9,632 Hits in 6.0 sec

Towards a Hybrid Verification Methodology for Communication Protocols (Short Paper) [chapter]

Christian Bartolo Burlò, Adrian Francalanza, Alceste Scalas
2020 Lecture Notes in Computer Science  
We present our preliminary work towards a comprehensive solution for the hybrid (static + dynamic) verification of open distributed systems, using session types.  ...  We automate a solution for binary sessions where one endpoint is statically checked, and the other endpoint is dynamically checked by a monitor acting as an intermediary between typed and untyped components  ...  We view these approaches as two extremes on a continuum: our aim is to develop practical hybrid (static and dynamic) verification methodologies and tools for distributed programs in open settings.  ... 
doi:10.1007/978-3-030-50086-3_13 fatcat:xfaow2m4hvcpfelwoyevzaplsm

Design of a stateless low-latency router architecture for green software-defined networking

Silvia Saldaña Cercós, Ramon M. Ramos, Ana C. Ewald Eller, Magnos Martinello, Moisés R. N. Ribeiro, Anna Manolova Fagertun, Idelfonso Tafur Monroy, Atul K. Srivastava, Benjamin B. Dingel, Achyut K. Dutta
2015 Optical Metro Networks and Short-Haul Systems VII  
This paper presents an overview of a new approach named KeyFlow to simultaneously reduce latency, jitter, and power consumption in core network nodes.  ...  New south-bound protocols within SDN have been proposed to benefit from having control plane detached from the data plane offering a cost-and energy-efficient forwarding engine.  ...  In this paper a protocol within the SDN architecture named KeyFlow for design of stateless low-latency router architecture is presented.  ... 
doi:10.1117/12.2077560 fatcat:cdsoqd5wubbzhj3j4au2a6qdcq

Spatiotemporal enabled Content-based Image Retrieval

Mariana Belgiu, Martin Sudmanns, Tiede Dirk, Andrea Baraldi, Stefan Lang
2016 International Conference on GIScience Short Paper Proceedings  
In this paper, we propose a probabilistic method for estimation of the coverage of a sensor network based on 3D vector representation of the environment.  ...  A sensor in WSNs covers only a limited region, depending on its sensing and communicating ranges, as well as the environment configuration.  ...  for security in a multi-organizational context (NSF IIA-1427873).  ... 
doi:10.21433/b311729295dw fatcat:fulw4pw3kfh5nmfzcsy3pkisvm

Enhancing grammatical structures in web-based texts [chapter]

Leonardo Zilio, Rodrigo Wilkens, Cédrick Fairon
2017 CALL in a climate of change: adapting to turbulent global conditions – short papers from EUROCALL 2017  
Acknowledgements We would like to thank Dr Zöe Handely for her feedback and the students for their participation.  ...  Acknowledgements We thank the Walloon Region (Projects BEWARE 1510637 and 1610378) for support, and Altissia International for collaboration.  ...  In short: A poster is more Than a slideshow on paper. Let's keep this in mind.  ... 
doi:10.14705/rpnet.2017.eurocall2017.738 fatcat:oofyj56lfbhqjgnsinoj2rkxui

The first workshop on language support for privacy-enhancing technologies (PETShop'13)

Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
verification to exchange ideas and research results to improve the practicality of state of the art cryptographic privacy-enhancing technologies.  ...  The Workshop on Language Support for Privacy-Enhancing Technologies (PETShop'13) aims at bringing together researchers from the areas of security, programming languages, compiler construction, and program  ...  features two invited talks, six short papers, and one invited paper covering several of the above mentioned topics.  ... 
doi:10.1145/2508859.2509032 dblp:conf/ccs/FranzHMPV13 fatcat:qsu4uv4xhrhb5ljov6la65ka7e

RTL validation methodology on high complexity wireless microcontroller using OVM technique for fast time to market

Nurul Zhafirah Muhammad, A. Harun, N.A.M.A. Hambali, S. A. Z. Murad, S. N. Mohyar, M.N. Isa, AB Jambek, Mohamad Halim Abd. Wahid
2017 EPJ Web of Conferences  
This in essence brings about the discovery of dynamic verification, formal verification and hybrid techniques.  ...  Ergo, in this paper we are focusing on the methodology of verification that can be done at Register Transfer Level of SoC based on the AMBA bus design.  ...  This paper reviews the various methods used in SoC validation in the industry and proposes a suitable RTL validation methodology for wireless microcontroller system. Fig. 3.  ... 
doi:10.1051/epjconf/201716201068 fatcat:ha2hy6gyw5hxdgdpewo3q5py44

Meeting the Challenges of Critical and Extreme Dependability and Security

Paulo Esteves-Verissimo, Marcus Volp, Jeremie Decouchant, Vincent Rahli, Francisco Rocha
2017 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)  
In this position paper, we present this vision and describe our methodology, as well as the assurance arguments we make for the ultra-resilient components and protocols they enable, illustrated with case  ...  Extreme threats require extreme defenses: we propose resilience as a unifying paradigm to endow systems with the capability of dynamically and automatically handling extreme adversary power, and sustaining  ...  First steps towards the verification of ultra-resilient faulttolerant protocols have recently been made: Cryptographic primitives such as SHA, HMAC and RSA have been verified for example in Dafny as part  ... 
doi:10.1109/prdc.2017.21 dblp:conf/prdc/VerissimoVDRR17 fatcat:zztmil6xojgztdfrrfhkyv5dzy

On PSL Properties Re-use in SoC Design Flow Based on Transaction Level Modeling

Nicola Bombieri, Andrea Fedeli, Franco Fummi
2005 International Workshop on Microprocessor Test and Verification  
In this paper we present some key concepts concerning the Properties Specification Language (PSL) utilization in a system level verification flow for System on Chip (SoC) designs.  ...  How to save time and effort in the verification phase during system development steps and how to overcome global system verification limitations through a compositional approach are discussed.  ...  Concluding Remarks PSL utilization in a TLM-based verification flow for SoC designs has been analyzed in this paper.  ... 
doi:10.1109/mtv.2005.15 dblp:conf/mtv/BombieriFF05 fatcat:plm7z3hk2zcn5mrhrkac2nplge

Introductory Paper

Enrico Tronci
2006 International Journal on Software Tools for Technology Transfer (STTT)  
The above situation calls for better and better formal verification techniques at all steps of the design flow.  ...  Authors of well regarded papers from CHARME'03 were invited to submit to this special issue. All papers included here have been suitably extended and have undergone an independent round of reviewing.  ...  The paper Towards Diagrammability and Efficiency in Event Sequence Languages, by Fisler [44] , investigates the problem of devising event sequence languages for hardware verification.  ... 
doi:10.1007/s10009-005-0212-y fatcat:35xnumzg5vdzxozujfc67w5jgi

Amir Pnueli and the dawn of hybrid systems

Oded Maler
2010 Proceedings of the 13th ACM international conference on Hybrid systems: computation and control - HSCC '10  
He received the Turing Award in 1996 for proposing Temporal Logic as a language for specifying acceptable behaviors of concurrent systems He participated in pioneering efforts to extend verification methodology  ...  to timed and hybrid systems He wrote one of the first CS papers on hybrid automata (phase-transition systems) He was among the founders of HSCC and a member of the steering committee (1998)(1999)(2000  ...  Frehse) A tool platform for developing hybrid verification tools Two tools will be released: PHAVer 2.0 for linear hybrid automata and a tool for piecewise-linear differential equations based on LeGuernic  ... 
doi:10.1145/1755952.1755953 dblp:conf/hybrid/Maler10 fatcat:z3r3ii3lcrbwbd6hpurf2qerae

Low maintenance verification

Valeria Bertacco
2006 Proceedings of the 19th annual symposium on Integrated circuits and systems design - SBCCI '06  
, hybrid semi-formal verification technologies.  ...  While the past few decades have witnessed significant efforts to improve verification methodology for hardware systems, these efforts have been far outstripped by the massive complexity of modern digital  ...  The core advantages of this approach is that there is no need for a designer to know and to reproduce the correct communication protocol for a system.  ... 
doi:10.1145/1150343.1150347 dblp:conf/sbcci/Bertacco06a fatcat:g7l2sxlwfvg5jbqolcvezk6orm

Editorial: Dependable and Real-time Vehicular Communication for Intelligent Transportation Systems (ITS)

Muhammad Alam, Elad Schiller, Lei Shu, Xiaoling Wu, Unai Hernandez Jayo
2016 Journal on spesial topics in mobile networks and applications  
The first paper of this SI is "Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party" by Chingfang Hsu et al.  ...  Therefore, European Alliance for Innovation (EAI) took a step towards the realization of Future Intelligent Vehicular Technologies based on dependable and real-time communication and invite both academic  ...  Safety vehicular communications rely, instead on non-IP protocols, either the WAVE Short Message Protocol or the FAST Network and Transport Protocol.  ... 
doi:10.1007/s11036-016-0782-9 fatcat:ncqv7of55vfujhetojxhzyoshi

Formal Methods in Communication Protocol Design

G. Bochmann, C. Sunshine
1980 IRE Transactions on Communications Systems  
The Message Link Protocol [I21 for process-to-process communication has been formally specified in a hybrid model.  ...  Initial efforts at formal service specifications have been directed towards applying general software engineering methodology.  ... 
doi:10.1109/tcom.1980.1094685 fatcat:jrxd6je3hjgmraifmvyxxcbfke

Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

Rupinder Singh, Jatinder Singh, Ravinder Singh
2017 Wireless Communications and Mobile Computing  
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed.  ...  For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique.  ...  Gujral Punjab Technical University, Kapurthala, Punjab, India, for providing the opportunity to conduct this research work.  ... 
doi:10.1155/2017/3548607 fatcat:666snufxavbcjfgeissix2yafy

A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel

Abudhahir Buhari
2012 International journal of network security and its applications  
In this paper, we propose a quantum user authentication protocol with a single photon based on short shared secret key and quantum bit error ratio verification.  ...  In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate reduced photon transmission.  ...  IGK protocol mainly based on short shared secret key between the parties called Identification Key (IK). Unlike other QKD protocols, our protocol requires short shared secret key.  ... 
doi:10.5121/ijnsa.2012.4605 fatcat:7udp65tzuzayrakdxi7mit25ja
« Previous Showing results 1 — 15 out of 9,632 results