Filters








66,733 Hits in 2.4 sec

Trigger Selection Strategies to Stabilize Program Verifiers [chapter]

K. R. M. Leino, Clément Pit-Claudel
2016 Lecture Notes in Computer Science  
At their core, the contributed techniques move the trigger selection logic away from the SMT solver and into the high-level verifier: this move allows authors of verifiers to annotate, rewrite, and analyze  ...  The paper demonstrates three core techniques (quantifier splitting, trigger sharing, and matching loop detection) by extending the Dafny verifier with its own trigger selection routine, and demonstrates  ...  While other sources remain, we argue that our strategies are ready to be used in program verifiers and look forward to further stability improvements.  ... 
doi:10.1007/978-3-319-41528-4_20 fatcat:xojvcws5creyjmnvyxxcnabfbu

Optimized Differential Evolution Algorithm for Software Testing

Xiaodong Gou, Tingting Huang, Shunkun Yang, Mengxuan Su, Fuping Zeng
2018 International Journal of Computational Intelligence Systems  
A B S T R A C T ID:p0065 Differential evolution (DE) algorithms for software testing usually exhibited limited performance and stability owing to possible premature-convergence-related aging during evolution  ...  The results of application of the proposed framework to instantiate three DE algorithms with different mutation schemas indicate that it significantly improved their effectiveness, performance, and stability  ...  We would like to thank Editage [www.editage.cn] for English language editing.  ... 
doi:10.2991/ijcis.2018.125905642 fatcat:s4az3vl3tjc2vo25k4qgh3qqxa

Event-triggered PI control for continuous plants with input saturation

L. G. Moreira, L. B. Groff, J. M. Gomes da Silva, S. Tarbouriech
2016 2016 American Control Conference (ACC)  
This paper proposes a methodology to design stabilizing event-trigger strategies for PI controlled linear continuous-time plants subject to input saturation.  ...  These conditions can be cast in an optimization problem to choose the parameters of the trigger function aiming at reducing the sampling activity, while ensuring the regional stability of the origin with  ...  A challenge in this case is to devise trigger conditions that ensure the stability of the closed-loop system under the aperiodic sampling strategy.  ... 
doi:10.1109/acc.2016.7525590 dblp:conf/amcc/MoreiraGST16 fatcat:jlro247z6neofgrs2lpjwswowu

PSOFuzzer: A Target-Oriented Software Vulnerability Detection Technology Based on Particle Swarm Optimization

Chen Chen, Han Xu, Baojiang Cui
2021 Applied Sciences  
Sidewinder, respectively, on tested software programs.  ...  The experimental results show that PSOFuzzer can generate more samples in the test process to reach the target point and can trigger vulnerabilities with 79% and 423% higher probability than AFLGo and  ...  runtime state of the program cannot be perceived to adjust the fuzzing strategy.  ... 
doi:10.3390/app11031095 fatcat:q46uxbejfnhbnfp54ri66nk4su

A Synchrophasor Based Optimal Voltage Control Scheme with Successive Voltage Stability Margin Improvement

Heng-Yi Su, Yi-Chung Chen, Yu-Liang Hsu
2016 Applied Sciences  
Specifically, a voltage stability margin estimation algorithm is developed and built in the newly designed adaptive secondary voltage control (ASVC) method to achieve more reliable and efficient voltage  ...  This new approach is applied to improve voltage profile across the entire power grid by an optimized plan for VAR (reactive power) sources allocation; therefore, voltage stability margin of a power system  ...  In order to verify the performance of the presented methodology to power system secondary voltage control, we have studied a lot of experiments.  ... 
doi:10.3390/app6010014 fatcat:h7qp7akefzhzvghsqslk5fimti

On composing and proving the correctness of reactive behavior

David Harel, Amir Kantor, Guy Katz, Assaf Marron, Lior Mizrahi, Gera Weiss
2013 2013 Proceedings of the International Conference on Embedded Software (EMSOFT)  
We show how program verification can be automated and streamlined by combining properties of individual modules, specified and verified separately, with application-independent specifications both of the  ...  The approach is based on behavioral programming (BP) and the Z3 SMT solver.  ...  Thus, in every run E0 can only be triggered at times that are divisible by N , and E1 may always be triggered. Our goal is to create a behavioral program that generates LN and prove its correctness.  ... 
doi:10.1109/emsoft.2013.6658591 dblp:conf/emsoft/HarelKKMMW13 fatcat:q636qmxfgrehzexq2nj6gcvway

Self-triggered observer based control of linear plants*

João Almeida, Carlos Silvestre, António Pascoal
2011 IFAC Proceedings Volumes  
The proposed solution extends previous results on state feedback stabilization to the case of dynamic output feedback by using an observer based approach.  ...  This paper addresses the problem of controlling a linear time-invariant plant when only its output is measured at discrete time instants, by using a self-triggered strategy.  ...  It is the goal of the scheduler to guarantee that certain stability conditions are verified by appropriately selecting the sequence of sampling intervals (τ k ) +∞ k=0 where τ k = t k+1 −t k denote the  ... 
doi:10.3182/20110828-6-it-1002.02235 fatcat:pjuxpiyl5req7bnopcvo3xybhi

An Approach to Self-adaptive Software Based on Supervisory Control [chapter]

Gabor Karsai, Akos Ledeczi, Janos Sztipanovits, Gabor Peceli, Gyula Simon, Tamas Kovacshazy
2003 Lecture Notes in Computer Science  
Self-adaptive software systems use observations of their own behavior, and that of their environment, to select and enact adaptations in accordance with some objective(s).  ...  In this paper, we show how this capability can be realized using techniques found in hierarchical control systems, and we discuss interrelated issues of stability, assurance, and implementation.  ...  Acknowledgement The DARPA/ITO SEC program (F33615-99-C-3611) has supported, in part, the activities described in this paper.  ... 
doi:10.1007/3-540-36554-0_3 fatcat:bram3zibfnbejfczhs6noj3asi

Robustness Testing of Intermediate Verifiers [article]

Yu-Ting Chen, Carlo A. Furia
2018 arXiv   pre-print
Experiments targeting 135 Boogie programs indicate that brittle behavior occurs fairly frequently (16 programs) and is not hard to trigger.  ...  All variants are, by construction, equivalent to the original program; thus, any variant that fails verification indicates lack of robustness in the verifier.  ...  In this work, we target this kind of robustness (stability) analysis of program verifiers.  ... 
arXiv:1805.03296v1 fatcat:37zu3viwgrafjivji7cebm3g7i

Verification Points for Self-adaptive Systems

Brian Phillips, Mark Blackburn
2014 Procedia Computer Science  
Systems begin with little information, and may start with erratic behavior selection. The system eventually achieves stability. This point of stability is referred to as Homeostasis [1] .  ...  The stabilization of behavior choices gives insight into how the adaptive system selects behaviors across time.  ... 
doi:10.1016/j.procs.2014.09.047 fatcat:dlwt6qojbvfqbcz4j5zp7n6wle

Impact of RRAM Read Fluctuations on the Program-Verify Approach

David M. Nminibapiel, Dmitry Veksler, Pragya R. Shrestha, Jason P. Campbell, Jason T. Ryan, Helmut Baumgart, Kin P. Cheung
2017 IEEE Electron Device Letters  
However, it was recently shown that program-verify methods are unworkable due to strong resistance state relaxation after SET/RESET programming.  ...  As such, program-verify methodologies are highly alluring.  ...  Therefore, a post-programming wait/delay still encounters fluctuations large enough to false trigger program verification.  ... 
doi:10.1109/led.2017.2696002 pmid:28890601 pmcid:PMC5590659 fatcat:lzqptoswrfafldb3l2n2s4hjri

Layered Management and Hybrid Control Strategy Based on Hybrid Automata and Random Forest for Microgrid

Chunxia Dou, Shengqi Teng, Tengfei Zhang, Bo Zhang, Kai Ma
2019 IET Renewable Power Generation  
In the middle layer coordinated control strategy, the hybrid automata is used to characterise the complex logical features of each underlying unit and trigger the switching of working modes according to  ...  It is used to realise energy management and multi-modal coordinated switching of microgrid system to ensure high security, stability and high efficiency.  ...  For the bottom level agents, internal switching control strategy and continuous dynamic management strategy are designed to ensure system stability during multi-modal switching.  ... 
doi:10.1049/iet-rpg.2019.0664 fatcat:l2cu33n4a5eyxl5qihkgdvlyju

Robust Stabilization of a Class of Nonlinear Systems via Aperiodic Sensing and Actuation

Niladri Sekhar Tripathy, Indra Narayan Kar, Mohammadreza Chamanbaz, Roland Bouffanais
2020 IEEE Access  
To compute the optimal event-triggering law, an optimization problem is solved using dynamic programming.  ...  As a next step, an event-triggering criterion is established to ensure input-to-state stability of (9).  ...  Algorithm 3 Dynamic Programming 1: Select the counter k = 1, initial valueê(0), time step ∆t, and integer N such that T = N × ∆t with T being the final execution time. 2: Discretize the continuous-time  ... 
doi:10.1109/access.2020.3018733 fatcat:shokme4rsvf57gzmddqaqlz4ki

A Self-Adapting Task Scheduling Algorithm for Container Cloud Using Learning Automata

Lilu Zhu, Kai Huang, Yanfeng Hu, Xianqing Tai
2021 IEEE Access  
actions of all tasks using Formula (3) 12: else 13: LA penalize the selected actions of all tasks using Formula (4) 14: end if 15: waiting to trigger the next dynamic scheduling scheduling mechanism to  ...  RP is the reward penalty strategy, that is, increase probability of selecting the action when it is rewarded by the environment.  ... 
doi:10.1109/access.2021.3078773 fatcat:xck26qmmizbttgvy4z3do7wvpe

Game authority for robust and scalable distributed selfish-computer systems

Shlomi Dolev, Elad M. Schiller, Paul G. Spirakis, Philippas Tsigas
2010 Theoretical Computer Science  
., the Internet, and propose designing self-stabilizing and Byzantine fault-tolerant distributed game authorities.  ...  Alternatively, when they do not assume that, designers turn to noncooperative games and seek an outcome that corresponds to a rough consensus when no coordination is allowed.  ...  Namely, given π −i , the strategy π i produces an outcome that is the most favorable to i. The middleware The task of the game authority is to verify that all agents play the game by its rules.  ... 
doi:10.1016/j.tcs.2010.02.014 fatcat:4pno4mtqajge7h7cgfc2jufkv4
« Previous Showing results 1 — 15 out of 66,733 results