Showing 261 - 280 results of 617 for search '"formal verification"', query time: 0.33s Refine Results
  1. 261
  2. 262
  3. 263
  4. 264
  5. 265
  6. 266
  7. 267

    Verification of tree-based hierarchical read-copy update in the Linux kernel by Liang, L, McKenney, PE, Kroening, D, Melham, TF

    Published 2018
    “…This suggests use of formal verification. Previous formal verification efforts for RCU either focus on simple implementations or use modeling languages. …”
    Conference item
  8. 268

    An experimental Study using ACSL and Frama-C to formulate and verify Low-Level Requirements from a DO-178C compliant Avionics Project by Frank Dordowsky

    Published 2015-08-01
    “…Safety critical avionics software is a natural application area for formal verification. This is reflected in the formal method's inclusion into the certification guideline DO-178C and its formal methods supplement DO-333. …”
    Get full text
    Article
  9. 269

    Architecture of the Formally-Verified Distributed Ledger System InnoChain by Leonid Al'bertovich Merkin-Janson, Ruslan Maratovich Rezin, Nikolay Konstantinovich Vasilyev

    Published 2020-12-01
    “…In this paper we consider the software architecture of InnoChain, a distributed ledger system (DLS) with 5 levels of formal verification, including a formally-verified underlying operating system (OS). …”
    Get full text
    Article
  10. 270

    A statistical approach to assessing neural network robustness by Webb, S, Rainforth, T, Teh, Y, Mudigonda, P

    Published 2019
    “…Our approach critically varies from the formal verification framework in that when the property can be violated, it provides an informative notion of how robust the network is, rather than just the conventional assertion that the network is not verifiable. …”
    Conference item
  11. 271

    Analyzing model checking approach for multi agent system verification by Selamat, Ali, Abu Bakar, Najwa

    Published 2011
    “…Therefore, in this paper, we present our studies of formal verification of multi agent system using model checking approach. …”
    Conference or Workshop Item
  12. 272

    Extending the Real-Time Maude Semantics of Ptolemy to Hierarchical DE Models by Peter Csaba Ölveczky, Kyungmin Bae

    Published 2010-09-01
    “…The synthesis of a Real-Time Maude verification model from a Ptolemy II DE model, and the formal verification of the synthesized model in Real-Time Maude, have been integrated into Ptolemy II, enabling a model-engineering process that combines the convenience of Ptolemy II DE modeling and simulation with formal verification in Real-Time Maude.…”
    Get full text
    Article
  13. 273

    Verification of Transaction Level Models of Embedded Systems by Lucky Lochi Yu Lo

    Published 2013-11-01
    “…In order to shorten this verification phase of the design, we propose a methodology to do formal verification of embedded systems. In formal verification no test cases are needed, but an mathematical analysis of the original model and the refined one. …”
    Get full text
    Article
  14. 274

    Verification of SpecC using predicate abstraction. by Clarke, E, Jain, H, Kroening, D

    Published 2007
    “…Languages such as SystemC or SpecC offer modeling of hardware and whole system designs at a high level of abstraction. However, formal verification techniques are widely applied in the hardware design industry only for low level designs, such as a netlist or RTL. …”
    Journal article
  15. 275

    Specification and Verification of Context-dependent Services by Naseem Ibrahim, Vangalur Alagar, Mubarak Mohammad

    Published 2011-08-01
    “…Without a formal basis it is not possible to justify through formal verification the correctness conditions for service compositions and the satisfaction of contractual obligations in service provisions. …”
    Get full text
    Article
  16. 276

    Trustworthy Refactoring via Decomposition and Schemes: A Complex Case Study by Dániel Horpácsi, Judit Kőszegi, Zoltán Horváth

    Published 2017-08-01
    “…Widely used complex code refactoring tools lack a solid reasoning about the correctness of the transformations they implement, whilst interest in proven correct refactoring is ever increasing as only formal verification can provide true confidence in applying tool-automated refactoring to industrial-scale code. …”
    Get full text
    Article
  17. 277

    Synthesis and verification of delf-aware computing systems by Calinescu, R, Autili, M, Camara, J, Di Marco, A, Gerasimou, S, Inverardi, P, Perucci, A, Jansen, N, Katoen, J, Kwiatkowska, M, Mengshoel, O, Spalazzese, R, Tivoli, M

    Published 2017
    “…This chapter describes two classes of key enabling techniques for self-adaptive systems: automated synthesis and formal verification. The ability to dynamically synthesize component connectors and compositions underpins the proactive adaptation of the architecture of self-aware systems. …”
    Book section
  18. 278

    Pengujian Ketentuan Penghapusan Norma dalam Undang-Undang by Muchamad Ali Safa’at

    Published 2016-05-01
    “… Theoretically and practically (judicial review), include two types, namely formal verification (formale toetsingrecht) and material verification (materielle toetsingrecht). …”
    Get full text
    Article
  19. 279

    Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Using SMT Solvers by Bence Czipó, Ákos Hajdu, Tamás Tóth, István Majzik

    Published 2017-03-01
    “…Statecharts are frequently used as a modeling formalism in the design of state-based systems. Formal verification techniques are also often applied to prove certain properties about the behavior of the system. …”
    Get full text
    Article
  20. 280

    A Formal Model For Real-Time Parallel Computation by Peter Hui, Satish Chikkagoudar

    Published 2012-12-01
    “…The imposition of real-time constraints on a parallel computing environment– specifically high-performance, cluster-computing systems– introduces a variety of challenges with respect to the formal verification of the system's timing properties. In this paper, we briefly motivate the need for such a system, and we introduce an automaton-based method for performing such formal verification. …”
    Get full text
    Article