Showing 361 - 380 results of 428 for search '"formal verification"', query time: 0.09s Refine Results
  1. 361

    Introduction to the Special Issue on Distributed Hybrid Systems by Abate, Alessandro, Fahrenberg, Uli, Fränzle, Martin

    Published 2022-12-01
    “…The vision and purpose of the DHS workshops was to connect researchers working in real-time systems, hybrid systems, control theory, formal verification, distributed computing, and concurrency theory, in order to advance the subject of distributed hybrid systems. …”
    Get full text
    Article
  2. 362

    Countermeasuring MITM Attacks in Solar-Powered PON-Based FiWi Access Networks by Polyxeni Tsompanoglou, Antonios Iliadis, Konstantinos Kantelis, Sophia Petridou, Petros Nicopolitidis

    Published 2023-02-01
    “…Consequently, this paper introduces two novel mechanisms for reducing ONU energy consumption, namely the <i>wake-up</i> and <i>time-out</i> mechanisms, which can be used to mitigate the effectiveness of MITM attacks that may seek to affect the unit’s operation due to battery drain. The formal verification results show that these goals were effectively achieved.…”
    Get full text
    Article
  3. 363

    Mapping Applications Intents to Programmable NDN Data-Planes via Event-B Machines by Ouassim Karrakchou, Nancy Samaan, Ahmed Karmouch

    Published 2022-01-01
    “…Second, EBM&#x2019;s formal verification property, referred to as its proof obligation, ensures that the desired properties of the network or its services, as defined by the intent, remain satisfied by the refined EBM representing the final data-plane configurations. …”
    Get full text
    Article
  4. 364

    Exact and Approximate Determinization of Discounted-Sum Automata by Udi Boker, Thomas A. Henzinger

    Published 2014-02-01
    “…Unfortunately, determinization of NDAs, which is often essential in formal verification, is, in general, not possible. We provide positive news, showing that every NDA with an integral discount factor is determinizable. …”
    Get full text
    Article
  5. 365

    An IOHMM-Based Framework to Investigate Drift in Effectiveness of IoT-Based Systems by Gérald Rocher, Stéphane Lavirotte, Jean-Yves Tigli, Guillaume Cotte, Franck Dechavanne

    Published 2021-01-01
    “…IoT-based systems, when interacting with the physical environment through actuators, are complex systems difficult to model. Formal verification techniques carried out at design-time being often ineffective in this context, these systems have to be quantitatively evaluated for effectiveness at run-time, i.e., for the extent to which they behave as expected. …”
    Get full text
    Article
  6. 366
  7. 367

    Sampling-Based Approximation Algorithms for Reachability Analysis with Provable Guarantees by Liebenwein, Lucas, Baykal, Cenk, Gilitschenski, Igor, Karaman, Sertac, Rus, Daniela L

    Published 2018
    “…The successful deployment of many autonomous systems in part hinges on providing rigorous guarantees on their performance and safety through a formal verification method, such as reachability analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 368
  9. 369

    Specification and verification of sequential machines in rule-based hardware languages by Bourgeat, Thomas

    Published 2023
    “…The other technique is to use hardware formal verification, which phrases correctness as custom temporal-logic formulae and checks that a concrete design verifies those properties by solving a large set of corresponding Boolean equations. …”
    Get full text
    Thesis
  10. 370

    Verifying Confidentiality Under Nondeterminism for Storage Systems by Ileri, Atalay Mert

    Published 2023
    “…This thesis tackles this problem using formal verification, a technique that involves proving a software system always satisfy certain requirements. …”
    Get full text
    Thesis
  11. 371
  12. 372

    EGHR : efficient group-based handover authentication protocols for mMTC in 5G wireless networks by Cao, Jin, Ma, Maode, Li, Hui, Fu, Yulong, Liu, Xuefeng

    Published 2020
    “…The BAN logic and the formal verification tool by using the AVISPA and SPAN show that our proposed protocols are secure against various malicious attacks.…”
    Get full text
    Journal Article
  13. 373

    SafeOSL: ensuring memory safety of C via ownership-based intermediate language by Yin, Xiaohua, Huang, Zhiqiu, Kan, Shuanglong, Shen, Guohua, Chen, Zhe, Liu, Yang, Wang, Fei

    Published 2023
    “…The unsafe features of C make it a big challenge to ensure memory safety of C programs, and often lead to memory errors that can result in vulnerabilities. Various formal verification techniques for ensuring memory safety of C have been proposed. …”
    Get full text
    Journal Article
  14. 374

    GBAAM : group-based access authentication for MTC in LTE networks by Cao, Jin, Ma, Maode, Li, Hui

    Published 2015
    “…The experimental results and formal verification by using the TLA+ and TLC show that the proposed scheme is secure against various malicious attacks.…”
    Get full text
    Get full text
    Journal Article
  15. 375

    A simple and robust handover authentication between HeNB and eNB in LTE networks by Cao, Jin, Li, Hui, Ma, Maode, Zhang, Yueyu, Lai, Chengzhe

    Published 2013
    “…The experimental results and formal verification by using the AVISPA tool show that the proposed scheme is efficient and secure against various malicious attacks.…”
    Get full text
    Get full text
    Journal Article
  16. 376

    Towards robust neural networks: evaluation and construction by Lu, J

    Published 2021
    “…A common approach for assessing the robustness of a neural network is through formal verification, which is often computationally expensive. …”
    Thesis
  17. 377

    Semantic refactorings by Kesseli, P

    Published 2017
    “…Our semantics-driven refactorings rely on formal verification algorithms to reason over a program’s behaviour, and we conjecture they are more precise and can handle more complex code scenarios than syntax-driven ones.…”
    Thesis
  18. 378

    Branch and bound for piecewise linear neural network verification by Bunel, R, Mudigonda, P, Turkaslan, I, Torr, P, Lu, J, Kohli, P

    Published 2020
    “…The success of Deep Learning and its potential use in many safety-critical applications has motivated research on formal verification of Neural Network (NN) models. In this context, verification involves proving or disproving that an NN model satisfies certain input-output properties. …”
    Journal article
  19. 379

    Modelling osteomyelitis by Liò, P, Paoletti, N, Moni, M, Atwell, K, Merelli, E, Viceconti, M

    Published 2012
    “…Finally we discuss different diagnostic estimators defined by formal verification techniques, in order to assess different bone pathologies (osteopenia, osteoporosis and osteomyelitis) in an effective way.…”
    Journal article
  20. 380

    Topics in monitoring and planning for embedded real-time systems by Ho, H

    Published 2015
    “…<p>The verification of real-time systems has gained much interest in the formal verification community during the past two decades. …”
    Thesis