-
421
Neural network branching for neural network verification
Published 2020“…Formal verification of neural networks is essential for their deployment in safetycritical areas. …”
Journal article -
422
Solving parity games via priority promotion
Published 2016“…Parity games also have great practical interest, as they arise in many fields of theoretical computer science, most notably logic, automata theory, and formal verification. In this paper, we propose a new algorithm for the solution of the problem, based on the idea of promoting vertices to higher priorities during the search for winning regions. …”
Conference item -
423
Scaling the convex barrier with active sets
Published 2021“…We demonstrate that this results in significant formal verification speed-ups.…”
Conference item -
424
StocHy: automated verification and synthesis of stochastic processes
Published 2019“…Abstractions are then employed for (ii) formal verification or (iii) control (policy, strategy) synthesis. …”
Conference item -
425
A Complete Axiomatization of Quantified Differential Dynamic Logic for Distributed Hybrid Systems
Published 2012-11-01“…This is the first formal verification approach for distributed hybrid systems. …”
Get full text
Article -
426
Model Checking Synchronized Products of Infinite Transition Systems
Published 2007-11-01“…Formal verification using the model checking paradigm has to deal with two aspects: The system models are structured, often as products of components, and the specification logic has to be expressive enough to allow the formalization of reachability properties. …”
Get full text
Article -
427
A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure
Published 2022-01-01“…We then also present a formal verification of the HESTIA semantic model.…”
Get full text
Article -
428
Experience Report on Formally Verifying Parts of OpenJDK's API with KeY
Published 2018-11-01“…The KeY project constitutes a framework for specifying and verifying software systems, aiming at making formal verification tools applicable for mainstream software development. …”
Get full text
Article -
429
Towards Topology-Free Programming for Cyber-Physical Systems with Process-Oriented Paradigm
Published 2023-07-01“…The proposed approach was characterized, on the one hand, by a topologically independent specification of the control algorithm and, on the other hand, by the possibility of using existing formal verification methods by preserving the semantics of a centralized process-oriented program. …”
Get full text
Article -
430
Automated Mapping of UML Activity Diagrams to Formal Specifications for Supporting Containment Checking
Published 2014-04-01“…Based on existing formal verification techniques, we propose containment checking as a means to assess whether the system's behaviors described by the low-level models satisfy what has been specified in the high-level counterparts. …”
Get full text
Article -
431
On the Power of Uncertainties in Microbial System Modeling: No Need To Hide Them Anymore
Published 2017-12-01“…Taking into account uncertainties within microbial models calls for new validation techniques. Formal verification already overcomes this shortcoming by proposing modeling frameworks and validation techniques dedicated to probabilistic models. …”
Get full text
Article -
432
An Abstraction-Refinement Methodologyfor Reasoning about Network Games†
Published 2018-06-01“…The networks modeled by NGs may be huge. In formal verification, abstraction has proven to be an extremely effective technique for reasoning about systems with big and even infinite state spaces. …”
Get full text
Article -
433
Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime
Published 2022-05-01“…The security validation of the proposed system is done using the BAN logic. Formal verification is performed using the AVISPA tool. …”
Get full text
Article -
434
ADEFGuard: Anomaly detection framework based on Ethereum smart contracts behaviours
Published 2023-09-01“…Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. Formal verification and symbolic analysis have been employed to combat these destructive scams by analysing the codes and function calls, yet each scam's vulnerability should be discreetly predefined. …”
Get full text
Article -
435
Verification of measles elimination in Australia: Application of World Health Organization regional guidelines
Published 2019-04-01“…This article outlines Australia’s approach to addressing the guideline’s five lines of evidence, which led to formal verification of elimination by the WHO Regional Verification Commission (RVC) in March 2014. …”
Get full text
Article -
436
Model Checking Probabilistic Real-Time Properties for Service-Oriented Systems with Service Level Agreements
Published 2011-11-01“…In this paper, we suggest to employ the recently introduced model of Interval Probabilistic Timed Automata (IPTA) for formal verification of QoS properties of service-oriented systems. …”
Get full text
Article -
437
Verification Method of Safety Properties of Embedded Assembly Program by Combining SMT-Based Bounded Model Checking and Reduction of Interrupt Handler Executions
Published 2020-06-01“…Therefore, demands about the established method of formal verifications corresponding to those properties are increasing from the point of view of shorter development and high reliability. …”
Get full text
Article -
438
Proving Properties of Discrete-Valued Functions Using Deductive Proof: Application to the Square Root
Published 2019-12-01“…Other industries (e.g. aerospace, railway, nuclear) that produce critical systems requiring certification also took the path of formal verification techniques. One of these techniques is deductive proof. …”
Get full text
Article -
439
Linear-time Temporal Logic with Event Freezing Functions
Published 2017-09-01“…Formal properties represent a cornerstone of the system-correctness proofs based on formal verification techniques such as model checking. Formalizing requirements into temporal properties may be very complex and error prone, due not only to the ambiguity of the textual requirements but also to the complexity of the formal language. …”
Get full text
Article -
440
Parallel Prefix Polymorphism Permits Parallelization, Presentation & Proof
Published 2017“…Here, we show that polymorphism has broad applicability far beyond computations for technical computing: parallelism in distributed computing, presentation of visualizations of runtime data flow, and proofs for formal verification of correctness. The ability to reuse a single codebase for all these purposes provides new ways to understand and verify parallel programs.…”
Get full text
Get full text
Article