Showing 161 - 180 results of 428 for search '"formal verification"', query time: 0.10s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164

    Verification of tree-based hierarchical read-copy update in the Linux kernel by Liang, L, McKenney, PE, Kroening, D, Melham, TF

    Published 2018
    “…This suggests use of formal verification. Previous formal verification efforts for RCU either focus on simple implementations or use modeling languages. …”
    Conference item
  5. 165

    Architecture of the Formally-Verified Distributed Ledger System InnoChain by Leonid Al'bertovich Merkin-Janson, Ruslan Maratovich Rezin, Nikolay Konstantinovich Vasilyev

    Published 2020-12-01
    “…In this paper we consider the software architecture of InnoChain, a distributed ledger system (DLS) with 5 levels of formal verification, including a formally-verified underlying operating system (OS). …”
    Get full text
    Article
  6. 166

    A statistical approach to assessing neural network robustness by Webb, S, Rainforth, T, Teh, Y, Mudigonda, P

    Published 2019
    “…Our approach critically varies from the formal verification framework in that when the property can be violated, it provides an informative notion of how robust the network is, rather than just the conventional assertion that the network is not verifiable. …”
    Conference item
  7. 167

    Analyzing model checking approach for multi agent system verification by Selamat, Ali, Abu Bakar, Najwa

    Published 2011
    “…Therefore, in this paper, we present our studies of formal verification of multi agent system using model checking approach. …”
    Conference or Workshop Item
  8. 168

    Extending the Real-Time Maude Semantics of Ptolemy to Hierarchical DE Models by Peter Csaba Ölveczky, Kyungmin Bae

    Published 2010-09-01
    “…The synthesis of a Real-Time Maude verification model from a Ptolemy II DE model, and the formal verification of the synthesized model in Real-Time Maude, have been integrated into Ptolemy II, enabling a model-engineering process that combines the convenience of Ptolemy II DE modeling and simulation with formal verification in Real-Time Maude.…”
    Get full text
    Article
  9. 169

    Verification of SpecC using predicate abstraction. by Clarke, E, Jain, H, Kroening, D

    Published 2007
    “…Languages such as SystemC or SpecC offer modeling of hardware and whole system designs at a high level of abstraction. However, formal verification techniques are widely applied in the hardware design industry only for low level designs, such as a netlist or RTL. …”
    Journal article
  10. 170

    Synthesis and verification of delf-aware computing systems by Calinescu, R, Autili, M, Camara, J, Di Marco, A, Gerasimou, S, Inverardi, P, Perucci, A, Jansen, N, Katoen, J, Kwiatkowska, M, Mengshoel, O, Spalazzese, R, Tivoli, M

    Published 2017
    “…This chapter describes two classes of key enabling techniques for self-adaptive systems: automated synthesis and formal verification. The ability to dynamically synthesize component connectors and compositions underpins the proactive adaptation of the architecture of self-aware systems. …”
    Book section
  11. 171

    Pengujian Ketentuan Penghapusan Norma dalam Undang-Undang by Muchamad Ali Safa’at

    Published 2016-05-01
    “… Theoretically and practically (judicial review), include two types, namely formal verification (formale toetsingrecht) and material verification (materielle toetsingrecht). …”
    Get full text
    Article
  12. 172

    A Formal Model For Real-Time Parallel Computation by Peter Hui, Satish Chikkagoudar

    Published 2012-12-01
    “…The imposition of real-time constraints on a parallel computing environment– specifically high-performance, cluster-computing systems– introduces a variety of challenges with respect to the formal verification of the system's timing properties. In this paper, we briefly motivate the need for such a system, and we introduce an automaton-based method for performing such formal verification. …”
    Get full text
    Article
  13. 173

    Successful use of incremental BMC in the automotive industry by Schrammel, P, Kroening, D, Brain, M, Martins, R, Teige, T, Bienmüller, T

    Published 2015
    “…Program analysis is on the brink of mainstream usage in embedded systems development. Formal verification of behavioural requirements, finding runtime errors and automated test case generation are some of the most common applications of automated verification tools based on Bounded Model Checking (BMC). …”
    Conference item
  14. 174

    Rotational abstractions for verification of quantum Fourier transform circuits by Arun Govindankutty, Sudarshan K. Srinivasan, Nimish Mathure

    Published 2023-06-01
    “…Therefore, this method is able to scale up to the verification of QFT circuits with 10,000 qubits and 50 million quantum gates, providing a meteoric advance in the size of QFT circuits thus far verified using formal verification methods.…”
    Get full text
    Article
  15. 175

    Verifikasi Command Transfer Protocol Menggunakan SPIN by Dewi, Ervin Kusuma, Pulungan, Reza

    Published 2014
    “…Formal verification adalah metode untuk membuktikan bahwa sebuah implementasi betul-betul mengimplementasikan apa yang dijabarkan dalam bentuk spesifikasinya. …”
    Get full text
    Conference or Workshop Item
  16. 176

    Data-efficient Bayesian verification of parametric Markov chains by Polgreen, E, Wijesuriya, V, Haesaert, S, Abate, A

    Published 2016
    “…Obtaining complete and accurate models for the formal verification of systems is often hard or impossible. …”
    Conference item
  17. 177

    Model Checking Spatial Logics for Closure Spaces by Vincenzo Ciancia, Diego Latella, Michele Loreti, Mieke Massink

    Published 2017-04-01
    “…We present a topology-based approach to formal verification of spatial properties depending upon physical space. …”
    Get full text
    Article
  18. 178

    Comprehensive Formal Modeling and Automatic Vulnerability Detection for a Bitcoin-Compatible Mixing Protocol by Xianglin Bao, Xiaofeng Xu, Ping Zhang, Tao Liu

    Published 2022-01-01
    “…This work proposes a symbolic model for Blindcoin and conducts comprehensive formal verification. Fine-grained security goals of Blindcoin are formalized and subsequently encoded as model lemmas. …”
    Get full text
    Article
  19. 179

    Incremental bounded model checking for embedded software by Schrammel, P, Kroening, D, Brain, M, Martins, R, Teige, T, Bienmüller, T

    Published 2017
    “…Program analysis is on the brink of mainstream usage in embedded systems development. Formal verification of behavioural requirements, finding runtime errors and test case generation are some of the most common applications of automated verification tools based on bounded model checking (BMC). …”
    Journal article
  20. 180

    Modeling Requirements for Collaborative Robotic Services by Oscar Stiven Morales Zapata, Yaney Gomez Correa, Leopoldo Rideki Yoshioka, Jose Reinaldo Silva

    Published 2023-11-01
    “…These interactions must be elicited and modeled during the requirements stage to maximize value creation through collaboration. Formal verification is necessary, taking into account the risks of human-robot interaction. …”
    Get full text
    Article