-
161
-
162
-
163
-
164
Verification of tree-based hierarchical read-copy update in the Linux kernel
Published 2018“…This suggests use of formal verification. Previous formal verification efforts for RCU either focus on simple implementations or use modeling languages. …”
Conference item -
165
Architecture of the Formally-Verified Distributed Ledger System InnoChain
Published 2020-12-01“…In this paper we consider the software architecture of InnoChain, a distributed ledger system (DLS) with 5 levels of formal verification, including a formally-verified underlying operating system (OS). …”
Get full text
Article -
166
A statistical approach to assessing neural network robustness
Published 2019“…Our approach critically varies from the formal verification framework in that when the property can be violated, it provides an informative notion of how robust the network is, rather than just the conventional assertion that the network is not verifiable. …”
Conference item -
167
Analyzing model checking approach for multi agent system verification
Published 2011“…Therefore, in this paper, we present our studies of formal verification of multi agent system using model checking approach. …”
Conference or Workshop Item -
168
Extending the Real-Time Maude Semantics of Ptolemy to Hierarchical DE Models
Published 2010-09-01“…The synthesis of a Real-Time Maude verification model from a Ptolemy II DE model, and the formal verification of the synthesized model in Real-Time Maude, have been integrated into Ptolemy II, enabling a model-engineering process that combines the convenience of Ptolemy II DE modeling and simulation with formal verification in Real-Time Maude.…”
Get full text
Article -
169
Verification of SpecC using predicate abstraction.
Published 2007“…Languages such as SystemC or SpecC offer modeling of hardware and whole system designs at a high level of abstraction. However, formal verification techniques are widely applied in the hardware design industry only for low level designs, such as a netlist or RTL. …”
Journal article -
170
Synthesis and verification of delf-aware computing systems
Published 2017“…This chapter describes two classes of key enabling techniques for self-adaptive systems: automated synthesis and formal verification. The ability to dynamically synthesize component connectors and compositions underpins the proactive adaptation of the architecture of self-aware systems. …”
Book section -
171
Pengujian Ketentuan Penghapusan Norma dalam Undang-Undang
Published 2016-05-01“… Theoretically and practically (judicial review), include two types, namely formal verification (formale toetsingrecht) and material verification (materielle toetsingrecht). …”
Get full text
Article -
172
A Formal Model For Real-Time Parallel Computation
Published 2012-12-01“…The imposition of real-time constraints on a parallel computing environment– specifically high-performance, cluster-computing systems– introduces a variety of challenges with respect to the formal verification of the system's timing properties. In this paper, we briefly motivate the need for such a system, and we introduce an automaton-based method for performing such formal verification. …”
Get full text
Article -
173
Successful use of incremental BMC in the automotive industry
Published 2015“…Program analysis is on the brink of mainstream usage in embedded systems development. Formal verification of behavioural requirements, finding runtime errors and automated test case generation are some of the most common applications of automated verification tools based on Bounded Model Checking (BMC). …”
Conference item -
174
Rotational abstractions for verification of quantum Fourier transform circuits
Published 2023-06-01“…Therefore, this method is able to scale up to the verification of QFT circuits with 10,000 qubits and 50 million quantum gates, providing a meteoric advance in the size of QFT circuits thus far verified using formal verification methods.…”
Get full text
Article -
175
Verifikasi Command Transfer Protocol Menggunakan SPIN
Published 2014“…Formal verification adalah metode untuk membuktikan bahwa sebuah implementasi betul-betul mengimplementasikan apa yang dijabarkan dalam bentuk spesifikasinya. …”
Get full text
Conference or Workshop Item -
176
Data-efficient Bayesian verification of parametric Markov chains
Published 2016“…Obtaining complete and accurate models for the formal verification of systems is often hard or impossible. …”
Conference item -
177
Model Checking Spatial Logics for Closure Spaces
Published 2017-04-01“…We present a topology-based approach to formal verification of spatial properties depending upon physical space. …”
Get full text
Article -
178
Comprehensive Formal Modeling and Automatic Vulnerability Detection for a Bitcoin-Compatible Mixing Protocol
Published 2022-01-01“…This work proposes a symbolic model for Blindcoin and conducts comprehensive formal verification. Fine-grained security goals of Blindcoin are formalized and subsequently encoded as model lemmas. …”
Get full text
Article -
179
Incremental bounded model checking for embedded software
Published 2017“…Program analysis is on the brink of mainstream usage in embedded systems development. Formal verification of behavioural requirements, finding runtime errors and test case generation are some of the most common applications of automated verification tools based on bounded model checking (BMC). …”
Journal article -
180
Modeling Requirements for Collaborative Robotic Services
Published 2023-11-01“…These interactions must be elicited and modeled during the requirements stage to maximize value creation through collaboration. Formal verification is necessary, taking into account the risks of human-robot interaction. …”
Get full text
Article