We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 382 results
  1. Compositional verification of priority systems using sharp bisimulation

    Sharp bisimulation is a refinement of branching bisimulation, parameterized by a subset of the system’s actions, called strong actions. This...

    Luca Di Stefano, Frédéric Lang in Formal Methods in System Design
    Article 17 May 2023
  2. Generalized fuzzy variable precision rough sets based on bisimulations and the corresponding decision-making

    Recently, the classical rough set has been extended in many ways. However, some of them are based on binary relations which only excavate “one step”...

    Article 30 March 2022
  3. Communicating Piecewise Deterministic Markov Processes

    In this chapter we introduce the automata framework CPDP, which stands for Communicating Piecewise Deterministic Markov Processes. CPDP is developed...
    Stefan Strubbe, Arjan van der Schaft in Stochastic Hybrid Systems
    Chapter
  4. Bisimulation of type 2 for BL-general fuzzy automata

    In this note, first, we define bisimulation of type 2 for a basic logic general fuzzy automaton and show that if there exists a bisimulation of type...

    Marzieh Shamsizadeh, Mohammad Mehdi Zahedi in Soft Computing
    Article 14 March 2019
  5. Equivalence checking and intersection of deterministic timed finite state machines

    There has been a growing interest in defining models of automata enriched with time, such as finite automata extended with clocks (timed automata)....

    Davide Bresolin, Khaled El-Fakih, ... Nina Yevtushenko in Formal Methods in System Design
    Article Open access 01 December 2021
  6. Compositional verification of concurrent systems by combining bisimulations

    Frédéric Lang, Radu Mateescu, Franco Mazzanti in Formal Methods in System Design
    Article 18 February 2021
  7. Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation

    As evidenced from current literature in software security, the current signature detection mechanisms can be easily evaded by attackers simply...
    Giuseppe Crincoli, Tiziano Marinaro, ... Antonella Santone in Advanced Information Networking and Applications
    Conference paper 2020
  8. Introducing fuzzy reactive graphs: a simple application on biology

    In this paper, we propose a generalization for fuzzy graphs in order to model reactive systems with fuzziness. As we will show, the resulting fuzzy...

    Regivan Santiago, Manuel A. Martins, Daniel Figueiredo in Soft Computing
    Article 31 March 2021
  9. Elimination of Detached Regions in Dependency Graph Verification

    The formalism of dependency graphs by Liu and Smolka is a well-established method for on-the-fly computation of fixed points over Boolean domains...
    Peter Gjøl Jensen, Kim Guldstrand Larsen, ... Nikolaj Jensen Ulrik in Model Checking Software
    Conference paper 2023
  10. Transforming Dynamic Condition Response Graphs to Safe Petri Nets

    We present a transformation of the Dynamic Condition Response (DCR) graph constraint based process specification language to safe Petri Nets with...
    Vlad Paul Cosma, Thomas T. Hildebrandt, Tijs Slaats in Application and Theory of Petri Nets and Concurrency
    Conference paper 2023
  11. Overview of the Stream Theory-Based Big Data in Livestream

    The big data in livestream (BDL) are existing at various forms everywhere in the world. Based on these facts, we find that not yet mathematical...

    Dang Van Pham, Vinh Cong Phan in Mobile Networks and Applications
    Article 02 August 2023
  12. Algebraic aspects of big data in livestream in internet of mobile things

    Big data in livestream (BDL) is topic of interesting today, due to BDL appearing in the most of Internet of Mobile Things (IoMT). Algebraic aspects...

    Dang Van Pham, Vinh Cong Phan in Mobile Networks and Applications
    Article 24 April 2024
  13. Dissecting ltlsynt

    ltlsynt is a tool for synthesizing a reactive circuit satisfying a specification expressed as an LTL formula. ltlsynt generally follows a textbook...

    Florian Renkin, Philipp Schlehuber-Caissier, ... Adrien Pommellet in Formal Methods in System Design
    Article 01 December 2022
  14. Approximate bisimulation relations for fuzzy automata

    Chao Yang, Yongming Li in Soft Computing
    Article 09 November 2017
  15. Extended Future in Testing Semantics for Time Petri Nets

    Dense-Time Petri Nets (TPNs) are a widely-accepted model suitable for qualitative and quantitative modeling and verifying safety-critical,...
    Elena Bozhenkova, Irina Virbitskaite in Concurrency, Specification and Programming
    Chapter 2023
  16. Verification of Reaction Systems Processes

    Reaction Systems (RSs) are a computational framework inspired by biological systems. A RS is formed by a set of entities together with a set of...
    Linda Brodo, Roberto Bruni, Moreno Falaschi in Challenges of Software Verification
    Chapter 2023
  17. Formal methods: practical applications and foundations

    Maurice H. ter Beek, Annabelle McIver in Formal Methods in System Design
    Article 06 July 2021
  18. Information-flow control on ARM and POWER multicore processors

    Weak memory models implemented on modern multicore processors are known to affect the correctness of concurrent code. They can also affect whether or...

    Graeme Smith, Nicholas Coughlin, Toby Murray in Formal Methods in System Design
    Article 08 June 2021
  19. Decidability for \(\mathsf S4\) Gödel Modal Logics

    We introduce semantics for crisp and fuzzy Gödel \(\mathsf S4\)...
    Chapter 2023
  20. State and Action Abstraction for Search and Reinforcement Learning Algorithms

    Decision-making in large and dynamic environments has always been a challenge for AI agents. Given the multitude of available sensors in robotics and...
    Chapter 2023
Did you find what you were looking for? Share feedback.