We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Formal Verification of a Neural Network Based Prognostics System for Aircraft Equipment

    We demonstrate the use of formal methods to verify properties of a deep convolutional neural network that estimates remaining useful life of aircraft...
    Dmitrii Kirov, Simone Fulvio Rollini, ... Darren Cofer in Bridging the Gap Between AI and Reality
    Conference paper 2024
  2. Formal Verification of Arithmetic Masking in Hardware and Software

    Masking is a popular countermeasure to protect cryptographic implementations against physical attacks like differential power analysis. So far,...
    Barbara Gigerl, Robert Primas, Stefan Mangard in Applied Cryptography and Network Security
    Conference paper 2023
  3. Novel abstraction methods for TDMA based MAC protocols: Case of IIoT MAC Wireless HART Verification

    All Internet of Things application layer protocols are built on top of the Medium Access Control layer (MAC layer). The MAC Layer’s primary goal is...

    N. Suresh Kumar, G. Santhosh Kumar, ... A. Sreekumar in Telecommunication Systems
    Article 14 November 2023
  4. Verifying Collision Risk Estimation using Autonomous Driving Scenarios Derived from a Formal Model

    Autonomous driving technology is safety-critical and thus requires thorough validation. In particular, the probabilistic algorithms employed in...

    Jean-Baptiste Horel, Philippe Ledent, ... Wendelin Serwe in Journal of Intelligent & Robotic Systems
    Article 21 April 2023
  5. A Formal CHERI-C Semantics for Verification

    CHERI-C extends the C programming language by adding hardware capabilities, ensuring a certain degree of memory safety while remaining efficient....
    Seung Hoon Park, Rekha Pai, Tom Melham in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2023
  6. Formal Verification for VRM Requirement Models

    At the requirements level, formal verification and analysis are the focus of task’s attention which is develo** complex systems by formal methods....
    Yang Zhang, Jun Hu, ... Hao Rong in Communications, Signal Processing, and Systems
    Conference paper 2022
  7. New Horizons for Metamorphic Relationships in Formal Verification

    In this work we broadened the impact of the so called Metamorphic relationships (MR’s) in the formal verification phase. We showed the potential of...
    Fernando Asteasuain in Computer Science – CACIC 2022
    Conference paper 2023
  8. Formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol

    This paper introduces an abstract blockchain model that employs the Burn-to-Claim cross-blockchain protocol [1]. This multi-level simulator models a...
    Babu Pillai, Zhé Hóu, ... Vallipuram Muthukkumarasamy in Formal Methods and Software Engineering
    Conference paper 2023
  9. Polynomial Formal Verification of Complex Circuits Using a Hybrid Proof Engine

    The size and complexity of digital circuits are increasing; thus, they are becoming more and more error-prone. In order to prevent the bugs from...
    Alireza Mahzoon, Rolf Drechsler in Applicable Formal Methods for Safe Industrial Products
    Chapter 2023
  10. Exploring a Methodology for Formal Verification of Safety-Critical Systems

    As the formal verification of safety-critical software systems often requires the integration of multiple tools and techniques, we propose a...
    Oisín Sheridan in Rigorous State-Based Methods
    Conference paper 2023
  11. Introduction to the Special Issue on Runtime Verification

    Runtime verification (RV) refers to methods for formal reasoning about all aspects of the dynamic execution of systems, including hardware, software,...

    Jyotirmoy Deshmukh, Dejan Ničković in International Journal on Software Tools for Technology Transfer
    Article Open access 01 August 2023
  12. Verification

    This chapter emphasizes the critical need for thorough verification of embedded systems, building upon the advantages of SystemC models outlined in...
    Chapter 2024
  13. Introduction to the Special Issue on Runtime Verification

    Runtime verification (RV) refers to methods for formal reasoning about all aspects of the dynamic execution of systems, including hardware, software,...

    Article 01 August 2023
  14. Formal modeling and verification for amplification timing anomalies in the superscalar TriCore architecture

    Static worst-case timing analyses compute safe timing bounds of applications running in real-time systems. These bounds are necessary to evaluate the...

    Benjamin Binder, Mihail Asavoae, ... Mathieu Jan in International Journal on Software Tools for Technology Transfer
    Article 11 April 2022
  15. Polynomial Formal Verification of Arithmetic Circuits

    The size and the complexity of digital circuits are increasing rapidly. This makes the circuits highly error-prone. As a result, proving the...
    Conference paper 2022
  16. Embedding Formal Verification in Model-Driven Software Engineering with Slco: An Overview

    In 2009, the Simple Language of Communicating Objects (Slco) Domain-Specific Language was designed. Since then, a range of tools have been developed...
    Conference paper 2024
  17. Formal specification and verification of decentralized self-adaptive systems using symmetric nets

    Engineering distributed self-adaptive systems is challenging due to multiple interacting components, some of which monitor and possibly modify the...

    Matteo Camilli, Lorenzo Capra in Discrete Event Dynamic Systems
    Article Open access 05 August 2021
  18. Formal Methods for Industrial Critical Systems

    To stimulate the development and application of formal methods in industry, we need to promote research and development for the improvement of formal...

    Article Open access 15 February 2024
  19. An Approach for Formal Verification of Authentication Protocols

    Abstract

    Authentication protocols (APs) are one of the most important components of secure information systems. Authentication Protocols are...

    Article 01 February 2022
  20. Formal verification of neural agents in non-deterministic environments

    We introduce a model for agent-environment systems where the agents are implemented via feed-forward ReLU neural networks and the environment is...

    Michael E. Akintunde, Elena Botoeva, ... Alessio Lomuscio in Autonomous Agents and Multi-Agent Systems
    Article Open access 09 November 2021
Did you find what you were looking for? Share feedback.