Verification of the legOS Scheduler using Uppaal
نویسندگان
چکیده
منابع مشابه
Configuration Dynamics Verification Using UPPAAL
Modern software applications can have very complicated internal dynamics. Most of the software tools are written in an imperative programming language which can quickly become impractical for describing complex dynamics. Also, it is very hard to verify that the code actually covers fully all aspects of the tool’s dynamics. Propagation rules are suitable as a means for specification and verifica...
متن کاملCompositional Verification of Sensor Software Using Uppaal
Verification of wireless sensor networks has long been performed for communication protocols and for networklevel behavior over multiple nodes, but not for the basic properties that should hold at a single node. Testing sensor networks, however, is extremely hard due to the lack of controllability, and complex simulation setups are often too expensive to undertake. Thus, verification of propert...
متن کاملVerification of Plan Models Using UPPAAL
This paper describes work on the veriication of HSTS, the planner and sched-uler of the Remote Agent autonomous control system deployed in Deep Space 1 (DS1))8]. The veriication is done using UPPAAL, a real time model checking tool 6]. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a mapping of HSTS models into UPPAA...
متن کاملVerification of timed chi models using uppaal
Due to increasing system complexity and growing competition and costs, powerful techniques are needed to design and analyze manufacturing systems. One of the most popular techniques to do performance analysis is simulation. However, simulation-based analysis cannot guarantee the correctness of a system. Our research focuses on examining other methods to make performance analysis and functional ...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2000
ISSN: 1571-0661
DOI: 10.1016/s1571-0661(05)01223-5