نتایج جستجو برای: safety verification

تعداد نتایج: 333394  

Journal: :Knowledge Eng. Review 2012
Arnaud Gotlieb

Safety-critical software must be thoroughly verified before being exploited in commercial applications. In particular, any TCAS (Traffic Alert and Collision Avoidance System) implementation must be verified against safety properties extracted from the anti-collision theory that regulates the controlled airspace. This verification step is currently realized with manual code reviews and testing. ...

Journal: :CoRR 2013
Domenico Bianculli Antonio Filieri Carlo Ghezzi Dino Mandrioli

Software verification of evolving systems is challenging mainstream methodologies and tools. Formal verification techniques often conflict with the time constraints imposed by change management practices for evolving systems. Since changes in these systems are often local to restricted parts, an incremental verification approach could be beneficial. This paper introduces SiDECAR, a general fram...

Journal: :IEEE Trans. Intelligent Transportation Systems 2001
Claire J. Tomlin Ian M. Mitchell Ronojoy Ghosh

We address the problem of generating provably-safe conflict resolution maneuvers for aircraft in uncertain environments. We assume that a maneuver is composed of a sequence of flight modes, which are segments of constant heading, of constant bank angle, or of constant airspeed. Each of these flight modes has associated to it the kinematics of the aircraft, and hence the maneuver is a hybrid sys...

2014
Elena Gómez-Martínez Ricardo J. Rodríguez Leire Etxeberria Elorza Miren Illarramendi Rezabal Clara Benac Earle

The verification of safety becomes crucial in critical systems where human lives depend on the correct functioning of such systems. Formal methods have often been advocated as necessary to ensure the reliability of software systems, albeit with a considerable effort. In any case, such an effort is cost-effective when verifying safety-critical systems. Safety requirements are usually expressed u...

Journal: :CoRR 2017
Kalev Alpernas Roman Manevich Aurojit Panda Shmuel Sagiv Scott Shenker Sharon Shoham Yaron Velner

ions for Safety of Networks of Middleboxes. We follow Velner et al. (2016) and abstract away the order of packets pending for each middlebox. Œis means that we may not be able to verify the safety of networks that rely on the order of received packets. Unfortunately, this abstraction does not suce for scalability. Œerefore, we suggest two further abstractions: (i) Abstract away correlations be...

2016
Kishor Kumar Reddy

This paper proposes two integrity verification schemes based on Schnorr Signature Scheme, which are named Safety Integrity Verification Scheme (SIVS) and Efficient Integrity Verification Scheme (EIVS). In the two verification schemes, for the user’s each challenge, the cloud storage server chooses randomly the sets of file blocks and verification blocks to generate response values, and the user...

1995
Zohar Manna Amir Pnueli

What do you do to start reading temporal verification of reactive systems safety? Searching the book that you love to read first or find an interesting book that will make you want to read? Everybody has difference with their reason of reading a book. Actuary, reading habit must be from earlier. Many people may be love to read, but not a book. It's not fault. Someone will be bored to open the t...

2012
Alexander Heußner Tristan Le Gall Grégoire Sutre

In order to verify protocols that tag messages with integer values, we investigate the decidability of the reachability problem for systems of communicating one-counter machines. These systems consist of local one-counter machines that asynchronously communicate by exchanging the value of their counters via, a priori unbounded, Fifo channels. This model extends communicating finite-state machin...

2010
Lijun Zhang Zhikun She Stefan Ratschan Holger Hermanns Ernst Moritz Hahn

The interplay of random phenomena and continuous dynamics deserves increased attention, especially in the context of wireless sensing and control applications. Safety verification for such systems thus needs to consider probabilistic variants of systems with hybrid dynamics. In safety verification of classical hybrid systems, we are interested in whether a certain set of unsafe system states ca...

Journal: :CoRR 2018
Peter Chini Roland Meyer Prakash Saivasan

We study the fine-grained complexity of Leader Contributor Reachability (LCR) and Bounded-Stage Reachability (BSR), two variants of the safety verification problem for shared memory concurrent programs. For both problems, the memory is a single variable over a finite data domain. We contribute new verification algorithms and lower bounds based on the Exponential Time Hypothesis (ETH) and kernel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید