نتایج جستجو برای: safety verification

تعداد نتایج: 333394  

1994
Kevin G. Wika John C. Knight

Software plays a crucial role in a large number of safety-critical systems. In spite of this, many safety-critical systems exhibit residual software errors even after extensive implementation and verification efforts. We describe a software architecture based on a safety kernel that facilitates the implementation and verification of safety-critical software. Drawing many concepts from the relat...

2008
Karim Kanso Faron Moller Anton Setzer

In this paper we present a verification strategy for signalling principles for the control of a railway interlocking system written in ladder logic. All translation steps have been implemented and tested on a real-world example of a railway interlocking system. The steps in this translation are as follows: 1. The development of a mathematical model of a railway interlocking system and the trans...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Journal of image guided surgery 1995
J C Knight K G Wika

The use of software in safety-critical medical applications permits sophisticated functionality that would otherwise not be achievable. However, it is very difficult to ensure that software in these systems is dependable. In particular all software development techniques have limitations, and none can provide any guarantee of overall software dependability. Given this shortcoming, the approach ...

Journal: :International Journal on Software Tools for Technology Transfer 2017

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2023

In the context of verification data-aware processes, a formal approach based on satisfiability modulo theories (SMT) has been considered to verify parameterised safety properties. This requires combination model-theoretic notions and algorithmic techniques backward reachability. We introduce here Ontology-Based Processes, which are variant one most investigated models in this spectrum, namely s...

Journal: :Lecture Notes in Computer Science 2022

Temporal hyperproperties are system properties that relate multiple execution traces. For (finite-state) hardware, temporal supported by model checking algorithms, and tools for general logics like HyperLTL exist. (infinite-state) software, the analysis of has, so far, been limited to $k$-safety properties, i.e., stipulate absence a bad interaction between any $k$ In this paper, we present an a...

2018
Yang Wang Stefan Wagner

Context: Agile development is in widespread use, even in safety-critical domains. Motivation: However, there is a lack of an appropriate safety analysis and verification method in agile development. Objective: In this paper, we investigate the use of Behavior Driven Development (BDD) instead of standard User Acceptance Testing (UAT) for safety verification with System-Theoretic Process Analysis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید