UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.596
1.
  • DEv-PROMELA: modeling, veri... DEv-PROMELA: modeling, verification, and validation of a video game by combining model-checking and simulation
    Yacoub, Aznam; Hamri, Maamar El Amine; Frydman, Claudia Simulation (San Diego, Calif.), 11/2020, Letnik: 96, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Modeling, verifying, and validating are essential steps in order to build systems and software that do what designers expect. If formal verification, and especially model-checking, is a popular ...
Celotno besedilo
2.
  • PROMELA based formal verifi... PROMELA based formal verification for safety-critical software
    XING Liang; DING Chengjun; DU Hupeng ... Xibei Gongye Daxue Xuebao, 10/2022, Letnik: 40, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    聚焦安全关键软件, 研究基于PROMELA形式模型验证C程序中违反断言、数组越界、空指针解引用、死锁及饥饿等5类故障技术。建立C程序抽象语法树节点到PROMELA模型, 验证属性相关函数到PROMELA模型的2类映射规则; 根据映射规则提出由C程序自动生成PROMELA形式模型的算法, 并对算法进行理论分析; 针对C程序中5种故障类型, 分别给出基于PROMELA模型的形式化验证方法, ...
Celotno besedilo
3.
  • Modeling an Edge Computing ... Modeling an Edge Computing Arithmetic Framework for IoT Environments
    Roig, Pedro Juan; Alcaraz, Salvador; Gilly, Katja ... Sensors (Basel, Switzerland), 01/2022, Letnik: 22, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    IoT environments are forecasted to grow exponentially in the coming years thanks to the recent advances in both edge computing and artificial intelligence. In this paper, a model of remote computing ...
Celotno besedilo

PDF
4.
  • Comprehensive evaluation of... Comprehensive evaluation of file systems robustness with SPIN model checking
    Yuan, Jingcheng; Aoki, Toshiaki; Guo, Xiaoyun Software testing, verification & reliability, September 2022, 2022-09-00, 20220901, Letnik: 32, Številka: 6
    Journal Article
    Recenzirano

    Summary In existing computer systems, file systems are indispensable for organizing user data and system codes. However, several studies have reported certain file system errors that cause ...
Celotno besedilo
5.
  • Formal Verification and Per... Formal Verification and Performance Analysis of a New Data Exchange Protocol for Connected Vehicles
    Chouali, Samir; Boukerche, Azzedine; Mostefaoui, Ahmed ... IEEE transactions on vehicular technology, 12/2020, Letnik: 69, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    In this article, we focus on the usage of MQTT (Message Queuing Telemetry Transport) within Connected Vehicles (CVs). Indeed, in the original version of MQTT protocol, the broker is responsible ...
Celotno besedilo

PDF
6.
  • Modeling of a Generic Edge ... Modeling of a Generic Edge Computing Application Design
    Roig, Pedro Juan; Alcaraz, Salvador; Gilly, Katja ... Sensors (Basel, Switzerland), 11/2021, Letnik: 21, Številka: 21
    Journal Article
    Recenzirano
    Odprti dostop

    Edge computing applications leverage advances in edge computing along with the latest trends of convolutional neural networks in order to achieve ultra-low latency, high-speed processing, low-power ...
Celotno besedilo

PDF
7.
  • Autotuning Parallel Program... Autotuning Parallel Programs by Model Checking
    Garanina, Natalia Olegovna; Gorlatch, Sergei Petrovich Modeling and Analysis of Information Systems, 12/2021, Letnik: 28, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The paper presents a new approach to autotuning data-parallel programs. Autotuning is a search for optimal program settings which maximize its performance. The novelty of the approach lies in the use ...
Celotno besedilo

PDF
8.
  • Novel abstraction methods f... Novel abstraction methods for TDMA based MAC protocols: Case of IIoT MAC Wireless HART Verification
    Kumar, N. Suresh; Kumar, G. Santhosh; Shailesh, S. ... Telecommunication systems, 2024/1, Letnik: 85, Številka: 1
    Journal Article
    Recenzirano

    All Internet of Things application layer protocols are built on top of the Medium Access Control layer (MAC layer). The MAC Layer’s primary goal is to limit or eliminate packet collisions. The ...
Celotno besedilo
9.
  • Dynamic state machines for ... Dynamic state machines for modelling railway control systems
    Benerecetti, M.; De Guglielmo, R.; Gentile, U. ... Science of computer programming, 01/2017, Letnik: 133
    Journal Article
    Recenzirano
    Odprti dostop

    Verification and Validation of railway controllers is the most critical and time-consuming phase in a system development life-cycle. It is regulated by international standards, which explicitly ...
Celotno besedilo

PDF
10.
  • Abstracting IoT protocols u... Abstracting IoT protocols using timed process algebra and SPIN model checker
    Suresh Kumar, N.; Santhosh Kumar, G. Cluster computing, 04/2023, Letnik: 26, Številka: 2
    Journal Article
    Recenzirano

    The advancement of the Internet of Things (IoT) has tremendously influenced many fields of human life. The Internet of Medical Things, Internet of Flying Things, Internet of Floating Things and ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.596

Nalaganje filtrov