Results 1 - 10
of
118
Towards Automatic Verification of Autonomous Systems
- In IEEE/RSJ International conference on Intelligent Robots & Systems
, 2000
"... While autonomous systems offer great promise in terms of capability and flexibility, their reliability is particularly hard to assess. This paper describes research to apply formal verification methods to languages used to develop autonomy software. In particular, we describe tools that automaticall ..."
Abstract
-
Cited by 23 (1 self)
- Add to MetaCart
that automatically convert autonomy software into formal models that are then verified using model checking. This approach has been applied to MPL code for the Livingstone fault diagnosis system and to TDL task descriptions for mobile robot systems. Our long-term objective is to create tools that enable engineers
Towards Energy Consumption Evaluation of the SSL Handshake Protocol in Mobile Communications
"... Abstract—Secure Sockets Layer (SSL) protocol is the most popular security protocol, which provides confidentiality, au-thentication and integrity protection in Internet transactions. Nowadays, a large portion of them are executed by battery-powered handheld devices, such as personal digital assistan ..."
Abstract
- Add to MetaCart
assistants (PDAs), which are severely constrained by their resources, e.g. battery. This work launches an energy-aware study of the SSL Handshake protocol, the most complex part of SSL, considering a number of mobile SSL clients trying to simultaneously establish a secure connection with an SSL server
Verification and scheduling techniques for . . .
, 2005
"... Embedded computer systems have become ubiquitous. They are used in a wide spectrum of applications, ranging from household appliances and mobile devices to vehicle controllers and medical equipment. This dissertation deals with design and verification of embedded systems, with a special emphasis on ..."
Abstract
- Add to MetaCart
Embedded computer systems have become ubiquitous. They are used in a wide spectrum of applications, ranging from household appliances and mobile devices to vehicle controllers and medical equipment. This dissertation deals with design and verification of embedded systems, with a special emphasis
Transaction-Based Coordination of Software Agents
- in: 9th International Conference on Database and Expert System Applications (DEXA'98
, 1998
"... . Cooperative software agents provide a novel framework for building distributed applications. Central to the model is the support for sophisticated coordination and close cooperation among different agents working together towards accomplishing a specified task. In this paper, we focus on expressin ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
. Cooperative software agents provide a novel framework for building distributed applications. Central to the model is the support for sophisticated coordination and close cooperation among different agents working together towards accomplishing a specified task. In this paper, we focus
Towards a Human Trust Model for Mobile Ad-hoc Networks
"... Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically discover hosts and services with whom interactions can be started. However, the fear of exposure to risky transactions with un ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically discover hosts and services with whom interactions can be started. However, the fear of exposure to risky transactions
A Mobile-UNITY Specification of the Mobile IP Protocol
, 1996
"... This paper examines the mobile computing paradigm from a formal perspective. We show that existing assertional-style specification and verification methods can be extended to accommodate reasoning about mobile computations. The UNITY notation and proof logic provide the technical foundation for this ..."
Abstract
- Add to MetaCart
level. The research offers new insights into the modeling, specification, and verification of mobile protocols and applications. This is an important step toward the eventual delivery of high-dependability systems. The abstract and highly-decoupled specification of transient interactions employed
MoVES- A tool for Modelling and Verification of Embedded Systems
, 2007
"... www.imm.dtu.dk Embedded computer systems are making their way into more and more devices, from household appliances to mobile phones, PDAs and cars. Many of these systems have a limited amount of resources such memory and power, and must perform in a timely manner imposed by their application domain ..."
Abstract
- Add to MetaCart
domain. As it becomes harder to improve computer performance using sequential execution, the trend moves toward using Multi-processor System-on-Chip (MPSoC) designs, integrating multiple processing elements connected through an on-chip network. One or more applications are divided among these processing
Towards a Formal Framework for Mobile, Service-Oriented Sensor-Actuator Networks
"... Service-oriented sensor-actuator networks (SOSANETs) are deployed in health-critical ap-plications like patient monitoring and have to fulfill strong safety requirements. However, a framework for the rigorous formal modeling and analysis of SOSANETs does not exist. In particular, there is currently ..."
Abstract
- Add to MetaCart
Service-oriented sensor-actuator networks (SOSANETs) are deployed in health-critical ap-plications like patient monitoring and have to fulfill strong safety requirements. However, a framework for the rigorous formal modeling and analysis of SOSANETs does not exist. In particular, there is currently
Multi-Robot Target Verification With Reachability Constraints
, 2012
"... In search and rescue applications it is important that mobile ground robots can verify whether a potential target/victim is indeed a target of interest. This paper describes a novel approach to multi-robot target verification of multiple static objects. Suppose a team of multiple mobile ground rob ..."
Abstract
- Add to MetaCart
In search and rescue applications it is important that mobile ground robots can verify whether a potential target/victim is indeed a target of interest. This paper describes a novel approach to multi-robot target verification of multiple static objects. Suppose a team of multiple mobile ground
Towards Securing Databases on Mobile Devices: A Log-based Approach
"... Abstract Mobile devices like smart phones empower their users to download, install, and execute a spectrum of attractive applications from both service providers and third parties. Consequently, users are increasingly relying on such devices not only for storing personal data but also for enabling ..."
Abstract
- Add to MetaCart
Abstract Mobile devices like smart phones empower their users to download, install, and execute a spectrum of attractive applications from both service providers and third parties. Consequently, users are increasingly relying on such devices not only for storing personal data but also for enabling
Results 1 - 10
of
118