Specification patterns for robotic missions
Mobile and general-purpose robots increasingly support everyday life, requiring
dependable robotics control software. Creating such software mainly amounts to …
dependable robotics control software. Creating such software mainly amounts to …
Ten commandments of formal methods... ten years later
JP Bowen, MG Hinchey - Computer, 2006 - ieeexplore.ieee.org
Ten Commandments of Formal Methods ...Ten Years Later Page 1 COVERFEATURE 0018-9162/06/$20.00
© 2006 IEEE 40 Computer Published by the IEEE Computer Society Real engineers use …
© 2006 IEEE 40 Computer Published by the IEEE Computer Society Real engineers use …
Service-orientation: conquering complexity with XMDD
T Margaria, B Steffen - Conquering complexity, 2012 - Springer
We advocate a new direction for mastering complexity in service-oriented design of complex
applications: eXtreme Model-Driven Development (XMDD). It is a new application …
applications: eXtreme Model-Driven Development (XMDD). It is a new application …
OpenSBLI: Automated code-generation for heterogeneous computing architectures applied to compressible fluid dynamics on structured grids
OpenSBLI is an open-source code-generation system for compressible fluid dynamics
(CFD) on heterogeneous computing architectures. Written in Python, OpenSBLI is an explicit …
(CFD) on heterogeneous computing architectures. Written in Python, OpenSBLI is an explicit …
Swarm technology at NASA: building resilient systems
Developing space systems is a complex task, driven by standards and safety requirements
to ensure reliability of sophisticated hardware and software. Future NASA missions will focus …
to ensure reliability of sophisticated hardware and software. Future NASA missions will focus …
TFRC-CR: An equation-based transport protocol for cognitive radio networks
AK Al-Ali, K Chowdhury - Ad Hoc Networks, 2013 - Elsevier
Reliable and high throughput data delivery in cognitive radio networks remains an open
challenge owing to the inability of the source to quickly identify and react to changes in …
challenge owing to the inability of the source to quickly identify and react to changes in …
On-demand security requirements synthesis with relational generative adversarial networks
V Koscinski, S Hashemi… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Security requirements engineering is a manual and error-prone activity that is often
neglected due to the knowledge gap between cybersecurity professionals and software …
neglected due to the knowledge gap between cybersecurity professionals and software …
Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements
R Hassan, M Eltoweissy, S Bohner, S El-Kassas - IET software, 2010 - IET
Formal methods have long been advocated for the development of provably secure
software. However, the lack of formal requirements elaboration and the limited scalability …
software. However, the lack of formal requirements elaboration and the limited scalability …
ASSL specification and code generation of self-healing behavior for NASA swarm-based systems
The autonomic system specification language (ASSL) is a framework for formally specifying,
validating and generating autonomic systems. This paper presents concrete results on the …
validating and generating autonomic systems. This paper presents concrete results on the …
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results
The use of Soft Physical Hash (SPH) functions has been recently introduced as a flexible
and efficient way to detect Intellectual Property (IP) cores in microelectronic systems …
and efficient way to detect Intellectual Property (IP) cores in microelectronic systems …