Specification patterns for robotic missions

C Menghi, C Tsigkanos, P Pelliccione… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Mobile and general-purpose robots increasingly support everyday life, requiring
dependable robotics control software. Creating such software mainly amounts to …

Ten commandments of formal methods... ten years later

JP Bowen, MG Hinchey - Computer, 2006 - ieeexplore.ieee.org
Ten Commandments of Formal Methods ...Ten Years Later Page 1 COVERFEATURE 0018-9162/06/$20.00
© 2006 IEEE 40 Computer Published by the IEEE Computer Society Real engineers use …

Service-orientation: conquering complexity with XMDD

T Margaria, B Steffen - Conquering complexity, 2012 - Springer
We advocate a new direction for mastering complexity in service-oriented design of complex
applications: eXtreme Model-Driven Development (XMDD). It is a new application …

OpenSBLI: Automated code-generation for heterogeneous computing architectures applied to compressible fluid dynamics on structured grids

DJ Lusher, SP Jammy, ND Sandham - Computer Physics Communications, 2021 - Elsevier
OpenSBLI is an open-source code-generation system for compressible fluid dynamics
(CFD) on heterogeneous computing architectures. Written in Python, OpenSBLI is an explicit …

Swarm technology at NASA: building resilient systems

E Vassev, R Sterritt, C Rouff, M Hinchey - IT Professional, 2012 - ieeexplore.ieee.org
Developing space systems is a complex task, driven by standards and safety requirements
to ensure reliability of sophisticated hardware and software. Future NASA missions will focus …

TFRC-CR: An equation-based transport protocol for cognitive radio networks

AK Al-Ali, K Chowdhury - Ad Hoc Networks, 2013 - Elsevier
Reliable and high throughput data delivery in cognitive radio networks remains an open
challenge owing to the inability of the source to quickly identify and react to changes in …

On-demand security requirements synthesis with relational generative adversarial networks

V Koscinski, S Hashemi… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Security requirements engineering is a manual and error-prone activity that is often
neglected due to the knowledge gap between cybersecurity professionals and software …

Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements

R Hassan, M Eltoweissy, S Bohner, S El-Kassas - IET software, 2010 - IET
Formal methods have long been advocated for the development of provably secure
software. However, the lack of formal requirements elaboration and the limited scalability …

ASSL specification and code generation of self-healing behavior for NASA swarm-based systems

E Vassev, M Hinchey - 2009 Sixth IEEE conference and …, 2009 - ieeexplore.ieee.org
The autonomic system specification language (ASSL) is a framework for formally specifying,
validating and generating autonomic systems. This paper presents concrete results on the …

Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results

S Kerckhof, F Durvaux, FX Standaert… - … on Hardware-Oriented …, 2013 - ieeexplore.ieee.org
The use of Soft Physical Hash (SPH) functions has been recently introduced as a flexible
and efficient way to detect Intellectual Property (IP) cores in microelectronic systems …