Showing 1 - 20 results of 34 for search '"Formal methods"', query time: 0.08s Refine Results
  1. 1
  2. 2

    Towards Sophisticated Air Traffic Control System Using Formal Methods by Abdessamad Jarrar, Youssef Balouki

    Published 2018-01-01
    “…In such a critical safety system, the use of robust formal methods that assure bugs absence is highly required. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    A Formal Approach to Road Safety Assessment Using Traffic Conflict Techniques by Oumaima Barhoumi, Mohamed H. Zaki, Sofiene Tahar

    Published 2024-01-01
    “…As such, formal methods provide a novel way to model traffic rules and verify road users' compliance. …”
    Get full text
    Article
  14. 14

    Design, implementation and formal verification of BGP proxy for mimic router by Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU

    Published 2023-03-01
    “…To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communicated between the peer routers and the master actor were monitored by the BGP proxy.The BGP sessions with the slave actors on behalf of peer routers were established, ensuring the consistency of the BGP protocol states for all actors.The formal specification of the BGP proxy was written based on separation logic.The VeriFast theorem prover was used to prove that the program had no memory safety problems such as null pointer reference.Furthermore, the formal verification of high-level attributes of each module in BGP proxy was also conducted to strictly ensure that the implementation met the specification.The implementation to proof code ratio of BGP proxy is about 1.8:1, and the implementation to proof labor hour ratio is about 1:3.The formally verified BGP proxy consume 0.16 seconds to process 100 000 BGP routes, which is about 7 times as long as the unverified one.Works done provide a reference for applying formal methods to verify the safety and correctness of critical components in mimic defense equipment and systems.…”
    Get full text
    Article
  15. 15

    Teologia wśród nauk formalnych. Uwagi polemiczne do artykułu Krzysztofa Jaworskiego by Łukasz Remisiewicz

    Published 2025-01-01
    “…The author also addresses Jaworski’s objections and points to the need for a more precise definition of his earlier position, emphasizing the importance of formal methods and rules of text transformation in theology.…”
    Get full text
    Article
  16. 16

    Décomposer les humanités numériques by Michael Piotrowski, Aris Xanthos

    Published 2020-01-01
    “…More importantly, though, it increasingly becomes a liability in the context of the progressive institutionalisation of the digital humanities.Rather than vainly trying to find a definition of digital humanities that is at the same time descriptive and rigorous, we propose a stipulative definition that separates them into theoretical and applied digital humanities: the theoretical digital humanities are the metascientific discipline whose goal is the conception of formal methods that the applied digital humanities use to create formal models in the various humanities disciplines.…”
    Get full text
    Article
  17. 17

    System of systems method and formal function decomposition for software systems by LU Han-hua, ZHANG Shun-yi, WANG Ya-shi, MIN Li-juan

    Published 2010-01-01
    “…Based on the theory and method of system of system(SoS),the research work for the formal functional de-composition and estimation of large scale and open software systems was described,which were often emerged in IOT(internet of things) and cloud computing environments.It was proposed that abstraction description was necessary for the SoS properties of a large scale and open software system.Based on system abstract,formal methods for functional decomposition and estimation were described.The applications of the methods in system development and stable inter-mediate form building were discussed.The methods proposed here are helpful for improving the processes of implemen-tation,deployment and maintenance of large scale and open software systems in IOT and cloud computing environments.…”
    Get full text
    Article
  18. 18

    Analysis for e-commerce protocols based on ProVerif by GUO Yun-chuan1, DING Li3, ZHOU Yuan3, GUO Li1

    Published 2009-01-01
    “…It was very important to analyze e-commerce protocols by formal methods.A technique for modeling the fair-change e-commerce protocol(FEEP) with automated dispute resolution and for verifying its property was proposed.First, FEEP was modeled in applied picalculus and a novel formalization of the fairness was provided in term of a correspondence property.Then, ProVerif, proposed by Juels, Catalano and Jakobsson, was adopted to analyze FEEP automatically.The results show that:it is feasible to formalize the fairness based on a correspondence property;ProVerif can be used to verify the property that before event A happened, event B had happened, but it is not applicable to analyze the property that after event A happened, event B would happen.…”
    Get full text
    Article
  19. 19

    Analysis and improvement of the BACnet/IP based on identity authentication by Pengshou XIE, Jiafeng ZHU, Yongping KANG, Tao FENG, Wei LI, Yuxiang RAN

    Published 2024-03-01
    “…To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the protocol and modeling it using colored Petri net theory and CPN Tools, vulnerabilities in the security of BACnet/IP were identified.An improvement scheme was proposed based on the Dolev-Yao attacker model and formal analysis method.The BACnet/IP-SA protocol utilized the device’s pseudo-identity to safeguard the actual identity information.It emploied the PUF response for authentication and verified the authenticity of the counterparty’s identity.The session key was generated through the authentication value of the multi-information set.The protocol’s security was demonstrated by combining BAN logic and non-formal methods.The experimental results indicate that the proposed scheme can effectively resist security threats from multi-class attacks and key leakage, enhancing the security of the protocol authentication while reducing computational overhead.…”
    Get full text
    Article
  20. 20

    Formal Verification of Multi-Thread Minimax Behavior Using mCRL2 in the Connect 4 by Diego Escobar, Jesus Insuasti

    Published 2024-12-01
    “…The findings highlight the value of formal methods in validating the correctness of parallel artificial intelligence algorithms, laying the foundation for future optimizations that focus on performance.…”
    Get full text
    Article