-
1
-
2
Counterexample-Preserving Reduction for Symbolic Model Checking
Published 2014-01-01“…The cost of LTL model checking is highly sensitive to the length of the formula under verification. …”
Get full text
Article -
3
Survey on model checking based hardware Trojan detection technology
Published 2021-04-01Subjects: Get full text
Article -
4
Composable information flow verification for service chain based on model checking
Published 2014-11-01Subjects: “…model checking…”
Get full text
Article -
5
Adjusted automata learning algorithm for security protocol adaptive model checking
Published 2015-11-01Subjects: Get full text
Article -
6
Functionally-Equivalent Formalization and Automated Model Checking of Function Block Diagrams
Published 2025-01-01“…This article presents a new method based on functionally-equivalent formalisation and model checking. This method can be used for automatic verification of I&C algorithms by model checking while preserving obtained proofs from a formalised model in the original algorithm. …”
Get full text
Article -
7
Bounded Model Checking of ETL Cooperating with Finite and Looping Automata Connectives
Published 2013-01-01“…As a complementary technique of the BDD-based approach, bounded model checking (BMC) has been successfully applied to LTL symbolic model checking. …”
Get full text
Article -
8
BIM-Based Model Checking: A Scientometric Analysis and Critical Review
Published 2024-12-01“…The errors in BIM models can lead to significant losses in engineering projects, thus leading to BIM-based model checking (BMC) technology garnering an increasing amount of attention. …”
Get full text
Article -
9
Probabilistic Model Checking: One Step Forward in Wireless Sensor Networks Simulation
Published 2015-05-01“…A novel collision resolution algorithm for wireless sensor networks is formally analysed via probabilistic model checking. The algorithm called 2CS-WSN is specifically designed to be used during the contention phase of IEEE 802.15.4. …”
Get full text
Article -
10
Concurrent software fine‐coarse‐grained automatic modelling by Coloured Petri Nets for model checking
Published 2023-02-01“…Our method reduces the model and state space and ensures the error detection of the source program based on model checking. Moreover, we prove the equivalence of the fine‐grained model, the coarse‐grained model, and the program. …”
Get full text
Article -
11
-
12
Locality-guided based optimization method for bounded model checker
Published 2018-03-01Subjects: “…model checking…”
Get full text
Article -
13
Formal specification and security verification of usage control model based on PAT
Published 2016-03-01Subjects: Get full text
Article -
14
Automated configuration,simulation and verification platform for event-driven home automation IoT system
Published 2019-09-01Subjects: Get full text
Article -
15
Design and analysis of a novel fair payment protocol in mobile environments
Published 2007-01-01Subjects: Get full text
Article -
16
Modeling and verifying based on timed automata of Internet of things gateway security system
Published 2018-03-01Subjects: Get full text
Article -
17
The Impact of Collaboration Patterns and Network Centrality on Long-Term Contribution in GitHub Project
Published 2025-01-01Subjects: Get full text
Article -
18
Research on formal description and verification of automated trust negotiation
Published 2011-01-01“…First,a unified ATN formal framework was presented,into which typical negotiation strategies could be reduced.Second,the formal verification of ATN was defined based on the formal framework.The objectives and procedures of the formal verification of ATN were described.Third,several typical negotiation strategies were discussed,and the computational complexity of the corresponding verification problems was shown,several conclusions had been obtained.Last,the formal verification of ATN was implemented by using logic programming and model checking methods.The experimental results show that the number of rules is a crucial factor in determining the runtime.Both logic programming and model checking are efficient when the number of transition rules is small,and logic programming does not scale as well as model checking.…”
Get full text
Article -
19
A Latent Implementation Error Detection Method for Software Validation
Published 2013-01-01“…Model checking and conformance testing play an important role in software system design and implementation. …”
Get full text
Article -
20
Modeling and Analyzing CSMA/CA Protocol for Energy-Harvesting Wireless Sensor Networks
Published 2015-09-01“…This paper models the MAC protocol of CSMA/CA using timed automata on the message communication and the energy harvesting and analyzes the protocol through model checking of the major CTL properties. The modeling and analysis of CSMA/CA protocol with the comparative experiments give some performance results and also reveal that timing error may cause deadlock, and the accessibility is satisfied if no deadlock exists.…”
Get full text
Article