Showing 1 - 20 results of 27 for search '"model checking"', query time: 0.06s Refine Results
  1. 1
  2. 2

    Counterexample-Preserving Reduction for Symbolic Model Checking by Wanwei Liu, Rui Wang, Xianjin Fu, Ji Wang, Wei Dong, Xiaoguang Mao

    Published 2014-01-01
    “…The cost of LTL model checking is highly sensitive to the length of the formula under verification. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Functionally-Equivalent Formalization and Automated Model Checking of Function Block Diagrams by Tomas Ausberger, Karel Kubicek, Pavla Medvedcova

    Published 2025-01-01
    “…This article presents a new method based on functionally-equivalent formalisation and model checking. This method can be used for automatic verification of I&C algorithms by model checking while preserving obtained proofs from a formalised model in the original algorithm. …”
    Get full text
    Article
  7. 7

    Bounded Model Checking of ETL Cooperating with Finite and Looping Automata Connectives by Rui Wang, Wanwei Liu, Tun Li, Xiaoguang Mao, Ji Wang

    Published 2013-01-01
    “…As a complementary technique of the BDD-based approach, bounded model checking (BMC) has been successfully applied to LTL symbolic model checking. …”
    Get full text
    Article
  8. 8

    BIM-Based Model Checking: A Scientometric Analysis and Critical Review by Sihao Li, Ziyang Jiang, Zhao Xu

    Published 2024-12-01
    “…The errors in BIM models can lead to significant losses in engineering projects, thus leading to BIM-based model checking (BMC) technology garnering an increasing amount of attention. …”
    Get full text
    Article
  9. 9

    Probabilistic Model Checking: One Step Forward in Wireless Sensor Networks Simulation by José A. Mateo, Hermenegilda Macià, M. Carmen Ruiz, Javier Calleja, Fernando Royo

    Published 2015-05-01
    “…A novel collision resolution algorithm for wireless sensor networks is formally analysed via probabilistic model checking. The algorithm called 2CS-WSN is specifically designed to be used during the contention phase of IEEE 802.15.4. …”
    Get full text
    Article
  10. 10

    Concurrent software fine‐coarse‐grained automatic modelling by Coloured Petri Nets for model checking by Wenjie Zhong, Jian‐tao Zhou, Tao Sun

    Published 2023-02-01
    “…Our method reduces the model and state space and ensures the error detection of the source program based on model checking. Moreover, we prove the equivalence of the fine‐grained model, the coarse‐grained model, and the program. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Research on formal description and verification of automated trust negotiation by GUAN Shang-yuan 1, WU Wei-guo 1, DONG Xiao-she 1, QIAN De-pei1

    Published 2011-01-01
    “…First,a unified ATN formal framework was presented,into which typical negotiation strategies could be reduced.Second,the formal verification of ATN was defined based on the formal framework.The objectives and procedures of the formal verification of ATN were described.Third,several typical negotiation strategies were discussed,and the computational complexity of the corresponding verification problems was shown,several conclusions had been obtained.Last,the formal verification of ATN was implemented by using logic programming and model checking methods.The experimental results show that the number of rules is a crucial factor in determining the runtime.Both logic programming and model checking are efficient when the number of transition rules is small,and logic programming does not scale as well as model checking.…”
    Get full text
    Article
  19. 19

    A Latent Implementation Error Detection Method for Software Validation by Jiantao Zhou, Jing Liu, Jinzhao Wu, Guodong Zhong

    Published 2013-01-01
    “…Model checking and conformance testing play an important role in software system design and implementation. …”
    Get full text
    Article
  20. 20

    Modeling and Analyzing CSMA/CA Protocol for Energy-Harvesting Wireless Sensor Networks by Zhi Chen, Ya Peng, Wenjing Yue

    Published 2015-09-01
    “…This paper models the MAC protocol of CSMA/CA using timed automata on the message communication and the energy harvesting and analyzes the protocol through model checking of the major CTL properties. The modeling and analysis of CSMA/CA protocol with the comparative experiments give some performance results and also reveal that timing error may cause deadlock, and the accessibility is satisfied if no deadlock exists.…”
    Get full text
    Article