Architecting the future of software engineering
A Carleton, F Shull, E Harper - Computer, 2022 - ieeexplore.ieee.org
Architecting the Future of Software Engineering Page 1 COMPUTER 0018-9162/22©2022IEEE
PUBLISHED BY THE IEEE COMPUTER SOCIETY SEPTEMBER 2022 89 C O PY R IG H T IS TO …
PUBLISHED BY THE IEEE COMPUTER SOCIETY SEPTEMBER 2022 89 C O PY R IG H T IS TO …
Beagle: A new framework for smart contracts taking account of law
This paper presents a new Beagle framework for Smart Contracts (SCs) taking account of
law. Different from previous SC development or execution frameworks, this framework takes …
law. Different from previous SC development or execution frameworks, this framework takes …
B-PERFect: Applying the PERF Approach to B Based System Developments
An independent safety assessment of railway software systems is performed by RATP
(Régie Autonome des Transports Parisiens) for all safety-critical systems before their …
(Régie Autonome des Transports Parisiens) for all safety-critical systems before their …
Formal development process of safety-critical embedded human machine interface systems
This paper presents a formal development process for safety-critical embedded Human-
Machine Interface (HMI) systems. This formal approach is centered on the LIDL formal …
Machine Interface (HMI) systems. This formal approach is centered on the LIDL formal …
Simulation-Based Invariant Verification Technique for the OTS/CafeOBJ Method
We demonstrate the power of the simulation-based invariant verification technique through
two case studies in which it is formally verified that two mutual exclusion protocols, MCS …
two case studies in which it is formally verified that two mutual exclusion protocols, MCS …
Rigorous Safety-Critical Cyber-Physical Systems Development using Formal Methods
NK Singh - 2024 - hal.science
Today, we are surrounded by digital technologies and highly complex systems, where safety-
critical cyber-physical systems have taken central place in our lives and in various industrial …
critical cyber-physical systems have taken central place in our lives and in various industrial …
[HTML][HTML] Handling B models in the PERF integrated verification framework: Formalised and certified embedding
The design of complex systems involves several design models supporting different analysis
techniques for validation and verification purposes. These activities lead to the definition of …
techniques for validation and verification purposes. These activities lead to the definition of …
Parallel Specification-Based Testing for Concurrent Programs
The paper proposes a new testing technique for concurrent programs. The technique is a
specification-based testing. For a formal specification S and a concurrent program P, state …
specification-based testing. For a formal specification S and a concurrent program P, state …
[PDF][PDF] 形式検証ツールの並列化
MC DO - 2022 - dspace02.jaist.ac.jp
JAIST Repository Page 1 Japan Advanced Institute of Science and Technology JAIST
Repository https://dspace.jaist.ac.jp/ Title 形式検証ツールの並列化 Author(s) DO, MINH …
Repository https://dspace.jaist.ac.jp/ Title 形式検証ツールの並列化 Author(s) DO, MINH …
Formal techniques for cyber resilience: modeling, synthesis, and verification
MN Alsaleh - 2018 - search.proquest.com
As cyber vulnerability and complexity increases, cyber attacks become highly sophisticated
and inevitable. Therefore, cyber resilience is necessary to make cyber capable of …
and inevitable. Therefore, cyber resilience is necessary to make cyber capable of …