Testing, validation, and verification of robotic and autonomous systems: a systematic review

H Araujo, MR Mousavi, M Varshosaz - ACM Transactions on Software …, 2023‏ - dl.acm.org
We perform a systematic literature review on testing, validation, and verification of robotic
and autonomous systems (RAS). The scope of this review covers peer-reviewed research …

A scalable approach to attack graph generation

X Ou, WF Boyer, MA McQueen - … of the 13th ACM conference on …, 2006‏ - dl.acm.org
Attack graphs are important tools for analyzing security vulnerabilities in enterprise
networks. Previous work on attack graphs has not provided an account of the scalability of …

[PDF][PDF] Методы верификации программного обеспечения

ВВ Кулямин - М.: ИСП РАН, 2008‏ - bsivko.pbworks.com
В данной работе представлен обзор методов верификации программного обеспечения
(ПО). Верификацией называется проверка соответствия результатов отдельных …

Applying formal methods to a certifiably secure software system

C Heitmeyer, M Archer, E Leonard… - IEEE Transactions on …, 2008‏ - ieeexplore.ieee.org
A major problem in verifying the security of code is that the code's large size makes it much
too costly to verify in its entirety. This article describes a novel and practical approach to …

SpeAR v2. 0: Formalized past LTL specification and analysis of requirements

AW Fifarek, LG Wagner, JA Hoffman, BD Rodes… - NASA Formal Methods …, 2017‏ - Springer
This paper describes current progress on SpeAR, a novel tool for capturing and analyzing
requirements in a domain specific language designed to read like natural language. Using …

Formal specification and verification of data separation in a separation kernel for an embedded system

CL Heitmeyer, M Archer, EI Leonard… - Proceedings of the 13th …, 2006‏ - dl.acm.org
Although many algorithms, hardware designs, and security protocols have been formally
verified, formal verification of the security of software is still rare. This is due in large part to …

Generalized deformable spatial pyramid: Geometry-preserving dense correspondence estimation

J Hur, H Lim, C Park… - Proceedings of the IEEE …, 2015‏ - openaccess.thecvf.com
Abstract We present a Generalized Deformable Spatial Pyramid (GDSP) matching algorithm
for calculating the dense correspondence between a pair of images with large appearance …

An optimal convex hull algorithm and new results on cuttings

B Chazelle - [1991] Proceedings 32nd Annual Symposium of …, 1991‏ - computer.org
Abstract analysis on water quality and phytoplankton community structure was carried out
throughout the year of 2015. Nutritional status of Fuxian Lake was evaluated by means of …

Formal analysis of hardware requirements

I Pill, S Semprini, R Cavada, M Roveri… - Proceedings of the 43rd …, 2006‏ - dl.acm.org
Formal languages are increasingly used to describe the functional requirements
(specifications) of circuits. These requirements are used as a means to communicate design …

Authoring, analyzing, and monitoring requirements for a lift-plus-cruise aircraft

T Pressburger, A Katis, A Dutle, A Mavridou - … Working Conference on …, 2023‏ - Springer
Abstract [Context & Motivation] Requirements specification and analysis is widely applied to
ensure the correctness of industrial systems in safety critical domains. Requirements are …