The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The UML is a populär modelling notation that has a natural appeal to hardware and Software engineers and is adaptable through extension mechanisms. Formal (mathematical) modelling languages, on the other hand, are seen as difficult and costly to use and have achieved only limited use despite the benefits that they offer. In previous work, we have proposed an Integration of UML and the formal notation,...
A methodology for introducing formal proof to embedded Systems development. It is based on the formal semantics of B, uses UML notation as the primary design language, provides a formally provable decomposition techique, applies model checking for the verification of temporal properties and supports hardware synthesis in addition to Software implementation.
In this chapter we discuss a conceptual framework for the basis of a UML profile for hardware/software co-design and the meta-models of the target languages such as SystemC used in this domain.
This case study involves the specification of a digital signal processor architecture as may be developed usingvelo ed usin MDA (Model Driven Architecture) techniques.
This book presents the perspective of the project on a Paradigm Unifying System Specification Environments for proven Electronic design (PUS SEE) as conceived in the course of the research during 2002 -2003. The initial statement of the research was formulated as follows: The objective of PUSSEE is to introduce the formal proof of system properties throughout a modular system design methodology that...
Every cloud data center has a geographical location, which is known to, at least, its owner. Still, it is a challenge for a cloud customer to discover indisputably the location of the data center, which hosts an active cloud based service and its data. Knowing the location is necessary to assess that pertinent geographical obligations of service level agreements and legal requirements are fulfilled...
We present a framework, which combines model checking and theorem prover based refinement for real-time systems design focusing on the refinement of non deterministic to timed deterministic finite state machines. Our verification flow starts from a cycle accurate finite state machine for the RAVEN model checker. We present a translation, which transforms the model into efficient B language code. After...
The uses of both the Unified Modelling Language and Rate Monotonic Analysis are increasing in the development of real-time systems. While both are addressing their usage it remains to be seen a clear, defined link between both UML and RMA. We present here a profile based upon the OMG’s UML Real-Time Profile (Schedulability Analysis Subsection) that allows the placement of timing information and the...
The increase in usage of mobile phones and the relative increase in the number of mobile phone thefts have imposed an overhead on securely retrieving the stolen or missing devices. While the mobile security researchers try to figure out various mechanisms to track such devices, attackers on the other hand are trying to exploit weaknesses in the mobile network system to dissipate into the dark side...
Surveillance is seen as a key tool to detect terrorist activities or to counteract attacks on critical communication infrastructure. Everybody is in those systems to some degree under suspicion. The principle of innocent till proven guilty does not seem to apply to modern surveillance technology usage. On the other hand, criminals would gain easily upper hand in communication networks that are not...
Ensuring the privacy of end-user data is of paramount importance. Allowing data analysts access to personally identifiable information can lead to legal problems, especially when the end-user has not given permission for such data to be used. This paper is concerned with the specification and processing of data collected from consumers as they interact with services such as those presented as ‘smart-phone’...
The process of designing and modelling an ontology can be difficult, especially if the user finds the syntax to be relatively inaccessible. Providing users with graphical syntax with which they can model and visualise their ontology has the potential to be helpful. Previously, we informally introduced concept diagrams for ontology visualisation and modelling. We present a case study comprising: (a)...
Numerous advances in the area of ubiquitous computing resulted in appearance of such paradigms as Smart Spaces, where a number of devices can use a shared view of resources and services. Nowadays we observing emerge of the smart space technologies, which are truly mobile and allowing equally efficient design of applications for the broad range of devices. An example of such smart spaces platform is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.