The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces two complementary techniques, memoization-based and dependency-based incremental symbolic execution, that aim to optimize the analysis of state machine models that undergo change. We implement the two proposed techniques on IBM Rhapsody Statecharts and present some evaluation results.
Pacemaker is one of medical devices implanted in patients' bodies helping their health. It is important to certify accuracy and efficiency of the implanted device in all situations. If the device's software acts improperly, the patient's life will be threatened. As there may be a bug in the medical device's software, software verification is critical. Runtime software verification implies considering...
For the symbolic execution, dynamic taint analysis and theorem proving are widely used in software reverse engineering in recent years, the traditional code obfuscation can't make the JavaScript free of the reverse engineering, although the code may read hardly. Based on that, this paper proposes a code obfuscation technique to against the symbolic execution. This technique is based on the unsolved...
We present an automated compositional program verification technique for safety properties based on conditional inductive invariants. For a given program part (e.g., a single loop) and a postcondition ϕ, we show how to, using a Max-SMT solver, an inductive invariant together with a precondition can be synthesized so that the precondition ensures the validity of the invariant and that the invariant...
In this tutorial, I will present SeaHorn, a software verification framework. The key distinguishing feature of SeaHorn is its modular design that separates the concerns of the syntax of the programming language, its operational semantics, and the verification semantics. SeaHorn encompasses several novelties: it (a)~encodes verification conditions using an efficient yet precise inter-procedural technique,...
Hadoop YARN is evolving to become the de-facto standard that allows multiple data processing engines such as interactive SQL, real-time streaming, data science and batch processing to handle data stored in a single platform. And, there are lots of researches about efficiently managing cluster resources and scheduling parallel jobs over YARN clusters. However, the scheduling of sub-tasks derived from...
With continuous pressure for reducing vehicle development time & cost, without compromising reliability and quality from system, it is imperative to move from Road to Lab development. Every OEM is currently focusing on using virtual environment to complete the virtual testing and functional check for the system before hitting the road. This method of developing software and calibration in virtual...
Electronic controller unit (ECU) used for controlling sub-systems of complex real life applications like automotive vehicles can pose several challenges. Many times one needs to plan development and testing of controller, when the end vehicle is also under development and hence not available. In such case, hardware in the loop (HIL) approach for testing such controllers emulates the external application...
Program analysis is a highly active area of research, and the capacity and precision of software analyzers is improving rapidly. We investigate the use of modern software verification tools for formal property checking of hardware given in Verilog at register-transfer level. To this end, we translate RTL Verilog into an equivalent word-level ANSI-C program, according to synthesis semantics. The property...
National greenhouse gas (GHG) inventories are essential for public policy planning to mitigate GHG emissions. They provide critical information and enhance environmental integrity in planning and development of GHG mitigation policy. The characteristics of a high quality inventory are that it follows good practice according to the IPCC guidelines. The key components of good practice are that the inventory...
Automated test framework plays a significant role in test driven software development methodologies. The XUnit family of testing tools has been widely used in the industry. However, they are weak in supporting test case generation and test result checking. In this paper we propose a new kind of test automation framework by integrating data mutation testing and metamorphic testing methods. A tool for...
The increasing demand for air transport, as being forecasted for the next decade, and the difficulties associated with the expansion of existing infrastructures, have fostered the interest towards market-based mechanisms aimed at a more efficient use of available resources. Such mechanisms nevertheless require stakeholders to disclose private information, which can be used to recover key elements...
Services are self-contained and platform independent software components that aim at maximizing software reuse. The automated composition of services to a target software artifact has been tackled with many AI techniques, but existing approaches make unreasonably strong assumptions such as a predefined data flow, are limited to tiny problem sizes, ignore non-functional properties, or assume offline...
The main objective of this paper is to make a hardware/software system that could simulate an electric engine on a tablet with the Android operating system, having at our disposal the SIMATIC S7-1200 automate with the software program TIA Portal v11, implementing in this a PID for controlling the simulated electric motor. For simulating the electric motor on the tablet we used components that implement...
Traditional microprocessors have long benefited from the transistor density gains of Moore's law. Diminishing transistor speeds and practical energy limits however have created new challenges in technology, where the exponential performance improvements we have been accustomed to from previous computing generations continue to slowly cease. These factors signify that while transistors continue to...
The growth of digital technology have dramatically increased the security threats for computer networks over the last decade. Intrusion detection and prevention systems are designed to prevent and avoid any malicious attempts into the systems employing different types of hardware, software and classifiers. There are numerous studies developed to identify the virus attacks, protect the system from...
The SmartNIC is a User-Programmable 10GE NIC designed around industry standards to meet the demands of high performance networking in HPC and datacenter communities. The SmartNIC enables application-specific offload engines to be developed. Application developers can implementation application-aware offload engines, network developers can test and develop network protocol offload engines, and researchers...
An application for evacuation simulation using computational resources may help previewing situations, flows, conflicts, and behaviours that may only happen in a real danger situation. This kind of application enables the execution of several pre-defined scenarios at any time, without the expensive and complex allocation of real people. This paper proposes an emergency simulation system on oil platforms...
Regular physical activities such as weight training exercises are part of everyday modern life. If executed correctly, contribute to the health of its practitioners, for example, increases physical fitness, strengthen the muscles and the cardiovascular system, prevent obesity and stimulate the immune system. Many people practice physical exercises without an assistance of an expert in Physical Education...
Software architects who collaboratively evolve a software model rely on version control systems (VCSs) to synchronize their individual changes to the model. However, with the current generation of software model VCSs, architects remain unaware of newly arising conflicts until the next synchronization, raising the risk that delayed conflict resolution will be much harder. There are existing tools that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.