Graph-based clustering techniques have widely been researched in the literature. Mst-based clustering is the well known graph-based model in producing the clusters of arbitrary shapes. However, the Mst-based clusterin...
详细信息
In the model-based development of controller software, the use of an unverified code generator/transformer may result in introducing unintended bugs in the controller implementation. To assure the correctness of the c...
详细信息
ISBN:
(纸本)9783030174620;9783030174613
In the model-based development of controller software, the use of an unverified code generator/transformer may result in introducing unintended bugs in the controller implementation. To assure the correctness of the controller software in the absence of verified code generator/transformer, we develop Linear Controller Verifier (LCV), a tool to verify a linear controller implementation against its original linear controller model. LCV takes as input a Simulink block diagram model and a C code implementation, represents them as linear time-invariant system models respectively, and verifies an input-output equivalence between them. We demonstrate that LCV successfully detects a known bug of a widely used code generator and an unknown bug of a code transformer. We also demonstrate the scalability of LCV and a real-world case study with the controller of a quadrotor system.
This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing and informat...
详细信息
ISBN:
(数字)9783319076744
ISBN:
(纸本)9783319076737;9783319384160
This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing and information technology. Experts in research, industry, and academia present the latest developments in technology, describe applications involving cutting-edge communication and computersystems and explore likely future directions. In addition, access is offered to numerous new algorithms that assist in solving computer and communication engineering problems. The book is based on presentations delivered at ICOCOE 2014, the 1stinternationalconference on Communication and computer Engineering. It will appeal to a wide range of professionals in the field, including telecommunication engineers, computer engineers and scientists, researchers, academics and students.
One of the important problems in moving objects control system is the calculating of goal abilities, i.e., potential of the system to perform its missions in different situations. Thus, the preliminary analysis of inf...
详细信息
ISBN:
(纸本)9783030198138;9783030198121
One of the important problems in moving objects control system is the calculating of goal abilities, i.e., potential of the system to perform its missions in different situations. Thus, the preliminary analysis of information and technological and goal abilities of moving objects control system is very important in practice and can be used to obtain reasonable means of the moving objects exploitation under different conditions. In the paper model-algorithmic support for abilities calculating of control system based on projection operators are proposed.
We consider the problem of verifying finite precision implementation of linear time-invariant controllers against mathematical specifications. A specification may have multiple correct implementations which are differ...
详细信息
ISBN:
(纸本)9783662545775;9783662545768
We consider the problem of verifying finite precision implementation of linear time-invariant controllers against mathematical specifications. A specification may have multiple correct implementations which are different from each other in controller state representation, but equivalent from a perspective of input-output behavior (e.g., due to optimization in a code generator). The implementations may use finite precision computations (e.g. floating-point arithmetic) which cause quantization (i.e., roundoff) errors. To address these challenges, we first extract a controller's mathematical model from the implementation via symbolic execution and floating-point error analysis, and then check approximate input-output equivalence between the extracted model and the specification by similarity checking. We show how to automatically verify the correctness of floating-point controller implementation in C language using the combination of techniques such as symbolic execution and convex optimization problem solving. We demonstrate the scalability of our approach through evaluation with randomly generated controller specifications of realistic size.
We consider the problem of verifying software implementations of linear time-invariant controllers against mathematical specifications. Given a controller specification, multiple correct implementations may exist, eac...
详细信息
ISBN:
(纸本)9783662496749;9783662496732
We consider the problem of verifying software implementations of linear time-invariant controllers against mathematical specifications. Given a controller specification, multiple correct implementations may exist, each of which uses a different representation of controller state (e.g., due to optimizations in a third-party code generator). To accommodate this variation, we first extract a controller's mathematical model from the implementation via symbolic execution, and then check input-output equivalence between the extracted model and the specification by similarity checking. We show how to automatically verify the correctness of C code controller implementation using the combination of techniques such as symbolic execution, satisfiability solving and convex optimization. Through evaluation using randomly generated controller specifications of realistic size, we demonstrate that the scalability of this approach has significantly improved compared to our own earlier work based on the invariant checking method.
To deal with the arduous task of hyperspectral image classification band selection is a prominent approach broadly used in the literature. Rough set (RS) theory is a paradigm suitable for handling uncertain, incomplet...
详细信息
The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pu...
详细信息
The proceedings contain 31 papers. The special focus in this conference is on Automatic Verification Methods for Finite state systems. The topics include: Process calculi, from theory to practice: Verification tools;f...
ISBN:
(纸本)9783540521488
The proceedings contain 31 papers. The special focus in this conference is on Automatic Verification Methods for Finite state systems. The topics include: Process calculi, from theory to practice: Verification tools;fair smg and linear time model checking;network grammars, communication behaviors and automatic verification;cCS, liveness, and local model checking in the linear time mu-calculus;implementing a model checking algorithm by adapting existing automated tools;on-line model-checking for finite linear temporal logic specifications;timing assumptions and verification of finite-state concurrent systems;specifying, programming and verifying real-time systems using a synchronous declarative language;modal specifications;testing equivalence as a bisimulation equivalence;automated verification of timed transition models;temporal logic case study;the complexity of collapsing reachability graphs;what are the limits of model checking methods for the verification of real life protocols?;requirement analysis for communication protocols;state exploration by transformation with lola;parallel protocol verification: The two-phase algorithm and complexity analysis;formal verification of synchronous circuits based on string-functional semantics: The 7 paillet circuits in boyer-moore;combining CTL, trace theory and timing models;localized verification of circuit descriptions;the concurrency workbench;verification of synchronous sequential machines based on symbolic execution;parallel composition of lockstep synchronous processes for hardware validation: Divide-and-conquer composition;argonaute: Graphical description, semantics and verification of reactive systems by using a process algebra;using the axiomatic presentation of behavioural equivalences for manipulating CCS specifications;verifying properties of large sets of processes with network invariants;a method for verification of trace and test equivalence.
We propose a variant of the Hierarchical Constraint Logic Programming (HCLP) scheme of Borning, Wilson, and others. We consider compositionality and incrementality in Constraint Logic Programming, introduce HCLP, and ...
详细信息
暂无评论