Zobrazeno 1 - 10
of 1 545
pro vyhledávání: '"A, Bonakdarpour"'
We study the problem of automatically repairing infinite-state software programs w.r.t. temporal hyperproperties. As a first step, we present a repair approach for the temporal logic HyperLTL based on symbolic execution, constraint generation, and sy
Externí odkaz:
http://arxiv.org/abs/2408.06035
In distributed systems with processes that do not share a global clock, \emph{partial synchrony} is achieved by clock synchronization that guarantees bounded clock skew among all applications. Existing solutions for distributed runtime verification u
Externí odkaz:
http://arxiv.org/abs/2408.05033
Causality is the relationship where one event contributes to the production of another, with the cause being partly responsible for the effect and the effect partly dependent on the cause. In this paper, we propose a novel and effective method to for
Externí odkaz:
http://arxiv.org/abs/2407.16629
We present the first decentralized algorithm for detecting predicates over continuous-time signals under partial synchrony. A distributed cyber-physical system (CPS) consists of a network of agents, each of which measures (or computes) a continuous-t
Externí odkaz:
http://arxiv.org/abs/2308.02763
Probabilistic hyperproperties express probabilistic relations between different executions of systems with uncertain behavior. HyperPCTL allows to formalize such properties, where quantification over probabilistic schedulers resolves potential non-de
Externí odkaz:
http://arxiv.org/abs/2307.05282
Autor:
Ganguly, Ritam, Bonakdarpour, Borzoo
Industrial Control Systems (ICS) are often built from geographically distributed components and often use programmable logic controllers for localized processes. Since verification of such systems is challenging because of both time sensitivity of th
Externí odkaz:
http://arxiv.org/abs/2301.13266
Many types of attacks on confidentiality stem from the nondeterministic nature of the environment that computer programs operate in (e.g., schedulers and asynchronous communication channels). In this paper, we focus on verification of confidentiality
Externí odkaz:
http://arxiv.org/abs/2301.07208
Bounded model checking (BMC) is an effective technique for hunting bugs by incrementally exploring the state space of a system. To reason about infinite traces through a finite structure and to ultimately obtain completeness, BMC incorporates loop co
Externí odkaz:
http://arxiv.org/abs/2301.06209
Autor:
Mao, Chengsheng, Xu, Jie, Rasmussen, Luke, Li, Yikuan, Adekkanattu, Prakash, Pacheco, Jennifer, Bonakdarpour, Borna, Vassar, Robert, Jiang, Guoqian, Wang, Fei, Pathak, Jyotishman, Luo, Yuan
Objective: We develop a deep learning framework based on the pre-trained Bidirectional Encoder Representations from Transformers (BERT) model using unstructured clinical notes from electronic health records (EHRs) to predict the risk of disease progr
Externí odkaz:
http://arxiv.org/abs/2212.06042
Autor:
Ganguly, Ritam, Xue, Yingjie, Jonckheere, Aaron, Ljung, Parker, Schornstein, Benjamin, Bonakdarpour, Borzoo, Herlihy, Maurice
Transactions involving multiple blockchains are implemented by cross-chain protocols. These protocols are based on smart contracts, programs that run on blockchains, executed by a network of computers. Because smart contracts can automatically transf
Externí odkaz:
http://arxiv.org/abs/2204.09796