Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Sebastian Biewer"'
Autor:
Sebastian Biewer, Rayna Dimitrova, Michael Fries, Maciej Gazda, Thomas Heinze, Holger Hermanns, Mohammad Reza Mousavi
Publikováno v:
Logical Methods in Computer Science, Vol Volume 18, Issue 1 (2022)
We present a novel and generalised notion of doping cleanness for cyber-physical systems that allows for perturbing the inputs and observing the perturbed outputs both in the time- and value-domains. We instantiate our definition using existing notio
Externí odkaz:
https://doaj.org/article/998ff7886624487db2c8d638d4699a15
Publikováno v:
Formal Techniques for Distributed Objects, Components, and Systems-40th IFIP WG 6.1 International Conference, FORTE 2020, Held as Part of the 15th International Federated Conference on Distributed Computing Techniques, DisCoTec 2020, Valletta, Malta, June 15–19, 2020, Proceedings
Lecture Notes in Computer Science
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE)
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.59-77, ⟨10.1007/978-3-030-50086-3_4⟩
Formal Techniques for Distributed Objects, Components, and Systems ISBN: 9783030500856
FORTE
Lecture Notes in Computer Science-Formal Techniques for Distributed Objects, Components, and Systems
Formal Techniques for Distributed Objects, Components, and Systems
Lecture Notes in Computer Science
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE)
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.59-77, ⟨10.1007/978-3-030-50086-3_4⟩
Formal Techniques for Distributed Objects, Components, and Systems ISBN: 9783030500856
FORTE
Lecture Notes in Computer Science-Formal Techniques for Distributed Objects, Components, and Systems
Formal Techniques for Distributed Objects, Components, and Systems
Part 1: Full Papers; International audience; We present a novel and generalised notion of doping cleanness for cyber-physical systems that allows for perturbing the inputs and observing the perturbed outputs both in the time– and value–domains. W
Publikováno v:
Quantitative Evaluation of Systems-16th International Conference, QEST 2019, Glasgow, UK, September 10–12, 2019, Proceedings
Quantitative Evaluation of Systems ISBN: 9783030302801
QEST
ACM Transactions on Modeling and Computer Simulation
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Quantitative Evaluation of Systems
Quantitative Evaluation of Systems ISBN: 9783030302801
QEST
ACM Transactions on Modeling and Computer Simulation
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Quantitative Evaluation of Systems
The software running in embedded or cyber-physical systems is typically of proprietary nature, so users do not know precisely what the systems they own are (in)capable of doing. Most malfunctionings of such systems are not intended by the manufacture
Publikováno v:
LPAR
EPiC Series in Computing volume 57
EPiC Series in Computing volume 57
Emission cleaning in modern cars is controlled by embedded software. In this context, the diesel emission scandal has made it apparent that the automotive industry is susceptible to fraudulent behaviour, implemented and effectuated by that control so
Publikováno v:
Runtime Verification ISBN: 9783030037680
RV
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Runtime Verification
Runtime Verification-18th International Conference, RV 2018, Limassol, Cyprus, November 10–13, 2018, Proceedings
RV
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Runtime Verification
Runtime Verification-18th International Conference, RV 2018, Limassol, Cyprus, November 10–13, 2018, Proceedings
The diesel emissions scandal has demonstrated that real-world behavior of systems can deviate excessively from the behavior shown under certification conditions. In response to the massive revelation of fraudulent behavior programmed inside diesel ca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6e516ee6f4756867130b98d28ff0834e
https://doi.org/10.1007/978-3-030-03769-7_17
https://doi.org/10.1007/978-3-030-03769-7_17
Publikováno v:
Programming Languages and Systems ISBN: 9783662544334
ESOP
Programming Languages and Systems-26th European Symposium on Programming, ESOP 2017
26th European Symposium on Programming (ESOP 2017)
ESOP
Programming Languages and Systems-26th European Symposium on Programming, ESOP 2017
26th European Symposium on Programming (ESOP 2017)
Usually, it is the software manufacturer who employs verification or testing to ensure that the software embedded in a device meets its main objectives. However, these days we are confronted with the situation that economical or technological reasons
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::254aac334ed30d57820c1334ac591c9f
http://arxiv.org/abs/1702.04693
http://arxiv.org/abs/1702.04693
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319631202
Models, Algorithms, Logics and Tools
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Models, Algorithms, Logics and Tools
Models, Algorithms, Logics and Tools
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Models, Algorithms, Logics and Tools
Milner’s CCS is a cornerstone of concurrency theory. This paper presents CCS as a cornerstone of concurrency practice. CCS is the semantic footing of pseuCo, an academic programming language designed to teach concurrent programming. The language fe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb1f11dcba021b4d9e260b56360ca692
https://doi.org/10.1007/978-3-319-63121-9_9
https://doi.org/10.1007/978-3-319-63121-9_9
Autor:
Christian Lander, Marco Speicher, Denise Paradowski, Norine Coenen, Sebastian Biewer, Antonio Krüger
Publikováno v:
Proceedings of the 4th International Symposium on Pervasive Displays.
Publikováno v:
2018 IEEE Workshop on Monitoring and Testing of Cyber-Physical Systems (MT-CPS)
MT@CPSWeek
MT@CPSWeek
We are confronted with a growing number of cases where device manufacturers equip their products with embedded software that includes functionalities that are not in the owner's interest. Examples include customer lock-in strategies in inkjet printer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2234079c562817ccc3fead6728c73b4c
Autor:
Biewer, Sebastian, Finkbeiner, Bernd, Hermanns, Holger, Köhl, Maximilian A., Schnitzer, Yannik, Schwenger, Maximilian
Publikováno v:
International Journal on Software Tools for Technology Transfer; Apr2023, Vol. 25 Issue 2, p205-218, 14p