Zobrazeno 1 - 10
of 90
pro vyhledávání: '"Spécification formelle"'
Publikováno v:
[Research Report] RR-9407, Inria. 2021, pp.43
HAL
HAL
Deductive Verification aims at verifying that a given program code conforms to a formal specification of its intended behaviour. That approachproceeds by generating mathematical statements whose validity entails the conformance of the program. Such s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5063f7820de24ae11d7498756bbeae08
https://inria.hal.science/hal-03213438/document
https://inria.hal.science/hal-03213438/document
Autor:
Lourenço, Cláudio, Cousineau, Denis, Faissole, Florian, Marché, Claude, Mentré, David, Inoue, Hiroaki
Publikováno v:
[Research Report] RR-9402, Inria. 2021, pp.25
Programmable logic controllers (PLC) are industrial digital computers used as automation controllers of manufacturing processes, such as assembly lines or robotic devices. The Ladder language, also known as Ladder Logic, is a programming language use
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::c2b533e677c1c15eaff4516cd49f8421
https://hal.inria.fr/hal-03199464
https://hal.inria.fr/hal-03199464
Autor:
Nganyewou Tidjon, Lionel
Publikováno v:
Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris; Université de Sherbrooke (Québec, Canada), 2020. English. ⟨NNT : 2020IPPAS021⟩
The cybersecurity ecosystem continuously evolves with the number, the diversity, and the complexity of cyber attacks. Generally, we have three IDS types: anomaly-based detection, signature-based detection, and hybrid detection. Anomaly detection is b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::4ed1e08341a5eea0d1021ba3200df34e
https://tel.archives-ouvertes.fr/tel-03137661
https://tel.archives-ouvertes.fr/tel-03137661
Autor:
Nganyewou Tidjon, Lionel
Publikováno v:
Networking and Internet Architecture [cs.NI]. Institut Polytechnique de Paris; Université de Sherbrooke (Québec, Canada), 2020. English. ⟨NNT : 2020IPPAS021⟩
The cybersecurity ecosystem continuously evolves with the number, the diversity, and the complexity of cyber attacks. Generally, we have three IDS types: anomaly-based detection, signature-based detection, and hybrid detection. Anomaly detection is b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4ed1e08341a5eea0d1021ba3200df34e
https://theses.hal.science/tel-03137661
https://theses.hal.science/tel-03137661
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 240, Iss Proc. F-IDE 2016, Pp 38-52 (2017)
F-IDE@FM
Electronic Proceedings in Theoretical Computer Science (EPTCS)
3rd Workshop on Formal Integrated Development Environment
3rd Workshop on Formal Integrated Development Environment, Catherine Dubois; Dominique Mery; Paolo Masci, Nov 2016, Limassol, Cyprus
idUS. Depósito de Investigación de la Universidad de Sevilla
instname
F-IDE@FM
Electronic Proceedings in Theoretical Computer Science (EPTCS)
3rd Workshop on Formal Integrated Development Environment
3rd Workshop on Formal Integrated Development Environment, Catherine Dubois; Dominique Mery; Paolo Masci, Nov 2016, Limassol, Cyprus
idUS. Depósito de Investigación de la Universidad de Sevilla
instname
Many project-specific languages, including in particular filtering languages, are defined using non-formal specifications written in natural languages. This leads to ambiguities and errors in the specification of those languages. This paper reports o
Autor:
Sayar, Imen
Le développement de spécifications formelles correctes pour des systèmes et logiciels commence par l’analyse et la compréhension des besoins du client. Entre ces besoins décrits en langage naturel et leur spécification définie dans un langag
Externí odkaz:
http://www.theses.fr/2019LORR0030/document
Publikováno v:
[Research Report] RR-9060, Inria Saclay Ile de France. 2017, pp.53
In critical software systems like the ones related to transport and defense, it is common toperform numerical computations implemented using floating-point arithmetic. Safety conditions for suchsystems typically require strong guarantees on the funct
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::cb3d9f20da1817cf061cf34581b306ea
https://hal.inria.fr/hal-01511183
https://hal.inria.fr/hal-01511183
Publikováno v:
[Research Report] RR-9060, Inria Saclay Ile de France. 2017, pp.53
In critical software systems like the ones related to transport and defense, it is common toperform numerical computations implemented using floating-point arithmetic. Safety conditions for suchsystems typically require strong guarantees on the funct
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::cb3d9f20da1817cf061cf34581b306ea
https://inria.hal.science/hal-01511183/file/RR-9060.pdf
https://inria.hal.science/hal-01511183/file/RR-9060.pdf
Publikováno v:
Revue des Sciences et Technologies de l'Information-Série RIA : Revue d'Intelligence Artificielle
Revue des Sciences et Technologies de l'Information-Série RIA : Revue d'Intelligence Artificielle, Lavoisier, 2017, 31 (4), pp.449-470. ⟨10.3166/ria.31.449-470⟩
Revue des Sciences et Technologies de l'Information-Série RIA : Revue d'Intelligence Artificielle, Lavoisier, 2017, 31 (4), pp.449-470. ⟨10.3166/ria.31.449-470⟩
International audience; The increasing use of autonomous artificial agents in hospitals or in transport control systems leads to consider whether moral rules shared by many of us are followed by these agents. This a particularly hard problem because
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::dbba8bdadc0f7e18d9920d6e22e6adad
https://hal.archives-ouvertes.fr/hal-01705240
https://hal.archives-ouvertes.fr/hal-01705240