Zobrazeno 1 - 10
of 215
pro vyhledávání: '"State space explosion"'
Publikováno v:
IEEE Access, Vol 11, Pp 75748-75760 (2023)
This paper proposes an incremental optimization framework for verifying graph transformation systems to overcome the state space explosion (SSE). SSE refers to the exponential growth of the number of possible states in a system during its verificatio
Externí odkaz:
https://doaj.org/article/c40eb7140f364ab4bfdfb4f43f390b19
Publikováno v:
IEEE Access, Vol 10, Pp 133749-133765 (2022)
We invented a divide & conquer approach to conditional stable model checking so as to ease the state space explosion problem. As indicated by its name, the technique concentrates on conditional stable properties expressed as $\varphi _{1} \leadsto \B
Externí odkaz:
https://doaj.org/article/42d741f708784d1bbc8fa998d7be334d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 9, Pp 77526-77544 (2021)
Component-based software development (CBSD) is an alternative approach to constructing software systems that offers numerous benefits, particularly in decreasing the complexity of system design. However, deploying components into a system is a challe
Externí odkaz:
https://doaj.org/article/89d1d198d6e54fcd866b89b4fe2894c4
Publikováno v:
Journal of Artificial Intelligence and Data Mining, Vol 8, Iss 2, Pp 189-199 (2020)
Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system s
Externí odkaz:
https://doaj.org/article/78050ff36c054ec4858381d50e835a3b
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 10182 (2022)
Symbolic execution is well known as a dynamic vulnerability discovery technique. Its greatest advantage is the capability to analyze the execution information of the program and to explore the path in the program deterministically. This is a more acc
Externí odkaz:
https://doaj.org/article/5c0b0ddbda374024bfcbcf4b8093601e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Kiviriga, A, Larsen, K G & Nyman, U 2022, ' Randomized reachability analysis in UPPAAL: fast error detection in timed systems* ', International Journal on Software Tools for Technology Transfer, vol. 24, no. 6, pp. 1025-1042 . https://doi.org/10.1007/s10009-022-00681-z
Randomized reachability analysis is an efficient method for detection of safety violations. Due to the under-approximate nature of the method, it excels at quick falsification of models and can greatly improve the model-based development process: usi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::1003e5cfa93e1fc4adf8d9f5bc8c13a4
https://vbn.aau.dk/da/publications/f9ba9f59-7aae-4c29-8e19-2546583a41f6
https://vbn.aau.dk/da/publications/f9ba9f59-7aae-4c29-8e19-2546583a41f6
Autor:
YATI, PHYO
Supervisor:緒方 和博
先端科学技術研究科
博士
先端科学技術研究科
博士
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=jairo_______::ed41b71b9cd21742dcaa621e41cea53d
http://hdl.handle.net/10119/18134
http://hdl.handle.net/10119/18134
Autor:
DO, MINH CANH
Supervisor:緒方 和博
先端科学技術研究科
博士
先端科学技術研究科
博士
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=jairo_______::0be78d40198c12139fbfd606f3c32bc3
http://hdl.handle.net/10119/18129
http://hdl.handle.net/10119/18129