Memory-efficient algorithms for the verification of temporal properties
Formal Methods in System Design - Special issue on computer-aided verification: general methods
Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering
Simple on-the-fly automatic verification of linear temporal logic
Proceedings of the Fifteenth IFIP WG6.1 International Symposium on Protocol Specification, Testing and Verification XV
Compositional Modeling in Metropolis
EMSOFT '02 Proceedings of the Second International Conference on Embedded Software
A behavioral type system and its application in Ptolemy II
Formal Aspects of Computing
Spin model checker, the: primer and reference manual
Spin model checker, the: primer and reference manual
Real World Multi-agent Systems: Information Sharing, Coordination and Planning
Logic, Language, and Computation
Refinement of Interface Automata Strengthened by Action Semantics
Electronic Notes in Theoretical Computer Science (ENTCS)
System Safety Requirements as Control Structures
COMPSAC '09 Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01
An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems
Towards better support for the evolution of safety requirements via the model monitoring approach
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
Hi-index | 0.00 |
This paper reports on an extension of the Ptolemy II tool to support the design and verification of resource constrained embedded systems. Our extension allows for modeling the functional and dependability requirements separately. The functional model is described in terms of labeled interface automata, an action-oriented approach that considers not only the control flow, but also the information flow (input/output actions). Safety and security constraints are specified using controlling automata. We apply model checking techniques in order to automatically generate a compliant model that will satisfy the dependability requirements.