Model checking
Safety Critical Computer Systems
Safety Critical Computer Systems
Model Checking: A Tutorial Overview
MOVEP '00 Proceedings of the 4th Summer School on Modeling and Verification of Parallel Processes
At Home with Ubiquitous Computing: Seven Challenges
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
An empirical study on the trustworthiness of life-like interface agents
Proceedings of the HCI International '99 (the 8th International Conference on Human-Computer Interaction) on Human-Computer Interaction: Communication, Cooperation, and Application Design-Volume 2 - Volume 2
Probabilistic symbolic model checking with PRISM: a hybrid approach
International Journal on Software Tools for Technology Transfer (STTT) - Special section on tools and algorithms for the construction and analysis of systems
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
A Portable Compiler-Integrated Approach to Permanent Checking
ASE '06 Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering
Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings (Lecture Notes in Computer Science)
Thorough static analysis of device drivers
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
The FSAP/NuSMV-SA Safety Analysis Platform
International Journal on Software Tools for Technology Transfer (STTT) - Special Section on Advances in Automated Verification of Critical Systems
Benchmarking Dependability of a System Biology Application
ICECCS '09 Proceedings of the 2009 14th IEEE International Conference on Engineering of Complex Computer Systems
Trustworthy organic computing systems: challenges and perspectives
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
On-Road Prediction of Driver's Intent with Multimodal Sensory Cues
IEEE Pervasive Computing
PRISM 4.0: verification of probabilistic real-time systems
CAV'11 Proceedings of the 23rd international conference on Computer aided verification
Constant-Round password-based group key generation for multi-layer ad-hoc networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Hi-index | 0.00 |
In 1988, Marc Weiser was one of the first computer scientists who envisioned that computers would become invisible; that computing power and communication technology would become part of many objects of society's daily life. Many modern systems would not be able without pervasive technology. Today, most such systems might be invisible or wearable, but society is either still aware of them or they only communicate to a limited extent with each other. In the near future many objects of day to day life will be equipped with some kind of computing and communication capability and people won't be aware of it anymore. The great benefit is that they will offer citizens support and guidance in everyday life. For example, most people do not know that nice features like jam prediction and avoidance rely on feedback of the navigation system to some centralized server clusters. These analyze the data and thus predict possible traffic jams. Although, dependability issues most often form rigid limits. Because the systems are so smoothly integrated into normal life, they are expected to be robust against intended manipulations to guarantee functional requirements and/or to be traceable and understandable for the human user. In addition, the adaptive nature of many Pervasive Computing systems makes them very difficult to analyze and predict.