A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Advanced Verification Methodology for Complex System on Chip Verification
2015
International Journal of VLSI Design & Communication Systems
Verification remains the most significant challenge in getting advanced SOC devices in market. The important challenge to be solved in the Semiconductor industry is the growing complexity of SOCs. ...
Industry experts consider that the verification effort is almost 70% to 75% of the overall design effort. ...
For example, active agents can be converted to passive agents when verification env is reused in system verification units. • Extract: all the required information is gathered in this phase • Check: checks ...
doi:10.5121/vlsic.2015.6602
fatcat:uhfiugij4retdmpiww4x33dfla
Game Theory Models for the Verification of the Collective Behaviour of Autonomous Cars
2017
Electronic Proceedings in Theoretical Computer Science
In this position paper we discuss the multi-agent models and the verification results of the collective behaviour of autonomous cars. ...
The collective of autonomous cars is expected to generate almost optimal traffic. ...
Autonomous cars continuously enter the road network, and each agent of the traffic flow decides its optimal route when it enters the road network, and the decision is based on the real-time information ...
doi:10.4204/eptcs.257.4
fatcat:uoixvxec6jgbrjkaxorocfjpd4
Digitalised Information Security in Data Communication in Organizational Flow
2022
International Journal for Research in Applied Science and Engineering Technology
Systems, essential information, data, and other important virtual goods are at risk if there is no security to protect them. ...
Financial data, intellectual property, personal information, and other sorts of data that could be harmed by unauthorised access or acquaintance can make up a major amount of the data ...
A set of work flows are in charge of everything. ...
doi:10.22214/ijraset.2022.44485
fatcat:gpfqdpzypjd6fcnsh6iqebcmnm
Verification of 10 Gigabit Ethernet Controllers
Верификация контроллеров 10 гигабитного Ethernet
2017
Proceedings of the Institute for System Programming of RAS
Верификация контроллеров 10 гигабитного Ethernet
We describe a set of approaches used to verify such devicesprototype based verification, system and stand-alone verification. ...
The examination of network characteristics of the controller is very important in the verification process. ...
The test system for ASIC-based 10 Gigabit Ethernet controller was developed by replacing PCIE Agent with SLink agent. ...
doi:10.15514/ispras-2017-29(4)-17
fatcat:ytfumadx3nba5kplmckl74qr6u
Dynamic safety measurement-control technology for intelligent connected vehicles based on digital twin system
2021
Vibroengineering PROCEDIA
for autonomous vehicle in different connected levels of the mixed-flow traffic environments, such as multi-agent perception, multi-source information transmission, vehicle control, vehicle-to-vehicle ...
As the number of connected vehicles increases, the intelligence levels become more and more uneven, so the problem how to determine the dynamic safety of autonomous driving behavior in the mixed-flow traffic ...
Fig. 1 . 1 Information interaction behavior of traffic system under mixed-flow traffic system
Fig. 2 . 2 Dynamic Game interaction mechanism of multiagent intelligent network in mixed-flow transportation ...
doi:10.21595/vp.2021.21990
fatcat:mf2zvazbxzcrlfbtqzma6wmswq
Logic-Based Agent Verification
2007
Journal of Applied Logic
ensure the security of classified information. ...
The first three papers focus primarily on agent interaction protocols, and they address both the specification and verification of multi-agent systems. ...
Acknowledgements The editors would like to thank all the authors who submitted papers to this issue, and especially to thank the additional reviewers, all of whom provided extensive feedback and constructive ...
doi:10.1016/j.jal.2005.12.012
fatcat:kdmkpegsyjgwzcy5pyh6dbruo4
Formal Methods Research at SICS and KTH
2003
Electronical Notes in Theoretical Computer Science
In this note we focus attention on the area of information flow control. ...
using call-graph abstractions and compositional techniques; (iii) Formalisation and analysis of security properties, in the areas of information flow control, authorisation, and verification of security ...
doi:10.1016/s1571-0661(04)80824-7
fatcat:3rhsokuaw5haxa32nhwne63h7q
Asynchronous Runtime Verification of Business Processes
2015
2015 7th International Conference on Computational Intelligence, Communication Systems and Networks
This mechanism allows verifying the correctness of business process execution and it runs in parallel with the base processes affecting them insignificantly. ...
The verification mechanism prototype was developed and tested in real business processes, as well as limits of runtime verification overhead were evaluated ...
L-KC-11-0003 signed between IT Competence Centre and Investment and Development Agency of Latvia, Research No. 1.6 "Algorithms for verification of business processes". ...
doi:10.1109/cicsyn.2015.28
dblp:conf/cicsyn/OditisB15
fatcat:ezvhmx6n65gffhfeayrioa7qum
Methodologies for Self-Organising Systems: A SPEM Approach
2009
2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology
We define 'SPEM fragments' of five methods for developing self-organising multi-agent systems. Self-organising traffic lights controllers provide an application scenario. ...
Testing and Verification phase: agent-based simulations are combined with numerical analysis algorithms for dynamical systems verification at macro-level. ...
DL: a UML diagram (e.g. an activity diagram) and an information flow model that describes the information flow in the entire system, starting from each locality. ...
doi:10.1109/wi-iat.2009.128
dblp:conf/iat/PuvianiSFC09
fatcat:7bkjw6dylfdxzipv5vxs3q67jq
Data-Provenance Verification For Secure Hosts
2012
IEEE Transactions on Dependable and Secure Computing
Our goal in this work is to improve the trustworthiness of a host and its system data. ...
Specifically, we provide a new mechanism that ensures the correct origin or provenance of critical system information and prevents adversaries from utilizing host resources. ...
He is particularly interested in language-and library-based approaches to decentralized information flow control and secure computation. ...
doi:10.1109/tdsc.2011.50
fatcat:6udb5iwqzjfg3c7osddz5tftlq
An Architecture of Procedures in Modeling for Manufacturing Logistics
2020
Journal of Sustainable Machines
These are the fundamentals in the application of the M&S approach to comprehend the systems of product development in SMEs. ...
However, there are gaps in the discussion of the complete cycle of modeling and simulation which incorporates the verification and development of an architecture that can be used in manufacturing logistics ...
The system dynamics are used in simulating the flow of products to assess the system-wide bottleneck. ...
doi:10.46532/jsm.20200902
fatcat:exgrvg52fbhzjdij5ob63zrxk4
Early Validation Framework for Critical and Complex Process-Centric Systems
[chapter]
2019
Lecture Notes in Business Information Processing
This early validation methodology promotes formal verification of the process model alongside agent-oriented simulation and visualization of the process models in a distributed context. ...
Rigorous software development methodologies are used for such systems, where formal methods for the verification of properties guarantee the required level of correctness. ...
We thank French ministry of the armed forces and specifically the Directorate General of Armaments for funding this research work. ...
doi:10.1007/978-3-030-20618-5_3
fatcat:otspgwewdjgrjajypwskg64ale
Generic System Verilog Universal Verification Methodology based Reusable Verification Environment for Efficient Verification of Image Signal Processing IPs/SoCs
[article]
2013
arXiv
pre-print
In this paper,we present Generic System Verilog Universal Verification Methodology based Reusable Verification Environment for efficient verification of Image Signal Processing IP's/SoC's. ...
Thus, Generic System Verilog Universal Verification Methodology (UVM) based Reusable Verification Environment is required to avoid the problem of having so many methodologies and provides a standard unified ...
ACKNOWLEDGEMENTS The authors would like to thank management and team members of Imaging Division, STMicroelectronics; Faculty members and peer scholars of JBS, Jaypee Institute of Information Technology ...
arXiv:1301.2858v1
fatcat:4x7jfmnxmje73nvpzic5p7vvmu
Mathematical Models of IP Traceback Methods and Their Verification
[chapter]
2005
IFIP Advances in Information and Communication Technology
In this paper, mathematical models of ICMP, probabilistic packet marking, hash-based, and Kai's improved ICMP method are proposed. ...
The mathematical models are verified by comparing the theoretical values with actual measurements of a network of about 600 nodes. ...
The measurement data was obtained by the verification item shown in Improved ICMP traceback places an agent on each router and has a manager. We show the flow of improved ICMP traceback in Fig. 5 . ...
doi:10.1007/0-387-25660-1_11
fatcat:w32dvmxsyndpnnusu4i4uc3t6y
Blockchain in air cargo: challenges of new World
2021
MATEC Web of Conferences
The article examines and summarizes the world practice of using blockchain technology to manage information and financial flows in air cargo. ...
This study focuses on the implementation of digital technologies at the airports to optimize information and financial flows, that are required for the air cargo transportation. ...
During the organization of the air cargo transportation, in addition to the incoming financial flow from the airline's cargo sales agents, there is an outgoing financial flow from airlines to the airport ...
doi:10.1051/matecconf/202134100021
fatcat:2amsphq7crc4fg52zq7lat2dzq
« Previous
Showing results 1 — 15 out of 84,234 results