Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








84,234 Hits in 3.9 sec

Advanced Verification Methodology for Complex System on Chip Verification

Renuka G, Ushashree V, Chandrasekhar Reddy P
2015 International Journal of VLSI Design & Communication Systems  
Verification remains the most significant challenge in getting advanced SOC devices in market. The important challenge to be solved in the Semiconductor industry is the growing complexity of SOCs.  ...  Industry experts consider that the verification effort is almost 70% to 75% of the overall design effort.  ...  For example, active agents can be converted to passive agents when verification env is reused in system verification units. • Extract: all the required information is gathered in this phase • Check: checks  ... 
doi:10.5121/vlsic.2015.6602 fatcat:uhfiugij4retdmpiww4x33dfla

Game Theory Models for the Verification of the Collective Behaviour of Autonomous Cars

László Z. Varga
2017 Electronic Proceedings in Theoretical Computer Science  
In this position paper we discuss the multi-agent models and the verification results of the collective behaviour of autonomous cars.  ...  The collective of autonomous cars is expected to generate almost optimal traffic.  ...  Autonomous cars continuously enter the road network, and each agent of the traffic flow decides its optimal route when it enters the road network, and the decision is based on the real-time information  ... 
doi:10.4204/eptcs.257.4 fatcat:uoixvxec6jgbrjkaxorocfjpd4

Digitalised Information Security in Data Communication in Organizational Flow

Maneesh Choppara
2022 International Journal for Research in Applied Science and Engineering Technology  
Systems, essential information, data, and other important virtual goods are at risk if there is no security to protect them.  ...  Financial data, intellectual property, personal information, and other sorts of data that could be harmed by unauthorised access or acquaintance can make up a major amount of the data  ...  A set of work flows are in charge of everything.  ... 
doi:10.22214/ijraset.2022.44485 fatcat:gpfqdpzypjd6fcnsh6iqebcmnm

Verification of 10 Gigabit Ethernet Controllers
Верификация контроллеров 10 гигабитного Ethernet

M.V. Petrochenkov, R.E. Mushtakov, I.A. Stotland
2017 Proceedings of the Institute for System Programming of RAS  
We describe a set of approaches used to verify such devicesprototype based verification, system and stand-alone verification.  ...  The examination of network characteristics of the controller is very important in the verification process.  ...  The test system for ASIC-based 10 Gigabit Ethernet controller was developed by replacing PCIE Agent with SLink agent.  ... 
doi:10.15514/ispras-2017-29(4)-17 fatcat:ytfumadx3nba5kplmckl74qr6u

Dynamic safety measurement-control technology for intelligent connected vehicles based on digital twin system

Xingbin Chen, Peng Zhang, Xinhe Min, Nini Li, Wei Cao, Shunren Xiao, Guanting Du
2021 Vibroengineering PROCEDIA  
for autonomous vehicle in different connected levels of the mixed-flow traffic environments, such as multi-agent perception, multi-source information transmission, vehicle control, vehicle-to-vehicle  ...  As the number of connected vehicles increases, the intelligence levels become more and more uneven, so the problem how to determine the dynamic safety of autonomous driving behavior in the mixed-flow traffic  ...  Fig. 1 . 1 Information interaction behavior of traffic system under mixed-flow traffic system Fig. 2 . 2 Dynamic Game interaction mechanism of multiagent intelligent network in mixed-flow transportation  ... 
doi:10.21595/vp.2021.21990 fatcat:mf2zvazbxzcrlfbtqzma6wmswq

Logic-Based Agent Verification

Michael Fisher, Munindar Singh, Diana Spears, Mike Wooldridge
2007 Journal of Applied Logic  
ensure the security of classified information.  ...  The first three papers focus primarily on agent interaction protocols, and they address both the specification and verification of multi-agent systems.  ...  Acknowledgements The editors would like to thank all the authors who submitted papers to this issue, and especially to thank the additional reviewers, all of whom provided extensive feedback and constructive  ... 
doi:10.1016/j.jal.2005.12.012 fatcat:kdmkpegsyjgwzcy5pyh6dbruo4

Formal Methods Research at SICS and KTH

Mads Dam, Lars-Åke Fredlund, Dillian Gurov
2003 Electronical Notes in Theoretical Computer Science  
In this note we focus attention on the area of information flow control.  ...  using call-graph abstractions and compositional techniques; (iii) Formalisation and analysis of security properties, in the areas of information flow control, authorisation, and verification of security  ... 
doi:10.1016/s1571-0661(04)80824-7 fatcat:3rhsokuaw5haxa32nhwne63h7q

Asynchronous Runtime Verification of Business Processes

Ivo Oditis, Janis Bicevskis
2015 2015 7th International Conference on Computational Intelligence, Communication Systems and Networks  
This mechanism allows verifying the correctness of business process execution and it runs in parallel with the base processes affecting them insignificantly.  ...  The verification mechanism prototype was developed and tested in real business processes, as well as limits of runtime verification overhead were evaluated  ...  L-KC-11-0003 signed between IT Competence Centre and Investment and Development Agency of Latvia, Research No. 1.6 "Algorithms for verification of business processes".  ... 
doi:10.1109/cicsyn.2015.28 dblp:conf/cicsyn/OditisB15 fatcat:ezvhmx6n65gffhfeayrioa7qum

Methodologies for Self-Organising Systems: A SPEM Approach

Mariachiara Puviani, Giovanna Di Marzo Serugendo, Regina Frei, Giacomo Cabri
2009 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology  
We define 'SPEM fragments' of five methods for developing self-organising multi-agent systems. Self-organising traffic lights controllers provide an application scenario.  ...  Testing and Verification phase: agent-based simulations are combined with numerical analysis algorithms for dynamical systems verification at macro-level.  ...  DL: a UML diagram (e.g. an activity diagram) and an information flow model that describes the information flow in the entire system, starting from each locality.  ... 
doi:10.1109/wi-iat.2009.128 dblp:conf/iat/PuvianiSFC09 fatcat:7bkjw6dylfdxzipv5vxs3q67jq

Data-Provenance Verification For Secure Hosts

Kui Xu, Huijun Xiong, Chehai Wu, Deian Stefan, Danfeng Yao
2012 IEEE Transactions on Dependable and Secure Computing  
Our goal in this work is to improve the trustworthiness of a host and its system data.  ...  Specifically, we provide a new mechanism that ensures the correct origin or provenance of critical system information and prevents adversaries from utilizing host resources.  ...  He is particularly interested in language-and library-based approaches to decentralized information flow control and secure computation.  ... 
doi:10.1109/tdsc.2011.50 fatcat:6udb5iwqzjfg3c7osddz5tftlq

An Architecture of Procedures in Modeling for Manufacturing Logistics

Udula Mangalika
2020 Journal of Sustainable Machines  
These are the fundamentals in the application of the M&S approach to comprehend the systems of product development in SMEs.  ...  However, there are gaps in the discussion of the complete cycle of modeling and simulation which incorporates the verification and development of an architecture that can be used in manufacturing logistics  ...  The system dynamics are used in simulating the flow of products to assess the system-wide bottleneck.  ... 
doi:10.46532/jsm.20200902 fatcat:exgrvg52fbhzjdij5ob63zrxk4

Early Validation Framework for Critical and Complex Process-Centric Systems [chapter]

Fahad Rafique Golra, Joël Champeau, Ciprian Teodorov
2019 Lecture Notes in Business Information Processing  
This early validation methodology promotes formal verification of the process model alongside agent-oriented simulation and visualization of the process models in a distributed context.  ...  Rigorous software development methodologies are used for such systems, where formal methods for the verification of properties guarantee the required level of correctness.  ...  We thank French ministry of the armed forces and specifically the Directorate General of Armaments for funding this research work.  ... 
doi:10.1007/978-3-030-20618-5_3 fatcat:otspgwewdjgrjajypwskg64ale

Generic System Verilog Universal Verification Methodology based Reusable Verification Environment for Efficient Verification of Image Signal Processing IPs/SoCs [article]

Abhishek Jain, Giuseppe Bonanno, Hima Gupta, Ajay Goyal
2013 arXiv   pre-print
In this paper,we present Generic System Verilog Universal Verification Methodology based Reusable Verification Environment for efficient verification of Image Signal Processing IP's/SoC's.  ...  Thus, Generic System Verilog Universal Verification Methodology (UVM) based Reusable Verification Environment is required to avoid the problem of having so many methodologies and provides a standard unified  ...  ACKNOWLEDGEMENTS The authors would like to thank management and team members of Imaging Division, STMicroelectronics; Faculty members and peer scholars of JBS, Jaypee Institute of Information Technology  ... 
arXiv:1301.2858v1 fatcat:4x7jfmnxmje73nvpzic5p7vvmu

Mathematical Models of IP Traceback Methods and Their Verification [chapter]

Keisuke Ohmori, Ayako Suzuki, Manabu Ohmuro, Toshifumi Kai, Mariko Kawabata, Ryu Matushima, Shigeru Nishiyama
2005 IFIP Advances in Information and Communication Technology  
In this paper, mathematical models of ICMP, probabilistic packet marking, hash-based, and Kai's improved ICMP method are proposed.  ...  The mathematical models are verified by comparing the theoretical values with actual measurements of a network of about 600 nodes.  ...  The measurement data was obtained by the verification item shown in Improved ICMP traceback places an agent on each router and has a manager. We show the flow of improved ICMP traceback in Fig. 5 .  ... 
doi:10.1007/0-387-25660-1_11 fatcat:w32dvmxsyndpnnusu4i4uc3t6y

Blockchain in air cargo: challenges of new World

Irina Poleshkina, M. Kulev, S. Roshchupkin
2021 MATEC Web of Conferences  
The article examines and summarizes the world practice of using blockchain technology to manage information and financial flows in air cargo.  ...  This study focuses on the implementation of digital technologies at the airports to optimize information and financial flows, that are required for the air cargo transportation.  ...  During the organization of the air cargo transportation, in addition to the incoming financial flow from the airline's cargo sales agents, there is an outgoing financial flow from airlines to the airport  ... 
doi:10.1051/matecconf/202134100021 fatcat:2amsphq7crc4fg52zq7lat2dzq
« Previous Showing results 1 — 15 out of 84,234 results