Collaborative verification-driven engineering of hybrid systems

S Mitsch, GO Passmore, A Platzer - Mathematics in Computer Science, 2014 - Springer
Hybrid systems with both discrete and continuous dynamics are an important model for real-
world cyber-physical systems. The key challenge is to ensure their correct functioning wrt …

Proofs for traffic safety: combining diagrams and logic

S Linker - 2015 - oops.uni-oldenburg.de
Due to the increasing interest in autonomously driving cars, safety issues of such systems
are of utmost importance. Safety in this sense is primarily the absence of collisions, which is …

[PDF][PDF] Similarity, logic, and games: bridging modeling layers of hybrid systems

JD Quesel - 2013 - Citeseer
Specifications and implementations of complex physical systems tend to differ as low-level
effects such as sampling are often ignored when highlevel models are created. Thus, the …

A vision of collaborative verification-driven engineering of hybrid systems

S Mitsch, GO Passmore, A Platzer - Proceedings of Enabling …, 2013 - research.ed.ac.uk
Hybrid systems with both discrete and continuous dynamics are an important model for real-
world physical systems. The key challenge is how to ensure their correct functioning wrt …

[PDF][PDF] Verification architectures for complex real-time systems.

J Faber - 2011 - Citeseer
In the analysis of complex real-time systems, several aspects have to be covered, eg,
behaviour that conforms to communication protocols, rich data structures, and timing …

Automatic verification of real-time systems with rich data: an overview

ER Olderog - International Conference on Theory and Applications of …, 2012 - Springer
We present an overview of the results of the project “Beyond Timed Automata” of the
Collaborative Research Center AVACS (Automatic Verification and Analysis of Complex …

Verification of hardware interaction properties of software

R Taylor - International Conference on Abstract State Machines …, 2012 - Springer
Many high-integrity software development processes prevent any assumptions about the
system hardware, but this makes it impossible to use these techniques on software that must …