Distributed embedded logic analysis for post-silicon validation of SOCs

HF Ko, AB Kinsman, N Nicolici - 2008 IEEE International Test …, 2008 - ieeexplore.ieee.org
Post-silicon validation is used to identify design errors in silicon. Its main limitation is real-
time observability of the circuit's internal nodes. In this paper, we introduce a novel design …

Programming and symbolic computation in Maude

F Durán, S Eker, S Escobar, N Martí-Oliet… - Journal of Logical and …, 2020 - Elsevier
Rewriting logic is both a flexible semantic framework within which widely different concurrent
systems can be naturally specified and a logical framework in which widely different logics …

Secure web browsing with the OP web browser

C Grier, S Tang, ST King - … on Security and Privacy (sp 2008), 2008 - ieeexplore.ieee.org
Current Web browsers are plagued with vulnerabilities, providing hackers with easy access
to computer systems via browser-based attacks. Browser security efforts that retrofit existing …

[PDF][PDF] Introducing the ITP Tool: a Tutorial.

M Clavel, M Palomino, A Riesco - J. Univers. Comput. Sci., 2006 - academia.edu
We present a tutorial of the ITP tool, a rewriting-based theorem prover that can be used to
prove inductive properties of membership equational specifications. We also introduce …

Runtime verification of train control systems with parameterized modal live sequence charts

M Chai, H Wang, T Tang, H Liu - Journal of Systems and Software, 2021 - Elsevier
With the growing complexity of railway control systems, it is required to preform runtime
safety checks of system executions that go beyond conventional runtime monitoring of pre …

Process calculi for biological processes

A Bernini, L Brodo, P Degano, M Falaschi, D Hermith - Natural Computing, 2018 - Springer
Abstract Systems biology is a research area devoted to developing computational
frameworks for modeling biological systems in a holistic fashion. Within this approach, the …

CoLoR: a Coq library on well-founded rewrite relations and its application to the automated verification of termination certificates

F Blanqui, A Koprowski - Mathematical Structures in Computer …, 2011 - cambridge.org
Termination is an important property of programs, and is notably required for programs
formulated in proof assistants. It is a very active subject of research in the Turing-complete …

Formal verification of IoT applications using rewriting logic: An MDE-based approach

A Fortas, E Kerkouche, A Chaoui - Science of Computer Programming, 2022 - Elsevier
Abstract Internet of Things (IoT) systems are complex assemblies of components that
collaborate to achieve common goals. These components are based on heterogeneous …

A classification and comparison of model checking software architecture techniques

P Zhang, H Muccini, B Li - Journal of Systems and Software, 2010 - Elsevier
Software architecture specifications are used for many different purposes, such as
documenting architectural decisions, predicting architectural qualities before the system is …

Modeling and formal analysis of virtually synchronous cyber-physical systems in AADL

J Lee, K Bae, PC Ölveczky, S Kim, M Kang - International Journal on …, 2022 - Springer
This paper presents the HybridSynchAADL modeling language and formal analysis tool for
virtually synchronous cyber-physical systems with complex control programs, continuous …