Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
In order to solve a long-standing problem with list fusion, a new compiler transformation, “Call Arity” is developed and implemented in the Haskell compiler GHC. It is formally proven to not degrade program performance; the proof is machine-checked using the interactive theorem prover Isabelle. To that end, a formalization of Launchbury’s Natural Semantics for Lazy Evaluation is modelled in Isabelle, including a correctness and adequacy proof.
Choose an application
The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing.
Choose an application
The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing.
Systems analysis & design --- Software testing & verification --- Computer architecture & logic design --- Mathematical theory of computation --- Artificial intelligence --- Formal Methods; Computer-Aided System Design; Hardware and System Verification; Formal Verification, Specification, Synthesis, and Testing; Automated and Formal Reasoning --- Formal Methods; Computer-Aided System Design; Hardware and System Verification; Formal Verification, Specification, Synthesis, and Testing; Automated and Formal Reasoning
Choose an application
The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing.
Systems analysis & design --- Software testing & verification --- Computer architecture & logic design --- Mathematical theory of computation --- Artificial intelligence --- Formal Methods --- Computer-Aided System Design --- Hardware and System Verification --- Formal Verification, Specification, Synthesis, and Testing --- Automated and Formal Reasoning
Choose an application
The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing.
Systems analysis & design --- Software testing & verification --- Computer architecture & logic design --- Mathematical theory of computation --- Artificial intelligence --- Formal Methods; Computer-Aided System Design; Hardware and System Verification; Formal Verification, Specification, Synthesis, and Testing; Automated and Formal Reasoning
Choose an application
This book contains the contributions of the Special Issue entitled "Agents and Robots for Reliable Engineered Autonomy". The Special Issue was based on the successful first edition of the "Workshop on Agents and Robots for reliable Engineered Autonomy" (AREA 2020), co-located with the 24th European Conference on Artificial Intelligence (ECAI 2020). The aim was to bring together researchers from autonomous agents, as well as software engineering and robotics communities, as combining knowledge from these three research areas may lead to innovative approaches that solve complex problems related to the verification and validation of autonomous robotic systems.
Technology: general issues --- belief-desire-intention (BDI) --- jason --- robot operating system (ROS) --- robotic agents --- collective autonomy --- self-organisation --- aggregate computing --- multi-agent systems --- coordination --- robotics --- software engineering --- verification and validation --- human-agent interaction --- Rules of the Road --- Autonomous Vehicles --- agents --- model checking --- self-driving vehicle --- formal verification --- rational agent --- decision-making --- ROS --- belief-desire-intention (BDI) --- jason --- robot operating system (ROS) --- robotic agents --- collective autonomy --- self-organisation --- aggregate computing --- multi-agent systems --- coordination --- robotics --- software engineering --- verification and validation --- human-agent interaction --- Rules of the Road --- Autonomous Vehicles --- agents --- model checking --- self-driving vehicle --- formal verification --- rational agent --- decision-making --- ROS
Choose an application
This book contains the contributions of the Special Issue entitled "Agents and Robots for Reliable Engineered Autonomy". The Special Issue was based on the successful first edition of the "Workshop on Agents and Robots for reliable Engineered Autonomy" (AREA 2020), co-located with the 24th European Conference on Artificial Intelligence (ECAI 2020). The aim was to bring together researchers from autonomous agents, as well as software engineering and robotics communities, as combining knowledge from these three research areas may lead to innovative approaches that solve complex problems related to the verification and validation of autonomous robotic systems.
Technology: general issues --- belief-desire-intention (BDI) --- jason --- robot operating system (ROS) --- robotic agents --- collective autonomy --- self-organisation --- aggregate computing --- multi-agent systems --- coordination --- robotics --- software engineering --- verification and validation --- human–agent interaction --- Rules of the Road --- Autonomous Vehicles --- agents --- model checking --- self-driving vehicle --- formal verification --- rational agent --- decision-making --- ROS --- n/a --- human-agent interaction
Choose an application
This book contains the contributions of the Special Issue entitled "Agents and Robots for Reliable Engineered Autonomy". The Special Issue was based on the successful first edition of the "Workshop on Agents and Robots for reliable Engineered Autonomy" (AREA 2020), co-located with the 24th European Conference on Artificial Intelligence (ECAI 2020). The aim was to bring together researchers from autonomous agents, as well as software engineering and robotics communities, as combining knowledge from these three research areas may lead to innovative approaches that solve complex problems related to the verification and validation of autonomous robotic systems.
belief-desire-intention (BDI) --- jason --- robot operating system (ROS) --- robotic agents --- collective autonomy --- self-organisation --- aggregate computing --- multi-agent systems --- coordination --- robotics --- software engineering --- verification and validation --- human–agent interaction --- Rules of the Road --- Autonomous Vehicles --- agents --- model checking --- self-driving vehicle --- formal verification --- rational agent --- decision-making --- ROS --- n/a --- human-agent interaction
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- n/a
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
Technology: general issues --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI
Listing 1 - 10 of 14 | << page >> |
Sort by
|