咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 23 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 8 篇 网络空间安全
    • 5 篇 机械工程
    • 4 篇 仪器科学与技术
    • 3 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 1 篇 冶金工程
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 交通运输工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 系统科学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 37 篇 formal verificat...
  • 3 篇 boolean satisfia...
  • 2 篇 boolean comparis...
  • 2 篇 model checking
  • 2 篇 model
  • 2 篇 service composit...
  • 2 篇 unknown constrai...
  • 2 篇 black box
  • 2 篇 uppaal
  • 1 篇 service choreogr...
  • 1 篇 hybrid system
  • 1 篇 security control...
  • 1 篇 knowledge-based ...
  • 1 篇 reliability
  • 1 篇 theorem proving
  • 1 篇 smv
  • 1 篇 unified modeling...
  • 1 篇 system theory pr...
  • 1 篇 information flow...
  • 1 篇 modeling

机构

  • 1 篇 facultyof comput...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 beijing institut...
  • 1 篇 school of inform...
  • 1 篇 state key labora...
  • 1 篇 icb-pmdm-lermps ...
  • 1 篇 school of manage...
  • 1 篇 department of co...
  • 1 篇 faculty of compu...
  • 1 篇 school of inform...
  • 1 篇 institute of com...
  • 1 篇 school of comput...
  • 1 篇 school of electr...
  • 1 篇 department of au...
  • 1 篇 college of compu...
  • 1 篇 departmentofcomp...
  • 1 篇 department of co...
  • 1 篇 riphah institute...
  • 1 篇 兰州大学

作者

  • 1 篇 xuqing liang
  • 1 篇 zaheed ahmed
  • 1 篇 zhiyuan liu
  • 1 篇 dan pescaru
  • 1 篇 weizhong qian
  • 1 篇 zhao jin
  • 1 篇 liangjun deng
  • 1 篇 蒋树
  • 1 篇 sun cong
  • 1 篇 ma jianfeng
  • 1 篇 fausto pedro gar...
  • 1 篇 seyed amin hosse...
  • 1 篇 xiao-qi ma
  • 1 篇 hongsong chen
  • 1 篇 qian junyan
  • 1 篇 xi ning
  • 1 篇 shao-feng li
  • 1 篇 chunjie zhou
  • 1 篇 庄雷
  • 1 篇 zhang ningrong z...

语言

  • 33 篇 英文
  • 4 篇 中文
检索条件"主题词=Formal verification"
37 条 记 录,以下是11-20 订阅
排序:
formal verification under Unknown Constraints
Formal Verification under Unknown Constraints
收藏 引用
The 1st Chinese Conference on Trusted Computing and Information Security
作者: LI Guang-hui, LI Xiao-wei School of Information Engineering, Zhejiang Forestry College, Hangzhou 311300, Zhejiang, China Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China Graduate School of the Chinese Academy of Sciences, Beijing 100039, China
<正> We present a formal method of verifying designs with unknown constraints (e. g. , black boxes) using Boolean satisfiability (SAT). This method is based on a new encoding scheme of unknown constraints, and s... 详细信息
来源: cnki会议 评论
A survey on formal specification and verification of separation kernels
收藏 引用
Frontiers of Computer Science 2017年 第4期11卷 585-607页
作者: Yongwang ZHAO Zhibin YANG Dianfu MA State Key Laboratory of Software Development Environment (NLSDE) School of Computer Science and Engineering Beihang Univerisity Beijing 100191 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing 210016 China
Abstract Separation kernels are fundamental software of safety and security-critical systems, which provide their hosted applications with spatial and temporal separation as well as controlled information flows among ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hybrid formal verification of CSTR System Based on MLD Model
Hybrid Formal Verification of CSTR System Based on MLD Model
收藏 引用
2011 Chinese Control and Decision Conference(CCDC)
作者: Yuhong Wang is associate professor with College of Information and Control Engineering,China University of Petroleum,Dongying,257061 China.Huayi Liu is with College of Information and Control Engineering,China University of Petroleum,Dongying,257061 China Di Lu is with College of Information and Control Engineering,China University of Petroleum,Dongying,257061,China
The operation safety problems in process industry are becoming more and more *** on Mixed Logical Dynamical (MLD) model,operation safety problems are converted into hybrid formal verification problems in this *** hy... 详细信息
来源: cnki会议 评论
Safety Protection Analysis with formal verification for Process Control System Under Cyberattacks
Safety Protection Analysis with Formal Verification for Proc...
收藏 引用
第35届中国过程控制会议
作者: Xuqing Liang Chunjie Zhou Yu-Chu Tian Xin Du Peihang Xu School of Artificial Intelligence and Automation Huazhong University of Science and Technology The Key Laboratory of Image Processing and Intelligent Control Ministry of Education School of Computer Science Queensland University of Technology
The safety protection of process control systems plays a crucial role in the overall safety of critical *** have increased the complexity of existing safety protection analysis. Traditional safety analysis methods fal... 详细信息
来源: cnki会议 评论
A formal Method for Service Choreography verification Based on Description Logic
收藏 引用
Computers, Materials & Continua 2020年 第2期62卷 893-904页
作者: Tingting Zhang Yushi Lan Minggang Yu Changyou Zheng Kun Liu PLA Army Engineering University NanjingChina The 28th Research Institute of China Electronics Technology Group Corporation NanjingChina Southeast University NanjingChina
Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography *** paper presents a new approach of c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture
收藏 引用
Frontiers of Computer Science 2013年 第1期7卷 34-43页
作者: Yuehua DAI Yi SHI Yong QI Jianbao REN Peijian WANG School of Electronic and Information Engineering Xi'an Jiaotong University Xi' an 710049 China
Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emu- lation make the VMM code base large and the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
verification of Authentication Protocols for Epistemic Goals via SAT Compilation
收藏 引用
Journal of Computer Science & Technology 2006年 第6期21卷 932-943页
作者: 苏开乐 陈清亮 Abdul Sattar 岳伟亚 吕关锋 郑锡忠 Department of Computer Science Sun Yat-Sen University Guangzhou 510275 P.R China Institute for Integrated and Intelligent Systems Griffth University Brisbane Qld 4111 Australia College of Computer Science and Technology Beijing University of Technology Beijing 100022 P.R. China Department of Computer Science Brandenburg University of Technology Cottbus 03036 Germany
This paper introduces a new methodology for epistemic logic, to analyze communication protocols that uses knowledge structures, a specific form of Kripke semantics over hostile networks. The paper particularly focuses... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Refinement modeling and verification of secure operating systems for communication in digital twins
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 304-314页
作者: Zhenjiang Qian Gaofei Sun Xiaoshuang Xing Gaurav Dhiman School of Computer Science and Engineering Changshu Institute of TechnologySuzhou215500China University Centre for Research and Development Department of Computer Science and EngineeringChandigarh UniversityMohali140413India Department of Computer Science and Engineering Graphic Era Deemed to be UniversityDehradun248002India
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
verification of Real Time Operating System Exception Management Based on SPARCv8
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1367-1387页
作者: Zhi Ma Lei Qiao Meng-Fei Yang Shao-Feng Li Jin-Kun Zhang Beijing Institute of Control Engineering Beijing 100190China China Academy of Space Technology Beijing 100094China School of Computer Science and Technology Xidian UniversityXi'an 710071China
Exception management,as the lowest level function module of the operating system,is responsible for making abrupt changes in the control flow to react to exception events in the *** correctness of the exception manage... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Distributed Information Flow verification for Secure Service Composition in Smart Sensor Network
收藏 引用
China Communications 2016年 第4期13卷 119-130页
作者: XI Ning SUN Cong MA Jianfeng CHEN Xiaofeng SHEN Yulong Shaanxi Key Laboratory of Network and System Security XIDIAN University School of Cyber Engineering XIDIAN University
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论