Search results for "Checking"

showing 10 items of 53 documents

Progress Checking for Dummies

2018

Verification of progress properties is both conceptually and technically significantly more difficult than verification of safety and deadlock properties. In this study we focus on the conceptual side. We make a simple modification to a well-known model to demonstrate that it passes progress verification although the resulting model is intuitively badly incorrect. Then we point out that the error can be caught easily by adding a termination branch to the system. We compare the use of termination branches to the established method of addressing the same need, that is, weak fairness. Then we discuss another problem that may cause failure of catching progress errors even with weak fairness. Fi…

060201 languages & linguisticsModel checkingComputer scienceusability of verification methodsalgoritmiikkafairness06 humanities and the arts02 engineering and technologyfair testingDeadlocktestausverifiointiRisk analysis (engineering)edistys0602 languages and literature0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPoint (geometry)ohjelmointiSet (psychology)Focus (optics)Simple (philosophy)
researchProduct

Two sides of the same coin? A new instrument to assess body checking and avoidance behaviors in eating disorders

2017

Body checking (BC) and avoidance behaviors (BA) are the dominant behavioral features of body image disturbances (BID) that characterize most individuals with eating disorders (EDs). Whereas BC can be reliably assessed, a valid assessment tool for BA is lacking, preventing an adequate assessment of BID differences across different EDs (anorexia nervosa, AN; bulimia nervosa, BN; binge eating disorder, BED). A total of 310 women with EDs and 112 nonclinical controls completed measures of BC-, BA- and ED-related symptoms. BA did not differentiate between EDs, whereas BC did: it was highest in AN and BN, and lowest in BED. Multivariate analyses also discriminated AN from BN based on BC. Given th…

Adult050103 clinical psychologyMultivariate analysisSocial PsychologyFactor structureBody image disturbanceDevelopmental psychologyFeeding and Eating Disorders03 medical and health sciences0302 clinical medicineBinge-eating disorderAvoidance LearningBody ImagemedicineHumansBody Weights and Measures0501 psychology and cognitive sciencesGeneral PsychologyApplied PsychologyBulimia nervosaBody Weight05 social sciencesmedicine.disease030227 psychiatryEating disordersAnorexia nervosa (differential diagnoses)FemaleBody checkingPsychologyClinical psychologyBody Image
researchProduct

Audiovisual Verification in the evolution of television newsrooms: Al Jazeera and the transition from satellite to the cloud

2021

With the spread of the digital sphere and the proliferation of images from indirect sources that can be accessed by systems and users, verification routines have become essential to ensure media corporations' credibility. The advances in artificial intelligence which allow automated fact-checking (AFC) initiatives to be created help detect falsehoods, but they do not eliminate the need for human intervention. On the contrary, information professionals are necessary, and their functions increasingly include procedures such as mediating in videos and images. This study analyses the evolution of verification routines in audiovisual journalism and how new techniques have influenced the percepti…

Al jazeerafake newsCommunication. Mass mediaVerificationRedacciónNoticias falsasInformaciótelevisionNewsroomP87-96Verificaciónfact-checkingFact-checkingFake newsRedaccióTelevisiónAl JazeeraTelevisionNotícies falsesverificationVerificacióComunicaciónTelevisió
researchProduct

RDF2NμSMV: Mapping Semantic Graphs to NμSMV Model Checker

2011

International audience; The most frequently used language to represent the semantic graphs is the RDF (W3C standard for meta-modeling). The construction of semantic graphs is a source of numerous errors of interpretation. The processing of large semantic graphs is a limit to the use of semantics in current information systems. The work presented in this paper is part of a new research at the border between two areas: the Semantic Web and the model checking. For this, we developed a tool, RDF2NμSMV, which converts RDF graphs into NμSMV language. This conversion aims checking the semantic graphs with the model checker NμSMV in order to verify the consistency of the data. To illustrate our pro…

BIM.Model-checking[INFO.INFO-WB] Computer Science [cs]/Webtemporal logicSemantic graph[INFO.INFO-WB]Computer Science [cs]/Web[ INFO.INFO-WB ] Computer Science [cs]/WebNμSMVBIMIFCRDF
researchProduct

Modular Strategies for Recursive Game Graphs

2006

AbstractMany problems in formal verification and program analysis can be formalized as computing winning strategies for two-player games on graphs. In this paper, we focus on solving games in recursive game graphs which can model the control flow in sequential programs with recursive procedure calls. While such games can be viewed as the pushdown games studied in the literature, the natural notion of winning in our framework requires the strategies to be modular with only local memory; that is, resolution of choices within a module does not depend on the context in which the module is invoked, but only on the history within the current invocation of the module. While reachability in (global…

Computer Science::Computer Science and Game TheoryTheoretical computer scienceGeneral Computer ScienceCombinatorial game theoryContext (language use)02 engineering and technology0102 computer and information sciences01 natural sciencesTheoretical Computer ScienceProgram analysisReachability0202 electrical engineering electronic engineering information engineering0101 mathematicsMathematicsbusiness.industry010102 general mathematics020207 software engineeringPushdown systemsResolution (logic)Modular designCall graphUndecidable problemModel-checkingGames in verification010201 computation theory & mathematicsbusinessComputer Science(all)
researchProduct

Control Flow Error Checking with ISIS

2005

The Interleaved Signature Instruction Stream (ISIS) is a signature embedding technique that allows signatures to co-exist with the main processor instruction stream with a minimal impact on processor performance, without sacrificing error detection coverage or latency. While ISIS incorporate some novel error detection mechanisms to assess the integrity of the program executed by the main processor, the limited number of bits available in the signature control word question if the detection mechanisms are effective detecting errors in the program execution flow. Increasing the signature size would negatively impact the memory requirements, so this option has been rejected. The effectiveness …

Control flowbusiness.industryComputer scienceReal-time computingSoftware developmentEmbeddingRetardFault injectionLatency (engineering)Error checkingError detection and correctionbusiness
researchProduct

Optimal paths in weighted timed automata

2004

AbstractWe consider the optimal-reachability problem for a timed automaton with respect to a linear cost function which results in a weighted timed automaton. Our solution to this optimization problem consists of reducing it to computing (parametric) shortest paths in a finite weighted directed graph. We call this graph a parametric sub-region graph. It refines the region graph, a standard tool for the analysis of timed automata, by adding the information which is relevant to solving the optimal-reachability problem. We present an algorithm to solve the optimal-reachability problem for weighted timed automata that takes time exponential in O(n(|δ(A)|+|wmax|)), where n is the number of clock…

Discrete mathematicsModel checkingHybrid systemsOptimization problemGeneral Computer ScienceComputer scienceOptimal reachabilityTimed automatonBüchi automatonDirected graphTheoretical Computer ScienceAutomatonCombinatoricsDeterministic automatonReachabilityShortest path problemState spaceAutomata theoryGraph (abstract data type)Two-way deterministic finite automatonTimed automataAlgorithmComputer Science::Formal Languages and Automata TheoryComputer Science(all)Mathematics
researchProduct

Sequentializing Parameterized Programs

2012

We exhibit assertion-preserving (reachability preserving) transformations from parameterized concurrent shared-memory programs, under a k-round scheduling of processes, to sequential programs. The salient feature of the sequential program is that it tracks the local variables of only one thread at any point, and uses only O(k) copies of shared variables (it does not use extra counters, not even one counter to keep track of the number of threads). Sequentialization is achieved using the concept of a linear interface that captures the effect an unbounded block of processes have on the shared state in a k-round schedule. Our transformation utilizes linear interfaces to sequentialize the progra…

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceScheduleComputer scienceD.2.4;F.3.1Interface (computing)Parameterized complexitymodel-checking02 engineering and technologyThread (computing)computer.software_genrelcsh:QA75.5-76.95parameterized programsComputer Science - Software Engineeringsoftware verification0202 electrical engineering electronic engineering information engineeringBlock (data storage)Programming languagelcsh:MathematicsD.2.4Local variable020207 software engineeringlcsh:QA1-939Logic in Computer Science (cs.LO)Software Engineering (cs.SE)Transformation (function)model-checking; software verification; parameterized programs020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceState (computer science)F.3.1computerElectronic Proceedings in Theoretical Computer Science
researchProduct

The Inconsistent Labelling Problem of Stutter-Preserving Partial-Order Reduction

2020

AbstractIn model checking, partial-order reduction (POR) is an effective technique to reduce the size of the state space. Stubborn sets are an established variant of POR and have seen many applications over the past 31 years. One of the early works on stubborn sets shows that a combination of several conditions on the reduction is sufficient to preserve stutter-trace equivalence, making stubborn sets suitable for model checking of linear-time properties. In this paper, we identify a flaw in the reasoning and show with a counter-example that stutter-trace equivalence is not necessarily preserved. We propose a solution together with an updated correctness proof. Furthermore, we analyse in whi…

FOS: Computer and information sciencesModel checkingComputer Science - Logic in Computer ScienceTheoretical computer sciencepartial-order reductionComputer scienceautomaattien teoria020207 software engineering02 engineering and technologymodel checkingArticleLogic in Computer Science (cs.LO)Partial order reductionstubborn sets0202 electrical engineering electronic engineering information engineeringState space020201 artificial intelligence & image processingEquivalence (formal languages)Equivalence (measure theory)tietojenkäsittely
researchProduct

Bayesian Checking of the Second Levels of Hierarchical Models

2007

Hierarchical models are increasingly used in many applications. Along with this increased use comes a desire to investigate whether the model is compatible with the observed data. Bayesian methods are well suited to eliminate the many (nuisance) parameters in these complicated models; in this paper we investigate Bayesian methods for model checking. Since we contemplate model checking as a preliminary, exploratory analysis, we concentrate on objective Bayesian methods in which careful specification of an informative prior distribution is avoided. Numerous examples are given and different proposals are investigated and critically compared.

FOS: Computer and information sciencesStatistics and ProbabilityModel checkingModel checkingComputer scienceconflictGeneral MathematicsBayesian probabilityMachine learningcomputer.software_genreMethodology (stat.ME)partial posterior predictivePrior probabilityStatistics - Methodologybusiness.industrymodel criticismProbability and statisticsExploratory analysisobjective Bayesian methodsempirical-Bayesposterior predictivep-valuesArtificial intelligenceStatistics Probability and Uncertaintybusinesscomputer
researchProduct