Search results for "Verification"

showing 10 items of 104 documents

WSN Design and Verification Using On-Board Executable Specifications

2019

The gap between informal functional specifications and the resulting implementation in the chosen programming language is notably a source of errors in embedded systems design. In this paper, we discuss a methodology and a software platform aimed at coping with this issue in programming resource-constrained wireless sensor network nodes (WSNs). Whereas the typical development model for the WSNs is based on cross compilation, the proposed approach supports high-level symbolic coding of abstract models and distributed applications, as well as their test and their execution, directly on the target hardware. As a working example, we discuss the application of our methodology to specify the func…

Computer scienceInformation System02 engineering and technologywireless sensor networkSoftware0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringEmbedded systemsymbolic programmingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFunctional specificationbusiness.industry020208 electrical & electronic engineeringRuntime verificationresource-constrained deviceComputer Science Applications1707 Computer Vision and Pattern Recognitioncomputer.file_formatsystem specificationComputer Science ApplicationsControl and Systems EngineeringEmbedded systemsystem programmingExecutablebusinesscomputerInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Design, Control, and Analysis of Nonlinear Circuits with Tunnel Diode with Piecewise Affine Dynamics

2019

Computer scienceMechanical EngineeringDynamics (mechanics)Nonlinear circuitsEnergy Engineering and Power TechnologyDesign controlIndustrial and Manufacturing EngineeringNonlinear systemControl theoryLimit cycleAutomotive EngineeringTunnel diodePiecewise affineElectrical and Electronic EngineeringFormal verificationIEEJ Journal of Industry Applications
researchProduct

Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices

2020

We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for the reduction of intermediate abstraction layers to map physical domain concepts into executable code avoiding the recourse to ontologies, which would need to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns. The methodology is supported by a rule-based sys…

Computer scienceinternet of thing02 engineering and technologycomputer.software_genrelcsh:Chemical technologyBiochemistryOracleArticleAnalytical ChemistryDomain (software engineering)Softwarewireless sensor network0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic Engineeringdistributed programmingwireless sensor networksEmbedded systemInstrumentationAbstraction (linguistics)concatenative languagessymbolic programmingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSymbolic programmingProgramming languagebusiness.industryRuntime verification020206 networking & telecommunications020207 software engineeringcomputer.file_formatforthinternet of thingsAtomic and Molecular Physics and Opticsconcatenative languageProgramming patternsembedded systemsExecutablebusinesscomputerNatural language
researchProduct

iOS Applications Testing

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Mobile applications conquer the world, but iOS devices hold the major share of tablets market among the corporate workers. This study aims to identify the aspects (i.e. features and/ or limitations) that influence the testing of the native iOS applications. The aspects related to general mobile applications testing are identified through the systematic literature review of academic sources. iOS applications testing aspects are identified through the review of non-academic (multivocal) literature sources. The identified aspects are merged and discussed in detail using the reviewed sources and based on the author’s professional expe…

Computer sciencemedia_common.quotation_subjectMobile computingData scienceSoftware qualityiOS application; mobile application; testing; quality; verification and validation; systematic literature review;World Wide WebSystematic reviewiOS applications; mobile computing; software testing; software qualityOrder (exchange)Software testingQuality (business)Software verification and validationmedia_common
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental groups). Ps…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSpassword securitypassword security behaviorturvallisuuspassword memorabilityuser conveniencemuistaminensalasanatkäyttäjäkokemuspassword verificationtoisto
researchProduct

Constraint Management in Engineering of Complex Information Systems

2009

We propose to build an engineering environment for information systems by using metamodels, OCL and symbolic model checkers to manage  constraints. Our proposal is based on a definition of constraints as 3D spaces with  dimensions corresponding to UML diagrams, constructs, and abstraction levels. We show how such environments can help with engineering quality complex systems by allowing to lift up a part of constraint verifications.

Constraint (information theory)Management information systemsUnified Modeling LanguageComputer scienceProgramming languageTheory of constraintsInformation systemcomputer.software_genrecomputerFormal verificationObject Constraint Languagecomputer.programming_languageMetamodeling2009 14th IEEE International Conference on Engineering of Complex Computer Systems
researchProduct

Sea breeze thunderstorms in the eastern Iberian Peninsula. Neighborhood verification of HIRLAM and HARMONIE precipitation forecasts

2014

In this study we investigated sea breeze thunderstorms with intense convective activity (i.e., heavy rainfall, hail and gusty winds) that occurred over the eastern Iberian Peninsula (Spain) and were missed by the operational HIRLAM model. We used two grid-spacing setups (5.0. km and 2.5. km) of the hydrostatic HIRLAM model, and the non-hydrostatic spectral HARMONIE suite (2.5. km), to simulate isolated convection associated with sea breezes. The overall aim is to estimate the ability of these three experimental setups, in particular the HARMONIE model as the forthcoming operational numerical weather prediction in most European Weather Services, to correctly simulate convective precipitation…

ConvectionAtmospheric Science010504 meteorology & atmospheric sciencesNowcastingMeteorology0207 environmental engineering02 engineering and technologySea breeze thunderstorm01 natural sciencesOperational forecastingSea breezePrecipitation020701 environmental engineering0105 earth and related environmental sciencesRain gaugeNumerical weather predictionHIRLAMHARMONIE13. Climate actionClimatologyThunderstormEnvironmental scienceNeighborhood verificationHIRLAMIberian PeninsulaAtmospheric Research
researchProduct

Integrated Simulation and Formal Verification of a Simple Autonomous Vehicle

2018

This paper presents a proof-of-concept application of an approach to system development based on the integration of formal verification and co-simulation. A simple autonomous vehicle has the task of reaching an assigned straight path and then follow it, and it can be controlled by varying its turning speed. The correctness of the proposed control law has been formalized and verified by interactive theorem proving with the Prototype Verification System. Concurrently, the system has been co-simulated using the Prototype Verification System and the MathWorks Simulink tool: The vehicle kinematics have been simulated in Simulink, whereas the controller has been modeled in the logic language of t…

CorrectnessSIMPLE (military communications protocol)Computer scienceProof assistant020207 software engineeringControl engineering02 engineering and technologyFormal methods Software engineering Theorem proving Vehicles Autonomous Vehicles Control laws Integrated simulations Interactive theorem proving Logic languages Proof of concept Prototype verification systems System development020202 computer hardware & architectureAutomated theorem provingSettore ING-INF/04 - AutomaticaControl theory0202 electrical engineering electronic engineering information engineeringPrototype Verification SystemFormal verificationLogic programming
researchProduct

Applying a Data Quality Model to Experiments in Software Engineering

2014

Data collection and analysis are key artifacts in any software engineering experiment. However, these data might contain errors. We propose a Data Quality model specific to data obtained from software engineering experiments, which provides a framework for analyzing and improving these data. We apply the model to two controlled experiments, which results in the discovery of data quality problems that need to be addressed. We conclude that data quality issues have to be considered before obtaining the experimental results.

Data collectionSoftware sizingbusiness.industryComputer scienceData qualitySoftware constructionSoftware verification and validationComputer-aided engineeringbusinessSoftware engineeringSoftware verificationData modeling
researchProduct

Modeling, evaluation, and scale on artificial pedestrians: a literature review

2017

Modeling pedestrian dynamics and their implementation in a computer are challenging and important issues in the knowledge areas of transportation and computer simulation. The aim of this article is to provide a bibliographic outlook so that the reader may have quick access to the most relevant works related to this problem. We have used three main axes to organize the article's contents: pedestrian models, validation techniques, and multiscale approaches. The backbone of this work is the classification of existing pedestrian models; we have organized the works in the literature under five categories, according to the techniques used for implementing the operational level in each pedestrian …

DesignGeneral Computer ScienceComputer sciencemedia_common.quotation_subjectPerformance02 engineering and technologyPedestriancomputer.software_genreTheoretical Computer SciencePedestrian modeling and simulationCrowdsSimulació per ordinador0502 economics and business0202 electrical engineering electronic engineering information engineeringScale sizeAlgorismes computacionalsQuality (business)Macromedia_commonInformática050210 logistics & transportationFocus (computing)MultimediaValidation methodsScale (chemistry)05 social sciencesVerificationMultiscale simulation020207 software engineeringCrowdsData scienceValidation methodsMacroscopic and microscopic pedestrian modelscomputerAlgorithms
researchProduct