Search for dissertations about: "formal system"
Showing result 16 - 20 of 460 swedish dissertations containing the words formal system.
-
16. Formal Approaches for Behavioral Modeling and Analysis of Design-time Services and Service Negotiations
Abstract : During the past decade service-orientation has become a popular design paradigm, offering an approach in which services are the functional building blocks. Services are self-contained units of composition, built to be invoked, composed, and destroyed on (user) demand. READ MORE
-
17. Design of Assured and Efficient Safety-critical Systems
Abstract : Safety-critical systems need to be analyzed rigorously to remove software/specifications errors, that is, their requirements specifications should be unambiguous, comprehensible and consistent, and the software design should conform to the specifications, hence avoiding undesirable system failures. Currently, there is a lack of effective and scalable methods to specify and analyze requirements, and formally analyze the behavioral models of embedded systems. READ MORE
-
18. Ontology-based Analysis and Scalable Model Checking of Embedded Systems Models
Abstract : Currently, there is lack of effective and scalable methods to specify and ana-lyze requirements specifications, and verify the behavioral models of embed-ded systems. Most embedded systems requirements are expressed in naturallanguage which is flexible and intuitive but frequently ambiguous, vague andincomprehensive. READ MORE
-
19. Managing the Complexity in Embedded and Cyber-Physical System Design : System Modeling and Design-Space Exploration
Abstract : To cope with the increasing complexity of embedded and cyber-physical system design, different system-level design approaches are proposed which start from abstract models and implement them using design flows with high degrees of automation. However, creating models of such systems and also formulating the mathematical problems arising in these design flows are themselves challenging tasks. READ MORE
-
20. Formal Verification of Peripheral Memory Isolation
Abstract : In many contexts, computers run both critical and untrusted software,necessitating the need for isolating critical software from untrusted software.These computers contain CPUs, memory and peripherals. READ MORE