Browse by Subject "Verification"

  • Prabhakar, Pavithra (2011-08-25)
    With the advent of computers to control various physical processes, there has emerged a new class of systems which contain tight interactions between the "discrete" digital world and the "continuous" physical world. These ...

    application/pdf

    application/pdfPDF (1MB)
  • Singh, Sankalp (2012-05-22)
    Networked systems are ubiquitous in our modern society. They are found in settings that vary from mundane enterprise IT systems to critical infrastructure systems. The security of networked systems is important given their ...

    application/pdf

    application/pdfPDF (3MB)
  • Raposa, Beverly R (2016-04-26)
    In light of some major disturbances in the Western Interconnection over the past two decades, efforts are being made to improve the representation of the system to help prevent the underutilization or overutilization of ...

    application/pdf

    application/pdfPDF (1MB)
  • Cusey, James Price (Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1993-06)

    application/pdf

    application/pdfPDF (1MB)Restricted to U of Illinois
  • Chadha, Rohit; Legay, Axel; Prabhakar, Pavithra; Viswanathan, Mahesh (Springer Verlag, 2009)
    We present uniform approaches to establish complexity bounds for decision problems such as reachability and simulation, that arise naturally in the verification of timed software systems. We model timed software systems ...

    application/pdf

    application/pdfPDF (232kB)
  • Duggirala, Parasara Sridhar (2015-08-21)
    With the recent advances in communication and computation technologies, integration of software into the sensing, actuation, and control is common. This has lead to a new branch of study called Cyber-Physical Systems (CPS). ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Abdi Taghi Abad, Fardin (2014-09-16)
    Cyber-physical systems (CPS) may interact and manipulate objects in the physical world with the aid of communication channels. Additionally, due to their nature, most CPS are safety-critical systems where there are safety ...

    application/pdf

    application/pdfPDF (2MB)
  • Katelman, Michael (2010)
    This is the source code accompanying our HVC 2010 paper titled "vlogsl: A Strategy Language for Simulation-based Verification of Hardware"; it includes the source code for the vlogsl tool, as well as targets for all of the ...

    application/octet-stream

    application/octet-streamUnknown (674kB)
  • Lee, Choonghwan; Jin, Dongyun; Meredith, Patrick O'Neil; Rosu, Grigore (2012-03-12)
    Formal specification of correct library usage is extremely useful, both for software developers and for the formal analysis tools they use, such as model checkers or runtime monitoring systems. Unfortunately, the process ...

    application/pdf

    application/pdfPDF (590kB)
  • Walsh, Jonathan; Chase, Lila (Lawrence Livermore National Laboratory Technical Report, 2010-08-12)
    A means for translating MCNP5 input files into a form that can be run by Mercury, a modern Monte Carlo particle transport code, will allow MCNP5 users to more easily take advantage of the high-performance computing benefits ...

    application/pdf

    application/pdfPDF (612kB)
  • Duggirala, Parasara Sridhar; Mitra, Sayan; Viswanathan, Mahesh (Coordinated Science Laboratory. University of Illinois at Urbana-Champaign., 2013-06)
    Simulations can help enhance confidence in system designs, but they provide almost no formal guarantees. In this paper, we present a simulation-based verification framework for embedded systems described by nonlinear, ...

    application/pdf

    application/pdfPDF (418kB)