Searched for: subject:"And%5C+verifications"
(1 - 20 of 45)

Pages

document
Marksteiner, S. (author), Marko, N. (author), Smulders, A. (author), Karagiannis, S. (author), Stahl, F. (author), Hamazaryan, H. (author), Schlick, R. (author), Kraxberger, S. (author), Vasenev, A. (author)
Modern vehicles become increasingly digitalized with advanced information technology-based solutions like advanced driving assistance systems and vehicle-to-x communications. These systems are complex and interconnected. Rising complexity and increasing outside exposure has created a steadily rising demand for more cyber-secure systems. Thus,...
conference paper 2021
document
Lathouwers, S. (author), Everts, M.H. (author), Huisman, M. (author)
String sanitizers are widely used functions for preventing injection attacks such as SQL injections and cross-site scripting (XSS). It is therefore crucial that the implementations of such string sanitizers are correct. We present a novel approach to reason about a sanitizer's correctness by automatically generating a model of the implementation...
conference paper 2020
document
Jonk, R. (author), Voeten, J. (author), Geilen, M. (author), Basten, T. (author), Schiffelers, R. (author)
We introduce a technique to verify temporal properties expressed in MTL on Interval Message Sequence Charts (IMSC), a model based on UML2.0 MSC that captures the timed execution of component-based software systems. We accomplish this by encoding the IMSC and the property of interest in a constraint satisfaction problem, which is then solved with...
conference paper 2020
document
Gross, D. (author), Jansen, N. (author), Perez, G.A. (author), Raaijmakers, S. (author)
We give a formal verification procedure that decides whether a classifier ensemble is robust against arbitrary randomized attacks. Such attacks consist of a set of deterministic attacks and a distribution over this set. The robustness-checking problem consists of assessing, given a set of classifiers and a labelled data set, whether there exists...
conference paper 2020
document
Sagastizabal, R. (author), Bonet-Monroig, X. (author), Singh, M. (author), Rol, M.A. (author), Bultink, C.C. (author), Fu, X. (author), Price, C.H. (author), Ostroukh, V.P. (author), Muthusubramanian, N. (author), Bruno, A. (author), Beekman, M. (author), Haider, N. (author), O'Brien, T.E. (author), Dicarlo, L. (author)
article 2019
document
Jasper, M. (author), Mues, M. (author), Murtovi, A. (author), Schlüter, M. (author), Howar, F. (author), Steffen, B. (author), Schordan, M. (author), Hendriks, D. (author), Schiffelers, R. (author), Kuppens, H. (author), Vaandrager, F.W. (author)
This paper covers the Rigorous Examination of Reactive Systems (RERS) Challenge 2019. For the first time in the history of RERS, the challenge features industrial tracks where benchmark programs that participants need to analyze are synthesized from real-world models. These new tracks comprise LTL, CTL, and Reachability properties. In addition,...
conference paper 2019
document
Burggraaf, J. (author), Groeneweg, J. (author), Sillem, S. (author), van Gelder, P. (author)
The field of safety and incident prevention is becoming more and more data based. Data can help support decision making for a more productive and safer work environment, but only if the data can be, is and should be trusted. Especially with the advance of more data collection of varying quality, checking and judging the data is an increasingly...
article 2019
document
Masin, M. (author), Palumbo, F. (author), Adriaanse, J. (author), Myrhaug, H. (author), Regazzoni, F. (author), Sanchez, M. (author), Zedda, K. (author)
Technical Requirements (TRs) provide a “black box” conceptualization of the target project results with explicit verification tests. The goal of Technical Requirements Elicitation (TRE) is to ensure that all needs of involved stakeholders are being identified and adequately addressed without prescribing how to achieve them. Whilst TRE...
conference paper 2019
document
Dresscher, M. (author), Human, J.D. (author), Witvoet, G. (author), van der Heiden, N. (author), den Breeje, R. (author), Kuiper, S. (author), Fritz, E.C. (author), Korevaar, C.W. (author), van der Valk, N.C.J. (author), de Lange, T.J. (author), Saathof, R. (author), Doelman, N.J. (author), Crowcombe, W.E. (author), Duque, C.M. (author), de Man, H. (author)
The anticipated capacity benefit of optical satellite communications has triggered a cascade of technology developments. In this paper, we present three such technologies, namely; i). A cube satellite laser terminal (CubeCAT), ii). A lower Earth orbit satellite optical head (LEOCAT) and iii). A calibration and verification test bench for coarse...
conference paper 2019
document
Grappiolo, C. (author), Verwielen, E. (author), Noorman, N. (author)
Connected high-tech systems allow the gathering of operational data at unprecedented volumes. A direct benefit of this is the possibility to extract usage models, that is, a generic representations of how such systems are used in their field of application. Usage models are extremely important, as they can help in understanding the discrepancies...
conference paper 2019
document
Barros, E.G.D. (author), Leeuwenburgh, O. (author), Carpentier, S.F.A. (author), Wilschut, F. (author), Neele, F.P. (author)
Managing the risk of unexpected events occurring during site operations and reducing operational costs are paramount to ensure the success of CO2 storage projects. For this purpose, operators need to design cost-effective monitoring systems to detect signals that can indicate whether or not the storage site behaves as expected and will continue...
conference paper 2018
document
Barros, E.G.D. (author), Leeuwenburgh, O. (author), Carpentier, S.F.A. (author), Wilschut, F. (author), Neele, F.P. (author)
In this paper we address the challenge of efficient and reliable monitoring of subsurface CO2 storage operations for conformance verification purposes. In order to acquire a storage license, the operator has to demonstrate convincingly to the regulator that the operation of the site will conform to safety regulations, and that CO2 will remain...
conference paper 2018
document
Eliasson, P. (author), Cerasi, P. (author), Romdhane, A. (author), White, J.C. (author), Schmidt-Hattenberger, C. (author), Carpentier, S.F.A. (author), Grimstad, A.A. (author), Lothe, A.E. (author)
Pre-ACT is a three-year (2017-2020) research project on CO2 storage which brings together a partnership of 10 research institutes and industrial companies. Pre-ACT is delivering cutting-edge research into the safe storage and monitoring of CO2. The focus is on improving strategies for monitoring and management of pore pressure within the storage...
conference paper 2018
document
de Goeij, B.T.G. (author), de Bruijn, D. (author), van der Knaap, F.G.P. (author), Bol, H. (author), Gielesen, W.L.M. (author), Bell, A. (author), Matthews, A. (author), Skipper, M. (author), Hallett, B. (author), Sauer, M. (author), Kruse, K.W. (author), Haas, C. (author), Wallace, K. (author), Heliere, A. (author)
The European Space Agency (ESA) and the Japan Aerospace Exploration Agency (JAXA) are co-operating to develop the EarthCARE satellite mission with the fundamental objective of improving the understanding of the processes involving clouds, aerosols and radiation in the Earth's atmosphere. A Cloud Profiling Radar (CPR), an Atmospheric LIDAR (ATLID...
conference paper 2018
document
Lu, S. (author), Heemink, A. (author), Lin, H.X. (author), Segers, A. (author), Fu, G. (author)
Remote sensing, as a powerful tool for monitoring atmospheric phenomena, has been playing an increasingly important role in inverse modeling. Remote sensing instruments measure quantities that often combine several state variables as one. This creates very strong correlations between the state variables that share the same observation variable....
article 2017
document
Donaldson, A.F. (author), Ketema, J. (author), Sorensen, T. (author), Wickerson, J. (author)
The tutorial at CONCUR will provide a practical overview of work undertaken over the last six years in the Multicore Programming Group at Imperial College London, and with collaborators internationally, related to understanding and reasoning about concurrency in software designed for acceleration on GPUs. In this article we provide an overview...
conference paper 2017
document
Kurtev, I. (author), Schuts, M. (author), Hooman, J. (author), Swagerman, D.J. (author)
conference paper 2017
document
Osaiweran, A. (author), Schuts, M. (author), Hooman, J. (author), Groote, J.F. (author), van Rijnsoever, B. (author)
We evaluate the effect of applying the commercial formal technique Analytical Software Design (ASD) to an industrial project. In ASD, interfaces and software designs are modelled using a formal tabular notation. The ASD tool set supports formal checks of these models, such as deadlock freedom and interface compliance. In addition, full code can...
article 2016
document
Gür, B. (author), Bol, H. (author), Xu, P. (author), Li, B. (author)
The present paper describes the challenging diffuser design and verification activities of TNO under contract of a customer for an earth observation instrument with observation conditions that require feasible BRDF under large angles of incidence of up to 70° with respect to the surface normal. Not only the design though but also the...
conference paper 2015
document
Voogd, J.M. (author), Roza, M. (author)
The Dutch Ministry of Defense (NL-MoD) has recently acquired an update of its medium range anti tank (MRAT) missile system, called the GILL. The update to the SPIKE Long Range (LR) weapon system is accompanied with the acquisition of new simulation training devices (STDs). These devices are bought Commercial off the Shelf (COTS). The question...
conference paper 2015
Searched for: subject:"And%5C+verifications"
(1 - 20 of 45)

Pages