An identification of system key attributes in structural reasoning for formal validation of industrial programming

Author(s):  
A. Lobov ◽  
J.L.M. Lastra
2014 ◽  
Vol 39 (1) ◽  
pp. 1-5 ◽  
Author(s):  
Corrina Gibson ◽  
Robert Karban ◽  
Luigi Andolfato ◽  
John Day

2019 ◽  
Vol 13 (4) ◽  
pp. 677-697 ◽  
Author(s):  
Thierry Gautier ◽  
Clément Guy ◽  
Alexandre Honorat ◽  
Paul Le Guernic ◽  
Jean-Pierre Talpin ◽  
...  
Keyword(s):  

In our previous papers, a new Ant Routing Protocol for Ad-hoc Networks inspired from ant colony optimization was presented. We introduced a new approach which decreases both of nodes energy consumption and routing overhead within the network. The validation of our routing protocol was based on series of simulation. The results show that our new algorithm provides a significant improvement compared to other protocols. After the algorithm is defined and published, we have found important to validate formally each one of its components in order to avoid any conflict, lack or misbehaving situations. This process requires in a first step a formal specification. This is our main concern in this paper where we propose in a first part a formal specification using inference systems based on logical rules. A formal validation using these inference systems is proposed in a second step in order to prove the correctness, the soundness, the completeness and the optimality of the proposition.


Author(s):  
Jorge L. Hernandez-Ardieta ◽  
Ana I. Gonzalez-Tablas ◽  
Benjamin Ramos
Keyword(s):  

2013 ◽  
Vol 765-767 ◽  
pp. 1761-1765
Author(s):  
Fu Lin Li ◽  
Jie Yang ◽  
Hong Wei Zhou ◽  
Ying Liu

Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.


Sign in / Sign up

Export Citation Format

Share Document