Wireless sensor networks (“sensornets”) are highly distributed and concurrent, with program actions bound to external stimuli. They exemplify a system class known as reactive systems, which comprise execution units that have “hidden” layers of control flow. A key obstacle in enabling reactive system developers to rigorously validate their implementations has been the absence of precise software component specifications and tools to assist in leveraging those specifications at runtime. We address this obstacle in three ways: (i) We describe a specification approach tailored for reactive environments and demonstrate its application in the context of sensornets. (ii) We describe the design and implementation of extensions to the popular nesC t...
Networked Cyber-Physical Systems are fundamentally constrained by the tight coupling and closed-loop...
Unit testing, an important facet of software quality assurance, is underappreciated by wireless sens...
© ACM, (YEAR). This is the author’s version of the work. It is posted here by permission of ACM for ...
Wireless sensor networks (“sensornets”) are highly distributed and concurrent, with program actions ...
We present a case study that considers the application of runtime verification technology to a wirel...
Journal ArticleWireless sensor networks are widely used to detect environment information that is no...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
Wireless sensor networks are application specific and necessitate the development of specific networ...
We present nesC, a programming language for networked embedded systems, such as sensor network “mote...
Abstract — Sensing events from dynamic environments are normally asynchronous and non-repeatable. Th...
This study will develop novel formal techniques for design and analysis of reactive sensor network p...
Sensor networks are increasingly important in many domains, for example, environmental monitoring, e...
UnrestrictedNetworked systems have an important role in our lives. Ranging from the Internet to new ...
It is currently difficult to build practical and reliable programming systems out of distributed and...
Networked Cyber-Physical Systems are fundamentally constrained by the tight coupling and closed-loop...
Unit testing, an important facet of software quality assurance, is underappreciated by wireless sens...
© ACM, (YEAR). This is the author’s version of the work. It is posted here by permission of ACM for ...
Wireless sensor networks (“sensornets”) are highly distributed and concurrent, with program actions ...
We present a case study that considers the application of runtime verification technology to a wirel...
Journal ArticleWireless sensor networks are widely used to detect environment information that is no...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
Wireless sensor networks are application specific and necessitate the development of specific networ...
We present nesC, a programming language for networked embedded systems, such as sensor network “mote...
Abstract — Sensing events from dynamic environments are normally asynchronous and non-repeatable. Th...
This study will develop novel formal techniques for design and analysis of reactive sensor network p...
Sensor networks are increasingly important in many domains, for example, environmental monitoring, e...
UnrestrictedNetworked systems have an important role in our lives. Ranging from the Internet to new ...
It is currently difficult to build practical and reliable programming systems out of distributed and...
Networked Cyber-Physical Systems are fundamentally constrained by the tight coupling and closed-loop...
Unit testing, an important facet of software quality assurance, is underappreciated by wireless sens...
© ACM, (YEAR). This is the author’s version of the work. It is posted here by permission of ACM for ...