Internet of Things (IoT) systems promise a seamless connected world with machines integrating their services without human intervention. It's highly probable that the entities participating in such autonomous machine to machine interactions are to be provided by different manufactures. Thus, integrating such heterogeneous devices from many providers complicates design and verification of IoT systems at an unprecedented scale. In this paper, we propose a novel runtime verification approach for IoT systems. The contributions of our proposed solution include: exploiting the interactions in message sequence charts (MSC) to specify message exchanges of constrained application protocol-based IoT systems in terms of events, a novel event calculus ...
We develop a session types based framework for implementing and validating rate-based message passin...
An Internet of Things (IoT) application typically involves implementations in both the device domain...
Today, the significant volumes of network traffic circulate through the Internet. The sources of suc...
Internet of Things systems are evolving at a rapid pace and their impact on our society grows every ...
Assuring the quality of Internet of Things (IoT) systems is of paramount importance, and guaranteein...
Summarization: Key challenges in Internet-of-Things (IoT) system design and management include the s...
Runtime verification is analysis based on information extracted from a running system. Traditionall...
Following the vision of the Internet of Things, physical world entities are integrated into virtual ...
With the expansion of the Internet, Internet of Things (IoT) gains lots of interest from industries ...
The design of IoT systems could benefit from the combination of two different analyses. We perform a...
International audienceInternet of Things (IoT) enables a myriad of applications by interconnecting s...
Trigger-action programming (TAP) is a popular end-user programming framework that can simplify the I...
In the last years Node.js has emerged as a framework particularly suitable for implementing lightwei...
We propose a process calculus for modelling and reasoning on systems in the Internet of Things parad...
One of the main purposes of the Internet of Things (IoT) systems is to provide information on the ob...
We develop a session types based framework for implementing and validating rate-based message passin...
An Internet of Things (IoT) application typically involves implementations in both the device domain...
Today, the significant volumes of network traffic circulate through the Internet. The sources of suc...
Internet of Things systems are evolving at a rapid pace and their impact on our society grows every ...
Assuring the quality of Internet of Things (IoT) systems is of paramount importance, and guaranteein...
Summarization: Key challenges in Internet-of-Things (IoT) system design and management include the s...
Runtime verification is analysis based on information extracted from a running system. Traditionall...
Following the vision of the Internet of Things, physical world entities are integrated into virtual ...
With the expansion of the Internet, Internet of Things (IoT) gains lots of interest from industries ...
The design of IoT systems could benefit from the combination of two different analyses. We perform a...
International audienceInternet of Things (IoT) enables a myriad of applications by interconnecting s...
Trigger-action programming (TAP) is a popular end-user programming framework that can simplify the I...
In the last years Node.js has emerged as a framework particularly suitable for implementing lightwei...
We propose a process calculus for modelling and reasoning on systems in the Internet of Things parad...
One of the main purposes of the Internet of Things (IoT) systems is to provide information on the ob...
We develop a session types based framework for implementing and validating rate-based message passin...
An Internet of Things (IoT) application typically involves implementations in both the device domain...
Today, the significant volumes of network traffic circulate through the Internet. The sources of suc...