International audienceWe present in this paper a method and tool for the verification of causal and temporal properties of embedded systems, by analyzing the trace streams resulting from virtual prototypes that combines simulated hardware and embedded software. The proposed method makes it possible to analyze different kinds of properties without rebuilding the simulation models. Logical clocks are used to identify relevant points to put observation probes and thus also reducing the trace streams size. We propose a property specification language, called PSML, and based on behavioral patterns that does not require knowledge of temporal logics. From a given PSML specification, simulation is instrumented to generate a trace and the code is dy...
The emergence of the Industrial Internet results in an increasing number of complicated temporal int...
Verification is decisive for embedded software. The goal of this work is to verify temporal properti...
Runtime verification is checking whether a system execution satisfies or violates a given correctnes...
International audienceWe present in this paper a method and tool for the verification of causal and ...
In modern times, human life is intrinsically depending on real-time embedded systems (RTES) with inc...
This paper presents a new methodology for model checking real-time systems based on the abstraction ...
Verification and validation are the major tasks during the design of digital hardware/software syste...
Runtime verification is checking whether a system execution satisfies or violates a given correctnes...
© The Author(s) 2013. This article is published with open access at Springerlink.com Abstract We pre...
The amount of software in embedded systems has increased significantly over the last years and, ther...
The Trace Runtime Analysis Platform (TRAP) provides a model-based framework and implements the corr...
Abstract: Obtaining full models for the validation and verification of embedded systems is often dif...
In the era of billion-transistor design, it is critical to establish effective verification methodol...
Formulae of linear temporal logic (LTL) can be used to specify (wanted or unwanted) properties of a ...
Modern embedded systems have reached a level of complexity such that it is no longer possible to wai...
The emergence of the Industrial Internet results in an increasing number of complicated temporal int...
Verification is decisive for embedded software. The goal of this work is to verify temporal properti...
Runtime verification is checking whether a system execution satisfies or violates a given correctnes...
International audienceWe present in this paper a method and tool for the verification of causal and ...
In modern times, human life is intrinsically depending on real-time embedded systems (RTES) with inc...
This paper presents a new methodology for model checking real-time systems based on the abstraction ...
Verification and validation are the major tasks during the design of digital hardware/software syste...
Runtime verification is checking whether a system execution satisfies or violates a given correctnes...
© The Author(s) 2013. This article is published with open access at Springerlink.com Abstract We pre...
The amount of software in embedded systems has increased significantly over the last years and, ther...
The Trace Runtime Analysis Platform (TRAP) provides a model-based framework and implements the corr...
Abstract: Obtaining full models for the validation and verification of embedded systems is often dif...
In the era of billion-transistor design, it is critical to establish effective verification methodol...
Formulae of linear temporal logic (LTL) can be used to specify (wanted or unwanted) properties of a ...
Modern embedded systems have reached a level of complexity such that it is no longer possible to wai...
The emergence of the Industrial Internet results in an increasing number of complicated temporal int...
Verification is decisive for embedded software. The goal of this work is to verify temporal properti...
Runtime verification is checking whether a system execution satisfies or violates a given correctnes...