This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
We show how some classical static analyses for imperative programs, and the optimizing transformations which they enable, may be expressed and proved correct using elementary logi...
This paper presents a new approach to accurate and reliable dead-reckoning with mobile robots. The approach makes use of special properties of our recently developed Multi-Degreeo...
Abstract—Symbolic Trajectory Evaluation is an industrialstrength verification method, based on symbolic simulation and abstraction, that has been highly successful in data path ...
Zurab Khasidashvili, Gavriel Gavrielov, Tom Melham
Of special interest in formal verification are safety properties, which assert that the system always stays within some allowed region. Each safety property can be associated with...