We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown simulatability approach, i.e., the specification is an ...
This paper presents a game-model of a gym training system, where the behavior of the system is specified using languages developed originally for reactive system design, which dri...
David Harel, Itai Segall, Hillel Kugler, Yaki Sett...
An embedded system the system continuously interacts with its environment under strict timing constraints, called the external constraints, and it is important to know how these e...
In this paper, we present the integration of controller synthesis techniques in the SIGNAL environment through the description of a tool dedicated to the incremental construction o...
Abstract— This paper describes an investigation into the control of autonomous mobile sensor platforms in a marine sensor network used to provide monitoring of transitory phenome...
Donald P. Eickstedt, Michael R. Benjamin, Henrik S...