메뉴 건너뛰기




Volumn , Issue , 2014, Pages 813-820

Formal verification of fault-tolerant and recovery mechanisms for safe node sequence protocol

Author keywords

event triggered protocol; fault tolerance; model checking; Safe Node Sequence Protocol

Indexed keywords

MODEL CHECKING; RECOVERY;

EID: 84903835056     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2014.99     Document Type: Conference Paper
Times cited : (4)

References (32)
  • 1
    • 0021626002 scopus 로고
    • Fault-tolerant microprocessor-based systems
    • B. W. Johnson, "Fault-Tolerant Microprocessor-Based Systems", IEEE Micro, Vol. 4, No. 6, 1984, pp. 6-21.
    • (1984) IEEE Micro , vol.4 , Issue.6 , pp. 6-21
    • Johnson, B.W.1
  • 3
    • 0003133883 scopus 로고
    • Probabilistic logics and synthesis of reliable organisms from unreliable components
    • eds. C. Shannon and J. McCarthy, Princeton University Press
    • J. von Neumann, "Probabilistic Logics and Synthesis of Reliable Organisms from Unreliable Components", in Automata Studies, eds. C. Shannon and J. McCarthy, Princeton University Press, 1956, pp. 43-98.
    • (1956) Automata Studies , pp. 43-98
    • Von Neumann, J.1
  • 6
    • 84886079029 scopus 로고    scopus 로고
    • Modeling and analysis of biological networks with model checking
    • (eds M. Elloumi and A. Y. Zomaya), John Wiley & Sons, Inc., Hoboken, NJ, USA, doi: 10.1002/9780470892107.ch39
    • D. Bosnacki and R. S. Mans, "Modeling and Analysis of Biological Networks with Model Checking", in Algorithms in Computational Molecular Biology: Techniques, Approaches and Applications (eds M. Elloumi and A. Y. Zomaya), John Wiley & Sons, Inc., Hoboken, NJ, USA, doi: 10.1002/9780470892107.ch39, 2011.
    • (2011) Algorithms in Computational Molecular Biology: Techniques, Approaches and Applications
    • Bosnacki, D.1    Mans, R.S.2
  • 7
    • 84874115715 scopus 로고    scopus 로고
    • Automated formal analysis and verification: An overview
    • B. Kfena and T. Vojnar, "Automated formal analysis and verification: an overview", International Journal of General System, Vol. 42, No.4, 2013, pp. 335-365.
    • (2013) International Journal of General System , vol.42 , Issue.4 , pp. 335-365
    • Kfena, B.1    Vojnar, T.2
  • 8
    • 84903834350 scopus 로고    scopus 로고
    • Technical Report accessed on Feb 18, 2014
    • TTTech Group, "A Platform for Safety-Critical Applications", Technical Report, http://www.ttagroup.org/ttp/doc/TTTech-TTA.pdf, accessed on Feb 18, 2014.
    • A Platform for Safety-Critical Applications
  • 12
    • 84903828721 scopus 로고    scopus 로고
    • Formal modeling and analysis of a node reintegration in the time-triggered architecture
    • Z. Aliouat, "Formal Modeling and analysis of a node reintegration in the Time-Triggered Architecture", Asian Journal of Information Technology Vol. 5, No. 7, 2006, pp. 706-711.
    • (2006) Asian Journal of Information Technology , vol.5 , Issue.7 , pp. 706-711
    • Aliouat, Z.1
  • 13
    • 4744361736 scopus 로고    scopus 로고
    • A model for fault-tolerant networked control system using TTP/C communication
    • R. P. Patankar, "A model for fault-tolerant networked control system using TTP/C communication", IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, Vol. 53, No. 5, 2004, pp. 1461-1467.
    • (2004) IEEE Transactions on Vehicular Technology , vol.53 , Issue.5 , pp. 1461-1467
    • Patankar, R.P.1
  • 15
    • 84903837303 scopus 로고    scopus 로고
    • Technical Report accessed on Feb 18, 2014
    • TTTech Group, "TTEthernet - A Powerful Network Solution for All Purp oses", Technical Report, http://www.ttagroup.org/ttethernet/doc/ TTEthernet-Article.pdf, accessed on Feb 18, 2014.
    • TTEthernet - A Powerful Network Solution for all Purp Oses
  • 17
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • Gjovik, Norway, October 13-15, 2003, published in Computer Security - ESORICS 2003, Lecture Notes in Computer Science
    • D. Basin, S. Mödersheim, and L. Viganö, "An On-the-Fly Model-Checker for Security Protocol Analysis", The 8th European Symposium on Research in Computer Security (ESORICS 2003), Gjovik, Norway, October 13-15, 2003, published in Computer Security - ESORICS 2003, Lecture Notes in Computer Science, Vol. 2808, 2003, pp. 253-270.
    • (2003) The 8th European Symposium on Research in Computer Security (ESORICS 2003) , vol.2808 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganö, L.3
  • 26
    • 62949146311 scopus 로고
    • Security protocol verification using SPIN
    • Montréal, Quebec, Canada
    • A. Jøsang, "Security Protocol Verification using SPIN", The First SPIN Workshop, Montréal, Quebec, Canada, 1995.
    • (1995) The First SPIN Workshop
    • Jøsang, A.1
  • 31
    • 84884791889 scopus 로고    scopus 로고
    • XtratuM/PPC: Ahypervisor for partitioned system on PowerPC processors
    • February
    • R. Zhou, Q. G. Zhou, Y. Sheng and K.-C. Li, "XtratuM/PPC: ahypervisor for partitioned system on PowerPC processors", Journal of Supercomputing, Vol. 63 Issue 2, February 2013, pp. 593-610.
    • (2013) Journal of Supercomputing , vol.63 , Issue.2 , pp. 593-610
    • Zhou, R.1    Zhou, Q.G.2    Sheng, Y.3    Li, K.-C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.