Nome |
# |
Formal Verification of Human-Robot Interaction in Healthcare Scenarios, file e0c31c10-00c3-4599-e053-1705fe0aef77
|
339
|
RoboMAX: Robotic Mission Adaptation eXemplars, file e0c31c11-6f0a-4599-e053-1705fe0aef77
|
305
|
A tool for verification of big-data applications, file e0c31c0a-25d1-4599-e053-1705fe0aef77
|
276
|
Formal verification of storm topologies through D-VerT, file e0c31c0b-1906-4599-e053-1705fe0aef77
|
238
|
A Model-Driven Approach for the Formal Verification of Storm-Based Streaming Applications, file e0c31c0b-cd47-4599-e053-1705fe0aef77
|
238
|
Online verification in cyber-physical systems: Practical bounds for meaningful temporal costs., file e0c31c0b-f345-4599-e053-1705fe0aef77
|
232
|
Using formal verification to evaluate the execution time of Spark applications, file e0c31c0f-7ebf-4599-e053-1705fe0aef77
|
211
|
A Logical Characterization of Timed (non-)Regular Languages, file e0c31c08-2496-4599-e053-1705fe0aef77
|
206
|
A Model-driven Approach for the Formal Analysis of Human-Robot Interaction Scenarios, file e0c31c10-4944-4599-e053-1705fe0aef77
|
196
|
On the timed analysis of big-data applications, file e0c31c0f-07ac-4599-e053-1705fe0aef77
|
188
|
An SMT-based approach to satisfiability checking of MITL, file e0c31c08-7356-4599-e053-1705fe0aef77
|
168
|
Event-sourced, observable software architectures: An experience report, file cd8a6637-630d-40db-b745-90b1af5ad582
|
149
|
Constraint LTL Satisfiability Checking without Automata, file e0c31c08-4804-4599-e053-1705fe0aef77
|
128
|
The Cost of Formal Verification in Adaptive CPS. An Example of a Virtualized Server Node, file e0c31c0f-e25c-4599-e053-1705fe0aef77
|
120
|
PuRSUE -from specification of robotic environments to synthesis of controllers, file e0c31c0f-4358-4599-e053-1705fe0aef77
|
117
|
A timed semantics of workflows, file e0c31c0f-fd69-4599-e053-1705fe0aef77
|
114
|
On the Initialization of Clocks in Timed Formalisms, file e0c31c0e-f3d1-4599-e053-1705fe0aef77
|
100
|
Towards Better Trust in Human-Machine Teaming through Explainable Dependability, file 82c6cdb9-b2c3-4955-bcc8-05d44f49340c
|
98
|
Towards the formal verification of data-intensive applications through metric temporal logic, file e0c31c0a-30b5-4599-e053-1705fe0aef77
|
85
|
Specification, stochastic modeling and analysis of interactive service robotic applications, file d44c1a4c-48b7-4f9a-9ebf-6603d239593f
|
77
|
Architecting Explainable Service Robots, file 7df0c22a-8220-4e78-ab53-f47b16397fe4
|
73
|
A Conceptual Framework for Explainability Requirements in Software-Intensive Systems, file 75d1e0f0-e8af-4acf-8524-ce107dc721f2
|
72
|
Model-Driven Development of Service Robot Applications Dealing with Uncertain Human Behavior, file 0dada564-cb99-415b-a4a4-4d16a656a344
|
70
|
Verifying big data topologies by-design: a semi-automated approach, file e0c31c0f-7511-4599-e053-1705fe0aef77
|
64
|
Improved Bounded Model Checking of Timed Automata, file e0c31c11-ac4a-4599-e053-1705fe0aef77
|
53
|
Model Checking MITL Formulae on Timed Automata: A Logic-based Approach, file 4032f53d-a77e-4142-9cc5-d00b8840fa7a
|
39
|
A tool for deciding the satisfiability of continuous-time metric temporal logic, file 564172b1-2dcb-456d-b996-507466978e2d
|
33
|
Towards Trust-preserving Continuous Co-evolution of Digital Twins, file 1813f7f4-cd77-4825-9e88-f3c052a63ecb
|
30
|
Analyzing the impact of human errors on interactive service robotic scenarios via formal verification, file f7d6472d-77c3-4a43-8399-df13fa2b28b8
|
23
|
Edge-based Runtime Verification for the Internet of Things, file 45f61876-af8b-4dd7-bb72-bbd8a255bb8c
|
17
|
A Deployment Framework for Formally Verified Human-Robot Interactions, file e0c31c12-60de-4599-e053-1705fe0aef77
|
15
|
Efficient large-scale trace checking using mapreduce, file e0c31c12-1d19-4599-e053-1705fe0aef77
|
11
|
A logical characterization of timed regular languages, file e0c31c0a-2374-4599-e053-1705fe0aef77
|
3
|
Model Checking MITL Formulae on Timed Automata: A Logic-based Approach, file e0c31c11-bcf4-4599-e053-1705fe0aef77
|
3
|
An LTL Semantics of BusinessWorkflows with Recovery, file e0c31c08-8145-4599-e053-1705fe0aef77
|
2
|
Towards DevOps for privacy-by-design in data-intensive applications: A research roadmap, file e0c31c0b-7992-4599-e053-1705fe0aef77
|
2
|
Trace checking of streaming applications through DICE-TraCT, file e0c31c0f-e25b-4599-e053-1705fe0aef77
|
2
|
On some classes of 2D-languages and their relations, file e0c31c0f-f614-4599-e053-1705fe0aef77
|
2
|
Using formal verification to evaluate the execution time of Spark applications, file e0c31c11-c0c0-4599-e053-1705fe0aef77
|
2
|
An SMT-based approach to satisfiability checking of MITL, file e0c31c0a-2c9a-4599-e053-1705fe0aef77
|
1
|
Formal Verification of Human-Robot Interaction in Healthcare Scenarios, file e0c31c0f-abb1-4599-e053-1705fe0aef77
|
1
|
DevOps Service Observability By-Design: Experimenting with Model-View-Controller, file e0c31c0f-c611-4599-e053-1705fe0aef77
|
1
|
Statistical Model Checking of Human-Robot Interaction Scenarios, file e0c31c0f-e412-4599-e053-1705fe0aef77
|
1
|
A Model-driven Approach for the Formal Analysis of Human-Robot Interaction Scenarios, file e0c31c10-75b7-4599-e053-1705fe0aef77
|
1
|
Efficient large-scale trace checking using mapreduce, file e0c31c10-a66e-4599-e053-1705fe0aef77
|
1
|
Online verification in cyber-physical systems: Practical bounds for meaningful temporal costs., file e0c31c10-ae33-4599-e053-1705fe0aef77
|
1
|
Totale |
4.108 |