2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS) 2016
DOI: 10.1109/iceccs.2016.015
|View full text |Cite
|
Sign up to set email alerts
|

Stepwise Formal Modeling and Verification of Self-Adaptive Systems with Event-B. The Automatic Rover Protection Case Study

Abstract: OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 24 publications
(26 reference statements)
0
5
0
Order By: Relevance
“…The Event-B method has been used successfully to design critical systems for a variety of applications, including the control system for the Meteor line 14 in Paris and the VAL shuttle for Paris CDG airport [21,22,23], as well as medical devices [24,25,26], autonomous systems [27,28], security protocols [29,30], control-command systems [31,32,33], and distributed protocols [34,35,36,37,38]. More information can be found in [39].…”
Section: Applicationsmentioning
confidence: 99%
“…The Event-B method has been used successfully to design critical systems for a variety of applications, including the control system for the Meteor line 14 in Paris and the VAL shuttle for Paris CDG airport [21,22,23], as well as medical devices [24,25,26], autonomous systems [27,28], security protocols [29,30], control-command systems [31,32,33], and distributed protocols [34,35,36,37,38]. More information can be found in [39].…”
Section: Applicationsmentioning
confidence: 99%
“…Application of the B method. Event-B method has been successfully applied to design critical systems for applications, like control system for the Meteor line 14 in Paris or the VAL shuttle for Paris CDG airport [9], medical devices [40], autonomous systems [42], security protocols [10], control-command systems [23] and distributed protocols [34,48]. More information can be found in [17,39].…”
Section: Event-b Extensions With Theoriesmentioning
confidence: 99%
“…Hence the implementation of the correct-by-construction paradigm. Applications of this method can be found for example in [52], [53]. As shown on Figure 11, this approach could rather be seen as an alternative to the first phases of the classical design flow, to build a correct-by-construction view of the SoC platform, from an abstract system specification.…”
Section: Comparison With the Correct-by-construction Approachmentioning
confidence: 99%