Results 1 - 10
of
118
L.: IIV: An invisible invariant verifier
- In: Computer Aided Verification (CAV
, 2005
"... This paper describes the Invisible Invariant Verifier (IIV)—an automatic tool for the generation of inductive invariants, based on the work in [4, 1, 2, 6]. The inputs to IIV are a parameterized system and an invariance property p, and the output of IIV is “success” if it finds an inductive invarian ..."
Abstract
-
Cited by 8 (3 self)
- Add to MetaCart
This paper describes the Invisible Invariant Verifier (IIV)—an automatic tool for the generation of inductive invariants, based on the work in [4, 1, 2, 6]. The inputs to IIV are a parameterized system and an invariance property p, and the output of IIV is “success” if it finds an inductive
Automatic Deductive Verification with Invisible Invariants
, 2001
"... The paper presents a method for the automatic verification of a certain class of parameterized systems. These are bounded-data systems consisting of N processes (N being the parameter), where each process is finite-state. First, we show that if we use the standard deductive inv rule for proving inva ..."
Abstract
-
Cited by 103 (11 self)
- Add to MetaCart
invariants can be transferred to the VC-validation phase without ever been examined by the user, which explains why we refer to them as "invisible". We illustrate the method on a non-trivial example of a cache protocol, provided by Steve German.
Invisible safety of distributed protocols
- Proc. 33 rd Intl. Coll. on Automata, Languages, and Programming
, 2006
"... Abstract. The method of “Invisible Invariants ” has been applied successfully to protocols that assume a “symmetric ” underlying topology, be it cliques, stars, or rings. In this paper we show how the method can be applied to proving safety properties of distributed protocols running under arbitrary ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Abstract. The method of “Invisible Invariants ” has been applied successfully to protocols that assume a “symmetric ” underlying topology, be it cliques, stars, or rings. In this paper we show how the method can be applied to proving safety properties of distributed protocols running under
Liveness with Invisible Ranking
- SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER
, 2006
"... The method of Invisible Invariants was developed originally in order to verify safety properties of parameterized systems in a fully automatic manner. The method is based on (1) a project&generalize heuristic to generate auxiliary constructs for parameterized systems, and (2) a small model theor ..."
Abstract
-
Cited by 20 (7 self)
- Add to MetaCart
The method of Invisible Invariants was developed originally in order to verify safety properties of parameterized systems in a fully automatic manner. The method is based on (1) a project&generalize heuristic to generate auxiliary constructs for parameterized systems, and (2) a small model
Psychophysical magic: rendering the visible ‘invisible’
"... What are the neural correlates of conscious visual awareness? Tackling this question requires contrasting neural correlates of stimulus processing culminating in visual awareness with neural correlates of stimulus processing unaccompanied by awareness. To produce these two neural states, one must be ..."
Abstract
-
Cited by 58 (0 self)
- Add to MetaCart
, inattentional blindness, change blindness and attentional blink. No single approach stands above the others, but those producing changing visual awareness despite invariant physical stimulation are clearly preferable. Such phenomena can help lead us ultimately to a comprehensive account of the neural correlates
Observing an invisible Higgs boson
- Phys. Lett
"... Given its weak coupling to bottom quarks and tau leptons, the Higgs boson may predominantly decay into invisible particles like gravitinos, neutralinos, or gravitons. We consider the manifestation of such an invisibly decaying Higgs boson in weak boson fusion at the CERN LHC. Distinctive kinematic d ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
distributions of the two quark jets of the signal as compared to Zjj and Wjj backgrounds allow to restrict the Higgs branching ratio to ’invisible ’ final states to some 13% with 10 fb −1 of data, provided events with two energetic forward jets of high dijet invariant mass and with substantial missing
Parameterized Verification with Automatically Computed Inductive Assertions
, 2001
"... The paper presents a method, called the method of verification by invisible invariants, for the automatic verification of a large class of parameterized systems. The method is based on the automatic calculation of candidate inductive assertions and checking for their inductiveness, using symbolic mo ..."
Abstract
-
Cited by 90 (9 self)
- Add to MetaCart
The paper presents a method, called the method of verification by invisible invariants, for the automatic verification of a large class of parameterized systems. The method is based on the automatic calculation of candidate inductive assertions and checking for their inductiveness, using symbolic
Rotation, Scale And Translation Invariant Digital Image Watermarking
- in IEEE Int. Conf. on Image Processing ICIP1997
, 1997
"... A digital watermark is an invisible mark embedded in a digital image which may be used for Copyright Protection. This paper describes how Fourier-Mellin transform-based invariants can be used for digital image watermarking. The embedded marks are designed to be unaffected by any comb ination of rota ..."
Abstract
-
Cited by 51 (5 self)
- Add to MetaCart
A digital watermark is an invisible mark embedded in a digital image which may be used for Copyright Protection. This paper describes how Fourier-Mellin transform-based invariants can be used for digital image watermarking. The embedded marks are designed to be unaffected by any comb ination
Invisible Formal Methods for Embedded Control Systems
"... Abstract — Embedded control systems typically comprise continuous control laws combined with discrete mode logic. These systems are modeled using a hybrid automaton formalism, which is obtained by combining the discrete transition system formalism with continuous dynamical systems. This paper develo ..."
Abstract
- Add to MetaCart
checking and theorem proving. As an instance of invisible formal methods, we describe techniques to check inductive invariants, or extended types, for hybrid systems and compute discrete finite state abstractions automatically to perform reachability set computation. The abstract system is sound
Phenomenology of a leptonic goldstino and invisible Higgs boson decays,” Nucl
- Phys. B
, 2005
"... Non-linearly realized supersymmetry, combined with the Standard Model field content and SU(3) × SU(2) × U(1) gauge invariance, permits local dimension-six operators involving a goldstino, a lepton doublet and a Higgs doublet. These interactions preserve total lepton number if the left-handed golds ..."
Abstract
-
Cited by 11 (3 self)
- Add to MetaCart
Non-linearly realized supersymmetry, combined with the Standard Model field content and SU(3) × SU(2) × U(1) gauge invariance, permits local dimension-six operators involving a goldstino, a lepton doublet and a Higgs doublet. These interactions preserve total lepton number if the left
Results 1 - 10
of
118