Code Verification
Mostrando 13-24 de 36 artigos, teses e dissertações.
-
13. Metodologia para modelagem, validação e programação de controladores lógicos industriais usando statecharts básicos
Com o advento da informática industrial muitos esforços têm sido realizados para o desenvolvimento de notações e semânticas usadas para classificar e descrever diferentes tipos de sistemas, sobretudo na fase de modelagem. Tais esforços fornecem a infraestrutura necessária para a solução de alguns problemas reais de engenharia e a construção de si
Publicado em: 2009
-
14. A prototype implementation of a distributed satisfiability modulo theories solver in the ToolBus framework
An increasing number of verification tools (e.g., software model-checkers) require the use of Satisfiability Modulo Theories (SMT) solvers to implement the back-ends for the automatic analysis of specifications and properties. The most prominent approach to build SMT solvers consists in integrating an efficient Boolean solver with decision procedures capable
Journal of the Brazilian Computer Society. Publicado em: 2008-03
-
15. Regime não-linear de trens de ondas modulados na direção transversal em um escoamento de Poiseuille plano / The nonlinear regime of spanwise modulated wavetrains in a plane Poiseuille flow
The current thesis had three objectives. The first objective was to develop a code of direct numerical simulation (DNS) to simulation of waves of instability in a plane Poiseuille flow. The other main objective was to analyze it through the method of manufactured solutions (MMS). Finally, a third objective was to study the nonlinear regime of spanwise modula
Publicado em: 2008
-
16. Hardware in the loop simulation applied to semi-autonomous underwater vehicles. / Simulação com hardware in the loop aplicada a veículos submarinos semi-autônomos.
Unmanned Underwater Vehicles (UUVs) have many commercial, military, and scientific applications because of their potential capabilities and significant costperformance improvements over traditional means of obtaining valuable underwater information The development of a reliable sampling and testing platform for these vehicles requires a thorough system desig
Publicado em: 2008
-
17. Algoritmos para Interoperabilidade entre Ontologias / ALGORITHMS FOR ONTOLOGIES INTEROPERABILIT
Nowadays the interest for the theme ontologies has steadily increased, as it aims at to capture consensual knowledge between people and applications, allowing reusing and sharing information. With this purpose, mechanisms are demanded to guarantee semantic interoperability, that is, the identification and compatibility of information. The present study propo
Publicado em: 2008
-
18. Contornos do inadimplemento absoluto, da mora e do adimplemento substancial: principais características e distinções
Inspired by the new vision of the phenomenon of the obligation, attributing to it values and ethics regarding the non-execution of the obligation, this work covers conceptual aspects of default, material breach and substantial performance, its fundamental distinctions and correlated institutes. In addition to resuming the valuable traditional legal teachings
Publicado em: 2008
-
19. Método de refinamento machina
The Abstract State Machine (ASM) has been used as language for formal specification to various systems due to the high level of abstraction and the mathematical rigor. It facilitates to understand the modeled system and to formally verify properties. Using an ASM language, is possible to make a high level specification, called Ground Model, to be transformed
Publicado em: 2007
-
20. Desenvolvimento de um ambiente para análise de códigos-fonte com ênfase em segurança / Development of a source code analysis aid tool focusing on security
This work presents a proposal of a source code analysis aid tool focused on security. Its main goal is to help developers to find real vulnerabilities in their own software. Among the vulnerabilities that can be found in a software, buffer overflows have greater occurrence. There are several ways to exploit this vulnerability and some of them are stack smash
Publicado em: 2007
-
21. Projeto de um dispositivo de autenticação e assinatura. / Design and implementation of an authentication device.
Currently, password-based authentication is the most widespread identity verification method for web pages access. However it presents security issues due to the growth of attacks based on spywares and phishing. The main purpose of both techniques is the digital identity theft, that is, stealing userspasswords in an unnoticed way. In order to counter this ty
Publicado em: 2007
-
22. Desenvolvimento de um ambiente para análise de códigos-fonte com ênfase em segurança / Development of a source code analysis aid tool focusing on security
Este trabalho apresenta uma proposta de ambiente para análise de códigos-fonte com enfase em segurança, tendo como objetivo primordial auxiliar desenvolvedores a encontrar reais vulnerabilidades presentes em seus próprios softwares. Dentre elas, as que podem ser encontradas com maior ocorrencia sao as que permitem ataques de extravasamento de buffer ou b
Publicado em: 2007
-
23. SimRP - simulador de redes de petri flexível com geração de código VHDL
The objective of this dissertation is to implement a description and simulation CAD tool for Petri Nets (PNs) based on open source, called SimRP. This CAD tool will be able to describe and simulate several PNs namely Ordinary, Temporal, Temporized and Interpreted types. Besides this, SimRP provides an option to generate VHDL code (a hardware description lang
Publicado em: 2006
-
24. Protocolo de comunicação para uma rede de sensores sem fio: teoria e implementação em SOC / Protocolo de comunicação para uma rede de sensores sem fio: teoria e implementação em SOC / Communications protocol to a sensor network: theory and implementation on SOC / Communications protocol to a sensor network: theory and implementation on SOC / Protocolo de comunicação para uma rede de sensores sem fio: teoria e implementação em SOC / Communications protocol to a sensor network: theory and implementation on SOC / Protocolo de comunicação para uma rede de sensores sem fio: teoria e implementação em SOC / Communications protocol to a sensor network: theory and implementation on SOC / Protocolo de comunicação para uma rede de sensores sem fio: teoria e implementação em SOC / Communications protocol to a sensor network: theory and implementation on SOC / Protocolo de comunicação para uma rede de sensores sem fio: teoria e implementação em SOC / Protocolo de comunicação para uma rede de sensores sem fio: teoria e implementação em SOC / Communications protocol to a sensor network: theory and implementation on SOC / Communications protocol to a sensor network: theory and implementation on SOC
This thesis presents the specification, verification, implementation, practical tests and performance analysis of a communication protocol which was developped starting from the work of Castricini and Marinangeli to the SNAP Protocol. The motivation to this work came from the communication needs of a new microcontroller named RISC16 which is under developmen
Publicado em: 2006