Affiliation:
1. Aalto University
2. University of Illinois at Urbana-Champaign
3. Institute for High Performance Computing and Networking
4. IBM T.J. Watson Research Center
Abstract
Ubiquitous and pervasive applications may present critical requirements from the point of view of functional correctness, reliability, availability, security, and safety. Unlike traditional safety-critical applications, the behavior of ubiquitous and pervasive applications is affected by the movements and location of users and resources. In this article, we first present emerging formal methods for the description of both entities and their behavior in pervasive computing environments; then, we introduce this special issue. Despite many previous works that have focused on modeling the entities, relatively few have concentrated on modeling or verifying behaviors; and almost none has dealt with combining techniques proposed in these two aspects. The articles accepted in this special issue cover some of the topics aforementioned and constitute a representative sample of the latest development of formal methods in pervasive computing environments.
Publisher
Association for Computing Machinery (ACM)
Subject
Software,Computer Science (miscellaneous),Control and Systems Engineering
Reference36 articles.
1. A really temporal logic
2. Combining test case generation and runtime verification
3. Bakhouya M. and Gaber J. 2008. Approaches for ubiquitous computing. In Wireless Ad Hoc and Sensor Networks. H. Labiod Ed. ISTE Publishing Knowledge John Wiley and Sons UK. 111--142. Bakhouya M. and Gaber J. 2008. Approaches for ubiquitous computing. In Wireless Ad Hoc and Sensor Networks. H. Labiod Ed. ISTE Publishing Knowledge John Wiley and Sons UK. 111--142.
4. Temporal logics for real-time system specification
5. Contextualizing ontologies
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献