語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Model-based Runtime Verification Fra...
~
ProQuest Information and Learning Co.
Model-based Runtime Verification Framework for Wireless Protocol Implementations.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Model-based Runtime Verification Framework for Wireless Protocol Implementations./
作者:
Shi, Jinghao.
面頁冊數:
1 online resource (97 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
Contained By:
Dissertation Abstracts International79-10B(E).
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9780438047099
Model-based Runtime Verification Framework for Wireless Protocol Implementations.
Shi, Jinghao.
Model-based Runtime Verification Framework for Wireless Protocol Implementations.
- 1 online resource (97 pages)
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
Thesis (Ph.D.)--State University of New York at Buffalo, 2018.
Includes bibliographical references
Validating wireless protocol implementations is challenging. Today's approaches require labor-intensive experimental setup and manual trace investigation, but produce poor coverage and inaccurate and irreproducible results. We present VERIF I , the first systematic sniffer-based, model-guided runtime verification framework for wireless protocol implementations. VERIFI takes a formal model of the protocol being verified as input. To achieve good coverage, it first applies state reachability analysis by applying model checking techniques. It then uses a new PACKETSNIPER component to selectively trigger packet losses required to quickly investigate all reachable protocol states. Our results show that the selective packet jamming allows VERIFI to significantly improve the coverage of protocol states. Finally, VERIFI accommodates uncertainty caused by the sniffer when validating traces, allowing it to provide accurate and reproducible results. By modeling uncertainty, VERIFI highlights likely protocol violations for developers to examine.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780438047099Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Model-based Runtime Verification Framework for Wireless Protocol Implementations.
LDR
:02297ntm a2200325Ki 4500
001
919145
005
20181116131020.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780438047099
035
$a
(MiAaPQ)AAI10745913
035
$a
(MiAaPQ)buffalo:15646
035
$a
AAI10745913
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Shi, Jinghao.
$3
1193650
245
1 0
$a
Model-based Runtime Verification Framework for Wireless Protocol Implementations.
264
0
$c
2018
300
$a
1 online resource (97 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-10(E), Section: B.
500
$a
Advisers: Geoffrey Challen; Chunming Qiao.
502
$a
Thesis (Ph.D.)--State University of New York at Buffalo, 2018.
504
$a
Includes bibliographical references
520
$a
Validating wireless protocol implementations is challenging. Today's approaches require labor-intensive experimental setup and manual trace investigation, but produce poor coverage and inaccurate and irreproducible results. We present VERIF I , the first systematic sniffer-based, model-guided runtime verification framework for wireless protocol implementations. VERIFI takes a formal model of the protocol being verified as input. To achieve good coverage, it first applies state reachability analysis by applying model checking techniques. It then uses a new PACKETSNIPER component to selectively trigger packet losses required to quickly investigate all reachable protocol states. Our results show that the selective packet jamming allows VERIFI to significantly improve the coverage of protocol states. Finally, VERIFI accommodates uncertainty caused by the sniffer when validating traces, allowing it to provide accurate and reproducible results. By modeling uncertainty, VERIFI highlights likely protocol violations for developers to examine.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
State University of New York at Buffalo.
$b
Computer Science and Engineering.
$3
1180201
773
0
$t
Dissertation Abstracts International
$g
79-10B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10745913
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入