TS-U: Temporal-spatial methodology for application checking of the systems in the ubiquitous environment

Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo Kwon Baik

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    In the paper a novel methodology, TS-U, is proposed based on existing model checking techniques that were extended to successfully model the systems in a ubiquitous environment by introducing time and space constraints relevant in modeling of some ubiquitous system for its validation. Method proposed requires only slight modification of the existing model checking tools by introducing the notion of a Transition Checking Matrix (TCM) which holds time and space constraints for model's transitions. By applying TS-U methodology, regular CTL formulae can be used without modifications to successfully check the system's model as in the traditional model checking based on the Kripke structure.

    Original languageEnglish
    Title of host publicationEmbedded and Ubiquitous Computing - EUC 2005 Workshops
    Subtitle of host publicationUISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
    Pages161-170
    Number of pages10
    DOIs
    Publication statusPublished - 2005
    EventEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES - Nagasaki, Japan
    Duration: 2005 Dec 62005 Dec 9

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume3823 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    OtherEUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES
    Country/TerritoryJapan
    CityNagasaki
    Period05/12/605/12/9

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'TS-U: Temporal-spatial methodology for application checking of the systems in the ubiquitous environment'. Together they form a unique fingerprint.

    Cite this