COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Automated Reasoning Group Lunches > Formal Methods for Critical Systems
Formal Methods for Critical SystemsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Thomas Tuerk. Formal methods have traditionally been reserved for systems with requirements for extremely high assurance. However, the growing popularity of model-based development, in which models of system behavior are created early in the development process and used to auto-generate code, are making precise, mathematical specifications much more common in industry. At the same time, formal verification tools such as model checkers continue to grow more powerful. The convergence of these two trends opens the door for the practical application of formal verification techniques early in the life cycle for many systems. This talk will describe how Rockwell Collins has applied both theorem proving and model checking to commercial avionics and security systems to reduce costs and improve quality. Biography for Steven P. Miller Dr. Steven Miller is a Senior Principal Software Engineer in the Advanced Technology Center of Rockwell Collins. He has over 30 years of experience in software development for both mainframe and embedded systems. He received his Ph.D. in computer science from the University of Iowa in 1991, and also holds a B.A. in physics and mathematics from the University of Iowa. His current research interests include model-based development and formal methods. He was principle investigator on a 5-year project sponsored by NASA Langley’s Aviation Safety Program and Rockwell Collins to investigate advanced methods and tools for the development flight critical systems. Prior to that he lead several research efforts at Rockwell Collins, including a collaborative effort with SRI International and NASA to formally verify the microcode in the AAMP5 and AAMP -FV microprocessors using the PVS verification system. This talk is part of the Computer Laboratory Automated Reasoning Group Lunches series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsal769's list Institute of Continuing Education EMBL-EBI Science & SocietyOther talksAn SU(3) variant of instanton homology for webs High-Dimensional Collocation for Lognormal Diffusion Problems The statistical model of nuclear fission: from Bohr-Wheeler to heavy-ion fusion-fission reactions Description: TIE proteins: chemical harpoons of Gram-positive bacteria The world is not flat: towards 3D cell biology and 3D devices Phylogenetic hypothesis of the Oleeae tribe (Oleaceae) Diversification and molecular evolution patterns in plastid and nuclear ribosomal DNA Liver Regeneration in the Damaged Liver Disease Migration 'Cryptocurrency and BLOCKCHAIN – PAST, PRESENT AND FUTURE' Lecture Supper: James Stuart: Radical liberalism, ‘non-gremial students’ and continuing education Graph Legendrians and SL2 local systems An Introduction to Cluster Categories of Type A |