Дисертації з теми "Vérification de modèles bornés"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Vérification de modèles bornés".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Kheireddine, Anissa. "Contribution to SAT-based Bounded Model Checking." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS566.
Повний текст джерелаComputer systems have become omnipresent in our daily lives. Ensuring the reliability and robustness of these systems is an absolute necessity. Model-Checking is one of the approaches dedicated to this purpose. Its objective is to either prove the absence of failures or identify potential ones. Model-Checking is declined into several technique. Among these, there is Bounded Model Checking (BMC), a technique that relies on Boolean satisfiability (SAT). The core idea behind BMC is to verify that a model, restricted to executions bounded by some integer k, satisfies its specification, often defined as a set of temporal logic expressions. In this approach, system behaviors are expressed as SAT problems. Unlike other formal verification methods, SAT-based BMC is generally not prone to the state space explosion problem, which can be problematic when dealing with designs involving millions of variables and constraints. However, the trade-off lies in the time complexity, as SAT problems are known to be NP-complete. Over the past few decades, significant advancements have been made in sequential SAT solving. These developments have mainly focused on utilizing dynamic information, acquired during the solving process (e.g., Learning Binary Clauses), or static information, extracted from the inherent structure of the SAT problem (e.g., community structure). However, less attention has been given to the structural information embedded within the original problem. For instance, when a BMC problem is reduced to SAT, critical information is lost in the translation. As this thesis emphasizes, reintegrating this lost information can greatly enhance the solving process. This work explores ways to improve SAT-based BMC problem-solving, both in sequential and parallel settings, by harnessing and leveraging pertinent information extracted from the problem's inherent characteristics. This may involve improving existing generic heuristics or effectively breaking down the formula into partitions
Duclos, Mathilde. "Méthodes pour la vérification des protocoles cryptographiques dans le modèle calculatoire." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM002/document.
Повний текст джерелаCritical and private information are exchanged on public environment. To protect it from dishonest users, we use cryptographic tools. Unfortunately, bad conception, poorly written security properties and required security hypothesis lead to attacks, and it may take years before one discover the attack and fix the security schemes involved. In this context, provable security provides formal definitions for security objectives and implied mathematical proofs that these objectives are fullfilled. On another hand, complexity and variety of cryptographic systems are increasing, and proofs by hand are too complicated to write and to verify (Bellare& Rogaway 2004, Shoup 2004, Halevi 2005). Thus, we need computer-assisted verification methods for cryptographic systems. The aim of this thesis is to progress in this direction. More precisely we want significant progress over formal proofs on cryptographic protocols. To verify cryptographic protocols we need to develop a theoritical framework providing: - a precise modelisation for cryptographic protocols and security properties we want to prove in the computationnal model, - designing tactics to automate proofs, - taking into account realistic models for adversary (side-channels...). By the end of the thesis we have enhanced a theoretical framework and computing tools helping verifying cryptographic protocols
Harrou, Fouzi. "Détection d'anomalies en présence de paramètres de nuisance bornés." Troyes, 2010. http://www.theses.fr/2010TROY0002.
Повний текст джерелаAnomaly detection is addressed within a statistical framework. Often the statistical model is composed of two types of parameters: the informative parameters and the nuisance ones. The nuisance parameters are of no interest for detection but they are necessary to complete the model. In the case of unknown, non-random and non-bounded nuisance parameters, their elimination is unavoidable. Unfortunately, this can lead to a serious degradation of the detector capacity because some anomalies are masked by nuisance parameters. Nevertheless, in many cases, the physical nature of nuisance parameter is known, and this may allow set bounds to the values taken by this parameter. In this work, the problem of anomaly detection with bounded nuisance parameters has been addressed from the statistical point of view in the context of linear model. The con-strained generalized likelihood ratio test has been studied. It has been shown that the performances of anomaly detector can be drastically improved by taking into account the lower and upper bounds, naturally imposed on the nuisance parameters. Some applications to integrity control of GPS positioning systems are developed in fields of train navigation. Finally, the detection of abnormal ozone measurements by using a regional ozone surveillance network has been used to illustrate the theoretical findings and to show the relevance of the proposed method
El, Smaily Mohammad. "Equations de réaction-diffusion dans des milieux hétérogènes non bornés." Aix-Marseille 3, 2008. http://www.theses.fr/2008AIX30010.
Повний текст джерелаIn this thesis, we study some propagation phenomena related to the heterogenous reaction-advection-diffusion. This thesis is composed of three parts. If the nonlinearity f is of "KPP", there exists a minimal speed c*. In the first part, we study the asymptotics and some homogenization regimes of the minimal speed c* with respect to the factors of reaction and diffusion and with respect to the parameter of periodicity. In the second part, we give several min-max and max-min formulae for the speeds of pulsating travelling fronts according to the type of the nonlinearity. The third part is concerned with the variation of the minimal speed with respect to the periodicity parameter L and also with the homogenized speed of a reaction-diffusion equation in the one dimensional case, but in a setting more general than that of the first part
Lacresse, Hervé. "Détection de pannes en présence de paramètres de nuisance non-linéaires bornés." Troyes, 2004. http://www.theses.fr/2004TROY0001.
Повний текст джерелаFault detection schemes usually aim at eliminating nuisance parameters from the decision process upon wich they rely. However, it is often possible to determine some bounds to the variations ot these parameters, taking into account physical considerations. Neglecting these bounds is a potential loss of relevant information. A fault detection methodology for models with non-linear bounded nuisance parameters is suggested. This methodology is based upon the design of the optimal staistical tests obtained in the linear nuisance case. This detection scheme uses non conventional linear approximations, whose impact on the performances of the tests can be assessed through a comparison to the optimal results of the linear case. This comparison is expressed in terms of modifications in the false-alarm and non-detection probabilities of the tests, reflecting the "non linearity" of the model. Some applications to integrity control of GPS/GNSS positioning systems are developed in the fields of plane and train navigation
Bouyer-Decitre, Patricia. "Modèles et algorithmes pour la vérification des systèmes temporisés." Cachan, Ecole normale supérieure, 2002. http://www.theses.fr/2002DENS0008.
Повний текст джерелаBeaudenon, Vincent. "Diagrammes de décision de données pour la vérification de systèmes matériels." Paris 6, 2006. http://www.theses.fr/2006PA066337.
Повний текст джерелаJacquemard, Florent. "Modèles d'automates d'arbres étendus pour la vérification de systèmes infinis." Habilitation à diriger des recherches, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00643595.
Повний текст джерелаColin, Séverine. "Procédures de recherche en génération de testes à partir de modèles de spécifications." Besançon, 2005. http://www.theses.fr/2005BESA2042.
Повний текст джерелаThe works introduced in this thesis give operational research procedures in the context of automatic functional test generation from specification models. The operations of the model are transformed into graphs. The paths of these graphs represent the behaviors of the model. The constraint animation (i. E. The simulation of the execution) of the behaviors is performed by the set constraint solver CLPS-BZ. The main goal of the generation method is to produce a set of tests designed to cover a specific set of test targets. These targets are computed from the model behaviors and in accordance with coverage criteria. The most delicate part of a test generation is to find a path, called preamble, that allows to reach a test target from the initial state of the system. The part of the test called postamble resets the system in a state that allows to resume the test procedure and comes under a similar problem. This PhD thesis gives several procedures in order to generate the preamble and postamble. A breadth search algorithm based on the system behaviors is given for the preamble computation. Besides, several Best-First search procedures are evaluated in the context of forward and backward chaining animations to compute the preamble and postamble. These algorithms have been implemented and adapted to several notations of specifications: B and Statemate statecharts. These algorithms have been used on many industrial projects and are optimized to go large scale
Cortier, Véronique. "Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoires." Habilitation à diriger des recherches, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00578816.
Повний текст джерелаJovanovic, Aleksandra. "Vérification parametrée de systèmes temporisés." Ecole centrale de Nantes, 2013. http://www.theses.fr/2013ECDN0036.
Повний текст джерелаIn this thesis we are studying formal verification of systems with timing constraints. As a formalism for modeling and analyzing such systems, we are using timed automata. Model-checking is a formal verification method that automatically verifies whether the model of the system satisfies some property. This method, however, requires complete knowledge of the system, which is often difficult to provide in the early design stages. Parametric approach is a way to address this issue and to increase the robustness of the design. We study parametric timed automata, a model that allows the use of parametric expressions instead of concrete timing values in the model. We offer new negative decidability results concerning reachability and unavoidability properties. We then propose a novel approach, we restrict parameter values to bounded integers and offer symbolic algorithms for parameter synthesis based on the computation of the integer hull of symbolic states. These algorithms are implemented in our tool Roméo. We then study timed game automata, a model used for control problems on real-times systems and propose its parametrization. We offer a subclass for which the reachability game is decidable and an algorithm for the computation of winning states and parameter synthesis. Finally, we study a parametric version of interrupt timed automata, a subclass of hybrid automata that uses stopwatches. We prove that the reachability problem is decidable without any restrictions and we give the complexity bounds
Mazo, Peña Raúl. "Modèle générique pour la vérification de modèles de lignes de produits." Paris 1, 2011. http://www.theses.fr/2011PA010075.
Повний текст джерелаVergamini, Didier. "Vérification de réseaux d'automates finis par équivalences observationnelles : le système AUTO." Nice, 1987. http://www.theses.fr/1987NICE4142.
Повний текст джерелаLepiller, Julien. "Vérification d'isolation de fautes logicielle." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S067.
Повний текст джерелаWe are used to use computers on which programs from diverse origins are installed and running at the same time. Each of these programs need to access memory for proper operation, but none of them should access or modify the memory of another. If this happened, programs would not be able to trust their memory and could start behaving erratically. Still, programmers do not need to coordinate and agree in advance on what parts of the memory they are allowed to use or not. Hardware takes care of allocating distinct memory zones for each program. This is completely transparent to the programmer. A malware cannot access or modify the memory of another program to attack it directly either. However, there exists a category of programs that do not benefit from this protection: modules that extend the features of other programs, such as plugins in a web browser. This thesis is based on a software (and not hardware) fault isolation technique, and proposes two semantics for it, single-threaded and multi-threaded, as well as a static analyzer based on abstract interpretation. We also present a proof of correctness for the analyzer
Larcher, Anthony. "Modèles acoustiques à structure temporelle renforcée pour la vérification du locuteur embarquée." Phd thesis, Université d'Avignon, 2009. http://tel.archives-ouvertes.fr/tel-00453645.
Повний текст джерелаNguyên, Duy-Tùng. "Vérification symbolique de modèles à l'aide de systèmes de ré-écriture dédiés." Phd thesis, Université d'Orléans, 2010. http://tel.archives-ouvertes.fr/tel-00579490.
Повний текст джерелаTrojet, Mohamed Wassim. "Approche de vérification formelle des modèles DEVS à base du langage Z." Aix-Marseille 3, 2010. http://www.theses.fr/2010AIX30040.
Повний текст джерелаThe general framework of the thesis consists in improving the verification and the validation of simulation models through the integration of formal methods. We offered an approach of formal verification of DEVS models based on Z language. DEVS is a formalism that allows the description and analysis of the behavior of discrete event systems, ie systems whose state change depends on the occurrence of an event. A DEVS model is essentially validated by the simulation which permits to verify if it correctly describes the behavior of the system. However, the simulation does not detect the presence of a possible inconsistency in the model (conflict, ambiguity or incompleteness). For this reason, we have integrated a formal specification language, known as Z, in the DEVS formalism. This integration consists in: (1) transforming a DEVS model into an equivalent Z specification and (2) verifying the consistency of the resulting specification using the tools developed by the Z community. Thus, a DEVS model is subjected to an automatic formal verification before its simulation
Contet, Jean-Michel. "Modèles multi-agents réactifs pour la navigation multi-véhicules : spécification formelle et vérification." Phd thesis, Université de Technologie de Belfort-Montbeliard, 2009. http://tel.archives-ouvertes.fr/tel-00472415.
Повний текст джерелаChapurlat, Vincent. "Vérification et validation de modèles de systèmes complexes: application à la Modélisation d'Entreprise." Habilitation à diriger des recherches, Université Montpellier II - Sciences et Techniques du Languedoc, 2007. http://tel.archives-ouvertes.fr/tel-00204981.
Повний текст джерелаLe travail de recherche entrepris depuis le début du Doctorat en 1991 relève de la thématique de la modélisation de systèmes complexes puis de la vérification et de la validation de ces modèles. Ceci a pour objectif d'assurer, ou à défaut de rassurer, le modeleur sur la qualité des modèles, sur leur pertinence vis-à-vis du système considéré et sur le respect d'exigences qui ont présidé à leur construction. La recherche a donc consisté au développement d'approches de modélisation, de spécification formelle de propriétés, de vérification par preuve de propriétés au moyen de Graphes Conceptuels et de simulation comportementale. Les domaines d'application privilégiés ont été les systèmes de contrôle commande répartis, puis plus largement la modélisation d'entreprise et tentent aujourd'hui d'intégrer une dimension risque dans la modélisation d'entreprise et de s'ouvrir plus largement à l'ingénierie des systèmes complexes. Les résultats sont des langages et un cadre de modélisation intégré, un langage de spécification baptisé LUSP, une suite de mécanismes de preuve formelle et de simulation qui ont donné lieu à divers encadrements de thèses, de travaux et à des transferts vers l'industrie.
Enfin, l'activité d'enseignement a tenté de rester cohérente avec le profil de compétence à la fois de producticien et d'ingénierie système acquis ou inspiré par la thématique de recherche. Elle s'est déroulée dans le cadre de diverses Universités, Ecoles d'Ingénieurs ou de cursus spécialisés. Les résultats sont des propositions et l'accompagnement de thématiques nouvelles, une activité d'ingénierie pédagogique et une implication dans diverses responsabilités administratives.
Dreyfus, Alois. "Contributions à la vérification et à la validation efficaces fondées sur des modèles." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2076/document.
Повний текст джерелаThe thesis contributes to development of automatic methods for model-based verification and validation ofcomputer systems. It is divided into two parts: verification and test generation.In the verification part, for the problem of regular model checking undecidable in general, two new approxi-mation techniques are defined in order to provide efficient (semi-)algorithms. Over-approximations of the setof reachable states are computed, with the objective of ensuring the termination of the exploration of the statespace. Reachable states (or over-approximations of this set of states) are represented by regular languages or,equivalently, by finite-state automata. The first technique consists in over-approximating the set of reachablestates by merging states of automata, based on simple syntactic criteria, or on a combination of these criteria.The second approximation technique also merges automata states, by using transducers. For the second tech-nique, we develop a new approach to refine approximations, inspired by the CEGAR paradigm (for Counter-Example-Guided Abstraction Refinement). These proposals have been tested on examples of mutual exclusionprotocols.In the test generation part, a technique that combines the random generation with coverage criteria, fromcontext-free models (context-free grammars, pushdown automata) is defined. Generate tests from these mo-dels (instead of doing from graphs) reduces the model abstraction level, and therefore allows having moretests executable in the real system. These proposals have been tested on the JSON grammar (JavaScript ObjectNotation), as well as on pushdown automata of mutually recursive functions, of an XPath query, and of theShunting-Yard algorithm
Kmimech, Mourad. "Vérification d’assemblages de composants logiciels : Application aux modèles de composants UML2.0 et Ugatze." Pau, 2010. http://www.theses.fr/2010PAUU3017.
Повний текст джерелаThe component approach aims for the reuse by a coherent and easy components assembly. But obtaining a coherent components assembly is not an easy exercise. To achieve this, we advocate a contractual approach distinguishing different syntactic, structural, semantic, synchronization and service quality contracts. We have successfully applied this approach on two models of semi-formal contractual components: UML2. 0 and Ugatze. Indeed, we propose two approaches: VerifComponentUML2. 0 and VerifComponentUgatze. The VerifComponentUML2. 0 approach aims the verification of syntactic, structural, synchronization and quality service contracts on a UML2. 0 component assembly through two formal component models Acme/Armani and Wright. VerifComponentUML2. 0 has two tools: Wr2fdr and Wright2Ada. The tool Wr2fdr allows translating Wright to CSP contracts in order to verify synchronization using the model checker FDR. It is a IDM tool Wright2Ada which allow is transforming Wright to Ada, in order to open UML2. 0 on static analysis and dynamic tools associated with Ada. VerifComponentUgatze approach provides a frame allowing to check syntactic and structural contracts of an Ugatze component assembly through Acme/Armani
Lewicki, Alexandre. "Conception de modèles haut niveau pour l'optimisation et la vérification de systèmes Bluetooth." Nice, 2008. http://www.theses.fr/2008NICE4110.
Повний текст джерелаThe different works conducted in this thesis were to design high level functional models that were used in a wireless system design flow. The MCSE methodology was followed to design those models and the results have been used for Bluetooth technology system design and verification. The first part of the work presents the MCSE methodology that has been used for the design of the models. Starting from the specification of a concrete use case, a temperature sensor, we designed a functional model of the system with successive refinement steps. The models were then translated in SystemC, a C++ library that allows describing both hardware and software parts of a system. The results of the exploitation of the models in a wireless network simulation can be used for protocol analysis, performance analysis and performance exploration. The second part of the work was to introduce the functional models in a hardware verification environment. Two different techniques for design engineers and verification engineers have been settled. This technique brings enhanced verification features with the possibility to write complex tests
Declerck, David. "Vérification par model-checking de programmes concurrents paramétrés sur des modèles mémoires faibles." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS336/document.
Повний текст джерелаModern multiprocessors and microprocesseurs implement weak or relaxed memory models, in which the apparent order of memory operation does not follow the sequential consistency (SC) proposed by Leslie Lamport. Any concurrent program running on such architecture and designed with an SC model in mind may exhibit new behaviors during its execution, some of which may potentially be incorrect. For instance, a mutual exclusion algorithm, correct under an interleaving semantics, may no longer guarantee mutual exclusion when implemented on a weaker architecture. Reasoning about the semantics of such programs is a difficult task. Moreover, most concurrent algorithms are designed for an arbitrary number of processus. We would like to ensure the correctness of concurrent algorithms, regardless of the number of processes involved. For this purpose, we rely on the Model Checking Modulo Theories (MCMT) framework, developed by Ghilardi and Ranise, which allows for the verification of safety properties of parameterized concurrent programs, that is to say, programs involving an arbitrary number of processes. We extend this technology with a theory for reasoning about weak memory models. The result of this work is an extension of the Cubicle model checker called Cubicle-W, which allows the verification of safety properties of parameterized transition systems running under a weak memory model similar to TSO
Sánchez-Soto, Eduardo. "Réseaux bayésiens dynamiques pour la vérification du locuteur." Paris, ENST, 2005. http://www.theses.fr/2005ENST0032.
Повний текст джерелаThis thesis is concerned with the statistical modeling of speech signal applied to Speaker Verification (SV) using Bayesian Networks (BNs). The main idea of this work is to use BNs as a mathematical tool to model pertinent speech features keeping its relations. It combines theoretical and experimental work. The difference between systems and humans performance in SV is the quantity of information and the relationships between the sources of information used to make decisions. A single statistical framework that keeps the conditional dependence and independence relations between those variables is difficult to attain. Therefore, the use of BNs as a tool for modeling the available information and their independence and dependence relationships is proposed. The first part of this work reviews the main modules of a SV system, the possible sources of information as well as the basic concepts of graphical models. The second part deals with Modeling. A new approach to the problems associated with the SV systems is proposed. The problem of inference and learning (parameters and structure)in BNs are presented. In order to obtain an adapted structure the relations of conditional independence among the variables are learned directly from the data. These relations are then used in order to build an adapted BN. In particular, a new model adaptation technique for BN has been proposed. This adaptation is based on a measure between Conditional Probability Distributions for discrete variables and on Regression Matrix for continuous variables used to model the relationships. In a large database for the SV task, the results have confirmed the potential of use the BNs approach
Kaliche, Keltoum. "Méthode des éléments finis inversés pour des domaines non bornés." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV014.
Повний текст джерелаInverted finite element method (IFEM) is a non runcature method which was introduced for solving partial differential equations in unbounded domains. The objective of this thesis is to analyze, to adapt and to implement IFEM for solving several problems arising in physics, especially when the domain is the whole space R3. We first give a presentation in which we detail the principles and the main features of the method. Then, we adapt IFEM for solving some div-curl systems and vector potential problems in the whole space. In a second part, we successfully develop an IFEM based approach for computing the stray-field energy in micromagnetism. In the last part, we are interested in the study of the polarizable continuum model arising in quantum chemistry. The manuscript contains a large number of numerical results obtained with some 3D codes, especially when the domain is the whole space R3. It also contains some theoretical results in relation with weighted Sobolev spaces. We give in particular a constructive proof of some div-curl inequalities in unbounded domains
Herbreteau, Frédéric. "Automates à file réactifs embarqués : application à la vérification de systèmes temps-réel." Nantes, 2001. http://www.theses.fr/2001NANT2090.
Повний текст джерелаWe are concern in our thesis by the verification of ELECTRE programs and Embedded Reactive Fiffo Systems (Embedded RFS). These two formalisms allow to model asynchronous reactive systems with event memorisation, along with their environment. Particularly, we focus on the boundedness problem which is seen as a correctness criterion for reactive systems. We prove that this problem is undeciable, thus we provide a testing method as a partial solution
Roux, Mattias. "Extensions de l’algorithme d’atteignabilité arrière dans le cadre de la vérification de modèles modulo théories." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLS582.
Повний текст джерелаThis thesis proposes to present several extensions that have been added to the Cubicle model checker.Cubicle is a software allowing to automatically check the safety of parameterized systems using model checking modulo theory techniques.The first contribution made by this thesis consists in the implementation of a new reachability algorithm called FAR (for Forward Abstracted Reachabilty). FAR is an algorithm involving both backward reachability analysis techniques already implemented in Cubicle as well as forward reachability analysis techniques.The second contribution consists of multiple additions inspired by artificial intelligence methods to improve the automatic generation of Cubicle invariants.Finally, the last contribution has increased Cubicle's expressiveness in order to prove properties involving universal quantifiers. This contribution was implemented by associating Cubicle with Why3, a deductive verification platform
Bertrand, Nathalie. "Modèles stochastiques pour les pertes de messages dans les protocoles asynchrones, et techniques de vérification automatique." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2006. http://tel.archives-ouvertes.fr/tel-00132080.
Повний текст джерелаBen, Ezzine Radhouane. "Application de la méthode de vérification de modèles sur des protocoles de communication JAVA." Mémoire, Université de Sherbrooke, 2002. http://savoirs.usherbrooke.ca/handle/11143/4492.
Повний текст джерелаDumitrescu, Emil. "Construction de modèles réduits et vérification symbolique de circuits industriels décrits au niveau RTL." Université Joseph Fourier (Grenoble), 2003. http://www.theses.fr/2003GRE10101.
Повний текст джерелаCartier-Michaud, Thomas. "Vérification de codes et réduction de modèles : Application au transport dans les plasmas turbulents." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4020.
Повний текст джерелаNumerical analysis is now a key component of research, especially for the understanding and the control of complex systems. Simulations of magnetic confinement plasmas fall within this approach. One of the difficulties of this field is the wide range of spatial scales, time scales, the chaotic nature of plasmas and the strong anisotropies require advanced numerical methods. Each of the two parts of my thesis takes place in this frame of numerical simulation and fusion plasmas.The first part of my thesis is dedicated to the method PoPe, a general method for code verification and model reduction. The principle of this method is to determine the equations which have generated a set of data. If the data was produced by a simulation tool, finding these equations and comparing them to the ones theoretically implemented is equivalent to verifying this simulation tool. The accuracy of this procedure allows to characterize the numerical error and to recover the order of each numerical scheme used.The second part of my thesis deals with the study of turbulent transport which determines the efficiency of fusion plasma. The chaotic avalanches of a fluid model are studied considering the impact of the chaos on the self-organization. For a kinetic model restricted to the low frequency instabilities, the ability to block itself in two regimes, one insulating and the other conducting, is studied. Upgrades of this model are undertaken in order to introduce the possibility of relaxations between the two previous states. For both the fluid and the kinetic model, reduce models are proposed thank to the PoPe method
Kamsu-Foguem, Bernard. "Modélisation et vérification des propriétés de systèmes complexes : Application aux processus d'entreprise." Montpellier 2, 2004. http://www.theses.fr/2004MON20050.
Повний текст джерелаFinot, Olivier. "Oracles du test de transformations de modèles." Nantes, 2014. http://archive.bu.univ-nantes.fr/pollux/show.action?id=2069ea58-6610-4161-8bef-5c993ad30652.
Повний текст джерелаWith Model Driven Engineering models are the heart of software development. These models evolve through transformations. In this thesis our interest was the validation for these model transformations by testing, and more precisely the test oracles. We propose two approaches to assist the tester to create these oracles. With the first approach this assistance is passive; we provide the tester with a new oracle function. The test oracles created with this new oracle function control only part of the model produced by the transformation under test. We defined the notion of partial verdict, described the situations where having a partial verdict is beneficial for the tester and how to test a transformation in this context. We developed a tool implementing this proposal, and ran experiments with it. With the second approach, we provide a more active assistance about test oracles’ quality. We study the quality of a set of model transformation test oracles. We consider that the quality of a set of oracles is linked to its ability to detect faults in the transformation under test. We show the limits of mutation analysis which is used for this purpose, then we propose a new approach that corrects part of these drawbacks. We measure the coverage of the output meta-model by the set of oracles we consider. Our approach does not depend on the language used for the transformation under test’s implementation. It also provides the tester with hints on how to improve her oracles. We defined a process to evaluate meta-model coverage and qualify test oracles. We developed a tool implementing our approach to validate it through experimentations
Hymans, Charles. "Vérification de composants VHDL par interprétation abstraite." Palaiseau, Ecole polytechnique, 2004. https://pastel.archives-ouvertes.fr/pastel-00000875.
Повний текст джерелаSangnier, Arnaud. "Vérification de systèmes avec compteurs et pointeurs." Cachan, Ecole normale supérieure, 2008. http://www.theses.fr/2008DENS0051.
Повний текст джерелаIn the past years, formal methods have shown to be a succesfull approach to ensure that the behavior of an informatic system will respect some properties. Among the different existing techniques, model-checking have been recently studied and successfully applied to a lot of models like counter systems, lossy channel systems, pushdown automata, timed automata, etc. In this thesis, we consider two different models to verify programs which manipulate integer variables and pointer variables. In a first part, we deal with counter systems. We define the model and the different restrictions which have been proposed. We then introduce a restricted class of counter systems, called the reversal-bounded counter machines, for which many reachability problems are decidable. We show that this class can be extended keeping the decidability results and we prove that we can decide whether a Vector Addition System with States is reversal-bounded or not, which is not possible for general counter systems. We then study the problem of model-checking counter systems with different temporal logics. The temporal logics we consider allow to speak about the data manipulated by the system. In particular, we show that the model-checking of deterministic one-counter automata with formulae of LTL with registers is decidable, and becomes undecidable when considering non deterministic one-counter automata and two counter automata. In a second part, we introduce the model of pointer systems, which is used to represent programs manipulating single linked lists. We propose an algorithm to translate any pointer system into a bisimilar counter system. This allows us to reuse existing techniques over counter systems to analyze these programs. We then propose an extension of CTL* to verify temporal properties for such programs, and we study the decidability of the model-checking problem for this new logic. Finally we present the tool TOPICS (Translation of Programs Into Counter Systems) which translates a C-like program with pointers and integer variables into a counter system
Sbihi, Mohammed. "Analyse spectrale de modèles neutroniques." Phd thesis, Université de Franche-Comté, 2005. http://tel.archives-ouvertes.fr/tel-00011072.
Повний текст джерелаBenmerzoug, Djamel. "Modèles et outils formels pour l'intégration d'applications d'entreprises." Paris 6, 2009. http://www.theses.fr/2009PA066344.
Повний текст джерелаDragomir, Iulia. "Conception et vérification d'exigences de sûreté temporisées à base de contrats dans les modèles SysML." Toulouse 3, 2014. http://thesesups.ups-tlse.fr/2510/.
Повний текст джерелаNowadays computer systems grow larger in size and more complex. Embedded in devices from different domains like avionics, aeronautics, consumer electronics, etc. , they are often considered critical with respect to human life, costs and environment. A development that results in safe and reliable critical real-time embedded systems is a challenging task, considering that errors are accidentally inserted in the design. A way for system designers to tackle this issue is to use a compositional design technique based on components and driven by requirements: it allows to infer from global requirements, component properties that must locally hold. Contract-based reasoning allows to compositionally derive correct components from global system requirements by interposing abstract and partial specifications for components. Informally, a contract models the abstract behavior a component exhibits from the point of view of the requirement to be satisfied (i. E. Guarantee) in a given context (i. E. Assumption). Contracts can be used to decompose and trace requirements during iterative design, but also to perform compositional verification of requirement satisfaction. In this thesis, we present a methodology for reasoning with contracts during system design and verification within SysML. Thus, we define the syntax for contracts in UML/SysML, as well as a set of refinement relations between contracts and/or components in order to prove the system's correctness with respect to requirements. Next, we provide a formal framework that models the semantics of a UML/SysML model extended with contracts as a mapping of the language concepts to a variant of Timed Input/Output Automata. The refinement relations are formalized based on the trace inclusion relation and compositional properties are proved to hold which ensures the soundness of the methodology. The approach is instantiated for the OMEGA Profile and IFx2 toolset with partial automatic generation of proof obligations. Finally, the approach is applied on several case studies, including an industry-grade system model, which show its efficiency by comparative verification results
Rasse, Alban. "Une Approche Orientée Modèles pour la Spécification, la Vérification et l’Implantation des Systèmes Logiciels Critiques." Mulhouse, 2006. https://www.learning-center.uha.fr/opac/resource/une-approche-orientee-modeles-pour-la-specification-la-verification-et-limplantation-des-systemes-lo/BUS3944436.
Повний текст джерелаConstant, Camille. "Génération automatique de tests pour modèles avec variables ou récursivité." Rennes 1, 2008. ftp://ftp.irisa.fr/techreports/theses/2008/constant.pdf.
Повний текст джерелаThis thesis adresses the problem of automatic test case generation for testing the conformance of a reactive implementation. We first propose a methodology which extends the testing theory based on the ioco conformance relation by distinguishing three levels of description: properties, specification and implementation. The methogology integrates verification and conformance testing. The execution of the generated test cases on the implementation allows detecting conformance violations between implementation and specification, but also violation/satisfaction of the properties by the implementation or the specification. Secondly, we introduce a more expressive specification model: recursive interprocedural specifications. The test generation method we propose is based on coreachability analysis, which allows deciding whether and how the test purpose can still be satisfied. However, although it is possible to carry out an exact analysis, the inability of test cases to inspect their own stack prevents them from fully using the coreachability information. We discuss this partial observation problem, its consequences, and how to minimise its impact. Finally, we experiment these methods of test generation on several examples and a case study
Gascard, Eric. "Méthodes pour la vérification formelle de systèmes matériels et logiciels à architecture régulière." Aix-Marseille 1, 2002. http://www.theses.fr/2002AIX11047.
Повний текст джерелаMagnier, Nicolas. "Validation des transactions dans les bases de données : classes décidables et vérification automatique." Bordeaux 1, 1998. http://www.theses.fr/1998BOR10506.
Повний текст джерелаAit-Cheik-Bihi, Wafaa, and Wafaa Ait-Cheik-Bihi. "Approche orientée modèles pour la vérification et l'évaluation de performances de l'interopérabilité et l'interaction des services." Phd thesis, Université de Technologie de Belfort-Montbeliard, 2012. http://tel.archives-ouvertes.fr/tel-00720657.
Повний текст джерелаSantos, Laurent. "Contribution à la validation et à la vérification des modèles conceptuels d'expertise : application au projet SACHEM." Aix-Marseille 3, 1998. http://www.theses.fr/1998AIX30102.
Повний текст джерелаMuroor, Nadumane Ajay Krishna. "Modèles et vérification pour la composition et la reconfiguration d'applications basées sur le web des objets." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALM067.
Повний текст джерелаThe Internet of Things (IoT) applications are built by interconnecting everyday objects over a network. These objects or devices sense the environment around them, and their network capabilities allow them to communicate with other objects to perform utilitarian tasks. One of the popular ways to build IoT applications in the consumer domain is by combining different objects using Event-Condition-Action (ECA) rules. These rules are typically in the form of IF something-happens THEN do-something. The Web of Things (WoT) are a set of standards and principles that integrate architectural styles and capabilities of web to the IoT. Even though WoT architecture coupled with ECA rules simplifies the building of IoT applications to a large extent, there are still challenges in making end-users develop advanced applications in a simple yet correct fashion due to dynamic, reactive and heterogeneous nature of IoT systems.The broad objective of this work is to leverage formal methods to provide end-users of IoT applications certain level of guarantee at design time that the designed application will behave as intended upon deployment. In this context, we propose a formal development framework based on the WoT. The objects are described using a behavioural model derived from the Thing Description specification of WoT. Then, the applications are designed not only by specifying individual ECA rules, but also by composing these rules using a composition language. The language enables users to build more expressive automation scenarios. The description of the objects and their composition are encoded in a formal specification from which the complete behaviour of the application is identified. In order to guarantee correct design of the application, this work proposes a set of generic and application-specific properties that can be validated on the complete behaviour before deployment. Further, the deployed applications may be reconfigured during their application lifecycle. The work supports reconfiguration by specifying reconfiguration properties that allow one to qualitatively compare the behaviour of the new configuration with the original configuration. The implementation of all the proposals is achieved by extending Mozilla WebThings platform. A new set of user interfaces are built to support the composition of rules and reconfiguration. A model transformation component which transforms WoT models to formal models and an integration with formal verification toolbox are implemented to enable automation. Finally, a deployment engine is built by extending WebThings APIs. It directs the deployment of applications and reconfigurations respecting their composition semantics
Ait-Cheik-Bihi, Wafaa. "Approche orientée modèles pour la vérification et l'évaluation de performances de l'interopérabilité et l'interaction des services." Thesis, Belfort-Montbéliard, 2012. http://www.theses.fr/2012BELF0182/document.
Повний текст джерелаWeb services are widely used by organizations to share their knowledge over the network and facilitate business-to-business collaboration. The emergence of Web services enabled applications to be presented as a set of business services well structured and correctly described. However, combining Web services and making them interoperable, to satisfy user requests taking into account functional and non-functional quality criteria, is a complex process. In this work, we focus specifically on location-based services (LBS) that integrate geographic information and provide information reachable from mobile devices, through wireless network by making use of the geographical positions of the devices. The aim of this work is to develop a model driven approach to specify, validate and implement service composition process in an automatic fashion for road security. This approach is based on two formal tools namely Petri nets (PN) and (max, +) algebra used to model, to verify and to evaluate the performance of service composition process. Workflow patterns are used to represent service composition processes. The behavior of each pattern is modeled by a PN model and then by a (max,+) state equation. The developed formal models allow the graphical and analytical description of the considered processes. Also, these models enable to evaluate some quantitative and qualitative properties of the considered processes. A platform, called TransportML, has been developed for collaboration and interoperability of different LBS. The obtained simulation results from the formal models are compared, on one hand, to those obtained from trials of the platform, and on the other hand, to those obtained from the real experimentations on the field.This work is a part of the FP7 European projects ASSET (2008-2011) and TeleFOT (2008-2012)
Boulifa, Rabea. "Génération de modèles comportemementaux des applications des applications réparties." Phd thesis, Université de Nice Sophia-Antipolis, 2004. http://tel.archives-ouvertes.fr/tel-00008927.
Повний текст джерелаautomatique de propriétés comportementales d'applications réparties par des
méthodes fondées sur les
modèles. En particulier, nous étudions le problème de
génération de modèles
à partir de programmes Java répartis et représentés par des systèmes de transitions
communiquants.
Pour ce faire, nous définissons une sémantique comportementale de programmes ProActive, une
librairie Java pour la programmation parallèle, distribuée et
concurrente. À partir de cette sémantique nous construisons des modèles
comportementaux pour
des abstractions finies d'applications écrites dans ce langage. Ces
modèles sont basés sur la sémantique des algèbres de
processus et peuvent donc être construits de manière compositionnelle et
hiérarchique.
La construction de modèles finis n'est pas toujours possible. Pour
pouvoir traiter des problèmes prenant en compte des données, ainsi que
des problèmes concernant des topologies non bornées d'objets
répartis, nous définissons une nouvelle notion de modèleles
hiérarchiques, à base de systèmes de transitions paramétrés et de
réseau de synchronisation paramétrés. Moyennant des abstractions ces modèles permettent de
spécifier des applications possiblement infinies par des représentations
expressives, finies, et plus proche de la structure du code.
Par ailleurs, nous définissons un système de règles sémantiques
permettant de générer automatiquement ces modèles (finis ou
paramétrés) à partir d'une forme intermédiaire, obtenue par analyse statique,
des programmes analysés.
Les modèles ainsi générés sont exploitables directement ou après
instantiation par des outils de vérification.
El, Baida Rami. "Les composants logiciels réutilisables : méthode de vérification." Toulouse 3, 2004. http://www.theses.fr/2004TOU30066.
Повний текст джерелаThe object oriented programming is more and more used in the development of complex systems. One of the principal characteristics of this type of programming is to favor the reusability. Some resounding failures (like the breakdown of the telephone network in the United-States of America in 1989) proved the necessity of the verification phase for such type of systems. Several verification's methods exist, like the verification by proof and the model-checking. In this thesis, we present a modeling language for the concurrent object systems as well as the associated temporal logic (temporal logic for concurrent object or TLCO). The two types of verification are then approached. First, the verification by proof is carried out in VSE (Visual Support Environment). Afterwards, the automatic checking is carried out in the model checker of SPIN. Finally, a tableau method allowing the verification of TLCO's formulas is presented
Aït-Sadoune, Idir. "Modélisation et vérification formelles de compositions de services." Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2010. http://www.theses.fr/2010ESMA0016.
Повний текст джерелаThe ability to compose existing services to provide more complex functionality is one of the main benefits of SOA architecture. This services compositions process, especially Web services, is generally defined by a choreography or an orchestration of atomic services. These compositions are seen as a states-transitions systems expressing the communication protocol between the participating services. Services Workflows description languages, expressing these compositions, suffer from the lack of formal semantics and the presence of ambiguities in their constructors definitions in standards defining these languages. The associated tools do not offer the possibility to formally verify and validate the behaviour and the obtained services compositions properties. This thesis focuses on modelling and formal verification of the Web services composition described with the BPEL standard using the B event method. The proposed approach models the static and dynamic parts of BPEL and is based on refinement for structuring the BPEL process development. The theorem proving technique is used for setting properties. One-to-one link is guaranteed between the BPEL elements and their B Event corresponding. This correspondence provides assistance to developers to improve the quality of the BPEL process. This approach has been implemented in the BPEL2B tool
Pétin, Jean-François. "Méthodes et modèles pour un processus sûr d'automatisation." Habilitation à diriger des recherches, Université Henri Poincaré - Nancy I, 2007. http://tel.archives-ouvertes.fr/tel-00202431.
Повний текст джерела