北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

青木 利晃 (アオキ トシアキ) 教授
融合科学系、情報科学系、セキュリティ・ネットワーク領域

54件中1-20件目

  • 1. Assembly Program Verification for Multiprocessors with Relaxed Memory Model using SMT Solver,Pattaravut Maleehuan, Yuki Chiba and Toshiaki Aoki,International Symposium on Theoretical Aspects of SoftwareEngineering, (pre-proceedings), 2017,pp.51-58
  • 2. Combined Model Checking and Testing Create Confidence-A Case on Commercial Automotive Operating System,Toshiaki Aoki, Makoto Satoh, Mitsuhiro Tani, Kenro Yatake, Tomoji Kishi,Cyber-Physical System Design from an Architecture Analysis Viewpoint,Chapter 5, Springer, 2017,pp.109-132
  • 3. Dissolution of the Gap between Safety Requirements Written in a Natural Language and Formal Notations,Masahiro Matsubara, Fumio Narisawa, Atsuhiro Ohno, Toshiaki Aoki and YukiChiba,Technical Session of SAE 2016 World Congress and Exhibition, SAE Technical Paper 2016-01-0133, 2016
  • 4. Combined Model Checking and Testing Create Confidence in Correctness of Commercial Automotive Operating System,Toshiaki Aoki, Makoto Satoh, Mitsuhiro Tani, Kenro Yatake, Tomoji Kishi,JAIST Research Report, IS-RR-2016-002, 10 pages, 2016
  • 5. Modeling Safety Requirements of ISO26262 using Goal Trees and Patterns,Toshiaki Aoki, Kriangkrai Traichaiyaporn, Yuki Chiba, Masahiro Matsubara, Masataka Nishi and Fumio Narisawa,International Workshop on Formal Techniques for Safety-Critical Systems, Springer CCIS, 2015,pp.206-221
  • 6. Verifying OSEK/VDX OS Design using Its Formal Specification,Dieu Huong Vu, Yuki Chiba, Kenro Yatake and Toshiaki Aoki,International Symposium on Theoretical Aspects of Software Engineering, 2016,pp.81-88
  • 7. ISO26262のための安全要求記述言語と追跡可能性検証手法の提案,青木利晃,千葉勇輝,松原正裕,成沢文雄,プログラミングおよびプログラミング言語ワークショップ(PPL), 14 pages, 2016
  • 8. Verifying OSEK/VDX OS Design using Its Formal Specification,Dieu Huong Vu, Yuki Chiba, Kenro Yatake and Toshiaki Aoki,International Symposium on Theoretical Aspects of Software Engineering, 2016,pp.81-88
  • 9. Experimental Fault Analysis Process Implemented Using Model Extraction and Model Checking,Hideto Ogawa, Makoto Ichii, Fumihiro Kumeno, Toshiaki Aoki,COMPSAC,pp.95-104
  • 10. Yes! You Can Use Your Model Checker to Verify OSEK/VDX Applications,Haitao Zhang, Toshiaki Aoki, and Yuki Chiba,In Proceedings of the 8th IEEE International Conference on Software Testing, Verification and Validation (ICST 2015), 10 pages, Graz, Austria, April 13-17, 2015
  • 11. Verifying OSEK/VDX Applications: A Sequentialization-Based Model Checking Approach,Haitao Zhang, Toshiaki Aoki, Yuki Chiba,IEICE Transactions,,98-D,No.10,pp.1765-1776,October, 2015
  • 12.  A Framework for Verifying the Conformance of Design to Its Formal Specifications,Dieu-Huong Vu, Yuki Chiba, Kenro Yatake, and Toshiaki Aoki,IEICE Transactions on Information and Systems,Vol.E98-D,No.6,pp.1137-1149,2015/06/01
  • 13. SMT-based Bounded Model Checking for OSEK/VDX Applications,Haitao Zhang, Toshiaki Aoki, Hsin-Hung Lin, Min Zhang, Yuki Chiba and Kenro Yatake,In Proceedings of the 20th Asia-Pacific Software Engineering Conference (APSEC 2013), IEEE, 2013,vol.1,pp.307-314
  • 14. Checking the Conformance of a Promela Design to Its Formal Specification in Event-B,Dieu-Huong Vu, Yuki Chiba, Kenro Yatake, and Toshiaki Aoki,In Proceedings of the third International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2014), Springer CCIS,pp.203-218,2014
  • 15. An UPPAAL Framework for Model Checking Automotive Systems with FlexRay Protocol,Xiaoyun Guo, Hsin-Hung Lin, Kenro Yatake and Toshiaki Aoki,Second International Workshop on Formal Techniques for Safety-CriticalSystems(FTSCS), Communications in Computer and Information Science(CCIS), Springer, 2014(presented in 2013),Volume 419,pp.36-53
  • 16. Refinement Tree and Its Patterns: a Graphical Approach for Event-B Modeling,Kriangkrai Traichaiyaporn and Toshiaki Aoki,Second InternationalWorkshop on Formal Techniques for Safety-Critical Systems(FTSCS),Communications in Computer and Information Science(CCIS), Springer, 2014 (presented in 2013),Volume 419,pp.246-261
  • 17. 再利用のためのRTLからの関数コード生成手法,立岡真人, 青木利晃, 金子峰雄,電子情報通信学会 VLSI設計技術研究会(VLD), 信学技報, VLD2013-165, 2014,vol.113,no.454,pp.171-176
  • 18. POM/MCを用いた仮説ベースモデル検査デバッグ手法,小川秀人, 市井誠, 粂野文洋, 青木利晃,ソフトウェア工学の基礎ワークショップ, 日本ソフトウェア科学会, 2013,pp.137-142
  • 19. Evaluation of Operational Vulnerability in Cloud Service Management using Model Checking,Shinji Kikuchi and Toshiaki Aoki,IEEE Seventh International Symposium on Service-Oriented System Engineering(SOSE),pp.37-48,2013
  • 20. モデル検査とテストによる車載オペレーティングシステムのシームレスな検証,青木利晃, 佐藤信, 谷充弘, 矢竹健朗,組込みシステムシンポジウム,pp.178-187,2012

 1  2  3 次へ ≫ ]