Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kåre J. Kristoffersen is active.

Publication


Featured researches published by Kåre J. Kristoffersen.


computer aided verification | 1996

Verification of an Audio Protocol with Bus Collision Using UPPAAL

Johan Bengtsson; W. O. David Griffioen; Kåre J. Kristoffersen; Kim Guldstrand Larsen; Fredrik Larsson; Paul Pettersson; Wang Yi

In this paper we apply the tool Uppaal1 to an automatic analysis of a version of the Philips Audio Control Protocol with two senders and bus collision handling. This case study is significantly larger than the real-time/hybrid systems previously analysed by automatic tools. During the case study the tool Uppaal was extended with a new feature, committed locations, allowing efficient modelling of broadcast communication.


tools and algorithms for construction and analysis of systems | 1998

Verification of Large State/Event Systems Using Compositionality and Dependency Analysis

Jørn Lind-Nielsen; Henrik Reif Andersen; Gerd Behrmann; Henrik Hulgaard; Kåre J. Kristoffersen; Kim Guldstrand Larsen

A state/event model is a concurrent version of Mealy machines used for describing embedded reactive systems. This paper introduces a technique that uses compositionality and dependency analysis to significantly improve the efficiency of symbolic model checking of state/event models. This technique makes possible automated verification of large industrial designs with the use of only modest resources (less than one hour on a standard PC for a model with 1421 concurrent machines). The results of the paper are being implemented in the next version of the commercial tool visualSTATEℳ.


colloquium on trees in algebra and programming | 1997

A Compositional Proof of a Real-Time Mutual Exclusion Protocol

Kåre J. Kristoffersen; François Laroussinie; Kim Guldstrand Larsen; Paul Pettersson; Wang Yi

In this paper, we apply a compositional proof technique to an automatic verification of the correctness of Fischers mutual exclusion protocol. It is demonstrated that the technique may avoid the stateexplosion problem. Our compositional technique has recently been implemented in a tool CMC 5, which verifies the protocol for 50 processes within 172.3 seconds and using only 32MB main memory. In contrast all existing verification tools for timed systems will suffer from the stateexplosion problem, and no tool has to our knowledge succeeded in verifying the protocol for more than 11 processes.


Electronic Notes in Theoretical Computer Science | 2003

Runtime Verification of Timed LTL using Disjunctive Normalized Equation Systems

Kåre J. Kristoffersen; Christian Pedersen; Henrik Reif Andersen

Abstract In this paper we present a new framework for runtime verification of properties of real time systems such as financial systems or backend databases. Such a systems has a semantics which resemples that of timed traces, namely a sequence of states where each state consists of predicates true in this state and then a timestamp explaining when the state is valid. We present a logic, LTL t , which is an extension of LTL with time constraints and a freeze quantifier and show how formulae in this logic are able to express properties of bounded liveness and safety which are ideal for these systems. It is shown how a formula in LTL t may be rewritten to a certain disjunctive normal form suitable for checking a real time system at runtime. The normal form captures the essential part of runtime verification by a set of mutually defined formula identifiers, each expressing two things: What should hold now and which formula identifiers that will need to hold in the next state. As part of the theoretical foundation for this work we propose a characterization of Runtime Verification and address the challenges in developing a method which is both sound and complete while at the same time efficient.


euromicro conference on real time systems | 2000

Model-checking real-time control programs: verifying LEGO MINDSTORMS TM systems using UPPAAL

Torsten K. Iversen; Kåre J. Kristoffersen; Kim Guldstrand Larsen; Morten Laursen; Rune G. Madsen; Steffen K. Mortensen; Paul Pettersson; Chris B. Thomasen

The authors present a method for automatic verification of real time control programs running on LEGO RCX TM bricks using the verification tool UPPAAL. The control programs, consisting of a number of tasks running concurrently, are automatically translated into the timed automata model of UPPAAL. The fixed scheduling algorithm used by the LEGO RCXTM processor is modeled in UPPAAL, and supply of similar (sufficient) timed automata models for the environment allows analysis of the overall real time system using the tools of UPPAAL. To illustrate our techniques, we have constructed, modeled and verified a machine for sorting LEGO bricks by color.


The Journal of Logic and Algebraic Programming | 2002

Automated verification of an audio-control protocol using UPPAAL

Johan Bengtsson; W. O. David Griffioen; Kåre J. Kristoffersen; Kim Guldstrand Larsen; Fredrik Larsson; Paul Pettersson; Wang Yi

In this paper we present a case-study in which the tool Uppaal is extended and applied to verify an audio-control protocol developed by Philips. The size of the protocol studied in this paper is significantly larger than case studies, including various abstract versions of the same protocol without bus-collision handling, reported previously in the community of real-time verification. We have checked that the protocol will function correctly if the timing error of its components is bound to ±5%, and incorrectly if the error is ±6%. In addition, using Uppaal’s ability of generating diagnostic traces, we have studied an erroneous version of the protocol actually implemented by Philips, and constructed a possible execution sequence explaining the error. During the case-study, Uppaal was extended with the notion of committed locations. It allows for accurate modelling of atomic behaviours, and more importantly, it is utilised to guide the state-space exploration of the model checker to avoid exploring unnecessary interleavings of independent transitions. Our experimental results demonstrate considerable time and space-savings of the modified model checking algorithm. In fact, due to the huge time and memory-requirement, it was impossible to check a simple reachability property of the protocol before the introduction of committed locations, and now it takes only seconds.


IEEE Computer | 2000

Practical verification of embedded software

J. Straunstrup; Henrik Reif Andersen; Henrik Hulgaard; Jørn Lind-Nielsen; Gerd Behrmann; Kåre J. Kristoffersen; Arne Skou; Hh. Leerberg; N.B. Theilgaard

Using a new verification algorithm called the compositional backward technique, the authors demonstrate that they can exhaustively verify even the largest industrial applications-comprising more than 1,000 components-in a few minutes on a standard PC.


international colloquium on automata languages and programming | 1995

Automatic Synthesis of Real Time Systems

Jørgen H. Andersen; Kåre J. Kristoffersen; Kim Guldstrand Larsen; Jesper Niedermann

This paper presents a method for automatically constructing real time systems directly from their specifications. The model–construction problem is considered for implicit specifications of the form: (A1 | . . . |An |X) sat S where S is a real time (logical) specification, A1 . . . An are given (regular) timed agents and the problem is to decide whether there exists (and if possible exhibit) a real time agent X which when put in parallel with A1 . . . An will yield a network satisfying S. The method presented proceeds in two steps: first, the implicit specification of X is transformed into an equivalent direct specification of X; second, a model for this direct specification is constructed (if possible) using a direct model construction algorithm. A prototype implementation of our method has been added to the real time verification tool EPSILON.


international conference on acoustics, speech, and signal processing | 2005

Multimodal wireless networks: distributed surveillance with multiple nodes

Zoltan Safar; John Aasted Sørensen; Jianjun Chen; Kåre J. Kristoffersen

Multimodal wireless networks are wireless networks that offer multiple functionalities realized on the same infrastructure. In this paper, we consider a multimodal network that has two modes of operation: the communication mode, when the network is used as a traditional wireless communication network, and the surveillance mode, when the network is used as a distributed sensor network that can detect illegal intrusion by detecting changes in the propagation environment caused by the intruder. We address the problem of distributed surveillance in a network consisting of multiple nodes: we develop a multi-sensor model for the received signal parameters of interest and derive a detector capable of detecting changes in these parameters. The experimental results demonstrate that combining the information from different nodes with the appropriate fusion function results in considerably improved detection performance compared to that of single-node detectors.


international symposium on signal processing and information technology | 2004

Indoor surveillance with multimodal wireless networks

J.A. Soerensen; Zoltan Safar; Jianjun Chen; Kåre J. Kristoffersen; M. Schioetz

In this paper, we propose a new family of wireless networks, the multimodal wireless networks. These networks offer multiple functionalities realized on the same infrastructure. We describe a wireless network that has two modes of operation: the communication mode, when the network is used as a traditional wireless communication network and the surveillance mode, when the network is used as a distributed sensor network that can detect illegal intrusion. The surveillance functionality is realized by analyzing the properties of the received signals and the change of the propagation environment caused by the intruder serves as the basis for intrusion detection. We also develop a general single-receiver model for detecting changes in a signal parameter of interest and derive a parameter change detector. The experimental results demonstrate that low-cost, off-the-shelf IEEE 802.11b WLAN hardware can be used as building blocks for multimodal networks.

Collaboration


Dive into the Kåre J. Kristoffersen's collaboration.

Top Co-Authors

Avatar

Paul Pettersson

Mälardalen University College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jianjun Chen

University of Copenhagen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Henrik Hulgaard

IT University of Copenhagen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jørn Lind-Nielsen

Technical University of Denmark

View shared research outputs
Researchain Logo
Decentralizing Knowledge