2,514 Hits in 7.6 sec

Auto-generating Test Sequences Using Model Checkers: A Case Study [chapter]

Mats P. E. Heimdahl, Sanjai Rayadurgam, Willem Visser, George Devaraj, Jimin Gao
2004 Lecture Notes in Computer Science  
We developed a framework for specification-based test generation using the NuSMV model-checker and code based test case generation using Java Pathfinder, and collected time and resource usage data for  ...  generating test cases using symbolic, bounded, and explicit state model-checking algorithms.  ...  A model checker can be used to find test cases by formulating a test criterion as a verification condition for the model checker.  ... 
doi:10.1007/978-3-540-24617-6_4 fatcat:b6b3mxamdfdtdlikwgscayxr4y

Grammar Checkers for Natural Languages : A Review

Nivedita S Bhirud, R.P Bhavsar, B.V Pawar
2017 International Journal on Natural Language Computing  
Grammar Checker tool is a prominent tool within language engineering.  ...  The survey concludes with the discussion of different features included in existing grammar checkers of foreign languages as well as a few Indian Languages.  ...  Using tagger based Hidden Markov Model, which uses manually tagged corpus, each word is assigned a part of speech.  ... 
doi:10.5121/ijnlc.2017.6401 fatcat:pm6efcpjjvevndvnvvbd57rmle

Who Writes What Checkers? - Learning from Bug Repositories

Takeshi Yoshimura, Kenji Kono
2014 Hot Topics in System Dependability  
Static code checkers have been useful for finding bugs in large-scale C code.  ...  Domain-specific checkers are particularly effective in finding deep/subtle bugs because they can make use of domain-specific knowledge.  ...  Our solution is to specify the model that simulates the invocation sequence of typical drivers by instrumenting the driver code as a function and then using it as the entry point of symbolic executions  ... 
dblp:conf/hotdep/YoshimuraK14 fatcat:flgyh63xszdzrflor7val4vixu

Learning from Fact-checkers: Analysis and Generation of Fact-checking Language [article]

Nguyen Vo, Kyumin Lee
2019 arXiv   pre-print
Our qualitative study also confirms that the superiority of our generated responses compared with responses generated from the existing models.  ...  of fact-checking tweets; and (3) propose and build a deep learning framework to generate responses with fact-checking intention to increase the fact-checkers' engagement in fact-checking activities.  ...  Case Studies. Table 4 presents examples of original tweets, groundtruth FC-tweets, and generated responses of the three models.  ... 
arXiv:1910.02202v1 fatcat:4hsbgjjvnjfy7nhd3er56at5ve

A Case Study in Abstract Interpretation Based Program Transformation

Patrick Cousot, Radhia Cousot
2001 Electronical Notes in Theoretical Computer Science  
Among the auto matic formal methods, program static analysis can be used to check for the absence of run-time errors.  ...  We discuss the extension of these techniques to abstract testing where speci fications are provided by the programmers. Abstract testing is compared to program debugging and model-checking.  ...  Indeed many model checking publications refer to the case study of a particular concurrent system which is often debugged and sometimes verified by using an existing model checker on an abstract model  ... 
doi:10.1016/s1571-0661(04)80954-x fatcat:efogrlufrjeqlhgcilord4xaji

An efficient statistical model checker for nondeterminism and rare events

Carlos E. Budde, Pedro R. D'Argenio, Arnd Hartmanns, Sean Sedwards
2020 International Journal on Software Tools for Technology Transfer (STTT)  
We highlight its capabilities using experiments across multi-core and distributed setups on three case studies and report on an extensive performance comparison with three current statistical model checkers  ...  In this article, we present modes: a statistical model checker that combines fully automated importance splitting to estimate the probabilities of rare events with smart lightweight scheduler sampling  ...  The same compilation engine is used by the mcsta and prohver model checkers and the motest model-based testing tool.  ... 
doi:10.1007/s10009-020-00563-2 fatcat:2zyvi27hgrhwzamfcnhv5eu2jm

CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover

Wilayat Khan, Farrukh Aslam Khan, Abdelouahid Derhab, Adi Alhudhaif, Huihua Chen
2021 Complexity  
CoCEC has a mathematical foundation, and it is reliable, quick, and easy to use.  ...  (CoCEC) tool, and (3) test and evaluate our tool.  ...  In the former case, the CoCEC tool gives the Coq proof object and proof script, which the user can confirm using the Coq checker, while in the latter case, a counterexample is returned.  ... 
doi:10.1155/2021/5525539 fatcat:6hlteqwfoff5ppeo342edfxydq

Teaching Concurrent Software Design: A Case Study Using Android [article]

Konstantin Läufer, George K. Thiruvathukal
2017 arXiv   pre-print
software modeling, architecture, and design topics.  ...  In this article, we explore various parallel and distributed computing topics from a user-centric software engineering perspective.  ...  Having a modular architecture, such as model-view-adapter, enables us to test most of the application components in isolation.  ... 
arXiv:1705.02899v1 fatcat:orsm5p37ond37hhdngleucaili

Methodology for Integrating Computational Tree Logic Model Checking in Unified Modelling Language Artefacts A Case Study of an Embedded Controller

KH Kochaleema, G. Santhoshkumar
2019 Defence Science Journal  
The suggested methodology; commences from functional specification and use case modelling, selects the most critical behaviour where formal verification can add value to the development cycle, analyses  ...  CTL model-checking algorithm from the literature is used for model- checking.  ...  Generate a Detailed Specification of the use Case using State Chart Diagram There are four different parallel sequence of actions take place in the lowering mode of operation (Fig. 4) .  ... 
doi:10.14429/dsj.69.12294 fatcat:suqbn5arrffjbnbtjkgh2ykr7u

Deriving invariant checkers for critical infrastructure using axiomatic design principles

Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, Christopher M Poskitt
2021 Cybersecurity  
We apply our method to the designs of two CPS testbeds, SWaT and WADI, deriving a suite of invariant checkers that are able to detect a variety of single- and multi-stage attacks without any false positives  ...  Our method iteratively decomposes a high-level CPS design to identify sets of dependent design parameters (i.e. sensors and actuators), allowing for invariants and invariant checkers to be derived in parallel  ...  Availability of data and materials The datasets used in this research are available online (iTrust Labs: Datasets 2020).  ... 
doi:10.1186/s42400-021-00069-7 fatcat:ck7trtf4pvgrdjc3vorufmdes4

Tightening Test Coverage Metrics: A Case Study in Equivalence Checking Using k-Induction [chapter]

Alastair F. Donaldson, Nannan He, Daniel Kroening, Philipp Rümmer
2011 Lecture Notes in Computer Science  
We have integrated k-induction into our test case generation framework for Simulink.  ...  We present a case study applying the k-induction method to equivalence checking of Simulink designs.  ...  Larger Simulink Case Studies In this case study, we make use of k-induction to check whether mutants injected into Simulink models are equivalent.  ... 
doi:10.1007/978-3-642-25271-6_16 fatcat:3uozdl4bkzeyhdp7jx24ind4fy

A Type Checker for a Logical Framework with Union and Intersection Types [article]

Luigi Liquori, Claude Stolze
2020 arXiv   pre-print
Binders are implemented using commonly-used de Bruijn indices. We have defined a concrete language syntax that will allow the user to write Delta-terms.  ...  Bull uses a higher-order unification algorithm for terms, while typechecking and partial type inference are done by a bidirectional refinement algorithm, similar to the one found in Matita and Beluga.  ...  This work could not be have be done without the many useful discussions with Furio Honsell, Ivan Scagnetto, Ugo de'Liguoro, and Daniel Dougherty.  ... 
arXiv:2002.10803v1 fatcat:gi4ypdx6hrgzjavufl7cripiou

Design-for-Security vs. Design-for-Testability: A Case Study on DFT Chain in Cryptographic Circuits

Yier Jin
2014 2014 IEEE Computer Society Annual Symposium on VLSI  
Using an AES encryption core as the testing platform, we elaborated the security assessment procedure as well as the DFS technique in balancing security and testability of cryptographic circuits.  ...  Relying on a recently developed gate-level information assurance scheme, we formally analyze the security of design-for-test (DFT) scan chains, the industrial standard testing methods for fabricated chips  ...  Using Perl scripting language, we developed a set of code auto-conversion and theorem auto-generation tools so that all the Coq representative and security theorems presented in this paper are generated  ... 
doi:10.1109/isvlsi.2014.54 dblp:conf/isvlsi/Jin14 fatcat:t3ub7g7p35hd3izto6ua4e3zxy

Flexibility versus efficiency? A case study of model changeovers in the Toyota production system

2002 International Abstracts in Operations Research  
T his is a careful and insightful case study of how the Toyota Production System manages the paradox of efficiency and flexibility, which arises periodically in connection with model changeovers.  ...  Analyzing two recent major model changes, we find that NUMMI used four mechanisms to support its exceptional flexibility/efficiency combination.  ...  Acknowledgments This research would not have been possible without the generous help of UAW Local 2244, and of workers and managers at NUMMI and Toyota.  ... 
doi:10.1057/iaor.2002.289 fatcat:najgupqb3vgvxeop3pptykoypq

Microsatellites and single nucleotide polymorphisms in avian hybrid identification: a comparative case study

Ülo Väli, Pauli Saag, Valery Dombrovski, Bernd-Ulrich Meyburg, Grzegorz Maciorowski, Tadeusz Mizera, Rimgaudas Treinys, Sofie Fagerberg
2010 Journal of Avian Biology  
Our study shows that the use of various sets of markers could lead to strikingly different assignment results, hybridisation studies may have been affected by too low a resolution power of used markers  ...  Bayesian model-based approaches.  ...  Acknowledgements Á Our thanks go to Szilard Daroczi, Miroslav Dravecky, Marina Dzmitranok, Mikhail Ivanov, Roman Kiselev, Anton Makarov, Joachim Matthes, Vladimir Melnikov  ... 
doi:10.1111/j.1600-048x.2009.04730.x fatcat:eeifvkyuhbbdjcoj65jwlbv6eu
« Previous Showing results 1 — 15 out of 2,514 results