A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Filters
Introducing software architecture specification and analysis in SAM through an example
1999
Information and Software Technology
In this article, we present a formal systematic software architecture specification and analysis methodology called SAM and show how to apply SAM to specify a command control (C2) system and to analyze ...
Software architecture study has become one of the most active research areas in software engineering in the recent years. ...
. / Information and Software Technology 41 (1999) [451][452][453][454][455][456][457][458][459][460][461][462][463][464][465][466][467] ...
doi:10.1016/s0950-5849(99)00009-9
fatcat:rlscesdei5bupaukbboks4ittq
Automatic test generation: a use case driven approach
2006
IEEE Transactions on Software Engineering
Our objective is to cover the system in terms of statement coverage with those generated tests: An empirical evaluation of our approach is given based on this objective and several case studies. ...
Use cases are believed to be a good basis for system testing. Yet, to automate the test generation process, there is a large gap to bridge between high-level use cases and concrete test cases. ...
We studied a large part of this server (the most interesting commands), the implementation is composed of 500 lines of code (and 207 executable statements). 3. ...
doi:10.1109/tse.2006.22
fatcat:yr4ln5sdb5aubbiptf77tlytry
Sponsors and Supporters
2015
2015 IEEE/ACM 3rd International Workshop on Conducting Empirical Studies in Industry
Rao Talasila and Prof. Fan Yan for the helpfulness to English grammar. A special thank to Dr. ...
This work has been supported by the IBM Toronto Center for Advanced Studies (CAS), the Natural Sciences and Engineering Research Council of Canada (NSERC), and the Consortium for Software Engineering ( ...
If possible, a CASE tool and/or repository vendor will be found to work with Siemens to create a seamless integration of use cases, requirements and hazards, enabling a modern, unified, model driven approach ...
doi:10.1109/cesi.2015.19
fatcat:wvuavwgkezbjrl35phcqz7kbam
Is CADP an Applicable Formal Method?
2021
Electronic Proceedings in Theoretical Computer Science
CADP is a comprehensive toolbox implementing results of concurrency theory. ...
This paper addresses the question, whether CADP qualifies as an applicable formal method, based on the experience of the authors and feedback reported by users. ...
Moreover, functions and processes have a unified syntax, which makes a great step forward from previous languages based on process calculi [22] : "Although modeling the DTD in a classical formal specification ...
doi:10.4204/eptcs.349.1
fatcat:jzc7gmtt35hwlhomudnws3fhh4
Languages of Games and Play
2020
ACM Computing Surveys
In particular, we study to what extent languages, notations, patterns and tools, can offer experts theoretical foundations, systematic techniques and practical solutions they need to raise their productivity ...
We present a systematic map that identifies relevant publications and gives an overview of research areas and publication venues. ...
Féher and Lengyel illustrate the strength of model transformations based on graph rewritingbased in a case study on Rouge-like games, a genre of 2d dungeon crawlers. ...
doi:10.1145/3412843
fatcat:k25yj7aylbcg5k3ks4v5d5dueu
The Probabilistic Model Checker Storm
[article]
2020
arXiv
pre-print
It has a modular set-up in which solvers and symbolic engines can easily be exchanged. Its Python API allows for rapid prototyping by encapsulating Storm's fast and scalable algorithms. ...
It supports multiple input languages for Markov models, including the JANI and PRISM modeling languages, dynamic fault trees, generalized stochastic Petri nets, and the probabilistic guarded command language ...
Acknowledgements.We would like to thank all additional contributors to Storm, in particular Philipp Berger, David Korzeniewski, Jip Spel, as well as Dimitri Bohlender, Alexander Bork, Harold Bruintjes, ...
arXiv:2002.07080v2
fatcat:howomuoxqrfkbcofduhyqdzrnq
Failure Propagation Modeling and Analysis via System Interfaces
2016
Mathematical Problems in Engineering
We focus on fault modeling and on how to compute minimal cut sets. ...
Safety-critical systems must be shown to be acceptably safe to deploy and use in their operational environment. ...
The state changes of the controller stand for handshaking with the train (via the actions Approach and Exit) and the gate (via the actions Lower and Raise by which the controller commands the gate to close ...
doi:10.1155/2016/8593612
fatcat:r4letymfzzcahgrxzkyy32mibq
Towards scalable compositional analysis by refactoring design models
2003
Proceedings of the 9th European software engineering conference held jointly with 10th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE '03
The process is supported by a parser which can parse a subset of Promela syntax and transform Promela code into refactored state graphs. ...
Theoretical lower bounds on complexity imply that all of the techniques that have been developed to avoid or mitigate state-space explosion depend on models that are "well-formed" in some way, and will ...
We use elevator index and channel name as grouping options to refactor controller and elevator. In the model, they both are not stateful processes, so, no m ¡ is created. ...
doi:10.1145/940071.940105
dblp:conf/sigsoft/ChengYHP03
fatcat:6665ksorunaqrfxitioh4skhnq
Towards scalable compositional analysis by refactoring design models
2003
Software engineering notes
The process is supported by a parser which can parse a subset of Promela syntax and transform Promela code into refactored state graphs. ...
Theoretical lower bounds on complexity imply that all of the techniques that have been developed to avoid or mitigate state-space explosion depend on models that are "well-formed" in some way, and will ...
We use elevator index and channel name as grouping options to refactor controller and elevator. In the model, they both are not stateful processes, so, no m ¡ is created. ...
doi:10.1145/949952.940105
fatcat:2qr4n3png5febikcponb6w2hfe
Software defined networking: State of the art and research challenges
2014
Computer Networks
In order to tackle these challenges, operators require a network that is efficient, flexible, agile, and scalable. ...
Conceptually, SDN separates the network control logic from its underlying hardware, enabling network administrators to exert more control over network functioning and providing a unified global view of ...
Many controllers may send controller-to-switch commands to the switch; the reply or error messages related to these commands must be sent only on the controller connection associated with that command. ...
doi:10.1016/j.comnet.2014.07.004
fatcat:kjqli3ve4vgmdcjfiiskq47xhm
Applying Formal Methods to Networking: Theory, Techniques, and Applications
2015
IEEE Communications Surveys and Tutorials
In this paper, we present a self-contained tutorial of the formidable amount of work that has been done in formal methods, and present a survey of its applications to networking. ...
The lack of formalization of the Internet architecture meant limited abstractions and modularity, especially for the control and management planes, thus requiring for every new need a new protocol built ...
In this section, we will study techniques for specifying and modeling systems in Section III-A and for specifying properties in Section III-B. ...
doi:10.1109/comst.2014.2345792
fatcat:oc6l6pn4tnddjbbr5v4gbbuycq
Linear Temporal Logic Symbolic Model Checking
2011
Computer Science Review
Symbolic Model Checking (SMC) Verification Formal Methods A B S T R A C T We are seeing an increased push in the use of formal verification techniques in safetycritical software and hardware in practice ...
We unify research from 1977 to 2009, providing a complete end-to-end analysis embracing a users' perspective by applying each step to a real-life aerospace example. ...
Thanks also to Heinz Erzberger for enlightening conversations on the automated airspace concept for air traffic control, which made a wonderful running example. ...
doi:10.1016/j.cosrev.2010.06.002
fatcat:e4zzsmtvmbhhfilofosb4ucqni
SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
2022
IEEE Access
Further, in addition to reviewing existing security solutions and related implications, this paper provides key use cases of SDN technology implementation in smart communication systems. ...
of the control plane and data plane. ...
The authors in [121] performed a statistical analysis on link latencies by undergoing a vetting period. Also, in comparison with the baseline models, relay-based LFA are assessed. ...
doi:10.1109/access.2022.3168972
fatcat:wdjp2kzohjbhvefsjebln2buly
Modeling and Simulation of Systems of Systems – a Survey
2013
Cybernetics and Information Technologies
The conceptions about SoS simulation modeling, subsystem integration and practical implementation issues in the face of main three tendencies for development (academic, military and industrial) are considered ...
The paper surveys the current state of the art and perspectives in the theoretical and practical achievements at the area of Systems of Systems (SoS) and SoS Engineering (SoSE). ...
Overall DEVS unified process
Fig. 7 . 5 . 75 Overall DEVS unified process development Since up to now, a large number of case studies are based on the DEVSUP conception and many projects are at a final ...
doi:10.2478/cait-2013-0011
fatcat:2b4r3xbuovfnhjt3ci676p4yxu
Building Quality-of-Service Monitoring Systems for Traffic Engineering and Service Management
2003
Journal of Network and Systems Management
of a scalable monitoring system for traffic engineering and QoS delivery in IP Differentiated Services networks. ...
control, programmable/active networks, mobile ad-hoc networks and communications middleware. ...
ACKNOWLEDGMENTS This work was undertaken in the Information Society Technologies (IST) TEQUILA project and was partially funded by the Commission of the European Union. ...
doi:10.1023/b:jons.0000005471.24268.d5
fatcat:qedfqrsapjgchnu622xfdq5ue4
« Previous
Showing results 1 — 15 out of 225 results