Filters








225 Hits in 6.8 sec

Introducing software architecture specification and analysis in SAM through an example

J Wang, X He, Y Deng
1999 Information and Software Technology  
In this article, we present a formal systematic software architecture specification and analysis methodology called SAM and show how to apply SAM to specify a command control (C2) system and to analyze  ...  Software architecture study has become one of the most active research areas in software engineering in the recent years.  ...  . / Information and Software Technology 41 (1999) [451][452][453][454][455][456][457][458][459][460][461][462][463][464][465][466][467]  ... 
doi:10.1016/s0950-5849(99)00009-9 fatcat:rlscesdei5bupaukbboks4ittq

Automatic test generation: a use case driven approach

C. Nebut, F. Fleurey, Y. Le Traon, J.-M. Jezequel
2006 IEEE Transactions on Software Engineering  
Our objective is to cover the system in terms of statement coverage with those generated tests: An empirical evaluation of our approach is given based on this objective and several case studies.  ...  Use cases are believed to be a good basis for system testing. Yet, to automate the test generation process, there is a large gap to bridge between high-level use cases and concrete test cases.  ...  We studied a large part of this server (the most interesting commands), the implementation is composed of 500 lines of code (and 207 executable statements). 3.  ... 
doi:10.1109/tse.2006.22 fatcat:yr4ln5sdb5aubbiptf77tlytry

Sponsors and Supporters

2015 2015 IEEE/ACM 3rd International Workshop on Conducting Empirical Studies in Industry  
Rao Talasila and Prof. Fan Yan for the helpfulness to English grammar. A special thank to Dr.  ...  This work has been supported by the IBM Toronto Center for Advanced Studies (CAS), the Natural Sciences and Engineering Research Council of Canada (NSERC), and the Consortium for Software Engineering (  ...  If possible, a CASE tool and/or repository vendor will be found to work with Siemens to create a seamless integration of use cases, requirements and hazards, enabling a modern, unified, model driven approach  ... 
doi:10.1109/cesi.2015.19 fatcat:wvuavwgkezbjrl35phcqz7kbam

Is CADP an Applicable Formal Method?

Hubert Garavel, Frédéric Lang, Radu Mateescu, Wendelin Serwe
2021 Electronic Proceedings in Theoretical Computer Science  
CADP is a comprehensive toolbox implementing results of concurrency theory.  ...  This paper addresses the question, whether CADP qualifies as an applicable formal method, based on the experience of the authors and feedback reported by users.  ...  Moreover, functions and processes have a unified syntax, which makes a great step forward from previous languages based on process calculi [22] : "Although modeling the DTD in a classical formal specification  ... 
doi:10.4204/eptcs.349.1 fatcat:jzc7gmtt35hwlhomudnws3fhh4

Languages of Games and Play

Riemer Van Rozen
2020 ACM Computing Surveys  
In particular, we study to what extent languages, notations, patterns and tools, can offer experts theoretical foundations, systematic techniques and practical solutions they need to raise their productivity  ...  We present a systematic map that identifies relevant publications and gives an overview of research areas and publication venues.  ...  Féher and Lengyel illustrate the strength of model transformations based on graph rewritingbased in a case study on Rouge-like games, a genre of 2d dungeon crawlers.  ... 
doi:10.1145/3412843 fatcat:k25yj7aylbcg5k3ks4v5d5dueu

The Probabilistic Model Checker Storm [article]

Christian Hensel, Sebastian Junges, Joost-Pieter Katoen, Tim Quatmann, Matthias Volk
2020 arXiv   pre-print
It has a modular set-up in which solvers and symbolic engines can easily be exchanged. Its Python API allows for rapid prototyping by encapsulating Storm's fast and scalable algorithms.  ...  It supports multiple input languages for Markov models, including the JANI and PRISM modeling languages, dynamic fault trees, generalized stochastic Petri nets, and the probabilistic guarded command language  ...  Acknowledgements.We would like to thank all additional contributors to Storm, in particular Philipp Berger, David Korzeniewski, Jip Spel, as well as Dimitri Bohlender, Alexander Bork, Harold Bruintjes,  ... 
arXiv:2002.07080v2 fatcat:howomuoxqrfkbcofduhyqdzrnq

Failure Propagation Modeling and Analysis via System Interfaces

Lin Zhao, Krishnaiyan Thulasiraman, Xiaocheng Ge, Ru Niu
2016 Mathematical Problems in Engineering  
We focus on fault modeling and on how to compute minimal cut sets.  ...  Safety-critical systems must be shown to be acceptably safe to deploy and use in their operational environment.  ...  The state changes of the controller stand for handshaking with the train (via the actions Approach and Exit) and the gate (via the actions Lower and Raise by which the controller commands the gate to close  ... 
doi:10.1155/2016/8593612 fatcat:r4letymfzzcahgrxzkyy32mibq

Towards scalable compositional analysis by refactoring design models

Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia-Yi Pan
2003 Proceedings of the 9th European software engineering conference held jointly with 10th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE '03  
The process is supported by a parser which can parse a subset of Promela syntax and transform Promela code into refactored state graphs.  ...  Theoretical lower bounds on complexity imply that all of the techniques that have been developed to avoid or mitigate state-space explosion depend on models that are "well-formed" in some way, and will  ...  We use elevator index and channel name as grouping options to refactor controller and elevator. In the model, they both are not stateful processes, so, no m ¡ is created.  ... 
doi:10.1145/940071.940105 dblp:conf/sigsoft/ChengYHP03 fatcat:6665ksorunaqrfxitioh4skhnq

Towards scalable compositional analysis by refactoring design models

Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia-Yi Pan
2003 Software engineering notes  
The process is supported by a parser which can parse a subset of Promela syntax and transform Promela code into refactored state graphs.  ...  Theoretical lower bounds on complexity imply that all of the techniques that have been developed to avoid or mitigate state-space explosion depend on models that are "well-formed" in some way, and will  ...  We use elevator index and channel name as grouping options to refactor controller and elevator. In the model, they both are not stateful processes, so, no m ¡ is created.  ... 
doi:10.1145/949952.940105 fatcat:2qr4n3png5febikcponb6w2hfe

Software defined networking: State of the art and research challenges

Manar Jammal, Taranpreet Singh, Abdallah Shami, Rasool Asal, Yiming Li
2014 Computer Networks  
In order to tackle these challenges, operators require a network that is efficient, flexible, agile, and scalable.  ...  Conceptually, SDN separates the network control logic from its underlying hardware, enabling network administrators to exert more control over network functioning and providing a unified global view of  ...  Many controllers may send controller-to-switch commands to the switch; the reply or error messages related to these commands must be sent only on the controller connection associated with that command.  ... 
doi:10.1016/j.comnet.2014.07.004 fatcat:kjqli3ve4vgmdcjfiiskq47xhm

Applying Formal Methods to Networking: Theory, Techniques, and Applications

Junaid Qadir, Osman Hasan
2015 IEEE Communications Surveys and Tutorials  
In this paper, we present a self-contained tutorial of the formidable amount of work that has been done in formal methods, and present a survey of its applications to networking.  ...  The lack of formalization of the Internet architecture meant limited abstractions and modularity, especially for the control and management planes, thus requiring for every new need a new protocol built  ...  In this section, we will study techniques for specifying and modeling systems in Section III-A and for specifying properties in Section III-B.  ... 
doi:10.1109/comst.2014.2345792 fatcat:oc6l6pn4tnddjbbr5v4gbbuycq

Linear Temporal Logic Symbolic Model Checking

Kristin Y. Rozier
2011 Computer Science Review  
Symbolic Model Checking (SMC) Verification Formal Methods A B S T R A C T We are seeing an increased push in the use of formal verification techniques in safetycritical software and hardware in practice  ...  We unify research from 1977 to 2009, providing a complete end-to-end analysis embracing a users' perspective by applying each step to a real-life aerospace example.  ...  Thanks also to Heinz Erzberger for enlightening conversations on the automated airspace concept for air traffic control, which made a wonderful running example.  ... 
doi:10.1016/j.cosrev.2010.06.002 fatcat:e4zzsmtvmbhhfilofosb4ucqni

SDN Security Review: Threat Taxonomy, Implications, and Open Challenges

Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Senthil Kumar Jagatheesaperumal, Moussa Ayyash, Maliha Shaheed
2022 IEEE Access  
Further, in addition to reviewing existing security solutions and related implications, this paper provides key use cases of SDN technology implementation in smart communication systems.  ...  of the control plane and data plane.  ...  The authors in [121] performed a statistical analysis on link latencies by undergoing a vetting period. Also, in comparison with the baseline models, relay-based LFA are assessed.  ... 
doi:10.1109/access.2022.3168972 fatcat:wdjp2kzohjbhvefsjebln2buly

Modeling and Simulation of Systems of Systems – a Survey

Anjel Tzanev
2013 Cybernetics and Information Technologies  
The conceptions about SoS simulation modeling, subsystem integration and practical implementation issues in the face of main three tendencies for development (academic, military and industrial) are considered  ...  The paper surveys the current state of the art and perspectives in the theoretical and practical achievements at the area of Systems of Systems (SoS) and SoS Engineering (SoSE).  ...  Overall DEVS unified process Fig. 7 . 5 . 75 Overall DEVS unified process development Since up to now, a large number of case studies are based on the DEVSUP conception and many projects are at a final  ... 
doi:10.2478/cait-2013-0011 fatcat:2b4r3xbuovfnhjt3ci676p4yxu

Building Quality-of-Service Monitoring Systems for Traffic Engineering and Service Management

Abolghasem (Hamid) Asgari, Panos Trimintzios, Mark Irons, Richard Egan, George Pavlou
2003 Journal of Network and Systems Management  
of a scalable monitoring system for traffic engineering and QoS delivery in IP Differentiated Services networks.  ...  control, programmable/active networks, mobile ad-hoc networks and communications middleware.  ...  ACKNOWLEDGMENTS This work was undertaken in the Information Society Technologies (IST) TEQUILA project and was partially funded by the Commission of the European Union.  ... 
doi:10.1023/b:jons.0000005471.24268.d5 fatcat:qedfqrsapjgchnu622xfdq5ue4
« Previous Showing results 1 — 15 out of 225 results