Filters








403,595 Hits in 1.4 sec

Specifying and Verifying the Correctness of Dynamic Software Updates [chapter]

Christopher M. Hayden, Stephen Magill, Michael Hicks, Nate Foster, Jeffrey S. Foster
2012 Lecture Notes in Computer Science  
In this paper, we present a more complete framework for specifying and verifying the correctness of dynamic updates.  ...  To verify such properties in actual updatable programs, we develop a transformation that combines the old and new versions of a program into a single merged program.  ...  Our work on specifying and verifying properties of dynamic updates is ongoing.  ... 
doi:10.1007/978-3-642-27705-4_22 fatcat:2kzd3hry5bh6vdhxec7fscgzdm

Signature Scheme for Specified Threshold Verifiers and Security Proofs

Wei-Dong CHEN
2005 Journal of Software (Chinese)  
The problem called "constructing signature schemes for specified verifiers" is proposed by Laih, and such a scheme is also given by Laih.  ...  Especially, for anyone except the specified verifiers, the ability of verifying signature is tightly related to DDH (decisional Diffie-Hellman) problem.  ...  因为 SV-EDL 签名方案指定了验证方,因此存在对签名方"不可否认"性质的潜在需求(对普通签名而言,由 于签名是公开可验证的,所以不存在这个问题).这里,我们以一种非常简明、直接的方式确保方案具有不可否认 性质:当发生争执时(亦即 Signer 是否曾经签署了某份消息),Verifier 只需向第三方 T(裁定方)提供对应消息 ,T 易于验证本次签名是否合法.这避免了较繁琐的不可否认协议设计.这也是我们方案的一个突出优  ... 
doi:10.1360/jos161967 fatcat:umxthofrcreajep5im4t6c7rty

Specifying and verifying requirements of real-time systems

Kirsten M. Hansen, Anders P. Ravn, Hans Rischel
1991 Software engineering notes  
Requirements define safety and functionality constraints on the system or a component.  ...  Abstracf-An approach to specification of requirements and verification of design for real-time systems is presented.  ...  Bjarner and Prof. C. A. R. Hoare, for encouragement, support and useful discusions, and to Prof. Z. Chaochen for his continuing efforts to develop and adapt duration calculus to our use.  ... 
doi:10.1145/123041.123051 fatcat:jw37mqatzfbj5cb5a7zw4gloky

Specifying and verifying holonic agents with GDT4MAS

B. Mermet, G. Simon
2010 International Journal of Agent-Oriented Software Engineering  
The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.  ...  HAL Id: hal-00955945 https://hal.archives-ouvertes.fr/hal-00955945 Submitted on 6 Mar 2014 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents  ... 
doi:10.1504/ijaose.2010.036985 fatcat:6tkjlegjo5cu7pvsztfgz4ayna

Specifying and verifying requirements of real-time systems

A.P. Ravn, H. Rischel, K.M. Hansen
1993 IEEE Transactions on Software Engineering  
Requirements define safety and functionality constraints on the system or a component.  ...  Abstracf-An approach to specification of requirements and verification of design for real-time systems is presented.  ...  Bjarner and Prof. C. A. R. Hoare, for encouragement, support and useful discusions, and to Prof. Z. Chaochen for his continuing efforts to develop and adapt duration calculus to our use.  ... 
doi:10.1109/32.210306 fatcat:mor6v75prrdenmucpeo4yxw3hy

Specifying and verifying real-time self-adaptive systems

Matteo Camilli, Angelo Gargantini, Patrizia Scandurra
2015 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE)  
This paper introduces a formal approach to specify and verify the self-adaptive behavior of real-time systems.  ...  We illustrate our approach by modeling and verifying a time-critical Gas Burner system that exhibits a self-healing behavior. $ FailureDetection=1 −> CloseValvActReq=1 && AirOnActReq=1, 0.4  ...  This paper introduces the zone-based technique to specify and verify the behavior of dynamically adaptive real-time systems.  ... 
doi:10.1109/issre.2015.7381823 dblp:conf/issre/CamilliGS15 fatcat:g7nn765sg5ge7asjmky6jph52y

The SCR method for formally specifying, verifying, and validating requirements

Constance Heitmeyer, James Kirby, Bruce Labaw
1997 Proceedings of the 19th international conference on Software engineering - ICSE '97  
This paper describes the specification, validation and verification of system and software requirements using the SCR tabular method and tools.  ...  An example is presented to illustrate the SCR tabular notation, and an overview of each of the ten tools in the SCR toolset is presented.  ...  , Validating, and Verifying Requirements  ... 
doi:10.1145/253228.253498 dblp:conf/icse/HeitmeyerKL97 fatcat:ulpfptgmlncnxc6gjw3ppu7m7u

Specifying and verifying requirements of real-time systems

Kirsten M. Hansen, Anders P. Ravn, Hans Rischel
1991 Proceedings of the conference on Software for citical systems - SIGSOFT '91  
Requirements define safety and functionality constraints on the system or a component.  ...  Abstracf-An approach to specification of requirements and verification of design for real-time systems is presented.  ...  Bjarner and Prof. C. A. R. Hoare, for encouragement, support and useful discusions, and to Prof. Z. Chaochen for his continuing efforts to develop and adapt duration calculus to our use.  ... 
doi:10.1145/125083.123051 fatcat:jdhnc5v7qnag7pjlf3wbfdijb4

Integrating UML and UPPAAL for designing, specifying and verifying component-based real-time systems

André L. N. Muniz, Aline M. S. Andrade, George Lima
2009 Innovations in Systems and Software Engineering  
A new tool for integrating formal methods, particularly model checking, in the development process of component-based real-time systems specified in UML is proposed.  ...  The described tool, TANGRAM (Tool for Analysis of Diagrams), performs automatic translation from UML diagrams into timed automata, which can be verified by the UPPAAL model checker.  ...  Introduction In this paper we describe a tool, named TANGRAM (Tool for Analysis of Diagrams), designed for modeling, specifying and verifying component-based real-time systems.  ... 
doi:10.1007/s11334-009-0103-6 fatcat:o3q6ndw4ajddjgkv63tedfioou

Specifying and verifying hardware for tamper-resistant software

D. Lie, J. Mitchell, C.A. Thekkath, M. Horowitz
Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)  
We specify a hardware architecture that supports tamper-resistant software by identifying an "idealized" model, which gives the abstracted actions available to a single user program.  ...  In performing the verification, we detected an replay attack scenario and were able to verify the security of our solution to the problem.  ...  The research presented in this paper was performed with the support of DARPA F29601-01-2-0085 and NSF CCR-0121403.  ... 
doi:10.1109/secpri.2003.1199335 dblp:conf/sp/LieMTH03 fatcat:iqfq527ayvbufidkdujw6lwvie

Using KIV to specify and verify architectures of knowledge-based systems

D. Fensel, A. Schnogge
Proceedings 12th IEEE International Conference Automated Software Engineering  
Our approach provide support by formally specified and verified building blocks i.e. components.  ...  Related Work, Conclusions and Future Work We have shown in the paper how tasks and problemsolving methods can be specified and verified with KIV.  ...  We would like to thank Rix Groenboom, John Penix, Annette ten Teije, Frank van Harmelen, Bob Wielinga, and the anonymous reviewers for very helpful comments and discussions and Jeff Butler for correcting  ... 
doi:10.1109/ase.1997.632826 dblp:conf/kbse/FenselS97 fatcat:twx5ibly4jfntny72zab4fzzkm

Applying the Composition Filter Model for Runtime Verification of Multiple-Language Software

Somayeh Malakuti, Christoph Bockisch, Mehmet Aksit
2009 2009 20th International Symposium on Software Reliability Engineering  
To verify the behavior of such software, a run-time verification system must deal with multiplelanguage environments both in its specifications and in its generated runtime verification modules.  ...  E-Chaser is built based on the Composition Filter Model and extends it with the notion of synchronization messages and synchronization filters to verify the synchronization properties of multiple subsystems  ...  properties of multiple subsystems can be specified and verified.  ... 
doi:10.1109/issre.2009.12 dblp:conf/issre/MalakutiBA09 fatcat:wmo42dzfb5hhhbo4qsfq3usmcy

Some usability hypotheses for verification

David J. Pearce
2015 Proceedings of the 6th Workshop on Evaluation and Usability of Programming Languages and Tools - PLATEAU 2015  
The idea of specifying and verifying software to eliminate errors has been studied extensively over the last three decades or more.  ...  Despite this, very little is known about the effect of using such tools on software development.  ...  Introduction The idea of specifying and verifying software goes back a long way to the likes of Hoare [1] , Dijkstra [2] , Gries [3] and others [4] .  ... 
doi:10.1145/2846680.2846691 dblp:conf/oopsla/Pearce15 fatcat:j4nuusepbjhyrltep7sj2cmmcm

Modelling High Integrity Transport Systems by Formal Methods

Hao Cai, Chengdian Zhang, Weihang Wu, Tin-kin Ho, Zaiming Zhang
2014 Procedia - Social and Behavioral Sciences  
With the introduction of the concepts of the formal methods, the software development process is explained and the advantages of simple translation and eliminations of hidden defects are highlighted.  ...  This paper discusses and promotes the application of formal method approach in the development of high integrity transport systems.  ...  The objective of using formal methods at the verification and validation phase is: Certain safety proprieties of the systems specified in the formal model can be automatically verified by advanced verifiable  ... 
doi:10.1016/j.sbspro.2014.07.249 fatcat:672srpltffhn5deujnmdsv7plu

Verifying Software Requirements Characteristics Based on Rules Defined from Software Component Relationships

Nattapon Phanthanithilerd, Nakornthip Prompoon
2016 Lecture Notes on Software Engineering  
importance to verifying that the requirements in the natural language sentence format and in the model format have good properties.  ...  Therefore, this research proposes rules for verifying that requirements in the natural language sentence format and requirements in the model have good properties according to the IEEE 830 standard, namely  ...  INTRODUCTION Identifying user requirement is important for specifying the scope of software development.  ... 
doi:10.7763/lnse.2016.v4.219 fatcat:wuddu7rb4nh7ddmxrycbcjlfjm
« Previous Showing results 1 — 15 out of 403,595 results