Filters








51,906 Hits in 4.7 sec

A Scalable Approach to Multi-style Architectural Modeling and Verification

Stephen Wong, Jing Sun, Ian Warren, Jun Sun
2008 13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008)  
In this paper, we present an approach to support the design and verification of software architectural models using the Alloy analyzer.  ...  A scalable approach to multi-style architectural modeling and verification. (2008).  ...  Conclusion In this paper we presented a multi-style approach to software architecture modeling and verification.  ... 
doi:10.1109/iceccs.2008.16 dblp:conf/iceccs/WongSWS08 fatcat:gxm7etrjcjhq5p37kitpwqlcw4

Ontological Representation of Relational Databases

Camila Zacché de Aguiar, Ricardo de Almeida Falbo, Vítor E. Silva Souza
2018 Joint Seminar on Ontology Research in Brazil / International Workshop on Metamodels, Ontologies and Semantic Technologies  
In addition to a reference ontology, we also implement and test its operational version, using it to automatic instantiate the ontology from a real database sample.  ...  In this paper, we present RDBS-O, a well-founded reference ontology on the relational database domain, rigorously constructed, verified and validated according to an ontology engineering method.  ...  data from relational databases, similar to the approach presented in Section 4.  ... 
dblp:conf/ontobras/AguiarFS18 fatcat:6uq2luicgfb7nlqeieaycrihl4

Runtime verification for autonomous spacecraft software

A. Goldberg, K. Havelund, C. McGann
2005 2005 IEEE Aerospace Conference  
We describe its application to the PLASMA planning system, used in the recent Mars Exploration Rover missions. We furthermore discuss alternative autonomy V&V approaches.  ...  We describe an approach named runtime verification for testing autonomy software. Runtime verification is a technique for generating test oracles from abstract specifications of expected behavior.  ...  They load a plan resulting from execution of the planner into a database and then check the database against constraints generated from the model.  ... 
doi:10.1109/aero.2005.1559341 fatcat:urmbkvjgf5hatpyxy5pao4xn4q

A Pattern Based Approach for Secure Database Design [chapter]

Jenny Abramov, Arnon Sturm, Peretz Shoval
2011 Lecture Notes in Business Information Processing  
In this paper, we present a novel approach that guides database designers, to design a database schema that complies with the organizational security policies related to authorization.  ...  Finally, the secure database schema is automatically generated.  ...  This work was partially funded by Deutsche Telekom Laboratories at Ben-Gurion University of the Negev.  ... 
doi:10.1007/978-3-642-22056-2_65 fatcat:pt72mces6ba7baywruv5dnf7yq

Estimating the maximum rise in temperature according to climate models using abstract interpretation

Peter Z. Revesz, Robert J. Woodward
2019 Acta Universitatis Sapientiae: Informatica  
In particular, we apply the constraint database approach to software verification to find that the rise in global temperature is bounded according to the common Java Climate Model that implements the Wigley  ...  In order to answer that question we propose to combine climate models with software verification techniques that can find invariant conditions for the set of program variables.  ...  The paper combined climate modeling and software verification techniques, in particular software verification using the constraint database approach [1, 16] .  ... 
doi:10.2478/ausi-2019-0001 fatcat:g3dw5ztglzag5ouudttpisjkou

Model-based system configuration approach for Internetware

Ying Li, KeWei Sun, Jie Yang, TianCheng Liu, LiangZhao Zeng
2013 Science China Information Sciences  
Similarly, Ref. [5] observed that, of the issues reported in the studied company customer-support database, the percentage of configuration-related issues was much bigger than that of software bugs.  ...  In this paper, we firstly analyze the configuration issues of Internetware, and then present a model-based engineering approach to managing the configuration for Internetware systematically.  ...  Then the Configuratio-nEntry(s) are mapped to the Constraint, the detection is done from entry to entry and the correlated Resource Configuration Verification Report is generated.  ... 
doi:10.1007/s11432-013-4917-3 fatcat:qmem2gwx3zajldtsmiffm4a7ky

Quality Improvement of Conceptual UML and OCL Schemata through Model Validation and Verification [chapter]

Martin Gogolla, Khanh-Hoang Doan
2017 Conceptual Modeling Perspectives  
In this paper, we discuss how to apply the tool USE in a larger example and demonstrate the advantages of our approach for relational database design.  ...  Introduction Model-driven engineering (MDE) is a software development approach that puts emphasis on models and not on code. The main purpose of a model is abstraction.  ... 
doi:10.1007/978-3-319-67271-7_11 dblp:conf/birthday/GogollaD17 fatcat:wmo7f423bngp3apl7p4vutqcye

A Study on Framework for Anti-Pattern Evaluation of System Software

Shaik Mastanvali
2021 International Journal for Research in Applied Science and Engineering Technology  
Abstract: Studies with a variety of viewpoints, goals, measurements, and quality characteristics have been conducted in order to determine the effect of design patterns on quality attributes.  ...  For the purpose of detecting and categorising software performance anti-patterns, this article proposes a non-intrusive machine learning method dubbed Non-intrusive Performance Anti-pattern Detector (NiPAD  ...  It is the most well-known kind of verification when it comes to database integrity.  ... 
doi:10.22214/ijraset.2021.39672 fatcat:e73r6mr5kzdthbksa2bhnybfwa

Enhancing Utility and Privacy of Data for Software Testing

Boyang Li
2014 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops  
A fundamental problem in test outsourcing is how to allow a database-centric application (DCA) owner to release a smaller subset of its private data along with the application.  ...  To the best of our knowledge, there exists no prior approaches that synergistically address all of the aforementioned dimensions.  ...  PREVIOUS WORK To address this issue, we presented a novel approach for Protecting and mInimizing databases for Software TestIng taSks (PISTIS) , which can both sanitize and minimize a database that comes  ... 
doi:10.1109/icstw.2014.53 dblp:conf/icst/Li14 fatcat:bynh6rihdnafvhnixjezdyy4rm

Rule representation and management in conceptbase

M. Jarke, M. Jeusfeld
1989 SIGMOD record  
In this paper, we demonstrate how to exploit a process, oriented software data model that uses just the object-oriented structural language kcmcl, to bootstrap efficient internal representations of the  ...  The knowledge representation language it supports, CML/Telos, combines the functionalities of deductive and temporal databases with structural object orientation.  ...  Eva Kriiger and Martin Staudt have participated in the implementation of the rule component, whereas Thomas Rose contributed strongly to the underlying software process data model.  ... 
doi:10.1145/71031.71037 fatcat:qwt3yrgi7fezhbo6fn6hiw2z3u

Secure Database Development [chapter]

Jan Jurjens, Eduardo B. Fernandez
2014 Encyclopedia of Database Systems  
Both approaches are contrasted so that the reader can decide which one of these problems applies to her specific case but more space is dedicated to the general secure database development problem.  ...  For the database community the words secure database design may refer to the schema design to produce a database for a specific application with some level of security properties.  ...  Thus advanced users of the UMLsec approach can use this framework to implement verification routines for the constraints of self-defined stereotypes.  ... 
doi:10.1007/978-1-4899-7993-3_329-2 fatcat:ybhrxoe46rebxakmfby4xdwwcq

Automatic Verification of Database-Centric Systems

Alin Deutsch, Richard Hull, Victor Vianu
2014 SIGMOD record  
Recently, an alternative approach to verification of database-centric systems has taken shape, at the confluence of the database and computer-aided verification areas.  ...  This allows to use again a symbolic run approach to verification, by replacing isomorphism types with inherited constraints.  ... 
doi:10.1145/2694428.2694430 fatcat:ecsguicnzfetzf2bsl6faolnle

Foundations of data-aware process analysis

Diego Calvanese, Giuseppe De Giacomo, Marco Montali
2013 Proceedings of the 32nd symposium on Principles of database systems - PODS '13  
In this work we survey the research on foundations of data-aware (business) processes that has been carried out in the database theory community.  ...  We argue that it is this community that should lay the foundations to solve, at least from the point of view of formal analysis, the dichotomy between data and processes still persisting in business process  ...  Acknowledgements We would like to thank Babak Bagheri Hariri, Riccardo De Masellis, Alin Deutsch, Paolo Felli, Rick Hull, Maurizio Lenzerini, Alessio Lomuscio, Fabio Patrizi, Jianwen Su, and Moshe Vardi  ... 
doi:10.1145/2463664.2467796 dblp:conf/pods/CalvaneseGM13 fatcat:t7zhz35ca5c6nlcurzmm2wz3mu

Tool support for UML-based specification and verification of role-based access control properties

Lionel Montrieux, Michel Wermelinger, Yijun Yu
2011 Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering - SIGSOFT/FSE '11  
The tool is built on top of an existing modelling IDE and allows for automatic verification of models according to our RBAC modelling approach, while providing users with the ability to easily identify  ...  Our modelling approach uses only standard UML mechanisms, like metamodels and OCL constraints, and improves on existing approaches in various ways: designers don't have to learn new languages or adopt  ...  Figure 1 is a sample model annotated using our approach. It represents a system allowing professors and teaching assistants to fill a database with students' marks.  ... 
doi:10.1145/2025113.2025190 dblp:conf/sigsoft/MontrieuxWY11 fatcat:ow57j6z5gndx3en5z7e7u3wuqa

Decomposing Verification Around End-User Features [chapter]

Kathi Fisler, Shriram Krishnamurthi
2008 Lecture Notes in Computer Science  
Practical program verification techniques must align with the software development methodologies that produce the programs.  ...  This paper motivates the decomposition of systems by features and provides an overview of the promises and challenges it poses to verification.  ...  In our work on this approach [18] the constraints have been propositional and temporal, reflecting their foundation in model checking.  ... 
doi:10.1007/978-3-540-69149-5_10 fatcat:35dppiu5obdkrap2mwvlb2yrfy
« Previous Showing results 1 — 15 out of 51,906 results