12,988 Hits in 4.5 sec

Verification of Hierarchical Artifact Systems

Alin Deutsch, Yuliang Li, Victor Vianu
2016 Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems - PODS '16  
The results show decidability of verification and establish its complexity, making use of novel techniques including a hierarchy of Vector Addition Systems and a variant of quantifier elimination tailored  ...  The present work represents a significant advance on the problem of artifact verification, by considering a much richer and more realistic model than in previous work, incorporating core elements of IBM's  ...  We summarize next other related work on verification of artifact systems.  ... 
doi:10.1145/2902251.2902275 dblp:conf/pods/DeutschLV16 fatcat:ulfwgni6tje4hllarthlq3qpfi

Practical Verification of Hierarchical Artifact Systems

Yuliang Li
2017 Very Large Data Bases Conference  
The present research bridges the gap between the theory and practice of artifact verification by studying the implementation of a full-fledged and efficient artifact verifier for a variant of the Hierarchical  ...  Artifact System (HAS) model presented in [9] .  ...  The artifact model we use is a variant of the Hierarchical Artifact System (HAS) model of [9] , which captures core elements of IBM's GSM model.  ... 
dblp:conf/vldb/Li17 fatcat:m4i5l5eqrjaetc6tlb7ypcqru4

Interactive Traceability Links Visualization using Hierarchical Trace Map

Thazin Win Win Aung, Huan Huo, Yulei Sui
2019 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)  
Traceability links between various software artifacts of a system aid software engineers in system comprehension, verification and change impact analysis.  ...  In this position paper, we propose a hierarchical trace map visualization technique to explore inter-relationships between various artifacts at once naturally and intuitively.  ...  We positioned the source artifact on the top layer and its target artifacts on the lower layer to demonstrate hierarchical layer view of the system.  ... 
doi:10.1109/icsme.2019.00059 dblp:conf/icsm/AungHS19 fatcat:dp5ojn7vwvhsvegs4k4f6htjie

DCL 2.0: modular and reusable specification of architectural constraints

Henrique Rocha, Rafael Serapilha Durelli, Ricardo Terra, Sândalo Bessa, Marco Túlio Valente
2017 Journal of the Brazilian Computer Society  
In this article, we extend DCL with a reusable, modular, and hierarchical specification.  ...  Therefore, we argue that DCL 2.0 can have a positive impact on the architectural conformance of systems.  ...  Availability of data and materials The dataset supporting the conclusions of this article belong to a government branch with sensitive information, we cannot publicly share this data.  ... 
doi:10.1186/s13173-017-0061-z fatcat:wdiuo6itc5gu5h5txfywknaxpq

Requirements Engineering Visualization: A Survey on the State-of-the-Art

John R. Cooper, Jr., Seok-Won Lee, Robin A. Gandhi, Orlena Gotel
2009 2009 Fourth International Workshop on Requirements Engineering Visualization  
Visualizations, when coupled with traditional practices, augment the ability of resulting requirements artifacts to reach a wide range of stakeholders and provide for a rapid and shared understanding of  ...  opportunities for further research with the understanding of the trends of applying visualization in requirements engineering research and practice.  ...  -Prepare precise specifications. 4: Verification and Validation -Check artifacts for consistency and completeness. -Ensure that requirements satisfy the intended real-world goals of the system.  ... 
doi:10.1109/rev.2009.4 fatcat:dc467ccox5fbvfeivlbrl2m75a

Structuring simulink models for verification and reuse

Michael W. Whalen, Anitha Murugesan, Sanjai Rayadurgam, Mats P. E. Heimdahl
2014 Proceedings of the 6th International Workshop on Modeling in Software Engineering - MiSE 2014  
In this paper, we discuss structuring issues in constructing models to support use (and reuse) of models for design and verification in critical software development projects.  ...  We illustrate our approach using a generic patient-controlled analgesia infusion pump (GPCA), a medical cyber-physical system.  ...  To achieve this for software artifacts version control systems that operate at the granularity of files in a file system are widely used.  ... 
doi:10.1145/2593770.2593776 dblp:conf/icse/WhalenMRH14 fatcat:7hm65robmrgl5ht2i42kbsskky

Compositional Algorithmic Verification of Software Product Lines [chapter]

Ina Schaefer, Dilian Gurov, Siavash Soleimanifard
2011 Lecture Notes in Computer Science  
The products of a software product line can be described by means of a hierarchical variability model specifying the commonalities and variabilities between the artifacts of the individual products.  ...  The number of products generated by a hierarchical model is exponential in its size, which poses a serious challenge to software product line analysis and verification.  ...  We propose simple hierarchical variability models (SHVM) as a novel way to specify the variability of product artifacts.  ... 
doi:10.1007/978-3-642-25271-6_10 fatcat:ldn5gmo6k5et3mwjydgolj2db4

Real-time detection of transients in OGLE-IV with application of machine learning [article]

Jakub Klencki, Łukasz Wyrzykowski
2016 arXiv   pre-print
We present a triple-stage hierarchical machine learning system for automated artifact filtering in difference imaging, based on self-organizing maps.  ...  The classifier, when tested on the OGLE-IV Transient Detection System, accepts ~ 97 % of real transients while removing up to ~ 97.5 % of artifacts.  ...  on test verifications of candidates of known types (real or bogus).  ... 
arXiv:1601.06151v1 fatcat:yvckrgrov5g3viztqtqtn7omde

D3TraceView: A Traceability Visualization Tool

Gilberto Cysneiros Filho, Andrea Zisman
2017 Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering  
The tool supports different types of queries related to the use of traceability information. We use an Air Traffic Control Environment multi-agent system to demonstrate the use of the tool.  ...  Traceability is fundamental to support several activities of the software development process such as impact analysis, software maintenance and evolution, verification and validation.  ...  Software verification is the collection of methods used to determine if a software system is correctly built.  ... 
doi:10.18293/seke2017-038 dblp:conf/seke/FilhoZ17 fatcat:5ixntcnw4razdp3afkflnuctqe

Algorithmic verification of procedural programs in the presence of code variability

Siavash Soleimanifard, Dilian Gurov
2016 Science of Computer Programming  
cvpp and ProMoVer, and to Stefan Schwoon for adapting the input language of Moped to our needs.  ...  We are indebted to Wojciech Mostowski, Erik Poll and Roberto Guanciale for their help in finding suitable case studies, to Afshin Amighi and Pedro de Carvalho Gomes for helping with the implementation of  ...  efficient verification of these systems.  ... 
doi:10.1016/j.scico.2015.08.010 fatcat:c7nrpyz65nfkjo4drugtsxrhja

Algorithmic Verification of Procedural Programs in the Presence of Code Variability [chapter]

Siavash Soleimanifard, Dilian Gurov
2015 Lecture Notes in Computer Science  
cvpp and ProMoVer, and to Stefan Schwoon for adapting the input language of Moped to our needs.  ...  We are indebted to Wojciech Mostowski, Erik Poll and Roberto Guanciale for their help in finding suitable case studies, to Afshin Amighi and Pedro de Carvalho Gomes for helping with the implementation of  ...  efficient verification of these systems.  ... 
doi:10.1007/978-3-319-15317-9_20 fatcat:beqsoxyqanczznzai56a2mzhh4

A Lightweight Methodology for Safety Case Assembly [chapter]

Ewen Denney, Ganesh Pai
2012 Lecture Notes in Computer Science  
We formulate our approach on top of an idealized process, and illustrate the applicability of the methodology on excerpts of requirements specifications for an experimental Unmanned Aircraft System.  ...  In turn, these modifications can be mapped back to extensions of the tabular requirements, with which they are kept consistent, thus avoiding the need for engineers to maintain an additional artifact.  ...  This work has been funded by the AFCS element of the SSAT project in the Aviation Safety Program of the NASA Aeronautics Mission Directorate.  ... 
doi:10.1007/978-3-642-33678-2_1 fatcat:qz2pihlypzfzjpok3iq3hff6wm

Towards Abstract Test Execution in Early Stages of Model-driven Software Development

Noël Hagemann, Reinhard Pröll, Bernhard Bauer
2020 Proceedings of the 8th International Conference on Model-Driven Engineering and Software Development  
As a result, we present a semi-formal approach enabling developers to perform abstract test execution straight on the modeled artifacts to support the overarching objective of a shift left of verification  ...  In order to cope with the emerging challenges during the development of such systems, modeling approaches become an indispensable part.  ...  On the one hand, the model artifact should give the modeler the possibility to specify a coarse sketch of how the SUD may be hierarchically decomposed into its basic building blocks.  ... 
doi:10.5220/0008934802160226 dblp:conf/modelsward/HagemannPB20 fatcat:mcebirrqqzgr7dlt73jegonfw4

Development of information technology for the automated construction and expansion of the temporal knowledge base in the tasks of supporting management decisions

Oksana Chala
2019 Tehnologìčnij Audit ta Rezervi Virobnictva  
At this stage, links are established between classes of artifacts that set hierarchical links in a subject area.  ...  set of state sequences Π Π = { } i ; H l -a hierarchical description of the context based on the ratio between the artifacts.  ... 
doi:10.15587/2312-8372.2019.160205 fatcat:2eyjaqapavdlxpm2sopchoijqa

PolicyForge: A collaborative environment for formalizing privacy policies in health care

Andras Nadas, Laszlo Juracz, Janos Sztipanovits, Mark E. Frisse, Ann J. Olsen
2013 2013 5th International Workshop on Software Engineering in Health Care (SEHC)  
; and by embedding formal policy models with relevant ontologies, it provides a wide range of services for authoring, composing, analyzing policy models, and for exporting executable version of the models  ...  The vision of is that it becomes an open repository for privacy policies at local, state and national level; provides collaboration services for discussing, interpreting, and tracking policies  ...  Its contents are solely the responsibility of the authors and do not necessarily represent the official views of the HHS or NSF.  ... 
doi:10.1109/sehc.2013.6602472 dblp:conf/icse/NadasJSFO13 fatcat:sex6qjhifzgofepq2h757hlsoy
« Previous Showing results 1 — 15 out of 12,988 results