• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 103
Next 10 →

An Approach for the Engineering of Protocol Software from Coloured Petri Net Models: A Case Study of the IETF WebSocket Protocol

by Lars Michael Kristensen
"... The vast majority of software systems today can be characterised as con-current and distributed systems as their operation inherently relies on protocols executed between independently scheduled software components. The engineer-ing of correct protocols can be a challenging task due to their complex ..."
Abstract - Add to MetaCart
of protocols, including automated code generation for different platforms from design-level models. Furthermore, the use of formal modelling in combination with model checking provides tech-niques to support the development of reliable protocol implementations. Coloured Petri Nets (CPNs) [3] is formal language

Title: Automated Test Case Generation for Code Generators based on

by Graph-transformation Rules, Eep Neema, Ingo Stürmer
"... In automotive software development models are the central artefact within the whole development process (model-based development). The new technology of automatic code generation closes the gap between the software design on the base of a model (executable specification) and its implementation (cont ..."
Abstract - Add to MetaCart
In automotive software development models are the central artefact within the whole development process (model-based development). The new technology of automatic code generation closes the gap between the software design on the base of a model (executable specification) and its implementation

Formal Modeling and Analysis of an Audio/Video Protocol: An Industrial Case Study Using UPPAAL

by Klaus Havelund, Arne Skou, Kim Guldstrand Larsen, Kristian Lund - In Proc. of the 18th IEEE Real-Time Systems Symposium , 1997
"... A formal and automatic verification of a real-life protocol is presented. The protocol, about 2800 lines of assembler code, has been used in products from the audio/video company Bang & Olufsen throughout more than a decade, and its purpose is to control the transmission of messages between audi ..."
Abstract - Cited by 64 (15 self) - Add to MetaCart
A formal and automatic verification of a real-life protocol is presented. The protocol, about 2800 lines of assembler code, has been used in products from the audio/video company Bang & Olufsen throughout more than a decade, and its purpose is to control the transmission of messages between

Formal semantics and automated analysis of BPMN process models

by Remco M. Dijkman, Marlon Dumas, Chun Ouyang , 2007
"... The Business Process Modelling Notation (BPMN) is a standard for capturing business processes in the early phases of systems development. The mix of constructs found in BPMN makes it possible to obtain models with a range of semantic errors. The ability to statically check the semantic correctness o ..."
Abstract - Cited by 17 (2 self) - Add to MetaCart
of a mapping to Petri nets, for which efficient analysis techniques exist. The proposed mapping has been implemented as a tool that generates code in the Petri Net Markup Language. This formalisation exercise has also led to the identification of a number of deficiencies in the BPMN standard

Automated Code Generation Of Dynamic Specializations: An Approach Based On Design Patterns And Formal Techniques

by Vicente Pelechano, Oscar Pastor, Emilio Insfran - Data and Knowledge Engineering , 2002
"... In this work, we present an automatic codegdevB# ion process from conceptual models. This process incorporates the use of desig patterns in OO-Method, an automated software production method, which is built on a formal object-oriented model called OASIS. Our approach defines a precisemapping between ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
In this work, we present an automatic codegdevB# ion process from conceptual models. This process incorporates the use of desig patterns in OO-Method, an automated software production method, which is built on a formal object-oriented model called OASIS. Our approach defines a precisemapping

Formal Modeling and Analysis of an Audio/Video Protocol: An Industrial . . .

by Kim G. Larsen, Kristian Lund, Klaus Havelund, Klaus Havelund, Arne Skou, Arne Skou, Kim Guldstrand Larsen , 1997
"... A formal and automatic verification of a real-life protocol is presented. The protocol, about 2800 lines of assembler code, has been used in products from the audio/video company Bang & Olufsen throughout more than a decade, and its purpose is to control the transmission of messages between a ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
A formal and automatic verification of a real-life protocol is presented. The protocol, about 2800 lines of assembler code, has been used in products from the audio/video company Bang & Olufsen throughout more than a decade, and its purpose is to control the transmission of messages between

Reasoning About Some Security Protocol Implementation Details revision 4

by Alfredo Pironti, Riccardo Sisto
"... Abstract. In formal methods, security protocols are usually modeled at a high level of abstraction. In particular, data encoding and decoding transformations are often abstracted away. However, in real applications, errors in these protocol components could be exploited to break protocol security. I ..."
Abstract - Add to MetaCart
/decoding operations, is implied to be secure too under the same intruder model. The paper also indicates possible exploitations of this result in the context of methods based on formal model extraction from implementation code and of methods based on automated code generation from formally verified models. 1

A Formalized Methodology for Constructing Safe Multiphase Protocols

by Robert J. Hilderman, Howard J. Hamilton
"... Communication protocols typically go through different phases, where each one performs a distinct function. Phases are implemented as layers (i.e., a protocol constructed on the OSI model) or as alternative functions (a protocol which can perform many functions, but is limited to performing one at a ..."
Abstract - Add to MetaCart
Communication protocols typically go through different phases, where each one performs a distinct function. Phases are implemented as layers (i.e., a protocol constructed on the OSI model) or as alternative functions (a protocol which can perform many functions, but is limited to performing one

Combined Static and Dynamic Automated Test Generation

by Sai Zhang, David Saff, Yingyi Bu, Michael D. Ernst
"... In an object-oriented program, a unit test often consists of a sequence of method calls that create and mutate objects, then use them as arguments to a method under test. It is challenging to automatically generate sequences that are legal and behaviorally-diverse, that is, reaching as many differen ..."
Abstract - Cited by 28 (7 self) - Add to MetaCart
different program states as possible. This paper proposes a combined static and dynamic automated test generation approach to address these problems, for code without a formal specification. Our approach first uses dynamic analysis to infer a call sequence model from a sample execution, then uses static

An Approach to Automatic Code Generation for Safety-Critical Systems

by Michael Whalen, Mats P. E. Heimdahl - Proceedings of the 14th IEEE International Conference on Automated Software Engineering , 1999
"... Automated translation, or code generation, of a formal requirements model to production code can alleviate many of the problems associated with design and implementation. In this report we outline the requirements of such code generation to obtain a high level of confidence in the correctness of th ..."
Abstract - Cited by 11 (1 self) - Add to MetaCart
Automated translation, or code generation, of a formal requirements model to production code can alleviate many of the problems associated with design and implementation. In this report we outline the requirements of such code generation to obtain a high level of confidence in the correctness
Next 10 →
Results 1 - 10 of 103
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University