• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 605
Next 10 →

Modular verification of software components in C

by Sagar Chaki, Edmund Clarke, Alex Groce, et al. - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 2003
"... We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software systems into subproblems of manageable complexity. The decomposition reflects the mo ..."
Abstract - Cited by 233 (23 self) - Add to MetaCart
We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software systems into subproblems of manageable complexity. The decomposition reflects

Conformance Checking of Service Behavior

by Wil M. P. van der Aalst, Marlon Dumas, Chun Ouyang, Anne Rozinat, Eric Verbeek
"... A service-oriented system is composed of independent software units, namely services, that interact with one another exclusively through message exchanges. The proper functioning of such system depends on whether or not each individual service behaves as the other services expect it to behave. Since ..."
Abstract - Cited by 33 (4 self) - Add to MetaCart
process model. We consider the case where the expected behavior is defined using the BPEL industry standard (Business Process Execution Language for Web Services). BPEL process definitions are translated into Petri nets and Petri net-based conformance checking techniques are applied to derive two

CONFORMANT PLANNING VIA MODEL CHECKING

by A. Cimatti, M. Roveri , 1999
"... Conformant planning is the problem of finding a sequence of actions that is guaranteed to achieve the goal for any possible initial state and nondeterministic behavior of the planning domain. In this paper we present a new approach to conformant planning. We propose an algorithm that returns the se ..."
Abstract - Cited by 51 (4 self) - Add to MetaCart
the set of all conformant plans of minimal length if the problem admits a solution, otherwise it returns with failure. Our work is based on the planning via model checking paradigm, and relies on symbolic techniques such as Binary Decision Diagrams to compactly represent and eciently analyze the planning

Automatic Modularity Conformance Checking

by Sunny Huynh, Yuanfang Cai, et al. - ICSE'08 , 2008
"... According to Parnas’s information hiding principle and Baldwin and Clark’s design rule theory, the key step to decomposing a system into modules is to determine the design rules (or in Parnas’s terms, interfaces) that decouple otherwise coupled design decisions and to hide decisions that are likely ..."
Abstract - Cited by 15 (7 self) - Add to MetaCart
to change in independent modules. Given a modular design, it is often difficult to determine whether and how its implementation realizes the designed modularity. Manually comparing code with abstract design is tedious and error-prone. We present an automated approach to check the conformance of implemented

Towards Robust Conformance Checking

by A. Adriansyah, B. F. Van Dongen
"... Summary. The growing complexity of processes in many organizations stimulates the adoption of business process management (BPM) techniques. Process models typically lie at the basis of these techniques and generally, the assumption is made that the operational business processes as they are taking p ..."
Abstract - Cited by 10 (5 self) - Add to MetaCart
place in practice conform to these models. However, recent experience has shown that this often isn’t the case. Therefore, the problem of checking to what extent the operational process conforms to the process model is increasingly important. In this paper, we present a robust approach to get insights

Sound and Precise Analysis of Web Applications for Injection Vulnerabilities

by Gary Wassermann, Zhendong Su - PLDI'07 , 2007
"... Web applications are popular targets of security attacks. One common type of such attacks is SQL injection, where an attacker exploits faulty application code to execute maliciously crafted database queries. Both static and dynamic approaches have been proposed to detect or prevent SQL injections; w ..."
Abstract - Cited by 161 (5 self) - Add to MetaCart
; while dynamic approaches provide protection for deployed software, static approaches can detect potential vulnerabilities before software deployment. Previous static approaches are mostly based on tainted information flow tracking and have at least some of the following limitations: (1) they do

Checking the Conformance between Models

by Duc-hanh Dang, Anh-hoang Truong, Martin Gogolla
"... Abstract: Narrowing the wide conceptual gap between problem and implementation domains is considered a significant factor within software engineering. Currently, such a relation is often obtained using mappings between metamodels for a structural semantics. This paper proposes an approach based on t ..."
Abstract - Add to MetaCart
Abstract: Narrowing the wide conceptual gap between problem and implementation domains is considered a significant factor within software engineering. Currently, such a relation is often obtained using mappings between metamodels for a structural semantics. This paper proposes an approach based

Logic-based Regulatory Conformance Checking

by Nikhil Dinesh, Aravind Joshi, Insup Lee, Oleg Sokolsky , 2007
"... In this paper, we describe an approach to formally assess whether an organization conforms to a body of regulation. Conformance is cast as a model checking question where the regulation is represented in a logic that is evaluated against an abstract model representing the operations of an organiza ..."
Abstract - Cited by 9 (7 self) - Add to MetaCart
In this paper, we describe an approach to formally assess whether an organization conforms to a body of regulation. Conformance is cast as a model checking question where the regulation is represented in a logic that is evaluated against an abstract model representing the operations

Distributed Process Discovery and Conformance Checking

by Wil M. P. van der Aalst
"... Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance checkin ..."
Abstract - Cited by 10 (6 self) - Add to MetaCart
Process mining techniques have matured over the last decade and more and more organization started to use this new technology. The two most important types of process mining are process discovery (i.e., learning a process model from example behavior recorded in an event log) and conformance

Heuristic Search + Symbolic Model Checking = Efficient Conformant Planning

by Piergiorgio Bertoli, Alessandro Cimatti, Marco Roveri , 2001
"... Planning in nondeterministic domains has gained more and more importance. Conformant planning is the problem of finding a sequential plan that guarantees the achievement of a goal regardless of the initial uncertainty and of nondeterministic action effects. In this paper, we present a new and ..."
Abstract - Cited by 48 (7 self) - Add to MetaCart
and efficient approach to conformant planning. The search paradigm, called heuristic-symbolic search, relies on a tight integration of symbolic techniques, based on the use of Binary Decision Diagrams, and heuristic search, driven by selection functions taking into account the degree of uncertainty
Next 10 →
Results 1 - 10 of 605
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University