Study about Application of Formal Methods in Consideration of Convenience by the Example of the Electric Pot

Size: px
Start display at page:

Download "Study about Application of Formal Methods in Consideration of Convenience by the Example of the Electric Pot"

Transcription

1 ,,, Study about Application of Formal Methods in Consideration of Convenience by the Example of the Electric Pot Abstract: It had been emphasized that formal methods in software development are verification techniques reducing risk to 0, such as mathematical proof model checking. However, modern software development accepts risks in order to achieve more complex functions shorter development period, which could not be achieved by conventional techniques. In this paper, we propose a method for efficient software development by changing the application intention of formal methods, depending on the risks. We analyzed risks on the requirements in a natural language for safety by the goal analysis, considered how to deal convenience in formal specification which often appears in the specification of end-user product. in particular it was subjected to risk assessment based on Specifically, for the example of buzz pot, consider the procedure for applying this method. Keywords: Formal method, Requirement Analysis, Specification Description, Pre-formal process 1. (Time To Market TTM) TTM 1 Faculty of Information Science Electrical Engineering, Kyushu Univ ersity c 2015 Information Processing Society of Japan 1

2 [3] [1] (safety). 2.1 Dependable Case ( 1 )... ( 2 )... ( 3 )... ( 4 )... [10] 3 4 1, 2 Dependable Case (D-Case) [8] D-Case D-Case Goal Structuring Notation (GSN) [5] (Goal) (Strategy) (Context) (Evidence) (Undeveloped) (Monitor) (External) D-Case D-Case c 2015 Information Processing Society of Japan 2

3 ( 1 ) Goal Rank ( 2 ) Root Cause Analysis (RCA) ( 3 ) RCA ( 4 ) ( 5 ) Rank ( 6 ) rank 2.2 Goal Oriented Analysis GSN GSN GSN [4][12] G G 1, G 2,... G n G G G P re G 1, G 2,... G n G P re = (G 1 G 2... G n G) (1) 1 Goal Rank ( dependability/tools/assurancecase/ ) 1 Goal Rank Goal Rank Rank 0 Goal Rank KAOS Liner Temporal Logic [11] 1 GSN [2] KAOS D-Case GSN Propositional Logic [7] 2.3 Functional Hazard Analysis FTA FMEA Root Cause Analysis RCA RCA [9] RCA c 2015 Information Processing Society of Japan 3

4 2.4 VDM D-Case 2.1 VDM++ VDM++ VDM [6] VDM 2.2 D-Case VDM D-Case VDM 3. (SESSAME: Society of Embedded Software Skill Acquisition for Managers Engineers) GOMA-1015 ( ) D-Case VDM++ [13] 3.1 D-Case 2 D-Case 2 2 don t care 3 POT-500: PID c 2015 Information Processing Society of Japan 4

5 3 c 2015 Information Processing Society of Japan 5

6 Goal Rank 2 Goal Rank VDM VDM++ VDM++ VDM VDM-SL OOA/OOD OOA/OOD 4 4 PID PID VDM++ ( 1 ) ( 2 ) ( 3 ) 5 VDM c 2015 Information Processing Society of Japan 6

7 5. D-Case D-Case GSN Goal Rank RCA Goal Rank Goal Rank Rank 0 Goal Rank - (GOMA-1015 ) 7 NPO (SESSAME) JSPS (S) c 2015 Information Processing Society of Japan 7

8 [1] Boehm, B. W. Basili, V. R.: Software Defect Reduction Top 10 List, IEEE Computer, Vol. 34, No. 1, pp (2001). [2] Denney, E., Pai, G. Whiteside, I.: Formal Foundations for Hierarchical Safety Cases, the 16th IEEE International Symposium on High Assurance Systems Engineering, pp (2015). [3] Jones, C. B.: Software Development based on Formal Methods, Proceedings of the CRAI Workshop on Software Factories Ada, LNCS, Vol. 275, Springer- Verlag, pp (1987). [4] Kelly, T. McDermid, J.: Safety case patterns-reusing successful arguments, Proceedings of IEE Colloquium on Understing Patterns Their Application to Systems Engineering, pp. 1 9 (1998). [5] Kelly, T. Weaver, R.: The Goal Structuring Notation A Safety Argument Notation, Proceedings of Dependable Systems Networks 2004 Workshop on A ssurance Cases (2004). [6] Larsen, P. G. Mukherjee, P. Plat, N. Verhoef, M. Fitzgerald, J. ( ) VDM++ (2010). [7] Matsuno, Y.: Design Implementation of GSN Patterns: A Step toward Assurance Case Language, Information Media Technologies, Vol. 9, No. 3, pp (2014). [8] Matsuno, Y., Nakazawa, J., Takeyama, M., Sugaya, M. Ishikawa, Y.: Toward a language for communication among stakeholders, Proceedings of the 16th IEEE Pacific Rim Inernational Symposium on Dependable Computing, pp (2010). [9] Reifer, D.: Software Failure Modes Effects Analysis, IEEE Transactions on Reliability, Vol. R-28, No. 3, pp (1979). [10] Sommerville, I.: Software Engineering, John Wiley & Sons (2010). [11] van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications, Wiley (2009). [12] Yamamoto, S. Matsuno, Y.: An evaluation of argument patterns to reduce pitfalls of applying assurance case, The 1st International Workshop on Assurance Cases for Software-Intensive Systems, pp (2013). [13] GOMA POT Specification.htm. class instance variables -- --nil private : [< > < > < > < >] := nil; nil private : [< > <> <>] := nil; nil private : [< > < > < >]; ON/OFF PID -- off private : < > < > < ONOFF > <PID >; -- public : := new (< >); public : := new (< >); public : := new (< >); -- --ON OFF -- off private : := new (<OFF>); -- ON -- OFF private : := new (<OFF>); -- private 1 : := new (<OFF>); private 2 : := new (<OFF>); private 3 : := new (<OFF>); private 4 : := new (<OFF>); private : seq1 of := [ 1, 2, 3, 4 ]; private : [< > < > <> <> < > < >] := < >; -- private : < > < > := < >; -- public : := new (); nil private : [< >] := < >; -- --nil private : < > < > < > := < >; inv if (. () = <OFF>) then ( = < >. = < >) -- else ( /* 2 */ /* */ ( = < > => forall s in set elems & s. () = <OFF>) ( = < > =>. () = <ON>) /**/ /* */ if(. () = <ON> <> < >) then(. = < >) /* */ elseif(forall s in set elems & s. () = <OFF> <> < >) then(. = < >) /**/ else(. = < >) ) /* */ ( <> < > =>. = < >) (( = < > or () = < > or. () = <OFF> or = < > or <> nil or <> < >) =>. = < >) /* */ (( = < >) => ( = < >)) -- public : () ==> () () == ( cases : < > ->( := < >; (< >) ), < > ->( := < >; (< >) ), < > ->( := < >; (< >) ), others -> := nil end;. (, ) ) pre. () = <ON>; 5 VDM++ c 2015 Information Processing Society of Japan 8

1.1 VDM VDM Java VDM Java JPF JPF VDM Java Java VDM 1.2 [3] [2] UML VDM++ VDM++ VDM [4]VDM VDM++ OOA/OOD VDM++ Fig. 1 1 VDM Structure of a VDM class S

1.1 VDM VDM Java VDM Java JPF JPF VDM Java Java VDM 1.2 [3] [2] UML VDM++ VDM++ VDM [4]VDM VDM++ OOA/OOD VDM++ Fig. 1 1 VDM Structure of a VDM class S VDM++ Java 1 1 1 1 VDM++ Java VDM++ JPF VDM++,,, A parctical approach of behavior verification to Java code that was automatically generated from VDM++ specification Abstract: Practical use of automatic

More information

D-Case Editor: A Typed Assurance Case Editor

D-Case Editor: A Typed Assurance Case Editor D-Case Editor: A Typed Assurance Case Editor Yutaka Matsuno The University of Tokyo, Japan JST, CREST matsu@cc.u-tokyo.ac.jp Abstract System assurance has become an important issue in many system domains,

More information

A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD)

A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD) A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD) Nada Olayan 1 and Shuichiro Yamamoto 2 1 Graduate School of Information Sciences, Nagoya University, Nagoya, Aichi,

More information

Parameterised Argument Structure for GSN Patterns

Parameterised Argument Structure for GSN Patterns Parameterised Argument Structure for GSN Patterns Yutaka Matsuno Information Technology Center The University of Tokyo, Japan JST, CREST matsu@cc.u-tokyo.ac.jp Kenji Taguchi National Institute of Advanced

More information

Safety Argument based on GSN for Automotive Control Systems. Yutaka Matsubara Nagoya University

Safety Argument based on GSN for Automotive Control Systems. Yutaka Matsubara Nagoya University 1 Safety Argument based on GSN for Automotive Control Systems Yutaka Matsubara Nagoya University yutaka@ertl.jp 02.26.2014 2 Agenda 1. Safety argument in ISO26262 2. Requirements related to safety argument

More information

IFAD. VDMTools Validated. Design through Modelling. Overview of VDM -SL/++ IFAD. IFAD A/S Forskerparken 10 DK-5230 Odense M Denmark.

IFAD. VDMTools Validated. Design through Modelling. Overview of VDM -SL/++ IFAD. IFAD A/S Forskerparken 10 DK-5230 Odense M Denmark. VDMTools Validated Design through Modelling Overview of VDM -SL/++ www.ifad.dk A/S Forskerparken 10 DK-5230 Odense M Denmark 1 VDM-SL ISO Standard 1996 for flat language Different module proposals A de-facto

More information

Adding Formal Requirements Modeling to SysML

Adding Formal Requirements Modeling to SysML Adding Formal Requirements Modeling to SysML Mark R. Blackburn www.markblackburn.com Abstract. This paper seeks to raise awareness on the SCR extensions derived from industry use, and discusses how an

More information

Seminar Software Quality and Safety

Seminar Software Quality and Safety Seminar Software Quality and Safety SCADE a model-driven Software Development Environment by Dominik Protte Software Engineering Group Universität Paderborn Motivation Many safety-critical components in

More information

Mobile Security Assurance through ArchiMate

Mobile Security Assurance through ArchiMate through ArchiMate Shuichiro Yamamoto and Nobuhide Kobayashi Nagoya University, Furo-cho Chikusa-ku, Nagoya Aichi 464-8601, Japan syamamoto@acm.org, nobuhide@dcinc.co.jp Abstract ArchiMate is used to describe

More information

GSN Metamodel. In the following subsections we describe the model elements. All references are to sections within the GSN Community Standard.

GSN Metamodel. In the following subsections we describe the model elements. All references are to sections within the GSN Community Standard. 1. Background GSN Metamodel This section defines a metamodel for representing structured arguments using GSN. GSN arguments should be instances of this GSN Metamodel. Instances of the GSN Metamodel are

More information

Weaving an Assurance Case from Design: A Model-Based Approach

Weaving an Assurance Case from Design: A Model-Based Approach Weaving an Assurance Case from Design: A Model-Based Approach Richard Hawkins, Ibrahim Habli, Dimitris Kolovos, Richard Paige, Tim Kelly Department of Computer Science The University of York York, UK {Richard.Hawkins,

More information

A Software Safety Argument Pattern Catalogue

A Software Safety Argument Pattern Catalogue A Software Safety Argument Pattern Catalogue R. Hawkins and T. Kelly {richard.hawkins\tim.kelly}@york.ac.uk Department of Computer Science The University of York Abstract This document presents a catalogue

More information

An Automatic Test Case Generator for Testing Safety-Critical Software Systems

An Automatic Test Case Generator for Testing Safety-Critical Software Systems An Automatic Test Case Generator for Testing Safety-Critical Software Systems Mehdi Malekzadeh Faculty of Computer Science and IT University of Malaya Kuala Lumpur, Malaysia mehdi_malekzadeh@perdana.um.edu.my

More information

Usually software system variants, developed by Clone-and-own approach, form

Usually software system variants, developed by Clone-and-own approach, form ABSTRACT Usually software system variants, developed by Clone-and-own approach, form a starting point for building Software Product Line. To migrate software systems which are deemed similar to a product

More information

Anthony Spiteri Staines. Department of Computer Information Systems, Faculty of ICT, University of Malta, Msida MSD 2080, Malta

Anthony Spiteri Staines. Department of Computer Information Systems, Faculty of ICT, University of Malta, Msida MSD 2080, Malta Representing System Processes using the Actor Model / Processor Net Anthony Spiteri Staines Department of Computer Information Systems, Faculty of ICT, University of Malta, Msida MSD 2080, Malta Abstract.

More information

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost? Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,

More information

Support for Safety Case Generation via Model Transformation

Support for Safety Case Generation via Model Transformation Support for Safety Case Generation via Model Transformation Chung-Ling Lin, Wuwei Shen Department of Computer Science Western Michigan University Kalamazoo, MI, USA {chung-ling.lin, wuwei.shen}@wmich.edu

More information

Formal Methods. CITS5501 Software Testing and Quality Assurance

Formal Methods. CITS5501 Software Testing and Quality Assurance Formal Methods CITS5501 Software Testing and Quality Assurance Pressman, R. Software Engineering: A Practitioner s Approach. Chapter 28. McGraw-Hill, 2005 The Science of Programming, David Gries, 1981

More information

SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND. Queensland 4072 Australia TECHNICAL REPORT

SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND. Queensland 4072 Australia TECHNICAL REPORT SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND Queensland 4072 Australia TECHNICAL REPORT No. 98-25 A Tutorial Introduction to Formal Methods Peter

More information

Safety Case Impact Assessment in Automotive Software Systems: An Improved Model-Based Approach

Safety Case Impact Assessment in Automotive Software Systems: An Improved Model-Based Approach Safety Case Impact Assessment in Automotive Software Systems: An Improved Model-Based Approach Sahar Kokaly 1(B), Rick Salay 2, Marsha Chechik 2,MarkLawford 1, and Tom Maibaum 1 1 McMaster Centre for Software

More information

Distributed Systems Programming (F21DS1) Formal Verification

Distributed Systems Programming (F21DS1) Formal Verification Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on

More information

Experience with Change-oriented SCM Tools

Experience with Change-oriented SCM Tools Experience with Change-oriented SCM Tools Ivica Crnkovic ABB Industrial Systems AB, 721 67 Västerås, Sweden E-mail: ivica@sw.seisy.abb.se Abstract. In the recent years two approaches in Software Configuration

More information

efmea RAISING EFFICIENCY OF FMEA BY MATRIX-BASED FUNCTION AND FAILURE NETWORKS

efmea RAISING EFFICIENCY OF FMEA BY MATRIX-BASED FUNCTION AND FAILURE NETWORKS efmea RAISING EFFICIENCY OF FMEA BY MATRIX-BASED FUNCTION AND FAILURE NETWORKS Maik Maurer Technische Universität München, Product Development, Boltzmannstr. 15, 85748 Garching, Germany. Email: maik.maurer@pe.mw.tum.de

More information

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.

More information

Evaluation of Commercial Web Engineering Processes

Evaluation of Commercial Web Engineering Processes Evaluation of Commercial Web Engineering Processes Andrew McDonald and Ray Welland Department of Computing Science, University of Glasgow, Glasgow, Scotland. G12 8QQ. {andrew, ray}@dcs.gla.ac.uk, http://www.dcs.gla.ac.uk/

More information

UML and the Cost of Defects

UML and the Cost of Defects UML and the of s Stephen J Mellor stephen_mellor@mentor.com It is common knowledge that software defects, especially in embedded systems, are expensive to repair; less well appreciated is just how very

More information

A Tool to Edit and Verify IoT System Architecture Model

A Tool to Edit and Verify IoT System Architecture Model A Tool to Edit and Verify IoT System Architecture Model Shinpei Ogata, Hiroyuki Nakagawa, Yoshitaka Aoki, Kazuki Kobayashi, Yuko Fukushima Shinshu University, Nagano, Japan Email: ogata@cs.shinshu-u.ac.jp,

More information

1. In waterfall model, output of one phase is input to next phase. True or false.

1. In waterfall model, output of one phase is input to next phase. True or false. 1. In waterfall model, output of one phase is input to next phase. True or false. a) True b) False ANSWER: a) True Comment: The output of requirement gathering is creation of URS (User requirement specification)

More information

XIV. The Requirements Specification Document (RSD)

XIV. The Requirements Specification Document (RSD) XIV. The Requirements Specification Document (RSD) What is a RSD? What to include/not include in a RSD? Attributes of a Well-Written RSD Organization of a RSD Sample Table of Contents An Example 2002 John

More information

Formal Methods for Software Engineers

Formal Methods for Software Engineers Formal Methods for Software Engineers Professor Ray Welland Department of Computing Science University of Glasgow ray@dcs.gla.ac.uk INF3120-FM 1 Overview Motivation Why have formal specifications? Where

More information

Flight Systems are Cyber-Physical Systems

Flight Systems are Cyber-Physical Systems Flight Systems are Cyber-Physical Systems Dr. Christopher Landauer Software Systems Analysis Department The Aerospace Corporation Computer Science Division / Software Engineering Subdivision 08 November

More information

Auto-Generating Test Sequences for Web Applications *

Auto-Generating Test Sequences for Web Applications * Auto-Generating Test Sequences for Web Applications * Hongwei Zeng and Huaikou Miao School of Computer Engineering and Science, Shanghai University, 200072, China zenghongwei@shu.edu.cn, hkmiao@shu.edu.cn

More information

Software Quality Starts with the Modelling of Goal-Oriented Requirements

Software Quality Starts with the Modelling of Goal-Oriented Requirements Software Quality Starts with the Modelling of Goal-Oriented Requirements Emmanuelle Delor, Robert Darimont CEDITI Avenue Georges Lemaître, 21 B-6041 Charleroi Belgium Phone : +32 (0) 71 25 94 04 Fax :

More information

Evidence-based Development coupling structured argumentation with requirements development.

Evidence-based Development coupling structured argumentation with requirements development. Evidence-based Development coupling structured argumentation with requirements development Jeremy.Dick@integrate.biz integrate 2012 based on paper Paper: EVIDENCE-BASED DEVELOPMENT COUPLING STRUCTURED

More information

! Use of formal notations. ! in software system descriptions. ! for a broad range of effects. ! and varying levels of use. !

! Use of formal notations. ! in software system descriptions. ! for a broad range of effects. ! and varying levels of use. ! What Are Formal Methods? David S. Rosenblum ICS 221 Winter 2001! Use of formal notations! first-order logic, state machines, etc.! in software system descriptions! system models, constraints, specifications,

More information

Software Engineering: Integration Requirements

Software Engineering: Integration Requirements Software Engineering: Integration Requirements AYAZ ISAZADEH Department of Computer Science Tabriz University Tabriz, IRAN Abstract: - This paper presents a discussion of software integration requirements,

More information

A DESIGN PROPOSAL FOR AN OBJECT ORIENTED ALGEBRAIC LIBRARY

A DESIGN PROPOSAL FOR AN OBJECT ORIENTED ALGEBRAIC LIBRARY STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume XLVIII, Number 1, 2003 A DESIGN PROPOSAL FOR AN OBJECT ORIENTED ALGEBRAIC LIBRARY VIRGINIA NICULESCU Abstract. Object oriented programming and design patterns

More information

A UML-based Methodology for Hypermedia Design

A UML-based Methodology for Hypermedia Design A UML-based Methodology for Hypermedia Design Rolf Hennicker, Nora Koch,2 Institute of Computer Science Ludwig-Maximilians University of Munich Oettingenstr. 67, D-80538 München, Germany {hennicke,kochn}@informatik.uni-muenchen.de

More information

GT HEURISTIC FOR SOLVING MULTI OBJECTIVE JOB SHOP SCHEDULING PROBLEMS

GT HEURISTIC FOR SOLVING MULTI OBJECTIVE JOB SHOP SCHEDULING PROBLEMS GT HEURISTIC FOR SOLVING MULTI OBJECTIVE JOB SHOP SCHEDULING PROBLEMS M. Chandrasekaran 1, D. Lakshmipathy 1 and P. Sriramya 2 1 Department of Mechanical Engineering, Vels University, Chennai, India 2

More information

Refinement of Safety-Related Hazards into Verifiable Code Assertions

Refinement of Safety-Related Hazards into Verifiable Code Assertions Refinement of Safety-Related Hazards into Verifiable Code Assertions Ken Wong 1 and Jeff Joyce 2 1 Department of Computer Science, University of British Columbia Vancouver, BC, Canada V6T 1Z4 tel (604)

More information

Real-Time Systems: An Introduction

Real-Time Systems: An Introduction Lecture (1) Real-Time Systems: An Introduction Prof. Kasim M. Al-Aubidy Computer Engineering Department Philadelphia University Summer Semester, 2011 Real-Time Systems Prof. Kasim Al-Aubidy Lecture Outline:

More information

Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification

Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification

More information

Summary of Contents LIST OF FIGURES LIST OF TABLES

Summary of Contents LIST OF FIGURES LIST OF TABLES Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter

More information

Requirements for editing 8D Reports

Requirements for editing 8D Reports Requirements for editing 8D Reports (jochen.keidel) (daniel.bihlmaier) Seite 1 von 8 Version Date Comment 1 15.11.2017 Translation into English Index 1 Guideline... 3 2 Content and form for processing

More information

Proposal of a Supporting Method for Diagrams Generation with the Transformation Rules in UML

Proposal of a Supporting Method for Diagrams Generation with the Transformation Rules in UML Proposal of a Supporting Method for Diagrams Generation with the Transformation Rules in UML Tetsuro Katayama Department of Computer Science and Systems Engineering, Faculty of Engineering, Miyazaki University

More information

Defining Classes and Methods

Defining Classes and Methods Defining Classes and Methods Chapter 5 Objects and References: Outline Variables of a Class Type Defining an equals Method for a Class Boolean-Valued Methods Parameters of a Class Type Variables of a Class

More information

USING TRANSFORMATIONS TO INTEGRATE TASK MODELS IN

USING TRANSFORMATIONS TO INTEGRATE TASK MODELS IN USING TRANSFORMATIONS TO INTEGRATE TASK MODELS IN THE UML Position Paper to the WTUML: Workshop on Transformations in UML ETAPS 2001 European Joint Conference on Theory and Practice of Software Nuno Jardim

More information

Automatic Fault Tree Derivation from Little-JIL Process Definitions

Automatic Fault Tree Derivation from Little-JIL Process Definitions Automatic Fault Tree Derivation from Little-JIL Process Definitions Bin Chen, George S. Avrunin, Lori A. Clarke, and Leon J. Osterweil Department of Computer Science, University of Massachusetts, Amherst,

More information

Static Analysis Techniques

Static Analysis Techniques oftware Design (F28SD2): Static Analysis Techniques 1 Software Design (F28SD2) Static Analysis Techniques Andrew Ireland School of Mathematical and Computer Science Heriot-Watt University Edinburgh oftware

More information

UML Specification and Correction of Object-Oriented Anti-patterns

UML Specification and Correction of Object-Oriented Anti-patterns UML Specification and Correction of Object-Oriented Anti-patterns Maria Teresa Llano and Rob Pooley School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh, United Kingdom {mtl4,rjpooley}@hwacuk

More information

A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems

A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems Sojan Markose, Xiaoqing

More information

Goal-Based Assessment for the Cybersecurity of Critical Infrastructure

Goal-Based Assessment for the Cybersecurity of Critical Infrastructure Goal-Based Assessment for the Cybersecurity of Critical Infrastructure IEEE HST 2010 November 10, 2010 NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator SOFTWARE

More information

Q Body of techniques supported by. R precise mathematics. R powerful analysis tools. Q Rigorous, effective mechanisms for system.

Q Body of techniques supported by. R precise mathematics. R powerful analysis tools. Q Rigorous, effective mechanisms for system. Introduction to Formal Methods 1 Introduction to Formal Methods 2 Formal Specification Requirements specification R notational statement of system services Software specification R formal abstract depiction

More information

Formal Foundations of Software Engineering

Formal Foundations of Software Engineering Formal Foundations of Software Engineering http://d3s.mff.cuni.cz Martin Nečaský Pavel Parízek CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics Goals of the course Show methods and tools

More information

Model-based segmentation and recognition from range data

Model-based segmentation and recognition from range data Model-based segmentation and recognition from range data Jan Boehm Institute for Photogrammetry Universität Stuttgart Germany Keywords: range image, segmentation, object recognition, CAD ABSTRACT This

More information

POSD - a notation for presenting complex systems of processes

POSD - a notation for presenting complex systems of processes POSD - a notation for presenting complex systems of processes Abstract Peter Henderson 1 and Graham D Pratten 2 Keywords: legacy systems, distributed systems, adaptability, process modelling, dataflow

More information

UML4COP: UML-based DSML for Context-Aware Systems

UML4COP: UML-based DSML for Context-Aware Systems UML4COP: UML-based DSML for Context-Aware Systems Naoyasu Ubayashi Kyushu University ubayashi@acm.org Yasutaka Kamei Kyushu University kamei@ait.kyushu-u.ac.jp Abstract Context-awareness plays an important

More information

Component Composition in Business and System Modeling

Component Composition in Business and System Modeling Stuart Kent *, Kevin Lano **, Juan Bicarregui **, Ali Hamie *, John Howse *1 * Division of Computing, University of Brighton, Lewes Rd., Brighton, UK. ** Department of Computing, Imperial College of Science

More information

A Generic Method for Defining Viewpoints in SysML

A Generic Method for Defining Viewpoints in SysML A Generic Method for Defining Viewpoints in SysML Takahiro Yamada Japan Aerospace Exploration Agency/Institute for Space and Astronautical Science 3-1-1 Yoshinodai, Sagamihara 229-8510, JAPAN Copyright

More information

A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process

A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process Vaise Patu, Shuichiro Yamamoto To cite this version: Vaise

More information

Mapping Software Product Line Features to Unmanned Aerial Vehicle Models

Mapping Software Product Line Features to Unmanned Aerial Vehicle Models Mapping Software Product Line Features to Unmanned Aerial Vehicle Models Vanderson H. Fragal, Edson A. Oliveira Junior, Itana M. S. Gimenes Informatics Department State University of Maringá Maringá-PR,

More information

Discrete Event Simulation and Petri net Modeling for Reliability Analysis

Discrete Event Simulation and Petri net Modeling for Reliability Analysis Discrete Event Simulation and Petri net Modeling for Reliability Analysis * Behrouz Safarinejadian Shiraz University of Technology, safarinejad@sutech.ac.ir Abstract. Analytical methods in reliability

More information

TIME-BASED CONSTRAINTS IN THE OBJECT CONSTRAINT LANGUAGE OCL

TIME-BASED CONSTRAINTS IN THE OBJECT CONSTRAINT LANGUAGE OCL TIME-BASED CONSTRAINTS IN THE OBJECT CONSTRAINT LANGUAGE OCL Ali Hamie, John Howse School of Computing, Mathematical and Information Sciences, University of Brighton, Brighton, UK. {a.a.hamie@brighton.ac.uk,

More information

The syntax of the OUN language

The syntax of the OUN language The syntax of the OUN language Olaf Owe Department of Informatics, University of Oslo, Norway February 21, 2002 Contents 1 The OUN language 1 1.1 Interface and contract definition.................. 2 1.2

More information

2012 Developments in Modular (Software) Safety Cases and Modular GSN

2012 Developments in Modular (Software) Safety Cases and Modular GSN 2012 Developments in Modular (Software) Safety Cases and Modular GSN John Carter General Dynamics on behalf of IAWG Agenda What is IAWG? System Wide Arguments Applicability Status of IAWG work and Standard

More information

Perspectives on User Story Based Visual Transformations

Perspectives on User Story Based Visual Transformations Perspectives on User Story Based Visual Transformations Yves Wautelet 1, Samedi Heng 2, and Manuel Kolp 2 1 KU Leuven, Belgium yves.wautelet@kuleuven.be, 2 LouRIM, Université catholique de Louvain, Belgium

More information

OCL Support in MOF Repositories

OCL Support in MOF Repositories OCL Support in MOF Repositories Joachim Hoessler, Michael Soden Department of Computer Science Technical University Berlin hoessler@cs.tu-berlin.de, soden@cs.tu-berlin.de Abstract From metamodels that

More information

The ProjectIT-RSL Language Overview

The ProjectIT-RSL Language Overview The ProjectIT-RSL Language Overview Carlos Videira 1, João Leonardo Carmo 2, Alberto Rodrigues da Silva 3 1 INESC-ID and Universidade Autónoma de Lisboa, Rua de Santa Marta, nº 56, 1169-023 Lisboa, Portugal

More information

Verification of a brick Wang tiling algorithm

Verification of a brick Wang tiling algorithm EPiC Series in Computing Volume 39, 2016, Pages 107 116 SCSS 2016. 7th International Symposium on Symbolic Computation in Software Science Verification of a brick Wang tiling algorithm Toshiaki Matsushima

More information

Search for Eulerian Recurrent Lengths by Using Constraint Solvers

Search for Eulerian Recurrent Lengths by Using Constraint Solvers Search for Eulerian Recurrent Lengths by Using onstraint Solvers Shuji JIMBO Graduate School of Natural Science and Technology, Okayama University jimbo-s@okayama-u.ac.jp Abstract The Eulerian recurrent

More information

Pattern-Based Architectural Design Process Model

Pattern-Based Architectural Design Process Model Pattern-Based Architectural Design Process Model N. Lévy, F. Losavio Abstract: The identification of quality requirements is crucial to develop modern software systems, especially when their underlying

More information

Graph Representation of Declarative Languages as a Variant of Future Formal Specification Language

Graph Representation of Declarative Languages as a Variant of Future Formal Specification Language Economy Informatics, vol. 9, no. 1/2009 13 Graph Representation of Declarative Languages as a Variant of Future Formal Specification Language Ian ORLOVSKI Technical University of Moldova, Chisinau, Moldova

More information

Dependability and Architecture: An HDCP Perspective

Dependability and Architecture: An HDCP Perspective Dependability and Architecture: An HDCP Perspective Bill Scherlis University ICSE Workshop on Architecting Dependable Systems May 2002 scherlis@cmu.edu Dependability and Architecture Dependability Reliance

More information

A Component-based Approach to Verified Software: What, Why, How and What Next?

A Component-based Approach to Verified Software: What, Why, How and What Next? A Component-based Approach to Verified Software: What, Why, How and What Next? Kung-Kiu Lau, Zheng Wang, Anduo Wang and Ming Gu School of Computer Science, The University of Manchester Manchester M13 9PL,

More information

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer

More information

MSc(IT) Program. MSc(IT) Program Educational Objectives (PEO):

MSc(IT) Program. MSc(IT) Program Educational Objectives (PEO): MSc(IT) Program Master of Science (Information Technology) is an intensive program designed for students who wish to pursue a professional career in Information Technology. The courses have been carefully

More information

COMP 763. Eugene Syriani. Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science. McGill University

COMP 763. Eugene Syriani. Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science. McGill University Eugene Syriani Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science McGill University 1 OVERVIEW In the context In Theory: Timed Automata The language: Definitions and Semantics

More information

Model-based GUI testing using Uppaal at NOVO Nordisk

Model-based GUI testing using Uppaal at NOVO Nordisk Model-based GUI testing using Uppaal at NOVO Nordisk Ulrik H. Hjort 2, Jacob Illum 1, Kim G. Larsen 1, Michael A. Petersen 2, and Arne Skou 1 1 Department of Computer Science, Aalborg University, Denmark

More information

A Semantics of Action Related Concepts in ODP Enterprise Language

A Semantics of Action Related Concepts in ODP Enterprise Language A Semantics of Action Related Concepts in ODP Enterprise Language Mohamed Bouhdadi, El Maati Chabbar, Youssef Balouki Abstract The Reference Model for Open Distributed Processing (RM-ODP) defines a framework

More information

model-driven development Separation of Concerns in Model-Driven Development

model-driven development Separation of Concerns in Model-Driven Development focus model-driven development Separation of Concerns in Model-Driven Development Vinay Kulkarni and Sreedhar Reddy, Tata Research Development and Design Centre To facilitate traceability, reuse, and evolution,

More information

Informing Assurance Case Review through a Formal Interpretation of GSN Core Logic

Informing Assurance Case Review through a Formal Interpretation of GSN Core Logic Informing Assurance Case Review through a Formal Interpretation of GSN Core Logic Victor Bandur and John McDermid University of York, UK Abstract. A formalization of a logical subset of Goal Structuring

More information

Modeling and Verification of Marine Equipment Systems Using a Model Checker

Modeling and Verification of Marine Equipment Systems Using a Model Checker Modeling and Verification of Marine Equipment Systems Using a Model Checker Shunsuke YAO Hiroaki AWANO Yasushi HIRAOKA Kazuko TAKAHASHI Abstract We discuss the modeling and verification of marine equipment

More information

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements Capturing and Formalizing SAF Availability Management Framework Configuration Requirements A. Gherbi, P. Salehi, F. Khendek and A. Hamou-Lhadj Electrical and Computer Engineering, Concordia University,

More information

A Novel Method for the Comparison of Graphical Data Models

A Novel Method for the Comparison of Graphical Data Models 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS DEVELOPMENT (ISD01 CROATIA) A Novel Method for the Comparison of Graphical Data Models Katarina Tomičić-Pupek University of Zagreb, Faculty of Organization

More information

A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs

A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs MACRo 2015-5 th International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs

More information

CURRICULUM VITAE. June, 2013

CURRICULUM VITAE. June, 2013 CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il

More information

Accreditation Process. Trusted Digital Identity Framework February 2018, version 1.0

Accreditation Process. Trusted Digital Identity Framework February 2018, version 1.0 Accreditation Process Trusted Digital Identity Framework February 2018, version 1.0 Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and

More information

SMT-LIB for HOL. Daniel Kroening Philipp Rümmer Georg Weissenbacher Oxford University Computing Laboratory. ITP Workshop MSR Cambridge 25 August 2009

SMT-LIB for HOL. Daniel Kroening Philipp Rümmer Georg Weissenbacher Oxford University Computing Laboratory. ITP Workshop MSR Cambridge 25 August 2009 1 / 13 SMT-LIB for HOL Daniel Kroening Philipp Rümmer Georg Weissenbacher Oxford University Computing Laboratory ITP Workshop MSR Cambridge 25 August 2009 2 / 13 The SMT-LIB Standard SMT Satisfiability

More information

Facilitating Consistency Check between Specification & Implementation with MapReduce Framework

Facilitating Consistency Check between Specification & Implementation with MapReduce Framework Facilitating Consistency Check between Specification & Implementation with MapReduce Framework Shigeru KUSAKABE, Yoichi OMORI, Keijiro ARAKI Kyushu University, Japan 2 Our expectation Light-weight formal

More information

Chapter 10 Formal Specification

Chapter 10 Formal Specification Chapter 10 Formal Specification Ian Sommerville 2000 Software Engineering, Chapter 10 Slide 1 Objectives To explain why formal specification helps discover problems in system requirements. To describe

More information

Testing Distributed Systems

Testing Distributed Systems Testing Distributed Systems Part I: Introduction to Model-Based Testing 2012-08-01 Jan Peleska and Wen-ling Huang University of Bremen {jp,huang}@informatik.uni-bremen.de Acknowledgements. This seminar

More information

A Template for an Assurance Case Shall Be Known as an Assurance Case Template

A Template for an Assurance Case Shall Be Known as an Assurance Case Template A Template for an Assurance Case Shall Be Known as an Assurance Case Template Alan Wassyng With lots of help if not always encouragement from: Tom Maibaum, Mark Lawford, Neeraj Singh, Paul Joannou VeriSure:

More information

New Approach for Modifying Blowfish Algorithm by Using Multiple Keys

New Approach for Modifying Blowfish Algorithm by Using Multiple Keys IJCSNS International Journal of Computer Science and Network Security, VOL. No.3, March 20 2 New Approach for Modifying Blowfish Algorithm by Using Multiple Keys Afaf M. Ali Al-Neaimi, Rehab F. Hassan

More information

A Verification Method for Software Safety Requirement by Combining Model Checking and FTA Congcong Chen1,a, Fuping Zeng1,b, Minyan Lu1,c

A Verification Method for Software Safety Requirement by Combining Model Checking and FTA Congcong Chen1,a, Fuping Zeng1,b, Minyan Lu1,c International Industrial Informatics and Computer Engineering Conference (IIICEC 2015) A Verification Method for Software Safety Requirement by Combining Model Checking and FTA Congcong Chen1,a, Fuping

More information

Lionel Devauchelle 1,Peter Gorm Larsen 2 and Henrik Voss 2. 2 IFAD (The Institute of Applied Computer Science), Forskerparken 10, DK-5230

Lionel Devauchelle 1,Peter Gorm Larsen 2 and Henrik Voss 2. 2 IFAD (The Institute of Applied Computer Science), Forskerparken 10, DK-5230 PICGAL: Practical use of Formal Specication to Develop a Complex Critical System Lionel Devauchelle 1,Peter Gorm Larsen 2 and Henrik Voss 2 1 AEROSPATIALE espace et defense, department SY/YI -BP 3 002,

More information

Lecture 11 Lecture 11 Nov 5, 2014

Lecture 11 Lecture 11 Nov 5, 2014 Formal Verification/Methods Lecture 11 Lecture 11 Nov 5, 2014 Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems to be analyzed, and

More information

The Fox Project: Advanced Development of Systems Software

The Fox Project: Advanced Development of Systems Software The Fox Project: Advanced Development of Systems Software R&D Status Report July 1 to September 30, 1999 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 19991222 022 This research

More information

PROOF OF THE COLLATZ CONJECTURE KURMET SULTAN. Almaty, Kazakhstan. ORCID ACKNOWLEDGMENTS

PROOF OF THE COLLATZ CONJECTURE KURMET SULTAN. Almaty, Kazakhstan.   ORCID ACKNOWLEDGMENTS PROOF OF THE COLLATZ CONJECTURE KURMET SULTAN Almaty, Kazakhstan E-mail: kurmet.sultan@gmail.com ORCID 0000-0002-7852-8994 ACKNOWLEDGMENTS 2 ABSTRACT This article contains a proof of the Collatz conjecture.

More information

Interdisciplinary Requirements Analysis Using the Model-based RM Tool AUTORAID

Interdisciplinary Requirements Analysis Using the Model-based RM Tool AUTORAID Interdisciplinary Requirements Analysis Using the Model-based RM Tool AUTORAID Eva Geisberger, Johannes Grünbauer, and Bernhard Schätz Technische Universität München, Institut für Informatik Boltzmannstr.

More information