Study about Application of Formal Methods in Consideration of Convenience by the Example of the Electric Pot
|
|
- Cora Weaver
- 6 years ago
- Views:
Transcription
1 ,,, Study about Application of Formal Methods in Consideration of Convenience by the Example of the Electric Pot Abstract: It had been emphasized that formal methods in software development are verification techniques reducing risk to 0, such as mathematical proof model checking. However, modern software development accepts risks in order to achieve more complex functions shorter development period, which could not be achieved by conventional techniques. In this paper, we propose a method for efficient software development by changing the application intention of formal methods, depending on the risks. We analyzed risks on the requirements in a natural language for safety by the goal analysis, considered how to deal convenience in formal specification which often appears in the specification of end-user product. in particular it was subjected to risk assessment based on Specifically, for the example of buzz pot, consider the procedure for applying this method. Keywords: Formal method, Requirement Analysis, Specification Description, Pre-formal process 1. (Time To Market TTM) TTM 1 Faculty of Information Science Electrical Engineering, Kyushu Univ ersity c 2015 Information Processing Society of Japan 1
2 [3] [1] (safety). 2.1 Dependable Case ( 1 )... ( 2 )... ( 3 )... ( 4 )... [10] 3 4 1, 2 Dependable Case (D-Case) [8] D-Case D-Case Goal Structuring Notation (GSN) [5] (Goal) (Strategy) (Context) (Evidence) (Undeveloped) (Monitor) (External) D-Case D-Case c 2015 Information Processing Society of Japan 2
3 ( 1 ) Goal Rank ( 2 ) Root Cause Analysis (RCA) ( 3 ) RCA ( 4 ) ( 5 ) Rank ( 6 ) rank 2.2 Goal Oriented Analysis GSN GSN GSN [4][12] G G 1, G 2,... G n G G G P re G 1, G 2,... G n G P re = (G 1 G 2... G n G) (1) 1 Goal Rank ( dependability/tools/assurancecase/ ) 1 Goal Rank Goal Rank Rank 0 Goal Rank KAOS Liner Temporal Logic [11] 1 GSN [2] KAOS D-Case GSN Propositional Logic [7] 2.3 Functional Hazard Analysis FTA FMEA Root Cause Analysis RCA RCA [9] RCA c 2015 Information Processing Society of Japan 3
4 2.4 VDM D-Case 2.1 VDM++ VDM++ VDM [6] VDM 2.2 D-Case VDM D-Case VDM 3. (SESSAME: Society of Embedded Software Skill Acquisition for Managers Engineers) GOMA-1015 ( ) D-Case VDM++ [13] 3.1 D-Case 2 D-Case 2 2 don t care 3 POT-500: PID c 2015 Information Processing Society of Japan 4
5 3 c 2015 Information Processing Society of Japan 5
6 Goal Rank 2 Goal Rank VDM VDM++ VDM++ VDM VDM-SL OOA/OOD OOA/OOD 4 4 PID PID VDM++ ( 1 ) ( 2 ) ( 3 ) 5 VDM c 2015 Information Processing Society of Japan 6
7 5. D-Case D-Case GSN Goal Rank RCA Goal Rank Goal Rank Rank 0 Goal Rank - (GOMA-1015 ) 7 NPO (SESSAME) JSPS (S) c 2015 Information Processing Society of Japan 7
8 [1] Boehm, B. W. Basili, V. R.: Software Defect Reduction Top 10 List, IEEE Computer, Vol. 34, No. 1, pp (2001). [2] Denney, E., Pai, G. Whiteside, I.: Formal Foundations for Hierarchical Safety Cases, the 16th IEEE International Symposium on High Assurance Systems Engineering, pp (2015). [3] Jones, C. B.: Software Development based on Formal Methods, Proceedings of the CRAI Workshop on Software Factories Ada, LNCS, Vol. 275, Springer- Verlag, pp (1987). [4] Kelly, T. McDermid, J.: Safety case patterns-reusing successful arguments, Proceedings of IEE Colloquium on Understing Patterns Their Application to Systems Engineering, pp. 1 9 (1998). [5] Kelly, T. Weaver, R.: The Goal Structuring Notation A Safety Argument Notation, Proceedings of Dependable Systems Networks 2004 Workshop on A ssurance Cases (2004). [6] Larsen, P. G. Mukherjee, P. Plat, N. Verhoef, M. Fitzgerald, J. ( ) VDM++ (2010). [7] Matsuno, Y.: Design Implementation of GSN Patterns: A Step toward Assurance Case Language, Information Media Technologies, Vol. 9, No. 3, pp (2014). [8] Matsuno, Y., Nakazawa, J., Takeyama, M., Sugaya, M. Ishikawa, Y.: Toward a language for communication among stakeholders, Proceedings of the 16th IEEE Pacific Rim Inernational Symposium on Dependable Computing, pp (2010). [9] Reifer, D.: Software Failure Modes Effects Analysis, IEEE Transactions on Reliability, Vol. R-28, No. 3, pp (1979). [10] Sommerville, I.: Software Engineering, John Wiley & Sons (2010). [11] van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications, Wiley (2009). [12] Yamamoto, S. Matsuno, Y.: An evaluation of argument patterns to reduce pitfalls of applying assurance case, The 1st International Workshop on Assurance Cases for Software-Intensive Systems, pp (2013). [13] GOMA POT Specification.htm. class instance variables -- --nil private : [< > < > < > < >] := nil; nil private : [< > <> <>] := nil; nil private : [< > < > < >]; ON/OFF PID -- off private : < > < > < ONOFF > <PID >; -- public : := new (< >); public : := new (< >); public : := new (< >); -- --ON OFF -- off private : := new (<OFF>); -- ON -- OFF private : := new (<OFF>); -- private 1 : := new (<OFF>); private 2 : := new (<OFF>); private 3 : := new (<OFF>); private 4 : := new (<OFF>); private : seq1 of := [ 1, 2, 3, 4 ]; private : [< > < > <> <> < > < >] := < >; -- private : < > < > := < >; -- public : := new (); nil private : [< >] := < >; -- --nil private : < > < > < > := < >; inv if (. () = <OFF>) then ( = < >. = < >) -- else ( /* 2 */ /* */ ( = < > => forall s in set elems & s. () = <OFF>) ( = < > =>. () = <ON>) /**/ /* */ if(. () = <ON> <> < >) then(. = < >) /* */ elseif(forall s in set elems & s. () = <OFF> <> < >) then(. = < >) /**/ else(. = < >) ) /* */ ( <> < > =>. = < >) (( = < > or () = < > or. () = <OFF> or = < > or <> nil or <> < >) =>. = < >) /* */ (( = < >) => ( = < >)) -- public : () ==> () () == ( cases : < > ->( := < >; (< >) ), < > ->( := < >; (< >) ), < > ->( := < >; (< >) ), others -> := nil end;. (, ) ) pre. () = <ON>; 5 VDM++ c 2015 Information Processing Society of Japan 8
1.1 VDM VDM Java VDM Java JPF JPF VDM Java Java VDM 1.2 [3] [2] UML VDM++ VDM++ VDM [4]VDM VDM++ OOA/OOD VDM++ Fig. 1 1 VDM Structure of a VDM class S
VDM++ Java 1 1 1 1 VDM++ Java VDM++ JPF VDM++,,, A parctical approach of behavior verification to Java code that was automatically generated from VDM++ specification Abstract: Practical use of automatic
More informationD-Case Editor: A Typed Assurance Case Editor
D-Case Editor: A Typed Assurance Case Editor Yutaka Matsuno The University of Tokyo, Japan JST, CREST matsu@cc.u-tokyo.ac.jp Abstract System assurance has become an important issue in many system domains,
More informationA Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD)
A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD) Nada Olayan 1 and Shuichiro Yamamoto 2 1 Graduate School of Information Sciences, Nagoya University, Nagoya, Aichi,
More informationParameterised Argument Structure for GSN Patterns
Parameterised Argument Structure for GSN Patterns Yutaka Matsuno Information Technology Center The University of Tokyo, Japan JST, CREST matsu@cc.u-tokyo.ac.jp Kenji Taguchi National Institute of Advanced
More informationSafety Argument based on GSN for Automotive Control Systems. Yutaka Matsubara Nagoya University
1 Safety Argument based on GSN for Automotive Control Systems Yutaka Matsubara Nagoya University yutaka@ertl.jp 02.26.2014 2 Agenda 1. Safety argument in ISO26262 2. Requirements related to safety argument
More informationIFAD. VDMTools Validated. Design through Modelling. Overview of VDM -SL/++ IFAD. IFAD A/S Forskerparken 10 DK-5230 Odense M Denmark.
VDMTools Validated Design through Modelling Overview of VDM -SL/++ www.ifad.dk A/S Forskerparken 10 DK-5230 Odense M Denmark 1 VDM-SL ISO Standard 1996 for flat language Different module proposals A de-facto
More informationAdding Formal Requirements Modeling to SysML
Adding Formal Requirements Modeling to SysML Mark R. Blackburn www.markblackburn.com Abstract. This paper seeks to raise awareness on the SCR extensions derived from industry use, and discusses how an
More informationSeminar Software Quality and Safety
Seminar Software Quality and Safety SCADE a model-driven Software Development Environment by Dominik Protte Software Engineering Group Universität Paderborn Motivation Many safety-critical components in
More informationMobile Security Assurance through ArchiMate
through ArchiMate Shuichiro Yamamoto and Nobuhide Kobayashi Nagoya University, Furo-cho Chikusa-ku, Nagoya Aichi 464-8601, Japan syamamoto@acm.org, nobuhide@dcinc.co.jp Abstract ArchiMate is used to describe
More informationGSN Metamodel. In the following subsections we describe the model elements. All references are to sections within the GSN Community Standard.
1. Background GSN Metamodel This section defines a metamodel for representing structured arguments using GSN. GSN arguments should be instances of this GSN Metamodel. Instances of the GSN Metamodel are
More informationWeaving an Assurance Case from Design: A Model-Based Approach
Weaving an Assurance Case from Design: A Model-Based Approach Richard Hawkins, Ibrahim Habli, Dimitris Kolovos, Richard Paige, Tim Kelly Department of Computer Science The University of York York, UK {Richard.Hawkins,
More informationA Software Safety Argument Pattern Catalogue
A Software Safety Argument Pattern Catalogue R. Hawkins and T. Kelly {richard.hawkins\tim.kelly}@york.ac.uk Department of Computer Science The University of York Abstract This document presents a catalogue
More informationAn Automatic Test Case Generator for Testing Safety-Critical Software Systems
An Automatic Test Case Generator for Testing Safety-Critical Software Systems Mehdi Malekzadeh Faculty of Computer Science and IT University of Malaya Kuala Lumpur, Malaysia mehdi_malekzadeh@perdana.um.edu.my
More informationUsually software system variants, developed by Clone-and-own approach, form
ABSTRACT Usually software system variants, developed by Clone-and-own approach, form a starting point for building Software Product Line. To migrate software systems which are deemed similar to a product
More informationAnthony Spiteri Staines. Department of Computer Information Systems, Faculty of ICT, University of Malta, Msida MSD 2080, Malta
Representing System Processes using the Actor Model / Processor Net Anthony Spiteri Staines Department of Computer Information Systems, Faculty of ICT, University of Malta, Msida MSD 2080, Malta Abstract.
More informationDeriving safety requirements according to ISO for complex systems: How to avoid getting lost?
Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,
More informationSupport for Safety Case Generation via Model Transformation
Support for Safety Case Generation via Model Transformation Chung-Ling Lin, Wuwei Shen Department of Computer Science Western Michigan University Kalamazoo, MI, USA {chung-ling.lin, wuwei.shen}@wmich.edu
More informationFormal Methods. CITS5501 Software Testing and Quality Assurance
Formal Methods CITS5501 Software Testing and Quality Assurance Pressman, R. Software Engineering: A Practitioner s Approach. Chapter 28. McGraw-Hill, 2005 The Science of Programming, David Gries, 1981
More informationSOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND. Queensland 4072 Australia TECHNICAL REPORT
SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND Queensland 4072 Australia TECHNICAL REPORT No. 98-25 A Tutorial Introduction to Formal Methods Peter
More informationSafety Case Impact Assessment in Automotive Software Systems: An Improved Model-Based Approach
Safety Case Impact Assessment in Automotive Software Systems: An Improved Model-Based Approach Sahar Kokaly 1(B), Rick Salay 2, Marsha Chechik 2,MarkLawford 1, and Tom Maibaum 1 1 McMaster Centre for Software
More informationDistributed Systems Programming (F21DS1) Formal Verification
Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on
More informationExperience with Change-oriented SCM Tools
Experience with Change-oriented SCM Tools Ivica Crnkovic ABB Industrial Systems AB, 721 67 Västerås, Sweden E-mail: ivica@sw.seisy.abb.se Abstract. In the recent years two approaches in Software Configuration
More informationefmea RAISING EFFICIENCY OF FMEA BY MATRIX-BASED FUNCTION AND FAILURE NETWORKS
efmea RAISING EFFICIENCY OF FMEA BY MATRIX-BASED FUNCTION AND FAILURE NETWORKS Maik Maurer Technische Universität München, Product Development, Boltzmannstr. 15, 85748 Garching, Germany. Email: maik.maurer@pe.mw.tum.de
More informationTest and Evaluation of Autonomous Systems in a Model Based Engineering Context
Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.
More informationEvaluation of Commercial Web Engineering Processes
Evaluation of Commercial Web Engineering Processes Andrew McDonald and Ray Welland Department of Computing Science, University of Glasgow, Glasgow, Scotland. G12 8QQ. {andrew, ray}@dcs.gla.ac.uk, http://www.dcs.gla.ac.uk/
More informationUML and the Cost of Defects
UML and the of s Stephen J Mellor stephen_mellor@mentor.com It is common knowledge that software defects, especially in embedded systems, are expensive to repair; less well appreciated is just how very
More informationA Tool to Edit and Verify IoT System Architecture Model
A Tool to Edit and Verify IoT System Architecture Model Shinpei Ogata, Hiroyuki Nakagawa, Yoshitaka Aoki, Kazuki Kobayashi, Yuko Fukushima Shinshu University, Nagano, Japan Email: ogata@cs.shinshu-u.ac.jp,
More information1. In waterfall model, output of one phase is input to next phase. True or false.
1. In waterfall model, output of one phase is input to next phase. True or false. a) True b) False ANSWER: a) True Comment: The output of requirement gathering is creation of URS (User requirement specification)
More informationXIV. The Requirements Specification Document (RSD)
XIV. The Requirements Specification Document (RSD) What is a RSD? What to include/not include in a RSD? Attributes of a Well-Written RSD Organization of a RSD Sample Table of Contents An Example 2002 John
More informationFormal Methods for Software Engineers
Formal Methods for Software Engineers Professor Ray Welland Department of Computing Science University of Glasgow ray@dcs.gla.ac.uk INF3120-FM 1 Overview Motivation Why have formal specifications? Where
More informationFlight Systems are Cyber-Physical Systems
Flight Systems are Cyber-Physical Systems Dr. Christopher Landauer Software Systems Analysis Department The Aerospace Corporation Computer Science Division / Software Engineering Subdivision 08 November
More informationAuto-Generating Test Sequences for Web Applications *
Auto-Generating Test Sequences for Web Applications * Hongwei Zeng and Huaikou Miao School of Computer Engineering and Science, Shanghai University, 200072, China zenghongwei@shu.edu.cn, hkmiao@shu.edu.cn
More informationSoftware Quality Starts with the Modelling of Goal-Oriented Requirements
Software Quality Starts with the Modelling of Goal-Oriented Requirements Emmanuelle Delor, Robert Darimont CEDITI Avenue Georges Lemaître, 21 B-6041 Charleroi Belgium Phone : +32 (0) 71 25 94 04 Fax :
More informationEvidence-based Development coupling structured argumentation with requirements development.
Evidence-based Development coupling structured argumentation with requirements development Jeremy.Dick@integrate.biz integrate 2012 based on paper Paper: EVIDENCE-BASED DEVELOPMENT COUPLING STRUCTURED
More information! Use of formal notations. ! in software system descriptions. ! for a broad range of effects. ! and varying levels of use. !
What Are Formal Methods? David S. Rosenblum ICS 221 Winter 2001! Use of formal notations! first-order logic, state machines, etc.! in software system descriptions! system models, constraints, specifications,
More informationSoftware Engineering: Integration Requirements
Software Engineering: Integration Requirements AYAZ ISAZADEH Department of Computer Science Tabriz University Tabriz, IRAN Abstract: - This paper presents a discussion of software integration requirements,
More informationA DESIGN PROPOSAL FOR AN OBJECT ORIENTED ALGEBRAIC LIBRARY
STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume XLVIII, Number 1, 2003 A DESIGN PROPOSAL FOR AN OBJECT ORIENTED ALGEBRAIC LIBRARY VIRGINIA NICULESCU Abstract. Object oriented programming and design patterns
More informationA UML-based Methodology for Hypermedia Design
A UML-based Methodology for Hypermedia Design Rolf Hennicker, Nora Koch,2 Institute of Computer Science Ludwig-Maximilians University of Munich Oettingenstr. 67, D-80538 München, Germany {hennicke,kochn}@informatik.uni-muenchen.de
More informationGT HEURISTIC FOR SOLVING MULTI OBJECTIVE JOB SHOP SCHEDULING PROBLEMS
GT HEURISTIC FOR SOLVING MULTI OBJECTIVE JOB SHOP SCHEDULING PROBLEMS M. Chandrasekaran 1, D. Lakshmipathy 1 and P. Sriramya 2 1 Department of Mechanical Engineering, Vels University, Chennai, India 2
More informationRefinement of Safety-Related Hazards into Verifiable Code Assertions
Refinement of Safety-Related Hazards into Verifiable Code Assertions Ken Wong 1 and Jeff Joyce 2 1 Department of Computer Science, University of British Columbia Vancouver, BC, Canada V6T 1Z4 tel (604)
More informationReal-Time Systems: An Introduction
Lecture (1) Real-Time Systems: An Introduction Prof. Kasim M. Al-Aubidy Computer Engineering Department Philadelphia University Summer Semester, 2011 Real-Time Systems Prof. Kasim Al-Aubidy Lecture Outline:
More informationQualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Qualitative Analysis of WorkFlow nets using Linear Logic: Soundness Verification
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationRequirements for editing 8D Reports
Requirements for editing 8D Reports (jochen.keidel) (daniel.bihlmaier) Seite 1 von 8 Version Date Comment 1 15.11.2017 Translation into English Index 1 Guideline... 3 2 Content and form for processing
More informationProposal of a Supporting Method for Diagrams Generation with the Transformation Rules in UML
Proposal of a Supporting Method for Diagrams Generation with the Transformation Rules in UML Tetsuro Katayama Department of Computer Science and Systems Engineering, Faculty of Engineering, Miyazaki University
More informationDefining Classes and Methods
Defining Classes and Methods Chapter 5 Objects and References: Outline Variables of a Class Type Defining an equals Method for a Class Boolean-Valued Methods Parameters of a Class Type Variables of a Class
More informationUSING TRANSFORMATIONS TO INTEGRATE TASK MODELS IN
USING TRANSFORMATIONS TO INTEGRATE TASK MODELS IN THE UML Position Paper to the WTUML: Workshop on Transformations in UML ETAPS 2001 European Joint Conference on Theory and Practice of Software Nuno Jardim
More informationAutomatic Fault Tree Derivation from Little-JIL Process Definitions
Automatic Fault Tree Derivation from Little-JIL Process Definitions Bin Chen, George S. Avrunin, Lori A. Clarke, and Leon J. Osterweil Department of Computer Science, University of Massachusetts, Amherst,
More informationStatic Analysis Techniques
oftware Design (F28SD2): Static Analysis Techniques 1 Software Design (F28SD2) Static Analysis Techniques Andrew Ireland School of Mathematical and Computer Science Heriot-Watt University Edinburgh oftware
More informationUML Specification and Correction of Object-Oriented Anti-patterns
UML Specification and Correction of Object-Oriented Anti-patterns Maria Teresa Llano and Rob Pooley School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh, United Kingdom {mtl4,rjpooley}@hwacuk
More informationA Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems Sojan Markose, Xiaoqing
More informationGoal-Based Assessment for the Cybersecurity of Critical Infrastructure
Goal-Based Assessment for the Cybersecurity of Critical Infrastructure IEEE HST 2010 November 10, 2010 NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator SOFTWARE
More informationQ Body of techniques supported by. R precise mathematics. R powerful analysis tools. Q Rigorous, effective mechanisms for system.
Introduction to Formal Methods 1 Introduction to Formal Methods 2 Formal Specification Requirements specification R notational statement of system services Software specification R formal abstract depiction
More informationFormal Foundations of Software Engineering
Formal Foundations of Software Engineering http://d3s.mff.cuni.cz Martin Nečaský Pavel Parízek CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics Goals of the course Show methods and tools
More informationModel-based segmentation and recognition from range data
Model-based segmentation and recognition from range data Jan Boehm Institute for Photogrammetry Universität Stuttgart Germany Keywords: range image, segmentation, object recognition, CAD ABSTRACT This
More informationPOSD - a notation for presenting complex systems of processes
POSD - a notation for presenting complex systems of processes Abstract Peter Henderson 1 and Graham D Pratten 2 Keywords: legacy systems, distributed systems, adaptability, process modelling, dataflow
More informationUML4COP: UML-based DSML for Context-Aware Systems
UML4COP: UML-based DSML for Context-Aware Systems Naoyasu Ubayashi Kyushu University ubayashi@acm.org Yasutaka Kamei Kyushu University kamei@ait.kyushu-u.ac.jp Abstract Context-awareness plays an important
More informationComponent Composition in Business and System Modeling
Stuart Kent *, Kevin Lano **, Juan Bicarregui **, Ali Hamie *, John Howse *1 * Division of Computing, University of Brighton, Lewes Rd., Brighton, UK. ** Department of Computing, Imperial College of Science
More informationA Generic Method for Defining Viewpoints in SysML
A Generic Method for Defining Viewpoints in SysML Takahiro Yamada Japan Aerospace Exploration Agency/Institute for Space and Astronautical Science 3-1-1 Yoshinodai, Sagamihara 229-8510, JAPAN Copyright
More informationA New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process Vaise Patu, Shuichiro Yamamoto To cite this version: Vaise
More informationMapping Software Product Line Features to Unmanned Aerial Vehicle Models
Mapping Software Product Line Features to Unmanned Aerial Vehicle Models Vanderson H. Fragal, Edson A. Oliveira Junior, Itana M. S. Gimenes Informatics Department State University of Maringá Maringá-PR,
More informationDiscrete Event Simulation and Petri net Modeling for Reliability Analysis
Discrete Event Simulation and Petri net Modeling for Reliability Analysis * Behrouz Safarinejadian Shiraz University of Technology, safarinejad@sutech.ac.ir Abstract. Analytical methods in reliability
More informationTIME-BASED CONSTRAINTS IN THE OBJECT CONSTRAINT LANGUAGE OCL
TIME-BASED CONSTRAINTS IN THE OBJECT CONSTRAINT LANGUAGE OCL Ali Hamie, John Howse School of Computing, Mathematical and Information Sciences, University of Brighton, Brighton, UK. {a.a.hamie@brighton.ac.uk,
More informationThe syntax of the OUN language
The syntax of the OUN language Olaf Owe Department of Informatics, University of Oslo, Norway February 21, 2002 Contents 1 The OUN language 1 1.1 Interface and contract definition.................. 2 1.2
More information2012 Developments in Modular (Software) Safety Cases and Modular GSN
2012 Developments in Modular (Software) Safety Cases and Modular GSN John Carter General Dynamics on behalf of IAWG Agenda What is IAWG? System Wide Arguments Applicability Status of IAWG work and Standard
More informationPerspectives on User Story Based Visual Transformations
Perspectives on User Story Based Visual Transformations Yves Wautelet 1, Samedi Heng 2, and Manuel Kolp 2 1 KU Leuven, Belgium yves.wautelet@kuleuven.be, 2 LouRIM, Université catholique de Louvain, Belgium
More informationOCL Support in MOF Repositories
OCL Support in MOF Repositories Joachim Hoessler, Michael Soden Department of Computer Science Technical University Berlin hoessler@cs.tu-berlin.de, soden@cs.tu-berlin.de Abstract From metamodels that
More informationThe ProjectIT-RSL Language Overview
The ProjectIT-RSL Language Overview Carlos Videira 1, João Leonardo Carmo 2, Alberto Rodrigues da Silva 3 1 INESC-ID and Universidade Autónoma de Lisboa, Rua de Santa Marta, nº 56, 1169-023 Lisboa, Portugal
More informationVerification of a brick Wang tiling algorithm
EPiC Series in Computing Volume 39, 2016, Pages 107 116 SCSS 2016. 7th International Symposium on Symbolic Computation in Software Science Verification of a brick Wang tiling algorithm Toshiaki Matsushima
More informationSearch for Eulerian Recurrent Lengths by Using Constraint Solvers
Search for Eulerian Recurrent Lengths by Using onstraint Solvers Shuji JIMBO Graduate School of Natural Science and Technology, Okayama University jimbo-s@okayama-u.ac.jp Abstract The Eulerian recurrent
More informationPattern-Based Architectural Design Process Model
Pattern-Based Architectural Design Process Model N. Lévy, F. Losavio Abstract: The identification of quality requirements is crucial to develop modern software systems, especially when their underlying
More informationGraph Representation of Declarative Languages as a Variant of Future Formal Specification Language
Economy Informatics, vol. 9, no. 1/2009 13 Graph Representation of Declarative Languages as a Variant of Future Formal Specification Language Ian ORLOVSKI Technical University of Moldova, Chisinau, Moldova
More informationDependability and Architecture: An HDCP Perspective
Dependability and Architecture: An HDCP Perspective Bill Scherlis University ICSE Workshop on Architecting Dependable Systems May 2002 scherlis@cmu.edu Dependability and Architecture Dependability Reliance
More informationA Component-based Approach to Verified Software: What, Why, How and What Next?
A Component-based Approach to Verified Software: What, Why, How and What Next? Kung-Kiu Lau, Zheng Wang, Anduo Wang and Ming Gu School of Computer Science, The University of Manchester Manchester M13 9PL,
More informationCertified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team
Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer
More informationMSc(IT) Program. MSc(IT) Program Educational Objectives (PEO):
MSc(IT) Program Master of Science (Information Technology) is an intensive program designed for students who wish to pursue a professional career in Information Technology. The courses have been carefully
More informationCOMP 763. Eugene Syriani. Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science. McGill University
Eugene Syriani Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science McGill University 1 OVERVIEW In the context In Theory: Timed Automata The language: Definitions and Semantics
More informationModel-based GUI testing using Uppaal at NOVO Nordisk
Model-based GUI testing using Uppaal at NOVO Nordisk Ulrik H. Hjort 2, Jacob Illum 1, Kim G. Larsen 1, Michael A. Petersen 2, and Arne Skou 1 1 Department of Computer Science, Aalborg University, Denmark
More informationA Semantics of Action Related Concepts in ODP Enterprise Language
A Semantics of Action Related Concepts in ODP Enterprise Language Mohamed Bouhdadi, El Maati Chabbar, Youssef Balouki Abstract The Reference Model for Open Distributed Processing (RM-ODP) defines a framework
More informationmodel-driven development Separation of Concerns in Model-Driven Development
focus model-driven development Separation of Concerns in Model-Driven Development Vinay Kulkarni and Sreedhar Reddy, Tata Research Development and Design Centre To facilitate traceability, reuse, and evolution,
More informationInforming Assurance Case Review through a Formal Interpretation of GSN Core Logic
Informing Assurance Case Review through a Formal Interpretation of GSN Core Logic Victor Bandur and John McDermid University of York, UK Abstract. A formalization of a logical subset of Goal Structuring
More informationModeling and Verification of Marine Equipment Systems Using a Model Checker
Modeling and Verification of Marine Equipment Systems Using a Model Checker Shunsuke YAO Hiroaki AWANO Yasushi HIRAOKA Kazuko TAKAHASHI Abstract We discuss the modeling and verification of marine equipment
More informationCapturing and Formalizing SAF Availability Management Framework Configuration Requirements
Capturing and Formalizing SAF Availability Management Framework Configuration Requirements A. Gherbi, P. Salehi, F. Khendek and A. Hamou-Lhadj Electrical and Computer Engineering, Concordia University,
More informationA Novel Method for the Comparison of Graphical Data Models
3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS DEVELOPMENT (ISD01 CROATIA) A Novel Method for the Comparison of Graphical Data Models Katarina Tomičić-Pupek University of Zagreb, Faculty of Organization
More informationA Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs
MACRo 2015-5 th International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs
More informationCURRICULUM VITAE. June, 2013
CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il
More informationAccreditation Process. Trusted Digital Identity Framework February 2018, version 1.0
Accreditation Process Trusted Digital Identity Framework February 2018, version 1.0 Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and
More informationSMT-LIB for HOL. Daniel Kroening Philipp Rümmer Georg Weissenbacher Oxford University Computing Laboratory. ITP Workshop MSR Cambridge 25 August 2009
1 / 13 SMT-LIB for HOL Daniel Kroening Philipp Rümmer Georg Weissenbacher Oxford University Computing Laboratory ITP Workshop MSR Cambridge 25 August 2009 2 / 13 The SMT-LIB Standard SMT Satisfiability
More informationFacilitating Consistency Check between Specification & Implementation with MapReduce Framework
Facilitating Consistency Check between Specification & Implementation with MapReduce Framework Shigeru KUSAKABE, Yoichi OMORI, Keijiro ARAKI Kyushu University, Japan 2 Our expectation Light-weight formal
More informationChapter 10 Formal Specification
Chapter 10 Formal Specification Ian Sommerville 2000 Software Engineering, Chapter 10 Slide 1 Objectives To explain why formal specification helps discover problems in system requirements. To describe
More informationTesting Distributed Systems
Testing Distributed Systems Part I: Introduction to Model-Based Testing 2012-08-01 Jan Peleska and Wen-ling Huang University of Bremen {jp,huang}@informatik.uni-bremen.de Acknowledgements. This seminar
More informationA Template for an Assurance Case Shall Be Known as an Assurance Case Template
A Template for an Assurance Case Shall Be Known as an Assurance Case Template Alan Wassyng With lots of help if not always encouragement from: Tom Maibaum, Mark Lawford, Neeraj Singh, Paul Joannou VeriSure:
More informationNew Approach for Modifying Blowfish Algorithm by Using Multiple Keys
IJCSNS International Journal of Computer Science and Network Security, VOL. No.3, March 20 2 New Approach for Modifying Blowfish Algorithm by Using Multiple Keys Afaf M. Ali Al-Neaimi, Rehab F. Hassan
More informationA Verification Method for Software Safety Requirement by Combining Model Checking and FTA Congcong Chen1,a, Fuping Zeng1,b, Minyan Lu1,c
International Industrial Informatics and Computer Engineering Conference (IIICEC 2015) A Verification Method for Software Safety Requirement by Combining Model Checking and FTA Congcong Chen1,a, Fuping
More informationLionel Devauchelle 1,Peter Gorm Larsen 2 and Henrik Voss 2. 2 IFAD (The Institute of Applied Computer Science), Forskerparken 10, DK-5230
PICGAL: Practical use of Formal Specication to Develop a Complex Critical System Lionel Devauchelle 1,Peter Gorm Larsen 2 and Henrik Voss 2 1 AEROSPATIALE espace et defense, department SY/YI -BP 3 002,
More informationLecture 11 Lecture 11 Nov 5, 2014
Formal Verification/Methods Lecture 11 Lecture 11 Nov 5, 2014 Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems to be analyzed, and
More informationThe Fox Project: Advanced Development of Systems Software
The Fox Project: Advanced Development of Systems Software R&D Status Report July 1 to September 30, 1999 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 19991222 022 This research
More informationPROOF OF THE COLLATZ CONJECTURE KURMET SULTAN. Almaty, Kazakhstan. ORCID ACKNOWLEDGMENTS
PROOF OF THE COLLATZ CONJECTURE KURMET SULTAN Almaty, Kazakhstan E-mail: kurmet.sultan@gmail.com ORCID 0000-0002-7852-8994 ACKNOWLEDGMENTS 2 ABSTRACT This article contains a proof of the Collatz conjecture.
More informationInterdisciplinary Requirements Analysis Using the Model-based RM Tool AUTORAID
Interdisciplinary Requirements Analysis Using the Model-based RM Tool AUTORAID Eva Geisberger, Johannes Grünbauer, and Bernhard Schätz Technische Universität München, Institut für Informatik Boltzmannstr.
More information