SpinArt: A Spin-based Verifier for Artifact Systems
نویسندگان
چکیده
Data-driven workflows, of which IBM’s Business Artifacts are a prime exponent, have been successfully deployed in practice, adopted in industrial standards, and have spawned a rich body of research in academia, focused primarily on static analysis. In previous work, theoretical results were obtained on the verification of a rich model incorporating core elements of IBM’s successful GuardStage-Milestone (GSM) artifact model. The results showed decidability of verification of temporal properties of a large class of GSM workflows and established its complexity. Following up on these results, the present paper reports on the implementation of SpinArt, a practical verifier based on the classical modelchecking tool Spin. The implementation includes nontrivial optimizations and achieves good performance on real-world business process examples. Our results shed light on the capabilities and limitations of off-the-shelf verifiers in the context of data-driven workflows.
منابع مشابه
Practical Verification of Hierarchical Artifact Systems
Data-driven workflows, of which IBM’s Business Artifacts are a prime exponent, have been successfully deployed in practice, adopted in industrial standards, and have spawned a rich body of research in academia, focused primarily on static analysis. The present research bridges the gap between the theory and practice of artifact verification by studying the implementation of a full-fledged and e...
متن کاملVERIFAS: A Practical Verifier for Artifact Systems
Data-driven workflows, of which IBM’s Business Artifacts are a prime exponent, have been successfully deployed in practice, adopted in industrial standards, and have spawned a rich body of research in academia, focused primarily on static analysis. The present research bridges the gap between the theory and practice of artifact verification with VERIFAS, the first implementation of practical si...
متن کاملA partition-based algorithm for clustering large-scale software systems
Clustering techniques are used to extract the structure of software for understanding, maintaining, and refactoring. In the literature, most of the proposed approaches for software clustering are divided into hierarchical algorithms and search-based techniques. In the former, clustering is a process of merging (splitting) similar (non-similar) clusters. These techniques suffered from the drawba...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملEEG Artifact Removal System for Depression Using a Hybrid Denoising Approach
Introduction: Clinicians use several computer-aided diagnostic systems for depression to authorize their diagnosis. An electroencephalogram (EEG) may be used as an objective tool for early diagnosis of depression and controlling it from reaching a severe and permanent state. However, artifact contamination reduces the accuracy in EEG signal processing systems. Methods: This work proposes a no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017