نتایج جستجو برای: verification rules generation

تعداد نتایج: 543340  

2003
Ralph D. Jeffords Constance L. Heitmeyer

This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker or a theorem prover, uses known state invariants to prove state and transition invariants. Two proof rules are presented: a standard incremental proof rule analogous to Manna and Pnueli’s incremental proof rule and a c...

2017
Seyed Morteza Babamir Mehdi Borhani Dehkordi

Verification of real time software is facing two problems: (1) how we should manage to produce verification rules and (2) how we should apply the rules to specify the problem. In this chapter we provide a method by which we get down to these two problems. In the first step, we specify real time software using Timed Automata and then we state it in RTL, real time logic, propositions. Timed Autom...

2006
Ursula Martin Erik Arne Mathiesen Paulo Oliva

We present an abstraction of Hoare logic to traced symmetric monoidal categories, a very general framework for the theory of systems. We first identify a particular class of functors – which we call ‘verification functors’ – between traced symmetric monoidal categories and subcategories of Preord (the category of preordered sets and monotone mappings). We then give an abstract definition of Hoa...

2014
Magdalena Kacprzak Anna Sawicka Katarzyna Budzynska Marcin Dziubinski

The aim of the paper is to consider a game-theoretic properties of strategies available to players in dialogue games. We treat speech acts formulated in a dialogue as moves in a dialogue game and rules for their appropriateness as rules of this game. We would like to analyze dialogical systems as a Nash-style games, and explore verification possibilities for some properties of such games e.g. d...

2006
Suzana Andova Jos C. M. Baeten Tim A. C. Willemse

We consider abstraction in probabilistic process algebra. The process algebra can be employed for specifying processes that exhibit both probabilistic and non-deterministic choices in their behaviour. We give a set of axioms that completely axiomatises the branching bisimulation for the strictly alternating probabilistic graph model. In addition, several recursive verification rules are identif...

2009
Kyungmin Bae Peter Csaba Ölveczky Thomas Huining Feng Stavros Tripakis

This paper shows how Ptolemy II discrete-event (DE) models can be formally analyzed using Real-Time Maude. We formalize in RealTime Maude the semantics of a subset of hierarchical Ptolemy II DE models, and explain how the code generation infrastructure of Ptolemy II has been used to automatically synthesize a Real-Time Maude verification model from a Ptolemy II design model. This enables a mode...

Journal: :IEICE Electronic Express 2011
Kyung Won Kim Jae Joon Park Sungroh Yoon Seong-Jun Oh

In order to reflect a realistic wireless channel as closely as possible, the channel model becomes very complicated and is thus prone to error when implemented as a channel simulator. However, there is no rigorous way of verifying the implementation of the channel simulator. We propose a novel verification methodology that aims at implementing a verified channel simulator for the IMT-Advanced c...

Journal: :Inf. Comput. 2013
Marta Z. Kwiatkowska Gethin Norman David Parker Hongyang Qu

Compositional approaches to verification offer a powerful means to address the challenge of scalability. In this paper, we develop techniques for compositional verification of probabilistic systems based on the assume-guarantee paradigm. We target systems that exhibit both nondeterministic and stochastic behaviour, modelled as probabilistic automata, and augment these models with costs or rewar...

2009
Sergey Lukichev

In this paper we present a rule-based (declarative) approach for rule verification. We focus on anomalies, which may appear in rule bases, containing production rules and semantic constraints. The presented approach defines special rules, called verifier rules, which look for anomalies in business rules. The approach is flexible and easy to maintain in the sense that verifier rules can easily b...

2010
Reinhard Wilhelm Matteo Maffei

Ubiquitous embedded computing systems expected to reliably perform one or more relevant tasks need design and verification methods currently not available. New envisioned applications and trends in system design increase this need. Several of these trends, e.g. function integration, concurrency, energy awareness, networking and their consequences for verification are considered in this article....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید