Research directions in requirements engineering
In this paper, we review current requirements engineering (RE) research and identify future
research directions suggested by emerging software needs. First, we overview the state of …
research directions suggested by emerging software needs. First, we overview the state of …
Requirements engineering in the year 00: A research perspective
A Van Lamsweerde - Proceedings of the 22nd international conference …, 2000 - dl.acm.org
Requirements engineering (RE) is concerned with the identification of the goals to be
achieved by the envisioned system, the operationalization of such goals into services and …
achieved by the envisioned system, the operationalization of such goals into services and …
[图书][B] Principles of model checking
A comprehensive introduction to the foundations of model checking, a fully automated
technique for finding flaws in hardware and software; with extensive examples and both …
technique for finding flaws in hardware and software; with extensive examples and both …
Temporal induction by incremental SAT solving
N Eén, N Sörensson - Electronic Notes in Theoretical Computer Science, 2003 - Elsevier
We show how a very modest modification to a typical modern SAT-solver enables it to solve
a series of related SAT-instances efficiently. We apply this idea to checking safety properties …
a series of related SAT-instances efficiently. We apply this idea to checking safety properties …
Using model checking to analyze network vulnerabilities
RW Ritchey, P Ammann - … on Security and Privacy. S&P 2000, 2000 - ieeexplore.ieee.org
Even well administered networks are vulnerable to attacks due to the security ramifications
of offering a variety of combined services. That is, services that are secure when offered in …
of offering a variety of combined services. That is, services that are secure when offered in …
Using model checking to generate tests from specifications
We apply a model checker to the problem of test generation using a new application of
mutation analysis. We define syntactic operators, each of which produces a slight variation …
mutation analysis. We define syntactic operators, each of which produces a slight variation …
Inconsistency management in software engineering: Survey and open research issues
G Spanoudakis, A Zisman - Handbook of Software Engineering and …, 2001 - World Scientific
The development of complex software systems is a complex and lengthy activity that
involves the participation and collaboration of many stakeholders (eg customers, users …
involves the participation and collaboration of many stakeholders (eg customers, users …
Approximative symbolic model checking of continuous-time Markov chains
This paper presents a symbolic model checking algorithm for continuous-time Markov
chains for an extension of the continuous stochastic logic CSL of Aziz et al [1]. The …
chains for an extension of the continuous stochastic logic CSL of Aziz et al [1]. The …
Symbolic model checking of UML activity diagrams
R Eshuis - ACM Transactions on Software Engineering and …, 2006 - dl.acm.org
Two translations from activity diagrams to the input language of NuSMV, a symbolic model
verifier, are presented. Both translations map an activity diagram into a finite state machine …
verifier, are presented. Both translations map an activity diagram into a finite state machine …
Software model checking: Extracting verification models from source code
GJ Holzmann, M H. Smith - Software Testing, Verification and …, 2001 - Wiley Online Library
To formally verify a large software application, the standard method is to invest a
considerable amount of time and expertise into the manual construction of an abstract …
considerable amount of time and expertise into the manual construction of an abstract …