Catálogo de publicaciones - libros

Compartir en
redes sociales


Formal Methods and Software Engineering: 8th International Conference on Formal Engineering Methods, ICFEM 2006, Macao, China, November 1-3, 2006, Proceedings

Zhiming Liu ; Jifeng He (eds.)

En conferencia: 8º International Conference on Formal Engineering Methods (ICFEM) . Macao, China . November 1, 2006 - November 3, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-47460-9

ISBN electrónico

978-3-540-47462-3

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Program Verification Through Computer Algebra

Zhou Chaochen

This is to advocate the approach to reducing program verification to the algebraic symbolic computation. Recent advances indicate that various verification problems can be reduced to semi-algebraic systems (SAS for short), and resolved through computer algebra tools. In this talk, we report our encouraging attempts at applying DISCOVERER to program termination analysis and state reachability computation. DISCOVERER is a Maple program implementing an algorithm of real solution classification and isolation for SAS, which is based on the discovery of complete discrimination systems of parametric polynomials. The talk also concludes that this approach deserves further attention from the program verification community. For theoretical and technical details of the work, we refer the reader to [1,2,3,4,5].

Palabras clave: Operating System; Software Engineer; Technical Detail; Real Root; Science Institute.

- Keynote Talks | Pp. 1-1

JML’s Rich, Inherited Specifications for Behavioral Subtypes

Gary T. Leavens

The Java Modeling Language (JML) is used to specify detailed designs for Java classes and interfaces. It has a particularly rich set of features for specifying methods. This paper describes those features, with particular emphasis on the features related to specification inheritance. It shows how specification inheritance in JML forces behavioral subtyping, through a discussion of semantics and examples. It also describes a notion of modular reasoning based on static type information, supertype abstraction, which is made valid in JML by methodological restrictions on invariants, history constraints, and initially clauses and by behavioral subtyping.

Palabras clave: Java Modeling Language; Dynamic Type; Behavioral Interface; History Constraint; Type Abstraction.

- Keynote Talks | Pp. 2-34

Three Perspectives in Formal Engineering

John McDermid; Andy Galloway

We present three perspectives of the use of formalism in the construction of High-Integrity Embedded Real-time Systems. In the first, we describe the long-term research aims. The scope is the entire system, the goal is to demonstrate intentional correctness, and the emphasis is on scientific certainty . In the second, we present medium-term research aims. The scope is more on the software in the system, and the emphasis shifts to the notion of engineering confidence . Following on from the medium-term view we propose a set of challenges for formal engineering methods research, based on our perception of the technical issues surrounding the provision of viable engineering solutions. In the third perspective we discuss the short term. In particular, we describe how our recent research is attempting to meet some of the proposed challenges, as a first step towards our medium and long-term aspirations.

Palabras clave: Embed System; Proof Obligation; Monitor Variable; Problem Frame; Formal Engineer.

- Keynote Talks | Pp. 35-54

A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces

Bernhard Beckert; Gerd Beuster

We present a methodology for the formalization of human-computer interaction under security aspects. As part of the methodology, we give formal semantics for the well-known GOMS methodology for user modeling, and we provide a formal definition of an important aspect of human-computer interaction security. We show how formal GOMS models can be augmented with formal models of (1) the application and (2) the user’s assumptions about the application. In combination, this allows the pervasive formal modeling of and reasoning about secure human-computer interaction. The method is illustrated by a simple eVoting example.

Palabras clave: User Model; User Behavior; Formal Semantic; Linear Temporal Logic; Automate Reasoning.

- Specification and Verification | Pp. 55-73

Applying Timed Interval Calculus to Simulink Diagrams

Chunqing Chen; Jin Song Dong

Simulink has been used widely as an industry tool to model and simulate embedded systems. With increasing usage of embedded systems in real-time safety-critical situations, Simulink is deficient to cope with the requirements of high-level assurance and timing analysis. In this paper, we present a systematic approach to translate Simulink diagrams to Timed Interval Calculus (TIC), a notation extending Z to support real-time system specification and verification. This work is based on the same angle chosen by Simulink and TIC where they model systems in terms of continuous time. Translated TIC specifications preserve the functional and timing aspects of the diagrams, and cover a wide range of Simulink blocks. After the translation, we can increase the design space by specifying important requirements, especially timing constraints exactly on the system or its components. Moreover, we can take advantage of TIC reasoning rules to formally verify systems with requirements, and hence elevate the design quality of Simulink.

Palabras clave: Simulink; Real-Time Specification; Z; Verification.

- Specification and Verification | Pp. 74-93

Reducing Model Checking of the Few to the One

E. Allen Emerson; Richard J. Trefler; Thomas Wahl

Verification of parameterized systems for an arbitrary number of instances is generally undecidable. Existing approaches resort to non-trivial restrictions on the system or lack automation. In practice, applications can often provide a suitable bound on the parameter size. We propose a new technique toward the bounded formulation of parameterized reasoning: how to efficiently verify properties of a family of systems over a large finite parameter range. We show how to accomplish this with a single verification run on a model that aggregates the individual instances. Such a run takes significantly less time than if the systems were considered one by one. Our method is applicable to a completely inhomogeneous family of systems, where properties may not even be preserved across instances. In this case the method exposes the parameter values for which the verification fails. If symmetry is present in the systems, it is inherited by the aggregate representation, allowing for verification over a reduced model. Our technique is fully automatic and requires no approximation.

Palabras clave: Model Check; Temporal Logic; Proper State; Atomic Proposition; Kripke Structure.

- Specification and Verification | Pp. 94-113

Induction-Guided Falsification

Kazuhiro Ogata; Masahiro Nakano; Weiqiang Kong; Kokichi Futatsugi

The induction-guided falsification searches a bounded reachable state space of a transition system for a counterexample that the system satisfies an invariant property. If no counterexamples are found, it tries to verify that the system satisfies the property by mathematical induction on the structure of the reachable state space of the system, from which some other invariant properties may be obtained as lemmas. The verification and falsification process is repeated for each of the properties until a counterexample is found or the verification is completed. The NSPK authentication protocol is used as an example to demonstrate the induction-guided falsification.

Palabras clave: CafeOBJ; counterexample; induction; invariant; Maude; observational transition system (OTS).

- Specification and Verification | Pp. 114-131

Verifying χ Models of Industrial Systems with Spin

Nikola Trčka

The language χ has been developed for modeling of industrial systems. Its simulator has been successfully used in many industrial areas for obtaining performance measures. For functional analysis simulation is less applicable and such analysis can be done in other environments. The purpose of this paper is to describe an automatic translator from χ to Promela , the input language of the well known model-checker Spin . We highlight the differences between the two languages and show, in a step by step manner, how some of them can be resolved. We conclude by giving a translation scheme and apply the translator in a small industrial case study.

Palabras clave: Model Checker; Parallel Operator; Atomic Process; Industrial System; Translation Scheme.

- Specification and Verification | Pp. 132-148

Stateful Dynamic Partial-Order Reduction

Xiaodong Yi; Ji Wang; Xuejun Yang

State space explosion is the main obstacle for model checking concurrent programs. Among the solutions, partial-order reduction (POR), especially dynamic partial-order reduction (DPOR) [1], is one of the promising approaches. However, DPOR only supports stateless explorations for acyclic state spaces. In this paper, we present the stateful DPOR approach for may-cyclic state spaces, which naturally combines DPOR with stateful model checking to achieve more efficient reduction. Its basic idea is to summarize the interleaving information for all transition sequences starting from each visited state, and infer the necessary partial-order information based on the summarization when a visited state is encountered again. Experiment results on two programs coming from [1] show that both of the costs of space and time could be remarkably reduced by stateful DPOR with rather reasonable extra memory overhead.

Palabras clave: State Space; Model Check; File System; Transition Sequence; Concurrent Program.

- Specification and Verification | Pp. 149-167

User-Defined Atomicity Constraint: A More Flexible Transaction Model for Reliable Service Composition

Xiaoning Ding; Jun Wei; Tao Huang

Transaction is the key mechanism to make service composition reliable. To ensure the relaxed atomicity of transactional composite service (TCS), existing research depends on the analysis to composition structure and exception handling mechanism. However, this approach can not handle various application-specific requirements, and causes lots of unnecessary failure recoveries or even aborts. In this paper, we propose a relaxed transaction model, including system mode, relaxed atomicity criterion, static checking algorithm and dynamic enforcement algorithm. Users can define different relaxed atomicity constraint for different TCS according to the specific application requirements, including accepted configurations and the preference order. The checking algorithm determines whether the constraint can be satisfied. The enforcement algorithm monitors the execution and performs transaction management works according to the constraint. Compared to existing work, our approach is flexible enough to handle complex application requirements and performs the transaction management works automatically. We apply the approach into web service composition language WS-BPEL and illustrate the above advantages through a concrete example.

Palabras clave: Service Composition; Internal Transition; External Transition; Failure Recovery; Candidate Service.

- Internetware and Web-Based Systems | Pp. 168-184