By Topic

Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM'06)

Date 11-15 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 39
  • Fourth IEEE International Conference on Software Engineering and Formal Methods [Cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1593 KB)
    Freely Available from IEEE
  • Fourth IEEE International Conference on Software Engineering and Formal Methods - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Fourth IEEE International Conference on Software Engineering and Formal Methods - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Fourth IEEE International Conference on Software Engineering and Formal Methods [Table of contents]

    Publication Year: 2006, Page(s): 263
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2006, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Modeling Heterogeneous Real-time Components in BIP

    Publication Year: 2006, Page(s):3 - 12
    Cited by:  Papers (89)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    We present a methodology for modeling heterogeneous real-time components. Components are obtained as the superposition of three layers: behavior, specified as a set of transitions; Interactions between transitions of the behavior; Priorities, used to choose amongst possible interactions. A parameterized binary composition operator is used to compose components layer by layer. We present the BIP la... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Context of Object Computation (extended abstract)

    Publication Year: 2006, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (102 KB) | HTML iconHTML

    A program, or in object-oriented programming a feature, is characterized not only by an implementation but by a contract specifying its intent and a proof obligation to ascertain that the implementation meets the contract. From these ideas it is possible to derive a general framework for discussing programs and program development View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Property Checking for Software: Past, Present and Future

    Publication Year: 2006, Page(s):18 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (87 KB) | HTML iconHTML

    Software validation is a very hard problem. Traditionally, most validation in our industry has been done by testing. Testing is the process of running software on representative inputs and checking if the software behaves as intended. There are various granularities in which testing is performed ranging from unit tests that test small units of the system, to system-wide tests. Over the past decade... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Harnessing Disruptive Innovation in Formal Verification

    Publication Year: 2006, Page(s):21 - 30
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    Technological innovations are sweeping through the field of formal verification. These changes are disruptive to tools based on interactive theorem proving, which needs new ways to integrate the capabilities of novel technologies. I describe two approaches. One is development and use of SMT solvers: these use techniques from theorem proving but apply them in ways that enable model checking, while ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Semi-Automatic Methodology for Repairing FaultyWeb Sites

    Publication Year: 2006, Page(s):31 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    The development and maintenance of Web sites are difficult tasks. To maintain the consistency of ever-larger, complex Web sites, Web administrators need effective mechanisms that assist them in fixing every possible inconsistency. In this paper, we present a novel methodology for semi-automatically repairing faulty Web sites which can be integrated on top of an existing rewriting-based verificatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Bisimilarities Induced by Relations on Actions

    Publication Year: 2006, Page(s):41 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    In this paper, we give a straightforward generalization of bisimulations to "bisimulations induced by a pair of relations" on the underlying action set. We establish that many of the nice properties of bisimulations and bisimilarities may be thought of as actually being inherited from properties of the underlying relations on actions. We show that many bisimulation-based orderings (including stron... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing AspectJ Weaving for Static Pointcuts

    Publication Year: 2006, Page(s):50 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    The aspect oriented programming is a new programming paradigm that provides a means of encapsulation of crosscuting concerns in software. This paper describes a formal semantics of advice weaving in AspectJ, an aspect oriented programming language that extends Java. The advice weaving is performed on the bytecode in regions of the code that correspond to join points declared by pointcuts. AspectJ ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Filtering Retrenchments into Refinements

    Publication Year: 2006, Page(s):60 - 69
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Retrenchment is a weakening of model based refinement that enables many development steps not expressible by refinement to be formally described nevertheless. The greater flexibility of retrenchment comes at the price of much feebler guarantees as compared with refinement, and so the interplay between retrenchment and refinement can hope to offer the best of both worlds. The paper explores the str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Complete Test Graphs for Hierarchical Systems

    Publication Year: 2006, Page(s):70 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Conformance testing focuses on checking whether an implementation under test (IUT) behaves according to its specification. Typically, testers are interested in performing targeted tests that exercise certain features of the IUT. This intention is formalized as a test purpose. The tester needs a "strategy" to reach the goal specified by the test purpose. Also, for a particular test case, the strate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jose: aspects for design by contract

    Publication Year: 2006, Page(s):80 - 89
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    Design by contract is a practical methodology for evolving code together with its specification. The contract has important methodological implications on the design of the program. In addition, tools that instrument the code to check for contract violations help the development process by catching errors close to their sources. This is complicated by several factors, such as the need to collect p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discern: Towards the Automatic Discovery of Software Contracts

    Publication Year: 2006, Page(s):90 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Design by contract is a practical methodology for evolving code together with its specification; it helps prevent many errors, and catch others close to their sources. Unfortunately, writing (and maintaining) contracts requires a non-trivial investment of time and effort. We are developing a tool, called Discern, to statically analyze existing programs and discover draft contracts for them. Discer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model for Temporal relations between Object Roles

    Publication Year: 2006, Page(s):100 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    The concept of roles has been advocated to model application domain objects which evolve dynamically during their lifespan. These objects may acquire new and drop old roles. Several research efforts have focused on formalizing roles as conceptual unit and their mappings to classes and objects of class based languages. This paper presents a formal notation for modelling temporal relationships betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A PVS Based Framework for Validating Compiler Optimizations

    Publication Year: 2006, Page(s):108 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    An optimization can be specified as sequential compositions of predefined transformation primitives. For each primitive, we can define soundness conditions which guarantee that the transformation is semantics preserving. An optimization of a program preserves semantics, if all applications of the primitives in the optimization satisfy their respective soundness conditions on the versions of the in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Modelling and Verification of an Asynchronous DLX Pipeline

    Publication Year: 2006, Page(s):118 - 127
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    A five stage pipeline of an asynchronous DLX processor is modelled and its control flow is verified. The model is built using an asynchronous pipeline of latches separated by processing logic. We model two versions of this pipeline: one using latch controllers with four-phase semi-decoupled and another using fully-decoupled protocol. All the processing units are modelled as processes in the PROMEL... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product Automata and Process Algebra

    Publication Year: 2006, Page(s):128 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    We define a model of labelled product systems of automata and explore its connections with process calculi and trace languages. Bisimilarity of labelled product systems is defined using a new definition of bisimulation with renaming. Concurrent mu-expressions are defined to describe labelled product systems. This leads to complete axiomatizations and algorithms for bisimulation and failure equival... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of JAVA CARD Applets Behavior with Respect to Transactions and Card Tears

    Publication Year: 2006, Page(s):137 - 146
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    The Java card transaction mechanism allows to protect sensitive operations on smart cards against problems due to card tears or power losses. Statements within a transaction are viewed as a single atomic operation so that either they are all performed or none of them is. KRAKATOA is a tool for static verification of Java programs annotated in JML (Java modeling language), a behavioral specificatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying Data-Flow Requirements for the Automated Composition of Web Services

    Publication Year: 2006, Page(s):147 - 156
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6811 KB) | HTML iconHTML

    One of the fundamental Ideas of Weh services and service oriented architecture is the possibility to develop new applications by composing existing services that are available on the Web. Several approaches have been proposed to tackle the problem of Web service composition, but little effort has been devoted so far to the problem of modeling the requirements of the composition. However, it is cle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements Modeling -- Experience from an Insurance Project

    Publication Year: 2006, Page(s):157 - 166
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Most errors in a software development life cycle are introduced in the requirements phase. Rigorous specifications and automatic analysis can address this problem. However, there are almost no tools that are based on formal analysis that can scale up for business systems. Also, there is very little literature that reports on the usefulness and scalability of formal analysis of industrial-scale bus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.