By Topic

Theoretical Aspects of Software Engineering, 2009. TASE 2009. Third IEEE International Symposium on

Date 29-31 July 2009

Filter Results

Displaying Results 1 - 25 of 67
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (4880 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (131 KB) | HTML iconHTML
    Freely Available from IEEE
  • TASE 2009 Committee Lists

    Publication Year: 2009, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • TASE 2009 Additional Reviewers

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Verification and Performance Analysis for Embedded Systems

    Publication Year: 2009, Page(s):3 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular Development of Certified System Software

    Publication Year: 2009, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (89 KB) | HTML iconHTML

    Certified software consists of a machine executable program plus a rigorous formal proof (checkable by computer) that the software is free of bugs with respect to a particular specification. The conventional wisdom is that certified software will never be practical because any real software must also rely on the underlying operating system which is too low-level and complex to be verifiable. In re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Expressive Specification and Efficient Model Checking

    Publication Year: 2009, Page(s): 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    We share the views that specifications are preferably executable. In this tutorial, we introduce our latest effort on combining the expressiveness of integrated formal specification languages with the power of mechanical system analysis method like model checking. We present a process analysis toolkit (PAT) which is a self-contained framework for system specification, simulation and verification. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Responsiveness of Hard Real-Time Embedded Systems

    Publication Year: 2009, Page(s):13 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Hard real-time systems are found in many critical embedded applications, for example aeroplane flight control, industrial production line control, and so on. The safe scheduling of tasks in these hard real-time systems is crucial to their correct operation, but the hard constraints of this type of scheduling reduce the responsiveness of the systems. In this paper we show the application of runtime... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environmental Simulation of Real-Time Systems with Nested Interrupts

    Publication Year: 2009, Page(s):21 - 28
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    Interrupts are important aspects of real-time embedded systems to handle events in time. When there exist nested interrupts in a real-time system, and an urgent interrupt is allowed to preempt the current interrupt handling, the design and analysis of the system become difficult due to the lack of appropriate behavioral models. This paper proposes a compositional model for nested interrupts and an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics for Communicating Actors with Interdependent Real-Time Deadlines

    Publication Year: 2009, Page(s):29 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Models of embedded systems with communicating actors and deadlines offer abstraction and encapsulation of related functionality, but their behavior is complex. Verification is therefore difficult and requires a combination of simulation, model checking and testing tools. In order to rely on the results, these tools must use consistent semantics for the model. Yet, a monolithic semantic model is ju... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Algorithm for Finding Empty Space for Reconfigurable Systems

    Publication Year: 2009, Page(s):36 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    The management of resources in reconfigurable systems is one of the most critical factors concerned deeply with the performance of dynamic reconfigurable systems. There are several algorithms for managing the empty space of reconfigurable systems, among which the basic scan line algorithm (SLA) is a relative efficient one. However, SLA suffers from two problems: redundancy and duplication. To solv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State Visibility and Communication in Unifying Theories of Programming

    Publication Year: 2009, Page(s):47 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    We explore the interactions between program-variable state visibility and communication behaviour in state-rich CSP-like processes, using the unifying theories of programming (UTP) framework. The key results of this work are: having variable state visible while a process is waiting to communicate, results in an operationally complex theory of behaviour; by contrast, considering state as unobservab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics of Metamodels in UML

    Publication Year: 2009, Page(s):55 - 62
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    A modelling language can be defined by a metamodel in UML class diagram. This paper defines the semantics of such metamodels through two mappings: a signature mapping from metamodels to signatures of first order languages and an axiom mapping from metamodels to sets of axioms over the signature. Valid models, i.e. instances of the metamodel, are therefore mathematical structures in the signature t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refinement Algebra with Explicit Probabilism

    Publication Year: 2009, Page(s):63 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Refinement algebra provides axioms for the stepwise removal of abstraction, in the form of demonic nondeterminism, in a first-order system that supports reasoning about loops. It has been extended by Solin and Meinecke to computations involving implicit probabilistic choices: demonic nondeterminism then satisfies weaker properties. In this paper their axiom system is extended to capture explicit p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environment Abstraction with State Clustering and Parameter Truncating

    Publication Year: 2009, Page(s):73 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Environment abstraction enriches predicate abstraction by idea from counter abstraction to develop a framework for verification of parameterized systems. However, despite various effects, the constructed abstractions still go beyond the capability of the usual model checkers for many realistic systems. In this paper, a new technique, called state clustering, is proposed to group local states into ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of Population Ring Protocols in PAT

    Publication Year: 2009, Page(s):81 - 89
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    The population protocol model has emerged as an elegant paradigm for describing mobile ad hoc networks, consisting of a number of nodes that interact with each other to carry out a computation. One essential property of self-stabilizing population protocols is that all nodes must eventually converge to the correct output value, with respect to all possible initial configurations. It has been shown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounded Model Checking of ACTL Formulae

    Publication Year: 2009, Page(s):90 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    In this paper, we give a new and improved Bounded Model Checking encoding method for the universal fragment of CTL (ACTL). More specifically, the new encoding method works for verification of ACTL properties, instead of error-hunting. Combine our verification encoding and bug-hunting encoding proposed before, we get a Bounded Model Checking procedure that works for both valid and invalid ACTL prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coarse Grained Retrenchment and the Mondex Denial of Service Attacks

    Publication Year: 2009, Page(s):103 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Retrenchment is a framework that allows relatively unrestricted system evolution steps to be described in a way that gives an evolution step some formal content - unlike model based refinement, whence it emerged, which is inapplicable outside some fairly tightly drawn notion of `progress towards implementation'. In this paper, we introduce a `coarse grained' version of retrenchment, relating to sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing Constraints on Life Cycles of Business Artifacts

    Publication Year: 2009, Page(s):111 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Artifact-centric business process models allow to describe artifacts (data objects) and their life cycles, which allow designers to focus on individual artifact in business processes, thus simplifies the design and analysis of business process model. However, this feature is a double-edged sword. The description of the relationships between artifacts becomes a new and nontrivial problem. It is bet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency Checking for LSC Specifications

    Publication Year: 2009, Page(s):119 - 126
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    Live sequence charts (LSCs) have been proposed as an inter-object scenario-based specification and visual programming language. In this paper, we introduce a high level computational semantics of LSCs, in the form of a PLAY-tree, to show how a running LSC affects the system behaviors in response to a set of external events. Given a nonempty regular language of external events,the consistency of an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Specification and Programs for System Modeling and Verification

    Publication Year: 2009, Page(s):127 - 135
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    High level specification languages like CSP use mathematical objects as abstractions to represent systems and processes. System behaviors are described as process expressions combined with compositional operators, which are associated with elegant algebraic laws for system analysis. Nonetheless, modeling systems with non-trivial data and functional aspects using CSP remains difficult. In this work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.