By Topic

2010 8th IEEE International Conference on Software Engineering and Formal Methods

13-18 Sept. 2010

Filter Results

Displaying Results 1 - 25 of 44
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1562 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (340 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Adaptive Software Needs Continuous Verification

    Publication Year: 2010, Page(s):3 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Extended abstract of keynote presentation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Fly Me to the Moon": Verification of Aerospace Systems

    Publication Year: 2010, Page(s):5 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    Aerospace systems are typically made up of several communicating components.Such systems must be verified extensively before being introduced in industry.In this paper, we present two inherently different approaches towards achieving this goal.The first approach aims at scaling exhaustive verification techniques by applying divide-and-conquer principles.It involves automated compositional verifica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Unreasonable Ineffectiveness of Security Engineering: An Overview

    Publication Year: 2010, Page(s):12 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    In his 1960 essay, Eugene Wigner raised the question of ”the unreasonable effectiveness of mathematics in natural sciences”. After several decades of security research, we are tempted to ask the opposite question: Are we not unreasonably ineffective? Why are we not more secure from all the security technologies? I sketch a conceptual landscape of security that may provide some answer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior Trees: From Systems Engineering to Software Engineering

    Publication Year: 2010, Page(s):21 - 30
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (783 KB) | HTML iconHTML

    Geoff Dromey's Behavior Engineering method provides a vital link between systems engineering processes and software engineering processes. It has proven particularly effective in industry when applied to large complex systems, to help understand the problem space and clarify system and software requirements. In this paper we compare the method with some of the most widely used system design method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior Engineering - A Scalable Modeling and Analysis Method

    Publication Year: 2010, Page(s):31 - 40
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (630 KB) | HTML iconHTML

    The impact of failing to develop a shared understanding of the requirements describing and constraining large, complex projects and programs with many, possibly distributed, stakeholders and suppliers is enormous. Traditional engineering methods provide little in the way of taming complexity when synthesising, analysing and communicating the requirements of such projects. The Behavior Engineering ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Requirements: The Behavior Tree Philosophy

    Publication Year: 2010, Page(s):41 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Behavior Trees were invented by Geoff Dromey as a graphical modelling notation. Their design was driven by the desire to ease the task of capturing functional system requirements and to bridge the gap between an informal language description and a formal model. Vital to Dromey's intention is the idea of incrementally building the model out of its building blocks, the functional requirements. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-local Choice and Implied Scenarios

    Publication Year: 2010, Page(s):53 - 62
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    A number of issues, such as non-local choice and implied scenarios, that arise in Message Sequence Charts (MSCs) have been investigated in the past. However, existing research on these two issues show disagreements regarding how they are related. In this paper, we analyse the relations among existing conditions for non-local choice free and Closure Conditions (CCs) for implied scenarios. On the ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • temporaljmlc: A JML Runtime Assertion Checker Extension for Specification and Checking of Temporal Properties

    Publication Year: 2010, Page(s):63 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Most mainstream specification languages primarily deal with a program's functional behavior. However, for many common problems, besides the system's functionality, it is necessary to be able to express its temporal properties, such as the necessity of calling methods in a certain order. We have developed temporaljmlc, a tool that performs runtime assertion checking of temporal properties specified... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Queries for Specification Refinement Treating Shared Aspect Join Points

    Publication Year: 2010, Page(s):73 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    We present an interactive semi-automatic procedure to help users refine their requirements formally and precisely, using knowledge the user possesses but does not notice as relevant and has difficulty formalizing. Questions in natural language are presented to the user, and augmentations to specifications, written in Linear Temporal Logic, are automatically created according to the answers. We app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing the Quality of B Models

    Publication Year: 2010, Page(s):83 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    This paper proposes to define and assess the notion of quality of B models aiming at providing an automated feedback on a model by performing systematic checks on its content. We define and classify classes of automatic verification steps that help the modeller in knowing whether his model is well-written or not. This technique is defined in the context of ``behavioral models'' that describe the b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assertion-based Slicing and Slice Graphs

    Publication Year: 2010, Page(s):93 - 102
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    This paper revisits the idea of slicing programs based on their axiomatic semantics, rather than using criteria based on control/data dependencies. We show how the forward propagation of preconditions and the backward propagation of post conditions can be combined in a new slicing algorithm that is more precise than the existing specification-based algorithms. The algorithm is based on (i) a preci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture Recovery Using Latent Semantic Indexing and K-Means: An Empirical Evaluation

    Publication Year: 2010, Page(s):103 - 112
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    A number of clustering based approaches and tools have been proposed in the past to partition a software system into subsystems. The greater part of these approaches is semiautomatic, thus requiring human decision to identify the best partition of software entities into clusters among the possible partitions. In addition, some approaches are conceived for software systems implemented using a parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution

    Publication Year: 2010, Page(s):113 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    The paper reports a new testing method working with state pattern designed software systems. The tests are performed in terms of symbolic execution aiming to identify conditions and values of some input parameters that violate assertions at runtime. The state based architecture of such systems allows a direct mapping of the methods to the transitions of the underlying finite state machine (FSM). I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Toolkit for Generating Sentences from Context-Free Grammars

    Publication Year: 2010, Page(s):118 - 122
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Producing sentences from a grammar, according to various criteria, is required in many applications. It is also a basic building block for grammar engineering. This paper presents a toolkit for context-free grammars, which mainly consists of several algorithms for sentence generation or enumeration and for coverage analysis for context-free grammars. The toolkit deals with general context-free gra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time and Data-Aware Analysis of Graphical Service Models in Reo

    Publication Year: 2010, Page(s):125 - 134
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB) | HTML iconHTML

    Reo is a graphical channel-based coordination language that enables the modeling of complex behavioral protocols using a small set of channel types with well-de ned behavior. Reo has been developed for the coordination of standalone components and services, which makes it suitable for the modeling of service-based business processes. The formal semantic models for Reo lay the grounds for computer-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Model for Work Flows

    Publication Year: 2010, Page(s):135 - 144
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    Within this paper, we present a structured, formal model for the specification and analysis of work flows. The model provides a graphical representation supporting a modular description of work flows together with a formal semantics accurately reflecting their execution and laying the foundation for tool support. Methodically relevant concepts such as hierarchy, refinement, model analysis, and mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back-annotation of Simulation Traces with Change-Driven Model Transformations

    Publication Year: 2010, Page(s):145 - 155
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (747 KB) | HTML iconHTML

    Model-driven analysis aims at detecting design flaws early in high-level design models by automatically deriving mathematical models. These analysis models are subsequently investigated by formal verification and validation (V&V) tools, which may retrieve traces violating a certain requirement. Back-annotation aims at mapping back the results of V&V tools to the design model in order to hi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.