Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Software analysis and verification“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Software analysis and verification" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Software analysis and verification"
V. Gayetri Devi, S., C. Nalini und N. Kumar. „An efficient software verification using multi-layered software verification tool“. International Journal of Engineering & Technology 7, Nr. 2.21 (20.04.2018): 454. http://dx.doi.org/10.14419/ijet.v7i2.21.12465.
Der volle Inhalt der QuelleChaki, Sagar, Edmund Clarke, Natasha Sharygina und Nishant Sinha. „Verification of evolving software via component substitutability analysis“. Formal Methods in System Design 32, Nr. 3 (02.05.2008): 235–66. http://dx.doi.org/10.1007/s10703-008-0053-x.
Der volle Inhalt der QuelleChun, Seung Su. „Effective Extraction of State Invariant for Software Verification“. Applied Mechanics and Materials 752-753 (April 2015): 1097–104. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1097.
Der volle Inhalt der QuelleCao, Zongyu, Wanyou Lv, Yanhong Huang, Jianqi Shi und Qin Li. „Formal Analysis and Verification of Airborne Software Based on DO-333“. Electronics 9, Nr. 2 (14.02.2020): 327. http://dx.doi.org/10.3390/electronics9020327.
Der volle Inhalt der QuelleSa'd, M. Al, J. Graham und G. P. Liney. „A software tool for 3D dose verification and analysis“. Journal of Physics: Conference Series 444 (26.06.2013): 012087. http://dx.doi.org/10.1088/1742-6596/444/1/012087.
Der volle Inhalt der QuelleLiu, Hua Xiao, Peng Zhang, Li Wen Mu, Ying Jin und Xue Hang Chi. „A Verification Method of Software Acceptability“. Applied Mechanics and Materials 411-414 (September 2013): 436–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.436.
Der volle Inhalt der QuelleCharlton, Nathaniel. „Program verification with interacting analysis plugins“. Formal Aspects of Computing 19, Nr. 3 (05.04.2007): 375–99. http://dx.doi.org/10.1007/s00165-007-0029-4.
Der volle Inhalt der QuelleBertrane, Julien, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné und Xavier Rival. „Static Analysis and Verification of Aerospace Software by Abstract Interpretation“. Foundations and Trends® in Programming Languages 2, Nr. 2-3 (2015): 71–190. http://dx.doi.org/10.1561/2500000002.
Der volle Inhalt der QuelleKornecki, Andrew, und Mingye Liu. „Fault Tree Analysis for Safety/Security Verification in Aviation Software“. Electronics 2, Nr. 4 (31.01.2013): 41–56. http://dx.doi.org/10.3390/electronics2010041.
Der volle Inhalt der QuelleVenet, Arnaud. „A practical approach to formal software verification by static analysis“. ACM SIGAda Ada Letters XXVIII, Nr. 1 (April 2008): 92–95. http://dx.doi.org/10.1145/1387830.1387836.
Der volle Inhalt der QuelleDissertationen zum Thema "Software analysis and verification"
Jobredeaux, Romain J. „Formal verification of control software“. Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53841.
Der volle Inhalt der QuelleDomagoj, Babić. „Exploiting structure for scalable software verification“. Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/1502.
Der volle Inhalt der QuelleWhite, Maurice Walter. „Verification and evaluation of structural analysis and design software“. Thesis, Virginia Tech, 1991. http://hdl.handle.net/10919/41489.
Der volle Inhalt der Quellede, Carvalho Gomes Pedro. „Automatic Extraction of Program Models for Formal Software Verification“. Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176286.
Der volle Inhalt der QuelleDen här avhandlingen studerar automatisk konstruktion av abstrakta modeller för formell verifikation av program skrivna i verkliga programmeringsspråk. Avhandlingen består av tre delar som involverar olika typer av program, programmeringsspråk, verifikationsscenarier, programmodeller och egenskaper.Del ett presenterar en algoritm för generation av flödesgrafer från sekventiella program i Java bytekod. Graferna är skräddarsydda för en kompositionell teknik för verifikationen av temporala kontrollflödens säkerhetsegenskaper. Vi visar att de extraherade modellerna sunt överapproximerar programbeteenden med avseende på sekvenser av metodanrop och -undantag. Således gäller egenskaperna som kan fastställas genom kompositionstekniken över kontrollflöden även för programmen. Vi implementerar dessutom algoritmen i form av verktyget ConFlEx och utvärderar verktyget på ett antal testfall.Del två presenterar en teknik för att generera modeller av ofullständiga program. Det vill säga, program där implementationen av åtminstone en komponent inte är tillgänglig. Vi definierar ett ramverk för att representera ofullständiga Java bytekodsprogram och utökar algoritmen från del ett till att hantera ofullständig kod. Därefter presenterar vi raffineringsregler - villkor för att instansiera den saknade koden - och bevisar att reglerna bevarar relevanta egenskaper av kontrollflödesgrafer. Vi har dessutom utökat ConFlEx till att stödja de nya definitionerna och har omvärderat verktyget på testfall av ofullständiga program.Del tre angriper verifikation av multitrådade program. Vi presenterar en teknik för att bevisa följande egenskap för synkronisering med vilkorsvariabler: "Om varje trådsynkronisering under samma villkor så småningom stiger in i sitt synkroniseringsblock så kommer varje tråd också till slut lämna synkroniseringen". För att stödja verifikationen så introducerar vi först SyncTask - ett enkelt mellanliggande språk för att specificera synkronisering av parallella beräkningar. Därefter presenterar vi ett annoteringsspråk för Java som tillåter automatisk extrahering av SyncTask-program och visar att egenskapen gäller om och endast om motsvarande SyncTask-program terminerar. Vi reducerar termineringsproblemet till ett nåbarhetsproblem på färgade Petrinät samt definierar en algoritm som skapar Petrinät från SyncTask-program där programmet terminerar om och endast om nätet alltid når en särskild mängd av döda konfigurationer. Extraktionen av SyncTask-program och deras motsvarande Petrinät är implementerade i form av verktyget STaVe. Slutligen utvärderar vi verktyget genom att mata annoterade.
QC 20151101
Molin, Oscar. „Design verification through software architecture recovery : Meeting ISO 26262 requirements on software using static analysis“. Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-202149.
Der volle Inhalt der QuelleLimouee, Maryam. „Verification of NYSlab a software for the analysis of jointed pavements /“. To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Der volle Inhalt der QuelleMrvaljevic, Pavle. „Tool orchestration for modeling, verification and analysis of collaborating autonomous machines“. Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48884.
Der volle Inhalt der QuelleMotta, Teixeira Leopoldo. „Verification and refactoring of configuration knowledge for software product lines“. Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2323.
Der volle Inhalt der QuelleConselho Nacional de Desenvolvimento Científico e Tecnológico
Uma linha de produtos de software (LPS) é definida como um conjunto de sistemas de software que compartilham características em comum, mas que são suficientemente distintos entre si, desenvolvidos a partir de um conjunto de artefatos reusáveis. Modelos de features e configuração são usados para possibilitar a geração automática de produtos a partir destes artefatos. Um modelo de features representa o conjunto de possíveis configurações de produto de uma LPS, enquanto o modelo de configuração estabelece o mapeamento entre features e implementação. Por exemplo, associando expressões de features, na forma de proposições lógicas, a artefatos. Os benefícios de produtividade que a abordagem de LPS fornece tornam possível que uma LPS seja capaz de gerar milhares de produtos. Neste contexto, erros cometidos ao especificar o modelo de configuração podem resultar em produtos inválidos - o problema da composição segura. Este problema pode ser difícil de ser detectado manualmente, já que os modelos de features e configuração podem tornar-se muito complexos. Gerar todos os produtos de uma LPS pode não ser prático, dado que existem LPS em que é possível gerar milhares de produtos. No entanto, mesmo modelos de configuração que não permitem a geração de produtos inválidos podem ter problemas na sua estrutura interna, como complexidade e duplicação, especialmente no contexto de LPS grandes, onde sua manutenção pode se tornar difícil. Precisamos nos certificar de que não introduzimos erros ao corrigir estes problemas. Neste trabalho, é proposta uma abordagem automática de verificação de composição segura para LPS baseadas em modelos de configuração. Esta abordagem é baseada na tradução de instâncias específicas de modelos de features e configuração em lógica proposicional, usando uma teoria codificada com Alloy. O suporte ferramental fornecido pelo Alloy Analyzer auxilia a verificação. Também é proposto um catálogo de refatoramentos simples para modelos de configuração, como uma maneira de evitar erros ao corrigir problemas na estrutura interna de tais modelos. Este catálogo é formalizado usando uma teoria geral para modelos de configuração especificada com o Prototype Verification System (PVS). Nós avaliamos a abordagem de verificação usando sete versões de uma LPS, com modelos de features que possibilitam a geração de até 272 produtos. Os resultados demonstram a vantagem de usar esta abordagem ao invés de gerar todos os produtos da LPS, já que o tempo médio para compilar um único produto da LPS é maior que o tempo para analisá-la na maior das versões analisadas. Também avaliamos o catálogo de refatoramento provando consistência (soundness) dos refatoramentos propostos no provador de teoremas de PVS
de, Carvalho Gomes Pedro. „Sound Modular Extraction of Control Flow Graphs from Java Bytecode“. Licentiate thesis, KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105275.
Der volle Inhalt der QuelleQC 20121122
de, Carvalho Gomes Pedro, und Attilio Picoco. „Sound Extraction of Control-Flow Graphs from open Java Bytecode Systems“. KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104076.
Der volle Inhalt der QuelleQC 20121029
Verification of Control-Flow Properties of Programs with Procedures(CVPP)
Bücher zum Thema "Software analysis and verification"
Stanley, William, und Janusz Laski. Software Verification and Analysis. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5.
Der volle Inhalt der QuelleBultan, Tevfik, Fang Yu, Muath Alkhalaf und Abdulbaki Aydin. String Analysis for Software Verification and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68670-7.
Der volle Inhalt der QuelleGermany) NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security (2011 Bayrischzell. Software safety and security: Tools for analysis and verification. Amsterdam: IOS Press published in cooperation with NATO Emerging Security Challenges Division, 2012.
Den vollen Inhalt der Quelle findenKhedker, Uday. Data flow analysis: Theory and practice. Boca Raton, Fla: Taylor & Francis, 2009.
Den vollen Inhalt der Quelle findenSymposium on Testing, Analysis, and Verification (1991 Victoria, B.C.). Proceedings of the Symposium on Testing, Analysis, and Verification (TAV4): Victoria, British Columbia, October 8-10, 1991. New York: ACM Press, 1991.
Den vollen Inhalt der Quelle findenClarke, Dave. Aliasing in Object-Oriented Programming. Types, Analysis and Verification. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Den vollen Inhalt der Quelle findenSymposium on Software Testing, Analysis, and Verification (3rd 1989 Key West, Fla.). Proceedings of the ACM SIGSOFT '89: Third Symposium on Software Testing, Analysis, and Verification (TAV3), Key West, Florida, December 13-15, 1989 / edited by Richard A. Kemmerer. New York: ACM Press, 1989.
Den vollen Inhalt der Quelle findenZeljko, Zilic, Hrsg. Verification by error modeling: Using testing techniques in hardware verification. Boston: Kluwer Academic Publishers, 2003.
Den vollen Inhalt der Quelle findenBouajjani, Ahmed. Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010, Singapore, September 21-24, 2010. Proceedings. Berlin, Heidelberg: Springer-Verlag Heidelberg, 2010.
Den vollen Inhalt der Quelle findenSungdeok, Cha, Hrsg. Automated technology for verification and analysis: 6th international symposium, ATVA 2008, Seoul, Korea, October 20-23, 2008, proceedings. Berlin: Springer, 2008.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Software analysis and verification"
Carré, Bernard. „Program analysis and verification“. In High-Integrity Software, 176–97. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4684-5775-9_8.
Der volle Inhalt der QuelleDonaldson, Alastair F., Leopold Haller, Daniel Kroening und Philipp Rümmer. „Software Verification Using k-Induction“. In Static Analysis, 351–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23702-7_26.
Der volle Inhalt der QuelleHolzmann, Gerard_J. „Software Analysis and Model Checking“. In Computer Aided Verification, 1–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45657-0_1.
Der volle Inhalt der QuelleLaski, Janusz, und William Stanley. „Dynamic Program Analysis“. In Software Verification and Analysis, 203–19. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_9.
Der volle Inhalt der QuelleBerz, Martin, und Kyoko Makino. „Rigorous Reachability Analysis and Domain Decomposition of Taylor Models“. In Numerical Software Verification, 90–97. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63501-9_7.
Der volle Inhalt der QuelleSekar, R. „Runtime Analysis and Instrumentation for Securing Software“. In Runtime Verification, 58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16612-9_6.
Der volle Inhalt der QuelleLaski, Janusz, und William Stanley. „Why Not Write Correct Software the First Time?“ In Software Verification and Analysis, 1–14. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_1.
Der volle Inhalt der QuelleLaski, Janusz, und William Stanley. „How to Prove a Program Correct: Programs Without Loops“. In Software Verification and Analysis, 39–61. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_2.
Der volle Inhalt der QuelleLaski, Janusz, und William Stanley. „How to Prove a Program Correct: Iterative Programs“. In Software Verification and Analysis, 63–79. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_3.
Der volle Inhalt der QuelleLaski, Janusz, und William Stanley. „Prepare Test for Any Implementation: Black-Box Testing“. In Software Verification and Analysis, 81–99. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_4.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Software analysis and verification"
Podymov, Vladislav, und Uliana Popesko. „UPPAAL-based software-defined network verification“. In 2013 Tools & Methods of Program Analysis (TMPA). IEEE, 2013. http://dx.doi.org/10.1109/tmpa.2013.7163715.
Der volle Inhalt der QuelleMorell, L. J. „Theoretical insights into fault-based testing“. In Workshop on Software Testing, Verification, and Analysis. IEEE, 1988. http://dx.doi.org/10.1109/wst.1988.5353.
Der volle Inhalt der Quelle„Proceedings of the Second Workshop on Software Testing, Verification, and Analysis (Cat. No.88TH0225-3)“. In Workshop on Software Testing, Verification, and Analysis. IEEE, 1988. http://dx.doi.org/10.1109/wst.1988.5360.
Der volle Inhalt der QuelleWeiss, S. N. „A formal framework for the study of concurrent program testing“. In Workshop on Software Testing, Verification, and Analysis. IEEE, 1988. http://dx.doi.org/10.1109/wst.1988.5362.
Der volle Inhalt der QuelleKellogg, Martin, Vlastimil Dort, Suzanne Millstein und Michael D. Ernst. „Lightweight verification of array indexing“. In ISSTA '18: International Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3213846.3213849.
Der volle Inhalt der QuelleCarlson, Jan-Renee. „Verification of Software: The Textbook and Real Problems“. In 11th AIAA/ISSMO Multidisciplinary Analysis and Optimization Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2006. http://dx.doi.org/10.2514/6.2006-7128.
Der volle Inhalt der QuelleCortesi, Agostino, Pietro Ferrara und Nabendu Chaki. „Static analysis techniques for robotics software verification“. In 2013 44th International Symposium on Robotics (ISR 2013). IEEE, 2013. http://dx.doi.org/10.1109/isr.2013.6739742.
Der volle Inhalt der QuelleBeyene, Tewodros A., Marc Brockschmidt und Andrey Rybalchenko. „CTL+FO verification as constraint solving“. In ISSTA '14: International Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2632362.2632364.
Der volle Inhalt der QuelleLatorre, Nicolas, Francesco Alberti und Natasha Sharygina. „Verige: verification with invariant generation engine“. In ISSTA '14: International Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2632362.2632373.
Der volle Inhalt der QuelleAlqahtani, Sultan S. „Enhancing Trust – Software Vulnerability Analysis Framework“. In 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2017. http://dx.doi.org/10.1109/icst.2017.76.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Software analysis and verification"
Leyva, Nha. Uncertainty Analysis and Software Verification. Office of Scientific and Technical Information (OSTI), Juli 2021. http://dx.doi.org/10.2172/1813900.
Der volle Inhalt der QuelleNelson, Adam G., und Micheal A. Smith. Verification of the DIF3D Software to Support Fast Reactor Analysis. Office of Scientific and Technical Information (OSTI), Februar 2020. http://dx.doi.org/10.2172/1599877.
Der volle Inhalt der QuelleVarma, Amit, und Jungil Seo. Verification of LRFD Bridge Design and Analysis Software for INDOT. West Lafayette, Indiana: Purdue University, 2011. http://dx.doi.org/10.5703/1288284314279.
Der volle Inhalt der QuelleButler, Richard S. Air Force Systems Command Software Independent Verification and Validation Implementation Analysis and Guidance. Fort Belvoir, VA: Defense Technical Information Center, April 1988. http://dx.doi.org/10.21236/ada194309.
Der volle Inhalt der QuelleLucon, Enrico. New software for the statistical analysis and qualification of NIST charpy verification specimen lots. Gaithersburg, MD: National Institute of Standards and Technology, April 2018. http://dx.doi.org/10.6028/nist.ir.8211.
Der volle Inhalt der QuelleBRATZEL, D. R. Flammable Gas Refined Safety Analysis Tool Software Verification and Validation Report for Resolve Version 2.5. Office of Scientific and Technical Information (OSTI), September 2000. http://dx.doi.org/10.2172/804776.
Der volle Inhalt der QuelleCopps, Kevin D. Verification of the coupled fluid/solid transfer in a CASL grid-to-rod-fretting simulation : a technical brief on the analysis of convergence behavior and demonstration of software tools for verification. Office of Scientific and Technical Information (OSTI), Dezember 2011. http://dx.doi.org/10.2172/1038207.
Der volle Inhalt der QuelleStrichman, Ofer. Software Regression Verification. Fort Belvoir, VA: Defense Technical Information Center, Dezember 2013. http://dx.doi.org/10.21236/ada594501.
Der volle Inhalt der QuelleCOMPUSEC INC SAN DIEGO CA. Secure Software Verification Tools. Fort Belvoir, VA: Defense Technical Information Center, Februar 1987. http://dx.doi.org/10.21236/ada189731.
Der volle Inhalt der QuelleWallace, Dolores R., und Roger U. Fujii. Software verification and validation. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-165.
Der volle Inhalt der Quelle