To see the other types of publications on this topic, follow the link: Software analysis and verification.

Journal articles on the topic 'Software analysis and verification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software analysis and verification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

V. Gayetri Devi, S., C. Nalini, and N. Kumar. "An efficient software verification using multi-layered software verification tool." International Journal of Engineering & Technology 7, no. 2.21 (April 20, 2018): 454. http://dx.doi.org/10.14419/ijet.v7i2.21.12465.

Full text
Abstract:
Rapid advancements in Software Verification and Validation have been critical in the wide development of tools and techniques to identify potential Concurrent bugs and hence verify the software correctness. A concurrent program has multiple processes and shared objects. Each process is a sequential program and they use the shared objects for communication for completion of a task. The primary objective of this survey is retrospective review of different tools and methods used for the verification of real-time concurrent software. This paper describes the proposed tool ‘F-JAVA’ for multithreaded Java codebases in contrast with existing ‘FRAMA-C’ platform, which is dedicated to real-time concurrent C software analysis. The proposed system is comprised of three layers, namely Programming rules generation stage, Verification stage with Particle Swarm Optimization (PSO) algorithm, and Performance measurement stage. It aims to address some of the challenges in the verification process such as larger programs, long execution times, and false alarms or bugs, and platform independent code verification
APA, Harvard, Vancouver, ISO, and other styles
2

Chaki, Sagar, Edmund Clarke, Natasha Sharygina, and Nishant Sinha. "Verification of evolving software via component substitutability analysis." Formal Methods in System Design 32, no. 3 (May 2, 2008): 235–66. http://dx.doi.org/10.1007/s10703-008-0053-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chun, Seung Su. "Effective Extraction of State Invariant for Software Verification." Applied Mechanics and Materials 752-753 (April 2015): 1097–104. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1097.

Full text
Abstract:
In software design of complex systems, more time and effort are spent on verification than on constructions. Model checking for software verification techniques offer a large potential to obtain and early integration of verification in the design process. This paper describes how to easily specify and the software properties and to understand the software generating automatically invariant. In this paper deal with issue that state invariant is a property that holds in every reachable state. Not only can be used in understanding and analysis of complex software systems. In addition, it can be used for system verifications such as checking safety, consistency, and completeness. For these reasons, there are many vital researches for deriving state invariant from finite state machine models. In this research was to be considered to extract state invariant. Thus it is likely to be too complex for the user to understand. This paper let the user focus on some interested parts (called scopes) rather than a whole state space in a model. Computation Tree Logic (CTL) is used to specify scopes in which he/she is interested. Given a scope in CTL, forward reachability analysis is used to find out a set of states inside it. Obviously, a set of states calculated in this way is a subset of every reachable state. Keywords: Software verification, Invariant, Scopes, Model Checking
APA, Harvard, Vancouver, ISO, and other styles
4

Cao, Zongyu, Wanyou Lv, Yanhong Huang, Jianqi Shi, and Qin Li. "Formal Analysis and Verification of Airborne Software Based on DO-333." Electronics 9, no. 2 (February 14, 2020): 327. http://dx.doi.org/10.3390/electronics9020327.

Full text
Abstract:
With rapid technological advances in airborne control systems, it has become imperative to ensure the reliability, robustness, and adaptability of airborne software since failure of these software could result in catastrophic loss of property and life. DO-333 is a supplement to the DO-178C standard, which is dedicated to guiding the application of formal methods in the review and analysis of airborne software development processes. However, DO-333 lacks theoretical guidance on how to choose appropriate formal methods and tools to achieve verification objectives at each stage of the verification process, thereby limiting their practical application. This paper is intended to illustrate the formal methods and tools available in the verification process to lay down a general guide for the formal development and verification of airborne software. We utilized the Air Data Computer (ADC) software as the research object and applied different formal methods to verify software lifecycle artifacts. This example explains how to apply formal methods in practical applications and proves the effectiveness of formal methods in the verification of airborne software.
APA, Harvard, Vancouver, ISO, and other styles
5

Sa'd, M. Al, J. Graham, and G. P. Liney. "A software tool for 3D dose verification and analysis." Journal of Physics: Conference Series 444 (June 26, 2013): 012087. http://dx.doi.org/10.1088/1742-6596/444/1/012087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Hua Xiao, Peng Zhang, Li Wen Mu, Ying Jin, and Xue Hang Chi. "A Verification Method of Software Acceptability." Applied Mechanics and Materials 411-414 (September 2013): 436–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.436.

Full text
Abstract:
Software requirements validation is one of the hot problems of software engineering field, for the formal verification of software acceptability, this paper presents a formal verification software acceptability method. This method uses the 4-variable model to character the software system requirements and the software behavior, and gives a formal description of the 4-variable model based on the generic model of Tabular expression, and converts the Tabular expression into predicate logic knowledge base to verify the software acceptability. The analysis shows that the proposed method is effective, and the software acceptability can be verified.
APA, Harvard, Vancouver, ISO, and other styles
7

Charlton, Nathaniel. "Program verification with interacting analysis plugins." Formal Aspects of Computing 19, no. 3 (April 5, 2007): 375–99. http://dx.doi.org/10.1007/s00165-007-0029-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bertrane, Julien, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, and Xavier Rival. "Static Analysis and Verification of Aerospace Software by Abstract Interpretation." Foundations and Trends® in Programming Languages 2, no. 2-3 (2015): 71–190. http://dx.doi.org/10.1561/2500000002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kornecki, Andrew, and Mingye Liu. "Fault Tree Analysis for Safety/Security Verification in Aviation Software." Electronics 2, no. 4 (January 31, 2013): 41–56. http://dx.doi.org/10.3390/electronics2010041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Venet, Arnaud. "A practical approach to formal software verification by static analysis." ACM SIGAda Ada Letters XXVIII, no. 1 (April 2008): 92–95. http://dx.doi.org/10.1145/1387830.1387836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yu, Huafeng, Yue Ma, Thierry Gautier, Loïc Besnard, Paul Le Guernic, and Jean-Pierre Talpin. "Polychronous modeling, analysis, verification and simulation for timed software architectures." Journal of Systems Architecture 59, no. 10 (November 2013): 1157–70. http://dx.doi.org/10.1016/j.sysarc.2013.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Harrison, Michael D., Paolo Masci, and Jose C. Campos. "Verification Templates for the Analysis of User Interface Software Design." IEEE Transactions on Software Engineering 45, no. 8 (August 1, 2019): 802–22. http://dx.doi.org/10.1109/tse.2018.2804939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hunt, Warren A., Matt Kaufmann, J. Strother Moore, and Anna Slobodova. "Industrial hardware and software verification with ACL2." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 375, no. 2104 (September 4, 2017): 20150399. http://dx.doi.org/10.1098/rsta.2015.0399.

Full text
Abstract:
The ACL2 theorem prover has seen sustained industrial use since the mid-1990s. Companies that have used ACL2 regularly include AMD, Centaur Technology, IBM, Intel, Kestrel Institute, Motorola/Freescale, Oracle and Rockwell Collins. This paper introduces ACL2 and focuses on how and why ACL2 is used in industry. ACL2 is well-suited to its industrial application to numerous software and hardware systems, because it is an integrated programming/proof environment supporting a subset of the ANSI standard Common Lisp programming language. As a programming language ACL2 permits the coding of efficient and robust programs; as a prover ACL2 can be fully automatic but provides many features permitting domain-specific human-supplied guidance at various levels of abstraction. ACL2 specifications and models often serve as efficient execution engines for the modelled artefacts while permitting formal analysis and proof of properties. Crucially, ACL2 also provides support for the development and verification of other formal analysis tools. However, ACL2 did not find its way into industrial use merely because of its technical features. The core ACL2 user/development community has a shared vision of making mechanized verification routine when appropriate and has been committed to this vision for the quarter century since the Computational Logic, Inc., Verified Stack. The community has focused on demonstrating the viability of the tool by taking on industrial projects (often at the expense of not being able to publish much). This article is part of the themed issue ‘Verified trustworthy software systems’.
APA, Harvard, Vancouver, ISO, and other styles
14

HU, Jun. "Formal Analysis and Verification of Resource Adaptability for Internetware." Journal of Software 19, no. 5 (October 21, 2008): 1186–200. http://dx.doi.org/10.3724/sp.j.1001.2008.01186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

ZHANG, Jing-Zhou, Hong-Min REN, Yu-Wei ZONG, Le-Qiu QIAN, and San-Yuan ZHU. "Component Substitutability Analysis and Verification Based on Behavior Automata." Journal of Software 21, no. 11 (January 28, 2011): 2768–81. http://dx.doi.org/10.3724/sp.j.1001.2010.03780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cacciagrano, Diletta Romana, Flavio Corradini, Rosario Culmone, Nikos Gorogiannis, Leonardo Mostarda, Franco Raimondi, and Claudia Vannucchi. "Analysis and verification of ECA rules in intelligent environments." Journal of Ambient Intelligence and Smart Environments 10, no. 3 (June 21, 2018): 261–73. http://dx.doi.org/10.3233/ais-180487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Cha, Byung-Rae, Nam-Ho Kim, Seong-Ho Lee, Yoo-Kang Ji, and Jong-Won Kim. "Integrated Verification of Hadoop Cluster Prototypes and Analysis Software for SMB." Journal of Korea Navigation Institute 18, no. 2 (April 30, 2014): 191–99. http://dx.doi.org/10.12673/jant.2014.18.2.191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

WANG, Yuan. "A Method of Time Constraint Workflow Model Analysis and Verification." Journal of Software 18, no. 9 (2007): 2153. http://dx.doi.org/10.1360/jos182153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

LI, Xian-Tong. "A Method of Time Constraint Workflow Model Analysis and Verification." Journal of Software 18, no. 10 (2007): 2469. http://dx.doi.org/10.1360/jos182469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

SONG, Wei. "Timing Constraint Petri Nets and Their Schedulability Analysis and Verification." Journal of Software 18, no. 1 (2007): 11. http://dx.doi.org/10.1360/jos180011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Diekmann, Cornelius, Lars Hupel, Julius Michaelis, Maximilian Haslbeck, and Georg Carle. "Verified iptables Firewall Analysis and Verification." Journal of Automated Reasoning 61, no. 1-4 (January 3, 2018): 191–242. http://dx.doi.org/10.1007/s10817-017-9445-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sánchez, César, Gerardo Schneider, Wolfgang Ahrendt, Ezio Bartocci, Domenico Bianculli, Christian Colombo, Yliès Falcone, et al. "A survey of challenges for runtime verification from advanced application domains (beyond software)." Formal Methods in System Design 54, no. 3 (November 2019): 279–335. http://dx.doi.org/10.1007/s10703-019-00337-w.

Full text
Abstract:
Abstract Runtime verification is an area of formal methods that studies the dynamic analysis of execution traces against formal specifications. Typically, the two main activities in runtime verification efforts are the process of creating monitors from specifications, and the algorithms for the evaluation of traces against the generated monitors. Other activities involve the instrumentation of the system to generate the trace and the communication between the system under analysis and the monitor. Most of the applications in runtime verification have been focused on the dynamic analysis of software, even though there are many more potential applications to other computational devices and target systems. In this paper we present a collection of challenges for runtime verification extracted from concrete application domains, focusing on the difficulties that must be overcome to tackle these specific challenges. The computational models that characterize these domains require to devise new techniques beyond the current state of the art in runtime verification.
APA, Harvard, Vancouver, ISO, and other styles
23

Cuervo Parrino, Bruno, Juan Pablo Galeotti, Diego Garbervetsky, and Marcelo F. Frias. "TacoFlow: optimizing SAT program verification using dataflow analysis." Software & Systems Modeling 14, no. 1 (February 25, 2014): 45–63. http://dx.doi.org/10.1007/s10270-014-0401-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Маурчев, Евгений, Evgeniy Maurchev, Юрий Балабин, and Yuriy Balabin. "RUSCOSMIC — the new software toolbox for detailed analysis of cosmic ray interactions with matter." Solar-Terrestrial Physics 2, no. 4 (February 2, 2017): 3–10. http://dx.doi.org/10.12737/24269.

Full text
Abstract:
At present, cosmic ray (CR) physics uses a considerable variety of methods for studying CR characteristics of both primary and secondary fluxes. Experimental methods make the main contribution, using various types of detectors, but numerical methods increasingly complement it due to the active development in computer technology. This approach provides researchers with the most extensive information about details of the process or phenomenon and allows us to make the most competent conclusions. This paper presents a concept of the RUSCOSMIC © software package based on the GEANT4 toolkit and representing a range of different numerical models for studying CR propagation through medium of different systems (radiation detectors, Earth’s atmosphere). The obtained results represent response functions of the main radiation detectors as well as some typical characteristics of secondary CR fluxes. Comparative results also show the operation of the module verification of calculations with experimental data.
APA, Harvard, Vancouver, ISO, and other styles
25

Popov, Dmitry. "Testing and verification of the LHCb Simulation." EPJ Web of Conferences 214 (2019): 02043. http://dx.doi.org/10.1051/epjconf/201921402043.

Full text
Abstract:
Monte-Carlo simulation is a fundamental tool for high-energy physics experiments, from the design phase to data analysis. In recent years its relevance has increased due to the ever growing measurements precision. Accuracy and reliability are essential features in simulation and particularly important in the current phase of the LHCb experiment, where physics analysis and preparation for data taking with the upgraded detector need to be performed at the same time. In this paper we will give an overview of the full chain of tests and procedures implemented for the LHCb Simulation software stack to ensure the quality of its results. The tests comprise simple checks to validate new software contributions in a nightlies system as well as more elaborate checks to probe simple physics and software quantities for performance and regression verifications. Commissioning of a new major version of the simulation software for production implies also validating its impact using a few physics anlayses. A new system for Simulation Data Quality (SimDQ) that is being put in place to help in the first phase of commissioning and for fast verification of all samples produced is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
26

Chang, Qiu Xiang. "A Type of Bomb Falling Analysis and Reliability Verification." Applied Mechanics and Materials 215-216 (November 2012): 771–74. http://dx.doi.org/10.4028/www.scientific.net/amm.215-216.771.

Full text
Abstract:
Using UG to build a shell of the three-dimensional solid model, using the finite element software on the solid floor is analyzed, the shells fall into 8 drop, respectively, to various forms of stress and strain were compared, and the shells of the reliability analysis.
APA, Harvard, Vancouver, ISO, and other styles
27

HU, NA, BIN CONG, TAO GAO, YU CHEN, JUNYI SHEN, SHUJIN LI, and CHUNLING MA. "Application of mixsep software package: Performance verification of male-mixed DNA analysis." Molecular Medicine Reports 12, no. 2 (April 30, 2015): 2431–42. http://dx.doi.org/10.3892/mmr.2015.3710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Salaün, Gwen, Xiang Fu, and Sylvain Hallé. "Proceedings Fourth International Workshop on Testing, Analysis and Verification of Web Software." Electronic Proceedings in Theoretical Computer Science 35 (September 17, 2010): 1–2. http://dx.doi.org/10.4204/eptcs.35.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Murrill, Branson W. "Integrating Software Analysis, Testing, and Verification into the Undergraduate Computer Science Curriculum." Computer Science Education 8, no. 2 (August 1998): 85–99. http://dx.doi.org/10.1076/csed.8.2.85.3819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Gil, Amparo, Jean-Michel Muller, and Javier Segura. "Preface to the special issue on Numerical Software: Design, Analysis and Verification." Science of Computer Programming 90 (September 2014): 1. http://dx.doi.org/10.1016/j.scico.2014.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ripon, Shamim H., Sk Jahir Hossain, and Moshiur Mahamud Piash. "Logic-Based Analysis and Verification of Software Product Line Variant Requirement Model." International Journal of Knowledge and Systems Science 5, no. 4 (October 2014): 52–76. http://dx.doi.org/10.4018/ijkss.2014100104.

Full text
Abstract:
Software Product Line (SPL) provides the facility to systematically reuse of software improving the efficiency of software development regarding time, cost and quality. The main idea of SPL is to identify the common core functionality that can be implemented once and reused afterwards. A variant model has also to be developed to manage the variants of the SPL. Usually, a domain model consisting of the common and variant requirements is developed during domain engineering phase to alleviate the reuse opportunity. The authors present a product line model comprising of a variant part for the management of variant and a decision table to depict the customization of decision regarding each variant. Feature diagrams are widely used to model SPL variants. Both feature diagram and our variant model, which is based on tabular method, lacks logically sound formal representation and hence, not amenable to formal verification. Formal representation and verification of SPL has gained much interest in recent years. This chapter presents a logical representation of the variant model by using first order logic. With this representation, the table based variant model as well as the graphical feature diagram can now be verified logically. Besides applying first-order-logic to model the features, the authors also present an approach to model and analyze SPL model by using semantic web approach using OWL-DL. The OWL-DL representation also facilitates the search and maintenance of feature models and support knowledge sharing within a reusable engineering context. Reasoning tools are used to verify the consistency of the feature configuration for both logic-based and semantic web-based approaches.
APA, Harvard, Vancouver, ISO, and other styles
32

Amoiralis, Eleftherios I., Pavlos S. Georgilakis, Marina A. Tsili, Antonios G. Kladas, and Athanassios T. Souflaris. "Complete Software Package for Transformer Design Optimization and Economic Evaluation Analysis." Materials Science Forum 670 (December 2010): 535–46. http://dx.doi.org/10.4028/www.scientific.net/msf.670.535.

Full text
Abstract:
In the present paper, a Transformer Design Optimization (TDO) software package is developed providing a user-friendly transformer design and visualization environment. This software consists of a collection of design optimization, visualization and verification tools, able to provide transformer designers all the proper interactive capabilities required for the enhancement of the automated design process of a manufacturing industry.
APA, Harvard, Vancouver, ISO, and other styles
33

Ray, Sandip, Warren A. Hunt, John Matthews, and J. Strother Moore. "A Mechanical Analysis of Program Verification Strategies." Journal of Automated Reasoning 40, no. 4 (March 14, 2008): 245–69. http://dx.doi.org/10.1007/s10817-008-9098-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Shao Feng. "A Study on Network Protocol Validation Based on Timed Automata." Applied Mechanics and Materials 543-547 (March 2014): 3386–90. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3386.

Full text
Abstract:
With the increasingly complex of computer software system, traditional software engineering methods for major software development will inevitably produce a lot of mistakes and catastrophic consequences for key industry users. Experiment with software engineering methods cannot guarantee the behavior at infinity reliability and security of the state space. All this requires formal analysis and verification to the complex system. In protocol verification based on automatic machines, the automaton is used to represent the behavior of the system, the time automaton is a formal method can be well applied to the network protocol verification.
APA, Harvard, Vancouver, ISO, and other styles
35

Guéguen, Hervé, Marie-Anne Lefebvre, Janan Zaytoon, and Othman Nasri. "Safety verification and reachability analysis for hybrid systems." Annual Reviews in Control 33, no. 1 (April 2009): 25–36. http://dx.doi.org/10.1016/j.arcontrol.2009.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sabouri, Hamideh, and Ramtin Khosravi. "Reducing the verification cost of evolving product families using static analysis techniques." Science of Computer Programming 83 (April 2014): 35–55. http://dx.doi.org/10.1016/j.scico.2013.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Herd, Benjamin, Simon Miles, Peter McBurney, and Michael Luck. "Quantitative analysis of multi-agent systems through statistical verification of simulation traces." International Journal of Agent-Oriented Software Engineering 6, no. 2 (2018): 156. http://dx.doi.org/10.1504/ijaose.2018.094373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Herd, Benjamin, Michael Luck, Peter McBurney, and Simon Miles. "Quantitative analysis of multi-agent systems through statistical verification of simulation traces." International Journal of Agent-Oriented Software Engineering 6, no. 2 (2018): 156. http://dx.doi.org/10.1504/ijaose.2018.10015554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Georg, Geri, Kyriakos Anastasakis, Behzad Bordbar, Siv Hilde Houmb, Indrakshi Ray, and Manachai Toahchoodee. "Verification and Trade-Off Analysis of Security Properties in UML System Models." IEEE Transactions on Software Engineering 36, no. 3 (May 2010): 338–56. http://dx.doi.org/10.1109/tse.2010.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Chen, Xi, Yan Luo, Harry Hsieh, Laxmi Bhuyan, and Felice Balarin. "Assertion Based Verification and Analysis of Network Processor Architectures." Design Automation for Embedded Systems 9, no. 3 (September 2004): 163–76. http://dx.doi.org/10.1007/s10617-005-1193-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

YAMAMOTO, JUNICHI, AKIHIKO OHSUGA, and SHINICHI HONIDEN. "COOAD: A CASE TOOL FOR OBJECT-ORIENTED ANALYSIS AND DESIGN." International Journal of Software Engineering and Knowledge Engineering 05, no. 03 (September 1995): 367–89. http://dx.doi.org/10.1142/s0218194095000186.

Full text
Abstract:
Although many CASE tools for object-oriented methods (OO CASE tools) have been proposed, few, if any, can verify that the constructed analysis and design models actually match the requirements of the system being developed. In order to realize this kind of verification, we propose a software development method amalgamating OO CASE tools and algebraic specification techniques. We are developing an experimental system named COOAD (CASE tool for Object-Oriented Analysis and Design) in order to examine the effectiveness of our proposition. COOAD supports object-oriented analysis and design, verification of the analysis and design, and generation of code. In this paper, we propose the software development method, introduce COOAD, and illustrate the facilities of COOAD with an example.
APA, Harvard, Vancouver, ISO, and other styles
42

Gaggi, Ombretta, and Annalisa Bossi. "Analysis and verification of SMIL documents." Multimedia Systems 17, no. 6 (April 19, 2011): 487–506. http://dx.doi.org/10.1007/s00530-011-0233-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ugarte, Iñigo, and Pablo Sanchez. "Verification of Embedded Systems Based on Interval Analysis." International Journal of Parallel Programming 33, no. 6 (December 2005): 697–720. http://dx.doi.org/10.1007/s10766-005-8909-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

PERKUSICH, ANGELO, MARIA L. B. PERKUSICH, and SHI-KUO CHANG. "OBJECT ORIENTED DESIGN, MODULAR ANALYSIS, AND FAULT-TOLERANCE OF REAL-TIME CONTROL SOFTWARE SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 06, no. 03 (September 1996): 447–76. http://dx.doi.org/10.1142/s0218194096000193.

Full text
Abstract:
When specifying, designing and analyzing complex real-time systems, it is necessary to adopt a modular or compositional methodology. This methodology shall allow the designer the ability to verify local properties of individual modules or components in the system, and also shall allow the verification of the correct behavior of interacting components. The application of Petri nets for the modeling and verification of systems, at specification and design levels are well known. Despite the powerful structuring mechanisms available in the Petri nets theory for the construction of the model of complex systems, the designer is still likely to face the problem of state explosion, when analyzing and verifying large systems. In this work we introduce a modular analysis methodology for a kind of high level Petri nets named G-Nets.
APA, Harvard, Vancouver, ISO, and other styles
45

Zotkin, Sergey P., Nina S. Blokhina, and Irina A. Zotkina. "About Development and Verification of Software for Finite Element Analysis of Beam Systems." Procedia Engineering 111 (2015): 902–6. http://dx.doi.org/10.1016/j.proeng.2015.07.045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Mammen, Omana, Vijayan Nair, Satheesh Kumar, and D. I. Sreenath. "Data Analysis Packages for the Verification and Validation of Launch Vehicle Flight Software." IETE Technical Review 10, no. 1 (January 1993): 43–50. http://dx.doi.org/10.1080/02564602.1993.11437285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Morcos, Marc, Mohammad Rezaee, and Akila Viswanathan. "Verification Software Based on Failure Modes and Effects Analysis for HDR Brachytherapy Plans." Brachytherapy 17, no. 4 (July 2018): S129—S130. http://dx.doi.org/10.1016/j.brachy.2018.04.240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Güdemann, Matthias, and Leonardo Mariani. "Preface to the special issue on improving software quality through program analysis." Software Quality Journal 29, no. 3 (June 15, 2021): 595–96. http://dx.doi.org/10.1007/s11219-021-09563-0.

Full text
Abstract:
AbstractThis special issue is dedicated to the presentation of novel results in the scope of program analysis, verification, and testing of software to improve its quality. The papers included in the special issue present approaches that successfully combine model-based test case generation, reasoning about functional equivalence, data mining, classification, and the combination of abstraction with model-checking, to address real software applications in realistic settings.
APA, Harvard, Vancouver, ISO, and other styles
49

Garanina, N. O., E. V. Bodin, and E. A. Sidorova. "Using SPIN for verification of multiagent data analysis." Automatic Control and Computer Sciences 49, no. 7 (December 2015): 420–29. http://dx.doi.org/10.3103/s014641161507007x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Saleh, Mohamed, Ali Reza Arasteh, Assaad Sakha, and Mourad Debbabi. "Forensic analysis of logs: Modeling and verification." Knowledge-Based Systems 20, no. 7 (October 2007): 671–82. http://dx.doi.org/10.1016/j.knosys.2007.05.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography