Sciweavers

ASE
2005
137views more  ASE 2005»
13 years 11 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
ASE
2005
96views more  ASE 2005»
13 years 11 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
ASE
2005
140views more  ASE 2005»
13 years 11 months ago
Automated Procedure Construction for Deductive Synthesis
Deductive program synthesis systems based on automated theorem proving offer the promise of software that is correct by construction. However, the difficulty encountered in constru...
Steve Roach, Jeffrey Van Baalen
ASE
2005
102views more  ASE 2005»
13 years 11 months ago
Tool-Supported Verification of Product Line Requirements
A recurring difficulty for organizations that employ a product-line approach to development is that when a new product is added to an existing product line, there is currently no a...
Prasanna Padmanabhan, Robyn R. Lutz
ASE
2005
103views more  ASE 2005»
13 years 11 months ago
Component Verification with Automatically Generated Assumptions
Abstract. Model checking is an automated technique that can be used to determine whether a system satisfies certain required properties. The typical approach to verifying propertie...
Dimitra Giannakopoulou, Corina S. Pasareanu, Howar...
ASE
2005
124views more  ASE 2005»
13 years 11 months ago
Reuse-Conducive Development Environments
Despite its well-recognized benefits, software reuse has not met its expected success due to technical, cognitive, and social difficulties. We have systematically analyzed the reu...
Yunwen Ye, Gerhard Fischer
ASE
2005
102views more  ASE 2005»
13 years 11 months ago
Modular Verification of Open Features Using Three-Valued Model Checking
Feature-oriented programming organizes programs around features rather than objects, thus better supporting extensible, product-line architectures. Programming languages increasin...
Harry C. Li, Shriram Krishnamurthi, Kathi Fisler
ASE
2005
145views more  ASE 2005»
13 years 11 months ago
Developing Ambient Intelligence Systems: A Solution based on Web Services
Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectiv...
Valérie Issarny, Daniele Sacchetti, Ferda T...
ASE
2005
91views more  ASE 2005»
13 years 11 months ago
Deviation Analysis: A New Use of Model Checking
Inaccuracies, or deviations, in the measurements of monitored variables in a control system are facts of life that control software must accommodate. Deviation analysis can be used...
Mats Per Erik Heimdahl, Yunja Choi, Michael W. Wha...