Sciweavers

ISOLA
2010
Springer
13 years 10 months ago
Context-Sensitivity in IPET for Measurement-Based Timing Analysis
Abstract. The Implicit Path Enumeration Technique (IPET) has become widely accepted as a powerful technique to compute upper bounds on the Worst-Case Execution Time (WCET) of time-...
Michael Zolda, Sven Bünte, Raimund Kirner
IFM
2010
Springer
147views Formal Methods» more  IFM 2010»
13 years 10 months ago
Symbolic Model-Checking of Optimistic Replication Algorithms
Abstract. The Operational Transformation (OT) approach, used in many collaborative editors, allows a group of users to concurrently update replicas of a shared object and exchange ...
Hanifa Boucheneb, Abdessamad Imine, Manal Najem
IFM
2010
Springer
132views Formal Methods» more  IFM 2010»
13 years 10 months ago
From Operating-System Correctness to Pervasively Verified Applications
Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the in...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
IFM
2010
Springer
133views Formal Methods» more  IFM 2010»
13 years 10 months ago
Towards Probabilistic Modelling in Event-B
Abstract. Event-B provides us with a powerful framework for correctby-construction system development. However, while developing dependable systems we should not only guarantee the...
Anton Tarasyuk, Elena Troubitsyna, Linas Laibinis
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
13 years 10 months ago
Specification and Verification of Model Transformations Using UML-RSDS
In this paper we describe techniques for the specification and verification of model transformations using a combination of UML and formal methods. The use of UML 2 notations to s...
Kevin Lano, Shekoufeh Kolahdouz Rahimi
IFM
2010
Springer
205views Formal Methods» more  IFM 2010»
13 years 10 months ago
Adding Change Impact Analysis to the Formal Verification of C Programs
Handling changes to programs and specifications efficiently is a particular challenge in formal software verification. Change impact analysis is an approach to this challenge where...
Serge Autexier, Christoph Lüth
IFM
2010
Springer
183views Formal Methods» more  IFM 2010»
13 years 10 months ago
Certified Absence of Dangling Pointers in a Language with Explicit Deallocation
Safe is a first-order eager functional language with facilities for programmer controlled destruction and copying of data structures. It provides also regions, i.e. disjoint parts...
Javier de Dios, Manuel Montenegro, Ricardo Pe&ntil...
FORMATS
2010
Springer
13 years 10 months ago
Diagnosis Using Unfoldings of Parametric Time Petri Nets
This paper considers the model of Time Petri Nets (TPNs) extended with time parameters and its use to perform on-line diagnosis of distributed systems. We propose to base the metho...
Bartosz Grabiec, Louis-Marie Traonouez, Claude Jar...
FORMATS
2010
Springer
13 years 10 months ago
Natural Domain SMT: A Preliminary Assessment
SMT solvers have traditionally been based on the DPLL(T) algorithm, where the driving force behind the procedure is a DPLL search over truth valuations. This traditional framework ...
Scott Cotton
FORMATS
2010
Springer
13 years 10 months ago
Safraless Procedures for Timed Specifications
This paper presents extensions of Safraless algorithms proposed in the literature for automata on infinite untimed words to the case of automata on infinite timed words.
Barbara Di Giampaolo, Gilles Geeraerts, Jean-Fran&...