Skip to main content
    • by 
    •   5  
      Software DevelopmentInformation ProcessingFormal methodFormal Model
Given a data set about an individual or group (e.g., interviewer ratings, life history or demographic facts, test results, self-descriptions), there are two modes of data combination for a predictive or diagnostic purpose. The clinical... more
    • by 
    •   8  
      PsychologyLawLife historyComparative Research
Software defect prediction strives to improve software quality and testing efficiency by constructing predictive classification models from code attributes to enable a timely identification of fault-prone modules. Several classification... more
    • by 
    •   13  
      Information SystemsSoftware EngineeringData MiningPublic Domain
This paper formalizes the process of updating the nowcast and forecast on output and inflation as new releases of data become available. The marginal contribution of a particular release for the value of the signal and its precision is... more
    • by 
    •   14  
      Monetary EconomicsEconomic TheoryForecastingApplied Economics
Twelve years ago, Proceedings of the IEEE devoted a special section to the synchronous languages. This paper discusses the improvements, difficulties, and successes that have occured with the synchronous languages since then. Today,... more
    • by 
    •   11  
      Biomedical EngineeringRocket/Missile Embedded Control SystemNew TechnologyDesign method
This paper describes a translator called Java PathFinder (Jpf), which translates from Java to Promela, the modeling language of the Spin model checker. Jpf translates a given Java program into a Promela model, which then can be model... more
    • by 
    •   6  
      Model CheckingJava ProgrammingModeling LanguageComputer Software
Probabilistic model checking is an automatic formal verification technique for analysing quantitative properties of systems which exhibit stochastic behaviour. PRISM is a probabilistic model checking tool which has already been... more
    • by 
    •   18  
      Distributed ComputingModel CheckingSystems EngineeringModeling
    • by 
    •   13  
      Cognitive ScienceStatic AnalysisJava ProgrammingJava Card
    • by 
    •   18  
      Information SystemsComputer ArchitectureFormal methodsTheorem Proving
    • by 
    •   12  
      Set TheoryProof TheoryModelingTheorem Proving
Finite-state verification (e.g., model checking) provides a powerful means to detect errors that are often subtle and difficult to reproduce. Nevertheless, the transition of this technology from research to practice has been slow. While... more
    • by 
    •   4  
      Model CheckingFormal SpecificationConcurrent SystemsFormal method
Although software documentation standards often go into great detail about the format of documents, describing such details as paragraph numbering and section headings, they fail to give precise descriptions of the information to be... more
    • by 
    •   6  
      Software EngineeringSystem DesignComputer SoftwareFormal method
We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software systems into... more
    • by 
    •   24  
      Information SystemsSoftware EngineeringVisualizationSAT Solver Design
This article describes the development and formal verification (proof of semantic preservation) of a compiler back-end from Cminor (a simple imperative intermediate language) to PowerPC assembly code, using the Coq proof assistant both... more
    • by 
    •   6  
      Cognitive ScienceFormal methodsAutomated reasoningFormal method
Since its inception as a student project in 2001, initially just for the handling (as the name implies) of convex polyhedra, the Parma Polyhedra Library has been continuously improved and extended by joining scrupulous research on the... more
    • by 
    •   10  
      Static AnalysisAbstract InterpretationSoftware DevelopmentContinuous Improvement
The paper describes a model-integrated approach for embedded software development that is based on domain-specific, multiple-view models used in all phases of the development process. Models explicitly represent the embedded software and... more
    • by 
    •   30  
      Software EngineeringBiomedical EngineeringEmbedded SystemsModeling
There has been much interest in password-authenticated keyexchange protocols which remain secure even when users choose passwords from a very small space of possible passwords (say, a dictionary of English words). Under this assumption,... more
    • by 
    •   19  
      ModelingComputer SecurityCryptographyAuthentication
    • by 
    •   6  
      EngineeringSoftware EngineeringTechnologyComputer Networks
    • by 
    •   12  
      Software DevelopmentWeb ServicesWorkflowGraphics
Wepresenttheon-the-∞ymodel-checkerOFMC,atoolthatcombinestwoideasforanalyzing security protocols based on lazy, demand-driven search. The flrst is the use of lazy data- types as a simple way of building e-cient on-the-∞y model-checkers for... more
    • by 
    •   6  
      Information SecurityInformationFormal methodState Space
Big information worlds cause big problems for interfaces. There is too much to see. They are hard to navigate. An armada of techniques has been proposed to present the many scales of information needed. Space-scale diagrams provide an... more
    • by 
    •   5  
      Information VisualizationUser InterfaceFormal methodDesign Rationale
Although the majority of software testing in industry is conducted at the system level, most formal research has focused on the unit level. As a result, most system-level testing techniques are only described informally. This paper... more
    • by 
    •   8  
      Software TestingSpecification-based TestingComputer SoftwareCase Study
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap between safety-critical and best-effort engineering... more
    • by 
    •   5  
      ModelingHeterogeneityEmbedded System DesignFormal method
Alcoa is a tool for analyzing object models. It has a range of uses. At one end, it can act as a support tool for object model diagrams, checking for consistency of multiplicities and generating sample snapshots. At the other end, it... more
    • by 
    •   8  
      Computer ScienceSAT Solver DesignModel CheckingFormal Specification
    • by 
    •   8  
      Information SystemsMechanical EngineeringApplied MathematicsSoftware Engineering
This paper addresses urban land tenure issues and policy options, particularly in developing countries. It draws heavily on a recent review of the literature and a research project on &Innovative approaches to tenure for the urban poor'... more
    • by 
    •   14  
      Human GeographyProperty RightsLand managementLand tenure
Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust treatment of their success probability, and the success chances of these attacks have commonly been estimated in a rather... more
    • by 
    •   32  
      Digital SignatureStatistical AnalysisComputer SecurityCryptography
A detailed generic model of the control design process is introduced and discussed. It is used for surveying different formal approaches in the context of PLC programming. The survey focuses on formal methods for verification and... more
    • by 
    •   21  
      Model CheckingLogic ProgrammingProcess ControlAutomata
KeY is a tool that provides facilities for formal specification and verification of programs within a commercial platform for UML based software development. Using the KeY tool, formal methods and object-oriented development techniques... more
    • by 
    •   15  
      Information SystemsSoftware DevelopmentFormal AnalysisJava Card
TermiLog is a system implemented in SICStus Prolog for automatically checking termination of queries to logic programs. Given a program and query, the system either answers that the query terminates or that it cannot prove termination.... more
    • by 
    •   32  
      Static AnalysisModel CheckingTiming AnalysisComputer Aided Design
In this paper we present an ontology for situation awareness. One of our goals is to support the claim that this ontology is a reasonable candidate for representing various scenarios of situation awareness. Towards this aim we provide an... more
    • by 
    •   4  
      Situation awarenessInformation FusionFormal methodDomain Specificity
A controversial issue in the formal methods community i s the degree to which mathematical sophistication and theorem proving skills should be needed to apply a formal method and its support tools. This paper describes the SCR Software... more
    • by 
    •   9  
      Software EngineeringComputer Aided DesignSoftware DevelopmentSystem Design
Recognizing and dealing with storage and timing channels when performing the security analysis of a computer system is an elusive task. Methods for discovering and dealing with these channels have mostly been informal, and formal methods... more
    • by 
    •   11  
      Information SystemsCovert ChannelsComputer HardwareComputer Software
This paper proposes an approach to optimally synthesize quantum circuits by symbolic reachability analysis, where the primary inputs and outputs are basis binary and the internal signals can be nonbinary in a multiple-valued domain. The... more
    • by 
    •   16  
      Model CheckingComputer Aided DesignComputer HardwareQuantum Logic
    • by 
    •   8  
      Software DevelopmentKnowledge RepresentationDesign processReal Time Systems
    • by 
    •   13  
      Software EngineeringModelingSoftware DevelopmentSteganography
Rationale: The reinstatement procedure has been used increasingly as a laboratory model of craving and relapse to drug abuse. With the number of reports involving this procedure growing, its validity as a model of relapse merits... more
    • by 
    •   19  
      PsychopharmacologyAddictionEvaluationEnvironmental Change
Current Web service choreography proposals, such as BPEL4WS, BPSS, WSFL, WSCDL or WSCI, provide notations for describing the message flows in Web service collaborations. However, such proposals remain at the descriptive level, without... more
    • by 
    •   6  
      Cognitive ScienceTheoretical Computer ScienceComputer SoftwareFormal method
We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance that the target program is running correctly with respect to a formal... more
    • by 
    •   10  
      Distributed ComputingFormal methodsSoftware ReliabilityJava Programming
This study addresses two objectives: (1) to develop a formal method of optimally locating a dense network of air pollution monitoring stations; and (2) to derive an exposure assessment model based on these monitoring data and related land... more
    • by 
    •   13  
      Environmental EngineeringAtmospheric ScienceAir pollutionExposure Assessment
We present a method for generating linear invariants for large systems. The method performs forward propagation in an abstract domain consisting of arbitrary polyhedra of a predefined fixed shape. The basic operations on the domain like... more
    • by 
    •   34  
      Static AnalysisAbstract InterpretationModel CheckingMathematical Programming
Goal orientation is an increasingly recognized paradigm for eliciting, modeling, specifying and analyzing software requirements. Goals are statements of intent organized in AND/OR refinement structures; they range from high-level,... more
    • by 
    •   9  
      Goal Oriented Requirements EngineeringFormal SemanticsFormal methodSoftware Requirements
Software reuse is one of the most advertised advantages of object-orientation. Inheritance, in all its forms, plays an important part in achieving greater reuse, at all stages of development. Class hierarchies start taking shape at the... more
    • by  and +1
    •   6  
      Software ReuseFormal methodPerforationGalois Lattice
    • by 
    •   2  
      Formal methodInteractive Monitoring System
    • by 
    •   20  
      LanguagesComputer ScienceSecurityFormal methods
A growing number of applications, often with firm or soft real-time requirements, are integrated on the same System on Chip, in the form of either hardware or software intellectual property. The applications are started and stopped at run... more
    • by 
    •   12  
      Intellectual PropertyComputer HardwareSystem DesignComputer Software
Specifications that are used in detailed design and in the documentation of existing code are primarily written and read by programmers. However, most formal specification languages either make heavy use of symbolic mathematical... more
    • by 
    •   9  
      DocumentationFormal methodsComputer SoftwareFormal method
Memetic algorithms (MAs) represent one of the recent growing areas in evolutionary algorithm (EA) research. The term MAs is now widely used as a synergy of evolutionary or any population-based approach with separate individual learning or... more
    • by 
    •   27  
      Information SystemsGeneticsArtificial IntelligenceEvolutionary Computation
Safety critical software requires integrating verification techniques in software development methods. Software architectures must guarantee that developed systems will meet safety requirements and safety analyses are frequently used in... more
    • by 
    •   92  
      Software EngineeringObject Oriented ProgrammingType TheorySoftware Maintenance
Exposing inconsistencies can uncover many defects in software specifications. One approach to exposing inconsistencies analyzes two redundant specifications, one operational and the other property-based, and reports discrepancies. This... more
    • by 
    •   34  
      Information SystemsSoftware EngineeringModel CheckingSoftware Development