Automated verification of code automatically generated from Simulink®
暂无分享,去创建一个
[1] Jim Woodcock,et al. Using Z - specification, refinement, and proof , 1996, Prentice Hall international series in computer science.
[2] John Barnes,et al. High Integrity Ada: The Spark Approach , 1997 .
[3] Colin O'Halloran,et al. Experiences with PiZA, an Animator for Z , 1997, ZUM.
[4] Claude Marché,et al. Multi-prover Verification of C Programs , 2004, ICFEM.
[5] C. A. R. HOARE,et al. An axiomatic basis for computer programming , 1969, CACM.
[6] Colin O'Halloran,et al. ClawZ: control laws in Z , 2000, ICFEM 2000. Third IEEE International Conference on Formal Engineering Methods.
[7] Donald E. Knuth,et al. Literate Programming , 1984, Comput. J..
[8] Jean-Raymond Abrial,et al. Modeling in event-b - system and software engineering by Jean-Raymond Abrial , 2010, SOEN.
[9] Bev Littlewood. On Diversity, and the Elusiveness of Independence , 2002, SAFECOMP.
[10] M. Gordon,et al. Introduction to HOL: a theorem proving environment for higher order logic , 1993 .
[11] Colin O'Halloran,et al. Verification of picture generated code , 1999, 14th IEEE International Conference on Automated Software Engineering.
[12] Colin O'Halloran,et al. Using a formal specification contractually , 2005, Formal Aspects of Computing.
[13] Ajitha Rajan,et al. Requirements Coverage as an Adequacy Measure for Conformance Testing , 2008, ICFEM.
[14] Carroll Morgan,et al. Programming from specifications , 1990, Prentice Hall International Series in computer science.
[15] Andrew Ireland,et al. E-SPARK: Automated generation of provably correct code from formally verified designs , 2012 .
[16] Ewen Denney,et al. A Verification-Driven Approach to Traceability and Documentation for Auto-Generated Mathematical Software , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[17] Bev Littlewood,et al. Modeling the Effects of Combining Diverse Software Fault Detection Techniques , 2000, IEEE Trans. Software Eng..
[18] David Clark,et al. Safety and Security Analysis of Object-Oriented Models , 2002, SAFECOMP.
[19] Antony Powell,et al. Modeling Risk-Benefit Assumptions in Technology Substitution , 2007, ICSP.