Formal architecture modeling of sequential non-recursive C programs
暂无分享,去创建一个
Dilian Gurov | Jonas Westman | Mattias Nyberg | Joakim Gustavsson | D. Gurov | M. Nyberg | Jonas Westman | J. Gustavsson
[1] Eike Thaden,et al. A Model-Based Design Methodology with Contracts to Enhance the Development Process of Safety-Critical Systems , 2010, SEUS.
[2] Jonas Westman,et al. Extending Contract theory with Safety Integrity Levels , 2015, 2015 IEEE 16th International Symposium on High Assurance Systems Engineering.
[3] Roberto Passerone,et al. Multiple Viewpoint Contract-Based Specification and Design , 2008, FMCO.
[4] Dilian Gurov,et al. Compositional Algorithmic Verification of Software Product Lines , 2010, FMCO.
[5] Thomas A. Henzinger,et al. Software Verification with BLAST , 2003, SPIN.
[6] Arvinder Kaur,et al. Component Based Software Engineering , 2010 .
[7] Mark N. Wegman,et al. Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.
[8] Sanford Friedenthal,et al. A Practical Guide to SysML: The Systems Modeling Language , 2008 .
[9] Jonas Westman,et al. A Reference Example on the Specification of Safety Requirements using ISO 26262 , 2013, DECS@SAFECOMP.
[10] James B. Dabney,et al. Mastering Simulink 4 , 2001 .
[11] Jan Bosch,et al. Design erosion: problems and causes , 2002, J. Syst. Softw..
[12] Martín Abadi,et al. Composing Specifications , 1989, REX Workshop.
[13] Jozef Hooman,et al. The Quest Goes on: A Survey of Proofsystems for Partial Correctness of CSP , 1986, Current Trends in Concurrency.
[14] Alex Groce,et al. Modular verification of software components in C , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[15] Ivar Jacobson,et al. The unified modeling language reference manual , 2010 .
[16] Thomas A. Henzinger,et al. Reactive Modules , 1999, Formal Methods Syst. Des..
[17] Martin Törngren,et al. Structuring Safety Requirements in ISO 26262 Using Contract Theory , 2013, SAFECOMP.
[18] Martín Abadi,et al. The Existence of Refinement Mappings , 1988, LICS.
[19] Dilian Gurov,et al. Algorithmic verification of procedural programs in the presence of code variability , 2014, Sci. Comput. Program..
[20] Elizabeth Wolf. Hierarchical models of synchronous circuits for formal verification and substitution , 1996 .
[21] Harald C. Gall,et al. An evaluation of reverse engineering tool capabilities , 1998, J. Softw. Maintenance Res. Pract..
[22] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[23] Orna Grumberg,et al. Modular Model Checking of Software , 1998, TACAS.
[24] Ghulam Rasool,et al. Software Architecture Recovery , 2007 .
[25] Taghi M. Khoshgoftaar,et al. Measuring coupling and cohesion of software modules: an information-theory approach , 2001, Proceedings Seventh International Software Metrics Symposium.
[26] Sanjai Rayadurgam,et al. Your "What" Is My "How": Iteration and Hierarchy in System Design , 2013, IEEE Software.
[27] Ivar Jacobson,et al. Unified Modeling Language Reference Manual, The (2nd Edition) , 2004 .
[28] Jonas Westman,et al. Contracts for Structuring and Specifying Requirements on Cyber-Physical Systems , 2015 .
[29] Reinhard Diestel,et al. Graph Theory , 1997 .
[30] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[31] Jonas Westman,et al. Failure Propagation Modeling Based on Contracts Theory , 2015, 2015 11th European Dependable Computing Conference (EDCC).
[32] C. A. R. Hoare,et al. A Theory of Communicating Sequential Processes , 1984, JACM.
[33] Jonas Westman,et al. Formal Architecture Modeling of Sequential C-Programs , 2015, FACS.
[34] Thomas A. Henzinger,et al. The Discipline of Embedded Systems Design , 2007, Computer.
[35] Bengt Jonsson,et al. An algebraic theory of interface automata , 2014, Theor. Comput. Sci..
[36] Danda B. Rawat,et al. Cyber-Physical Systems: From Theory to Practice , 2015 .
[37] Manfred Broy,et al. Engineering Automotive Software , 2007, Proceedings of the IEEE.
[38] Jussi Koskinen,et al. Analysis of Ten Reverse Engineering Tools , 2008, SCSS.
[39] E. F. CODD,et al. A relational model of data for large shared data banks , 1970, CACM.
[40] Leslie Lamport,et al. Artificial Intelligence and Language Processing ]acques Cohen Editor a Simple Approach to Specifying Concurrent Systems , 2022 .
[41] Mattias Nyberg,et al. Failure propagation modeling for safety analysis using causal Bayesian networks , 2013, 2013 Conference on Control and Fault-Tolerant Systems (SysTol).
[42] David Greenaway,et al. Automated proof-producing abstraction of C code , 2014 .
[43] Radu Negulescu,et al. Process Spaces , 2000, CONCUR.
[44] S. Ramesh,et al. Compositional Verification of Software Product Lines , 2013, IFM.
[45] M. N. Armstrong,et al. Evaluating architectural extractors , 1998, Proceedings Fifth Working Conference on Reverse Engineering (Cat. No.98TB100261).
[46] Alberto L. Sangiovanni-Vincentelli,et al. Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems , 2012, Eur. J. Control.
[47] Bernhard Rumpe,et al. Evolving Software Architecture Descriptions of Critical Systems , 2010, Computer.
[48] Peter H. Feiler,et al. Model-Based Engineering with AADL , 2012 .
[49] Mohamed Jmaiel,et al. System of systems software architecture description using the ISO/IEC/IEEE 42010 standard , 2017, SAC.
[50] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[51] Thomas L. Harman,et al. Mastering Simulink , 2003 .
[52] Amir Pnueli,et al. Compositionality: The Significant Difference , 1999, Lecture Notes in Computer Science.
[53] Brian W. Kernighan,et al. The C Programming Language , 1978 .
[54] Hardi Hungar,et al. Using contract-based component specifications for virtual integration testing and architecture design , 2011, 2011 Design, Automation & Test in Europe.
[55] Rajeev Alur,et al. Modular refinement of hierarchic reactive machines , 2004, TOPL.
[56] Bernhard Josko,et al. Contract Based ISO CD 26262 Safety Analysis , 2009 .
[57] A. Sangiovanni-Vincentelli,et al. Frankenstein : Contract-Based Design for Cyber-Physical Systems ∗ g , 2013 .
[58] Jonas Westman,et al. Environment-Centric Contracts for Design of Cyber-Physical Systems , 2014, MoDELS.
[59] Mark A. Hillebrand,et al. VCC: A Practical System for Verifying Concurrent C , 2009, TPHOLs.
[60] David L. Dill,et al. Trace theory for automatic hierarchical verification of speed-independent circuits , 1989, ACM distinguished dissertations.
[61] Qin Ma,et al. 5.1.2 Designing Embedded Systems using Heterogeneous Rich Components 1 , 2008 .
[62] Michael Hind,et al. Pointer analysis: haven't we solved this problem yet? , 2001, PASTE '01.