UACFinder: Mining Syntactic Carriers of Unspecified Assumptions in Medical Cyber-Physical System Design Models

ing with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2020 Association for Computing Machinery. 2378-962X/2020/03-ART24 $15.00 https://doi.org/10.1145/3375405 ACM Transactions on Cyber-Physical Systems, Vol. 4, No. 3, Article 24. Publication date: March 2020.

[1]  AgrawalRakesh,et al.  Mining association rules between sets of items in large databases , 1993 .

[2]  Lui Sha,et al.  Modeling and integrating physical environment assumptions in medical cyber-physical system design , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[3]  Ahmed Amine Jerraya,et al.  Modeling and rapid prototyping of avionics using STATEMATE , 1995, Proceedings Sixth IEEE International Workshop on Rapid System Prototyping. Shortening the Path from Specification to Prototype.

[4]  Gösta Grahne,et al.  Efficiently Using Prefix-trees in Mining Frequent Itemsets , 2003, FIMI.

[5]  Gunnar Peterson,et al.  Software Assumptions Lead to Preventable Errors , 2009, IEEE Security & Privacy.

[6]  Lui Sha,et al.  Pattern-Based Statechart Modeling Approach for Medical Best Practice Guidelines - A Case Study , 2017, 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS).

[7]  Bart Goethals,et al.  A primer to frequent itemset mining for bioinformatics , 2013, Briefings Bioinform..

[8]  Lui Sha,et al.  Transforming Medical Best Practice Guidelines to Executable and Verifiable Statechart Models , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[9]  Воробьев Антон Александрович Анализ уязвимостей вычислительных систем на основе алгебраических структур и потоков данных National Vulnerability Database , 2013 .

[10]  Lui Sha,et al.  IAFinder: Identifying Potential Implicit Assumptions to Facilitate Validation in Medical Cyber-Physical System , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).

[11]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[12]  Steven J. Landry Human centered design in the air traffic control system , 2011, J. Intell. Manuf..

[13]  S YuPhilip,et al.  An effective hash-based algorithm for mining association rules , 1995 .

[14]  David Harel,et al.  Using the Statecharts paradigm for simulation of patient flow in surgical care , 2008, Health care management science.

[15]  Shouhuai Xu,et al.  VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.

[16]  P. Lago,et al.  Explicit assumptions enrich architectural models , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[17]  Grace A. Lewis,et al.  Assumptions Management in Software Development , 2004 .

[18]  Insup Lee,et al.  Safety-critical medical device development using the UPP2SF model translation tool , 2014, ACM Trans. Embed. Comput. Syst..

[19]  Lui Sha,et al.  An Organ-Centric Best Practice Assist System for Acute Care , 2016, 2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS).

[20]  J. Samet,et al.  From the Food and Drug Administration. , 2002, JAMA.

[21]  F. J. Corbató,et al.  On building systems that will fail , 1991, CACM.

[22]  Amnon Naamad,et al.  The STATEMATE semantics of statecharts , 1996, TSEM.

[23]  Lui Sha,et al.  Study of Software-Related Causes in the FDA Medical Device Recalls , 2017, 2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS).

[24]  M. Smith,et al.  Chronic renal insufficiency: a diagnostic and therapeutic approach. , 1998, Archives of internal medicine.

[25]  Insup Lee,et al.  From Verification to Implementation: A Model Translation Tool and a Pacemaker Case Study , 2012, 2012 IEEE 18th Real Time and Embedded Technology and Applications Symposium.

[26]  Diana Bohm Clinical Methods The History Physical And Laboratory Examinations , 2016 .

[27]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[28]  Bjarne Stroustrup,et al.  The C++ programming language (2nd ed.) , 1991 .

[29]  Zhenmin Li,et al.  PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code , 2005, ESEC/FSE-13.

[30]  Virendra Singh,et al.  Blood gas analysis for bedside diagnosis , 2013, National journal of maxillofacial surgery.

[31]  Craig D Smallwood,et al.  Carbon Dioxide Elimination and Oxygen Consumption in Mechanically Ventilated Children , 2014, Respiratory Care.

[32]  James D. Arthur,et al.  Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[33]  Yu Jiang,et al.  Weak-Assert: A Weakness-Oriented Assertion Recommendation Toolkit for Program Analysis , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion).

[34]  Yuriy Brun,et al.  Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms , 2015, IEEE Transactions on Software Engineering.

[35]  Tzeng-Ji Chen,et al.  Application of Frequent Itemsets Mining to Analyze Patterns of One-Stop Visits in Taiwan , 2011, PloS one.

[36]  Philip S. Yu,et al.  An effective hash-based algorithm for mining association rules , 1995, SIGMOD '95.

[37]  Lui Sha,et al.  An Assumptions Management Framework for Systems Software , 2006 .

[38]  Meir M. Lehman,et al.  Rules and Tools for Software Evolution Planning and Management , 2001, Ann. Softw. Eng..

[39]  Lui Sha,et al.  Use Runtime Verification to Improve the Quality of Medical Care Practice , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C).