An efficient approach to state space management in model checking of complex software systems using machine learning techniques
暂无分享,去创建一个
Vahid Rafe | Hamid Parvin | Samad Nejatian | Mohammad Yasrebi | H. Parvin | S. Nejatian | M. Yasrebi | V. Rafe
[1] David L. Dill,et al. A New Scheme for Memory-Efficient Probabilistic Verification , 1996, FORTE.
[2] Vahid Rafe,et al. MS-ACO: a multi-stage ant colony optimization to refute complex software systems specified through graph transformation , 2018, Soft Comput..
[3] Somesh Jha,et al. Exploiting symmetry in temporal logic model checking , 1993, Formal Methods Syst. Des..
[4] Ganesh Gopalakrishnan,et al. Random Walk Based Heuristic Algorithms for Distributed Memory Model Checking , 2003, PDMC@CAV.
[5] Stefan Edelkamp,et al. Directed explicit-state model checking in the validation of communication protocols , 2004, International Journal on Software Tools for Technology Transfer.
[6] Hartmut Ehrig,et al. Handbook of graph grammars and computing by graph transformation: vol. 2: applications, languages, and tools , 1999 .
[7] Enrique Alba,et al. Finding safety errors with ACO , 2007, GECCO '07.
[8] A. Prasad Sistla,et al. On-the-Fly Model Checking Under Fairness that Exploits Symmetry , 1999, Formal Methods Syst. Des..
[9] A. Prasad Sistla,et al. Symmetry and model checking , 1996, Formal Methods Syst. Des..
[10] Vahid Rafe,et al. EMCDM: Efficient model checking by data mining for verification of complex software systems specified through architectural styles , 2016, Appl. Soft Comput..
[11] Thomas G. Dietterich. An Experimental Comparison of Three Methods for Constructing Ensembles of Decision Trees: Bagging, Boosting, and Randomization , 2000, Machine Learning.
[12] Maria Luisa Villani,et al. Ant Colony Optimization for Deadlock Detection in Concurrent Systems , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[13] David L. Dill,et al. Improved probabilistic verification by hash compaction , 1995, CHARME.
[14] Vahid Rafe,et al. A meta-heuristic solution for automated refutation of complex software systems specified through graph transformations , 2015, Appl. Soft Comput..
[15] Vahid Rafe,et al. Using evolutionary algorithms for reachability analysis of complex software systems specified through graph transformation , 2019, Reliab. Eng. Syst. Saf..
[16] Dragan Bosnacki,et al. Partial-order reduction for general state exploring algorithms , 2006, International Journal on Software Tools for Technology Transfer.
[17] Reiko Heckel,et al. Compositional Verification of Reactive Systems Specified by Graph Transformation , 1998, FASE.
[18] Mohsen Rahmani,et al. A heuristic solution for model checking graph transformation systems , 2014, Appl. Soft Comput..
[19] Pierre Wolper,et al. Memory-efficient algorithms for the verification of temporal properties , 1990, Formal Methods Syst. Des..
[20] Luciano Baresi,et al. Tutorial Introduction to Graph Transformation: A Software Engineering Perspective , 2002, ICGT.
[21] Edmund M. Clarke,et al. Symbolic Model Checking: 10^20 States and Beyond , 1990, Inf. Comput..
[22] Alberto Lluch-Lafuente. Symmetry reduction and heuristic search for error detection in model checking , 2003 .
[23] Ming T. Liu,et al. Protocol verification using reachability analysis: the state space explosion problem and relief strategies , 1987, Computer Communication Review.
[24] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD 2000.
[25] Xavier Crégut,et al. Automated Failure Analysis in Model Checking Based on Data Mining , 2014, MEDI.
[26] J. Gaschnig. Performance measurement and analysis of certain search algorithms. , 1979 .
[27] Stefan Leue,et al. Mining Sequential Patterns to Explain Concurrent Counterexamples , 2013, SPIN.
[28] Hartmut Ehrig,et al. Graph-Grammars: An Algebraic Approach , 1973, SWAT.
[29] David L. Dill,et al. Validation with guided search of the state space , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[30] Dimitar Dimitrov,et al. Stateless model checking of event-driven applications , 2015, OOPSLA.
[31] Arend Rensink,et al. Model Checking Dynamic States in GROOVE , 2006, SPIN.
[32] V. Vapnik,et al. Bounds on Error Expectation for Support Vector Machines , 2000, Neural Computation.
[33] Efstathios Stamatatos,et al. Syntactic N-grams as machine learning features for natural language processing , 2014, Expert Syst. Appl..
[34] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[35] Pierre Wolper,et al. Reliable Hashing without Collosion Detection , 1993, CAV.
[36] Majid Nili Ahmadabadi,et al. Bounded Rational Search for On-the-Fly Model Checking of LTL Properties , 2009, FSEN.
[37] Vahid Rafe. Scenario-driven analysis of systems specified through graph transformations , 2013, J. Vis. Lang. Comput..
[38] Vahid Rafe,et al. Searching for violation of safety and liveness properties using knowledge discovery in complex systems specified through graph transformations , 2018, Inf. Softw. Technol..