Using formal methods to increase confidence in a home network system implementation: a case study
暂无分享,去创建一个
Ben Yan | Masahide Nakamura | Hiroshi Igaki | Lydie du Bousquet | Masahide Nakamura | L. D. Bousquet | H. Igaki | Ben Yan
[1] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[2] Stefan Luckner,et al. Formal Specification of Web Service Contracts for Automated Contracting and Monitoring , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[3] Gerardo Canfora,et al. Testing services and service-centric systems: challenges and opportunities , 2006, IT Professional.
[4] Priya Narasimhan,et al. Special Issue Service-Oriented Computing , 2008 .
[5] Tatsuhiro Tsuchiya,et al. Describing and verifying integrated services of home network systems , 2005, 12th Asia-Pacific Software Engineering Conference (APSEC'05).
[6] Jean-Louis Lanet,et al. A case study in JML-based software validation , 2004 .
[7] Jean-Louis Lanet,et al. A case study in JML-based software validation , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..
[8] Lydie du Bousquet. Feature Interaction Detection Using Testing and Model-Checking Experience Report , 1999, World Congress on Formal Methods.
[9] Friedemann Mattern,et al. Living in a smart environment - implications for the coming ubiquitous information society , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[10] David Geer. Nanotechnology: the growing impact of shrinking computers , 2006, IEEE Pervasive Computing.
[11] Gary T. Leavens,et al. JML: notations and tools supporting detailed design in Java , 2000 .
[12] 簡聰富,et al. 物件導向軟體之架構(Object-Oriented Software Construction)探討 , 1989 .
[13] Albert L. Baker,et al. JML: A Notation for Detailed Design , 1999, Behavioral Specifications of Businesses and Systems.
[14] Mike P. Papazoglou,et al. Introduction: Service-oriented computing , 2003, CACM.
[15] Mark Ryan,et al. The feature construct for SMV: Semantics , 2000, FIW.
[16] Ken-ichi Matsumoto,et al. Characterizing Safety of Integrated Services in Home Network System , 2007, ICOST.
[17] Bertrand Meyer,et al. Applying 'design by contract' , 1992, Computer.
[18] Michael D. Ernst,et al. An overview of JML tools and applications , 2003, Electron. Notes Theor. Comput. Sci..
[19] Murat Karaorman,et al. jContractor: Introducing Design-by-Contract to Java Using Reflective Bytecode Instrumentation , 2005, Formal Methods Syst. Des..
[20] Mark Lillibridge,et al. Extended static checking for Java , 2002, PLDI '02.
[21] Heike Wehrheim,et al. Jass - Java with Assertions , 2001, RV@CAV.
[22] Michael Jackson. The Role of Formalism in Method , 1999, World Congress on Formal Methods.
[23] Seng Wai Loke. Service-Oriented Device Ecology Workflows , 2003, ICSOC.
[24] Catharina Candolin,et al. A Security Framework for Service Oriented Architectures , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[25] MeyerBertrand,et al. Design by Contract , 1997 .
[26] Sophie Dupuy-Chessa,et al. Test of the ICARE Platform Fusion Mechanism , 2005, DSV-IS.
[27] John L. Bruno,et al. jContractor: A Reflective Java Library to Support Design by Contract , 1999, Reflection.
[28] Bart Jacobs,et al. The LOOP Compiler for Java and JML , 2001, TACAS.
[29] Shin Nakajima,et al. Model-Checking Verification for Reliable Web Service , 2002 .
[30] Fabio Massacci,et al. Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code , 2007, EuroPKI.
[31] Xiaoying Bai,et al. Contract-Based Testing for Web Services , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[32] Roberto Gorrieri,et al. Towards a formal framework for choreography , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[33] Mario Kolberg,et al. Compatibility issues between services supporting networked appliances , 2003, IEEE Commun. Mag..
[34] John M. Rushby. Mechanized Formal Methods: Where Next? , 1999, World Congress on Formal Methods.
[35] Schahram Dustdar,et al. Challenges and solutions for model driven Web service composition , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[36] Domenico Cotroneo,et al. Improving dependability of service oriented architectures for pervasive computing , 2003, Proceedings of the Eighth International Workshop on Object-Oriented Real-Time Dependable Systems, 2003. (WORDS 2003)..
[37] Krys J. Kochut,et al. A CP-nets-based design and verification framework for Web services composition , 2004 .
[38] Michael Rohs,et al. Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.
[39] Bernhard Beckert,et al. Verification of Object-Oriented Software. The KeY Approach - Foreword by K. Rustan M. Leino , 2007, The KeY Approach.
[40] Gary T. Leavens,et al. A Simple and Practical Approach to Unit Testing: The JML and JUnit Way , 2002, ECOOP.
[41] Lydie du Bousquet,et al. Filtering TOBIAS Combinatorial Test Suites , 2004, FASE.
[42] Allan Collins,et al. Assessment and technology , 1993, CACM.
[43] Sebastián Uchitel,et al. Model-based verification of Web service compositions , 2003, 18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings..
[44] Sérgio Vale Aguiar Campos,et al. Symbolic Model Checking , 1993, CAV.
[45] Ken-ichi Matsumoto,et al. Adapting Legacy Home Appliances to Home Network Systems UsingWeb Services , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[46] Bertrand Meyer,et al. Object-Oriented Software Construction, 2nd Edition , 1997 .
[47] Ken-ichi Matsumoto,et al. Constructing Home Network Systems and Integrated Services Using Legacy Home Appliances and Web Services , 2008, Int. J. Web Serv. Res..
[48] Bernhard Rumpe,et al. Behavioral Specifications of Businesses and Systems , 1999, Behavioral Specifications of Businesses and Systems.
[49] D.M. Cohen,et al. The Combinatorial Design Approach to Automatic Test Generation , 1996, IEEE Softw..
[50] Jianying Zhou,et al. Pervasive trusted computing , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[51] Jean-Louis Lanet,et al. Java Applet Correctness: A Developer-Oriented Approach , 2003, FME.
[52] Bernhard Beckert,et al. The KeY tool , 2005, Software & Systems Modeling.