منابع مشابه
Protocol Refinement: Formalization and Verification
Cross-organizational business processes are not adequately supported by traditional methods, which fail to separate the interactions and business relationships of the participants from their internal implementations. We adopt a recent approach that gives primacy to the interactions among the participants. In this approach, a (business) protocol describes an interaction among two or more partici...
متن کاملRefinement complements verification and validation
Knowledge based systems are being applied in ever increasing numbers . The development of knowledge acquisition tools has eased the ‘‘Knowledge Acquisition Bottleneck’’ . More recently there has been a demand for mechanisms to assure the quality of knowledge based systems . Checking the contents of the knowledge base and the performance of the knowledge based systems at various stages throughou...
متن کاملVisual Design and On-line Verification of Tabular Rule-Based
The paper is dedicated to presentation of a new approach to joint design and verification of rule-based systems. The principal idea is that verification should be performed on-line, incrementally, during system design. This allows for early detection and handling of knowledge base anomalies and inconsistencies. The proposed approach offers also an innovative visual tool for computer-aided desig...
متن کاملTheory Refinement for Program Verification
Recent progress in automated formal verification is to a large degree due to the development of constraint languages that are sufficiently light-weight for reasoning but still expressive enough to prove properties of programs. Satisfiability modulo theories (SMT) solvers implement efficient decision procedures, but offer little direct support for adapting the constraint language to the task at ...
متن کاملMCDASH: Refinement-Based Property Verification
This paper presents MCDASH, a refinement-based model checker for machine code. While model checkers such as SLAM, BLAST, and DASH have each made significant contributions in the field of verification/flaw-detection, their use has been restricted to programs for which source code is available. This paper discusses several challenges that arise when working with machine code, and explains how the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2002
ISSN: 1571-0661
DOI: 10.1016/s1571-0661(05)80492-x