Model-Based Verification: A Technology for Dependable Upgrade

نویسندگان

  • David P. Gluch
  • Charles B. Weinstock
چکیده

v Acknowledgements vii Executive Summary ix 1 Background and Introduction 1 1.1 Goals of Model-Based Verification Efforts 1 1.2 Structure and Content of the Report 2 2 Model-Based Verification 3 2.1 The Model-Based Verification Paradigm 3 2.2 Context and Related Work 6 2.3 Model-Based Verification in Software Upgrades 6 3 Technical Aspects of Model-Based Verification 9 3.1 Models 9 3.2 Formalism in Modeling 10 3.3 Formal Methods for Verification 11 3.4 Formal Methods and Essential Models 11 3.4.1 Formalism 12 3.4.2 Abstraction 12 3.4.3 Perspective 13 3.4.4 Scope 13 3.5 Model-Based Verification Techniques 13 4 Model Checking 15 4.1 State Machines in Model Checking 15 4.2 Model-Checking Successes 16 4.2.1 IEEE Futurebus+ 16 4.2.2 Protocol Verification 17 4.2.3 Chip Set Design Checking 18 4.2.4 PowerPC 620 Microprocessor 18 4.2.5 Fujitsu Communications Chip 19

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model-Based Verification: A Technology for Dependable System Upgrade

v Acknowledgements vii Executive Summary ix 1 Background and Introduction 1 1.1 Goals of Model-Based Verification Efforts 1 1.2 Structure and Content of the Report 2 2 Model-Based Verification 3 2.1 The Model-Based Verification Paradigm 3 2.2 Context and Related Work 6 2.3 Model-Based Verification in Software Upgrades 6 3 Technical Aspects of Model-Based Verification 9 3.1 Models 9 3.2 Formalis...

متن کامل

Analysis of Intent Specification and System

The impact of computer programs in safety-critical systems has increased in the past decades and computer-based systems can now be found in a wide range of applications. A new approach for developing dependable systems is documenting all design rationale that affects safety using Intent Specifications. A recent approach for developing complex systems efficiently and in an upgradeable manner is ...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Why Do Upgrades Fail And What Can We Do About It? Toward Dependable, Online Upgrades in Enterprise System

Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. We propose a novel upgrade-centric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather than software defects. We show that current approach...

متن کامل

Why Do Upgrades Fail and What Can We Do about It? Toward Dependable, Online Upgrades in Enterprise Systems

Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. We propose a novel upgradecentric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather than software defects. We show that current approache...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998