UNIX STREAMS Generation from a Formal Specification
نویسندگان
چکیده
This paper describes a new idea of rapid protocol implementation starting from its formal specification, namely to generate Unix STREAMS modules. We have exercised this idea using Estelle formal specification technique. The generator was written for Linux system. The paper demonstrates how the semantic problems were resolved and gives some conclusions from generations we have performed.
منابع مشابه
A mapping system from Object-Z to C++
Object-Z is an extension of the formal specification language Z, augmenting the class concept as a structuring facility. This paper introduces and discusses a structural mapping sys tem f r o m Object-Z to the programming language C++, and reports on its implementat ion o n UNIX. The structural mapping translates an Object-Z specification consisting of classes into class interfaces of C++ such ...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملNext Generation Software Configuration Management System
As companies move towards larger software projects, management of these projects becomes a crucial issue. Software management can take on many meanings, from revision control to dependency tree specification. The dependency tree specification side of software management has been chiefly controlled by the UNIX Make command. This lightweight, text-based program allows users to specify dependencie...
متن کاملFormal verification of data-path circuits based on symbolic simulation
This paper presents a formal verification method based on logic simulation. In our method, using symbolic values even circuits which include data paths can be verified without abstruction of data paths. Our verifier extracts a transition relation from the state graph (given as a specification) which is expressed using symbolic values, and verifies based on simulation using those symbolic values...
متن کاملDomain Based Internet Security Policy Management
Abstract. As security devices and protocols become widely used on the Internet, the task of managing and processing communication security policies grows steeply in its complexity. This paper presents a scaleable, robust, secure distributed system that can manage communication security policies associated with multiple network domains and resolving the policies — esp. those that specify the use...
متن کامل