UNIX STREAMS Generation from a Formal Specification

نویسندگان

  • Pawel Rychwalski
  • Jacek Wytrebowicz
چکیده

This paper describes a new idea of rapid protocol implementation starting from its formal specification, namely to generate Unix STREAMS modules. We have exercised this idea using Estelle formal specification technique. The generator was written for Linux system. The paper demonstrates how the semantic problems were resolved and gives some conclusions from generations we have performed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A mapping system from Object-Z to C++

Object-Z is an extension of the formal specification language Z, augmenting the class concept as a structuring facility. This paper introduces and discusses a structural mapping sys tem f r o m Object-Z to the programming language C++, and reports on its implementat ion o n UNIX. The structural mapping translates an Object-Z specification consisting of classes into class interfaces of C++ such ...

متن کامل

Web Service Choreography Verification Using Z Formal Specification

Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...

متن کامل

Next Generation Software Configuration Management System

As companies move towards larger software projects, management of these projects becomes a crucial issue. Software management can take on many meanings, from revision control to dependency tree specification. The dependency tree specification side of software management has been chiefly controlled by the UNIX Make command. This lightweight, text-based program allows users to specify dependencie...

متن کامل

Formal verification of data-path circuits based on symbolic simulation

This paper presents a formal verification method based on logic simulation. In our method, using symbolic values even circuits which include data paths can be verified without abstruction of data paths. Our verifier extracts a transition relation from the state graph (given as a specification) which is expressed using symbolic values, and verifies based on simulation using those symbolic values...

متن کامل

Domain Based Internet Security Policy Management

Abstract. As security devices and protocols become widely used on the Internet, the task of managing and processing communication security policies grows steeply in its complexity. This paper presents a scaleable, robust, secure distributed system that can manage communication security policies associated with multiple network domains and resolving the policies — esp. those that specify the use...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003