期刊文献+

模型检测在软件需求分析及设计中的应用 被引量:3

APPLICATION OF MODEL CHECKING IN SOFTWARE REQUIREMENTS ANALYSIS AND DESIGN
下载PDF
导出
摘要 模型检测技术因其完全自动化并且验证速度快的优点在硬件及协议的验证中广泛应用,近年来在软件领域的应用研究也不断涌现。总结了模型检测在软件需求分析及设计中已有的应用技术,包括利用模型检测工具对RSML,SCR和UML图形的检测,以及直接的模型检测,并从不同角度对已有技术进行系统的分析和比较。最后对该项技术研究的方向进行展望。 Model checking is used widely in hardware, protocol domain because of the virtue of automatism and high checking rate. Recent years, research of model checking in software domain is developing rapidly, too. We conclude the existed application technology about model checking in software requirements analysis and design,including model checking RSML, SCR, and UML diagrams with model checker, and model checking directly. We also analyze and compare existed technologies from two angles. Finally, we identify some issues which are still open to further research.
出处 《计算机应用与软件》 CSCD 2009年第4期128-130,共3页 Computer Applications and Software
关键词 模型检测 模型检测工具 直接检测 Model checking Model checker Checking directly
  • 相关文献

参考文献13

  • 1Peled D A. Software Reliability Methods[M]. Springer-Verlog, 2001.
  • 2Clarke EM, Grumberg J O, PELED D A. Model Checking[ M]. MIT, 1999.
  • 3赵辉,李彤.基于模型的验证及其方法[J].计算机工程,2001,27(8):45-46. 被引量:5
  • 4Chan W, Anderson R, Beame P,et al. Model checking large software specifications. IEEETrans. on Software Engineering, 1998,24 (7).
  • 5Alspaugh T, Faulk S, Britton K, et al. Software Requirements for the A-7E Aircraft[ R]. Washington DC 20375 USA:Naval Research Labora-tory, 1992.
  • 6朱雪峰,金芝.关于软件需求中的不一致性管理[J].软件学报,2005,16(7):1221-1231. 被引量:24
  • 7朱雪阳,唐稚松.Statecharts的组合语义与求精[J].软件学报,2006,17(4):670-681. 被引量:4
  • 8Mikk E, Lakhnech Y, Siegel M. Hierarchical Automata as Model for Satecharts [ A ]. ASIAN97,1997.
  • 9Mikk E, Lakhnech Y, Siegel M, et al. Implementing Statecharts in PROMELA/SPIN [A]. In: Proc of Workshop on Industrial-Strength Formal Specification Tecniques, 1998.
  • 10Lilius J, Pahor I P. VUML: A Tool for Verfying UML Models[ R].TUCS Centre for Computer Science, TUCSTechnical Report No 272,1999.

二级参考文献12

  • 1朱雪阳,唐稚松.UML活动图的时序逻辑语义[J].计算机研究与发展,2005,42(9):1478-1484. 被引量:13
  • 2刘剑.基于代数系统网和Unity逻辑的并发系统规约及证明方法:硕士毕业论文[M].云南大学计算机系,..
  • 3Chan W,IEEE Trans Software Eng,1998年,24卷,7期,498页
  • 4Clarke E M,ACM Computing Surveys,1996年,626页
  • 5Clarke E M,ACM Transactions on Program Languages and Systems,1994年,16卷,4/6期,1512页
  • 6刘剑,硕士学位论文
  • 7Lilius J,TUCS Technical Report,1999年,272期
  • 8C. Courcoubetis,M. Vardi,P. Wolper,M. Yannakakis. Memory-efficient algorithms for the verification of temporal properties[J] 1992,Formal Methods in System Design(2-3):275~288
  • 9白硕,隋立颖,陈庆锋,付岩,庄超.安全协议的验证逻辑[J].软件学报,2000,11(2):213-221. 被引量:18
  • 10朱雪阳,唐稚松.基于时序逻辑的软件体系结构描述语言XYZ/ADL[J].软件学报,2003,14(4):713-720. 被引量:40

共引文献74

同被引文献27

  • 1苏开乐,骆翔宇,吕关锋.符号化模型检测CTL[J].计算机学报,2005,28(11):1798-1806. 被引量:24
  • 2陈晓梅.入侵检测中的数据预处理问题研究[J].计算机科学,2006,33(1):81-83. 被引量:13
  • 3吕关锋,苏开乐,林瀚,骆翔宇,陈清亮,岳伟亚.基于BDD的图表示及其算法[J].中山大学学报(自然科学版),2006,45(1):20-24. 被引量:4
  • 4刘静,何积丰,缪淮扣.模型驱动架构中模型构造与集成策略[J].软件学报,2006,17(6):1411-1422. 被引量:26
  • 5BRYANT R E. Graph based algorithms for Boolean function manipulation[J]. IEEE Transactions on Com- puters, 1986(8) :677-691.
  • 6Hart J W,Kamber M.数据挖掘一概念与技术[M].范明,孟小峰,译.北京:机械工业出版社,2001.
  • 7Agrawal R, Sbikant R. Fast algorithms for mining association rules[ C ]//Proceedings of 1994 International Conference on Very Large Data Bases(VLDB94). Santiago: [ s. n. ] ,1994.
  • 8Hay J, Pei J,Yv Y. Mining frequent patterns without candi- date generations [ C ]//Proceedings of 2000 ACM - SIGMOD International Conference on Management of Data. Dallas: [ s.n.],2000.
  • 9Luo Jiangxiong, Bridges S. Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection [ J ]. In- ternational Journal of Intelligent Systems, 2000,15 ( 8 ) : 687 - 704.
  • 10Lee W,Stolfo S. Mining in a Data-Flow Environment: Expe- rience in Network Intrusion Detection [ C] //Proc of the AC- MSIGKDD Int' 1 Conf Knowledge Discovery & Data Mining. [s. l. ]: [s. n. ] ,1999.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部