共查询到11条相似文献,搜索用时 0 毫秒
1.
2.
The modelling of delay-insensitive asynchronous circuits in the process calculus CCS is addressed. MUST-testing (rather than bisimulation) is found to support verification both of the property of delay-insensitivity and of design by stepwise refinement. Automated verification is possible with a well-known tool, the Edinburgh Concurrency Workbench. 相似文献
3.
We describe an innovative method for proving total correctness of tail recursive programs having a specific structure, namely programs in which an auxiliary tail recursive function is driven by a main nonrecursive function, and only the specification of the main function is provided. The specification of the auxiliary function is obtained almost fully automatically by solving coupled linear recursive sequences with constant coefficients. The process is carried out by means of CA (Computer Algebra) and AC (Algorithmic Combinatorics) and is implemented in the Theorema system (using Mathematica). We demonstrate this method on an example involving polynomial expressions. Furthermore, we develop a method for synthesis of recursive programs for computing polynomial expressions of a fixed degree by means of “cheap” operations, e.g., additions, subtractions and multiplications. For a given polynomial expression, we define its recursive program in a schemewise manner. The correctness of the synthesized programs follows from the general correctness of the synthesis method, which is proven once for all, using the verification method presented in the first part of this paper. 相似文献
4.
This paper presents some results of integrating predicate transition nets with first order temporal logic in the specification and verification of concurrent systems. The intention of this research is to use predicate transition nets as a specification method and to use first order temporal logic as a verification method so that their strengths — the easy comprehension of predicate transition nets and the reasoning power of first order temporal logic can be combined. In this paper, a theoretical relationship between the computation models of these two formalisms is presented; an algorithm for systematically translating a predicate transition net into a corresponding temporal logic system is outlined; and a special temporal refutation proof technique is proposed and illustrated in verifying various concurrent properties of the predicate transition net specification of the five dining philosophers problem. 相似文献
5.
This paper presents a principled SVM based speaker verification system. We propose a new framework and a new sequence kernel that can make use of any Mercer kernel at the frame level. An extension of the sequence kernel based on the Max operator is also proposed. The new system is compared to state-of-the-art GMM and other SVM based systems found in the literature on the Banca and Polyvar databases. The new system outperforms, most of the time, the other systems, statistically significantly. Finally, the new proposed framework clarifies previous SVM based systems and suggests interesting future research directions. 相似文献
6.
Modeling and verification of a telecommunication application using live sequence charts and the Play-Engine tool 总被引:1,自引:0,他引:1
We apply the scenario-based approach to modeling, via the language of live sequence charts (LSCs) and the Play-Engine tool
to a real-world complex telecommunication service, . It allows a user to call for help from a doctor, the fire brigade, a car maintenance service, etc. These kinds of services
are built on top of an embedded platform, using both new and existing service components, and their complexity stems from
their distributed architecture, the various time constraints they entail, and their rapidly evolving underlying systems. A
well known problem in this class of telecommunication applications is that of feature interaction, whereby a new feature might
cause problems in the execution of existing features. Our approach provides a methodology for high-level modeling of telecommunication
applications that can help in detecting feature interaction at early development stages. We exhibit the results of applying
the methodology to the specification, animation and formal verification of the Depannage service.
相似文献
Hillel Kugler (Corresponding author)Email: |
7.
Live Sequence Charts (LSC) extend Message Sequence Charts (MSC), mainly by distinguishing possible from necessary behavior.
They thus enable the specification of rich multi-modal scenario-based properties, such as mandatory, possible and forbidden
scenarios. The sequence diagrams of UML 2.0 enrich those of previous versions of UML by two new operators, assert and negate, for specifying required and forbidden behaviors, which appear to have been inspired by LSC. The UML 2.0 semantics of sequence
diagrams, however, being based on pairs of valid and invalid sets of traces, is inadequate, and prevents the new operators
from being used effectively.
We propose an extension of, and a different semantics for this UML language—Modal Sequence Diagrams (MSD)—based on the universal/existential modal semantics of LSC. In particular, in MSD assert and negate are really modalities, not operators. We define MSD as a UML 2.0 profile, thus paving the way to apply formal verification,
synthesis, and scenario-based execution techniques from LSC to the mainstream UML standard.
Preliminary version appeared in SCESM '06: Proc. of the 2006 Int.
workshop on Scenarios and State Machines, Shanghai, China (May 2006) [15]. This research was supported by the Israel Science
Foundation (grant No.287/02-1), and by The John von Neumann Minerva Center for the Development of
Reactive Systems at the Weizmann Institute of Science. 相似文献
8.
Convex polyhedra are the basis for several abstractions used in static analysis and computer-aided verification of complex and sometimes mission-critical systems. For such applications, the identification of an appropriate complexity–precision trade-off is a particularly acute problem, so that the availability of a wide spectrum of alternative solutions is mandatory. We survey the range of applications of polyhedral computations in this area; give an overview of the different classes of polyhedra that may be adopted; outline the main polyhedral operations required by automatic analyzers and verifiers; and look at some possible combinations of polyhedra with other numerical abstractions that have the potential to improve the precision of the analysis. Areas where further theoretical investigations can result in important contributions are highlighted. 相似文献
9.
10.
Steven D. Johnson Yanhong A. Liu Yuchen Zhang 《International Journal on Software Tools for Technology Transfer (STTT)》2003,4(2):211-223
A systematic transformation method based on incrementalization and value caching generalizes a broad family of program optimizations. It yields significant performance improvements in many program classes,
including iterative schemes that characterize hardware specifications. CACHET is an interactive incrementalization tool. Although incrementalization is highly structured and automatable, better results
are obtained through interaction, where the main task is to guide term rewriting based on data-specific identities. Incrementalization
specialized to iteration corresponds to strength reduction, a familiar program improvement technique. This correspondence is illustrated by the derivation of a hardware-efficient nonrestoring square-root algorithm, which has also served as an example of theorem prover-based implementation verification.
Published online: 9 October 2001
RID="*"
ID="*"S.D. Johnson supported, in part, by the National Science Foundation under grant MIP-9601358.
RID="**"
ID="**"Y.A. Liu supported in part by the National Science Foundation under grant CCR-9711253, the Office of Naval Research
under grant N00014-99-1-0132, and Motorola Inc. under a Motorola University Partnership in Research Grant.
RID="***"
ID="***"Y. Zhang is a student recipient of a Motorola University Partnership in Research Grant. 相似文献