SPARK is an annotated subset of Ada for high-integrity programming. This subset, in conjunction with its system of annotations (formal comments), is designed to eliminate language ambiguities and insecurities, and to ...
详细信息
SPARK is an annotated subset of Ada for high-integrity programming. This subset, in conjunction with its system of annotations (formal comments), is designed to eliminate language ambiguities and insecurities, and to allow rigorous static code analysis and formal verification of programs. The development, flow analysis and correctness proof of SPARK programs is supported by a software tool, the SPARK Examiner. The paper outlines the essential features of SPARK and explains how the Examiner is used in program development.< >
A great benefit of software inspections is that they can be applied at almost any stage of the software development life cycle. We document a large-scale experiment conducted during an entity relationship (ER) model i...
详细信息
A great benefit of software inspections is that they can be applied at almost any stage of the software development life cycle. We document a large-scale experiment conducted during an entity relationship (ER) model inspection meeting. The experiment was aimed at finding empirically validated answers to the question "which reading technique has a more efficient detection rate when searching for defects in an ER model". Secondly, the effect of the usage of roles in a team meeting was also explored. Finally, we investigate the reviewers' ability to find defects belonging to certain defect categories. The findings showed that the participants using a checklist had a significantly higher detection rate than the ad hoc groups. Overall, the groups using roles had a lower performance than those without roles. Furthermore, the findings showed that when comparing the groups using roles to those without roles, the proportion of syntactic and semantic defects found in the number of overall defects identified did not significantly differ.
Vehicle electronic control systems have the potential to become unreliable when they grow too complex. By careful design of the whole system, both hardware and software, it is possible to organise the data processing ...
详细信息
Vehicle electronic control systems have the potential to become unreliable when they grow too complex. By careful design of the whole system, both hardware and software, it is possible to organise the data processing tasks in such a way that the risks associated with software failure are indeed minimal. The validation tools already in widespread use throughout the industry, when rigorously applied, reduce this risk to below that associated with hardware design failures. The paper concerns the programmable automotive microcontroller (PAM), an ASIC-based device developed by AB Automotive Electronics to improve reliability. It describes ways in which PAM can detect errors arising from various sources in software. AB has written, and maintains, its own compiler for PAM. The compiler gives warnings of possible sources of difficulty. Standards for software and the development thereof are given.< >
Summary form only given. ZAL (Z Animation in LISP) is a package of extensions to Common LISP which allows a Z specification to be incrementally designed and validated in an interactive environment. A Z specification i...
详细信息
Summary form only given. ZAL (Z Animation in LISP) is a package of extensions to Common LISP which allows a Z specification to be incrementally designed and validated in an interactive environment. A Z specification is transformed into an equivalent ZAL program which can be executed in order to demonstrate the functionality of the intended implementation. The aim has been to ensure that the transformation rules are simple and mechanical, so that the ZAL version is essentially a rewrite of the original Z. A substantial subset of the Z notation has now been implemented in ZAL, and the package has been used to animate a collection of non-trivial Z specifications. A full-screen editor for Z has also been implemented as a basis for a front-end which will ultimately hide the underlying LISP notation from users of the system. Not only does the package provide facilities for users to validate their own specifications, but it interactive nature also encourages and supports an experimental approach as a valid technique for the development of Z specifications.< >
The article is based on the authors' experience and primarily on experience of assessing safety related programmable electronic systems (PESs). Therefore the thoughts expressed are directed principally towards saf...
详细信息
The article is based on the authors' experience and primarily on experience of assessing safety related programmable electronic systems (PESs). Therefore the thoughts expressed are directed principally towards safety, or lack of it, and PESs. The authors believe that it is possible to identify at least three important components of assessment, addressing three different aspects of what it is that the authors are trying to assess: assessment of compliance (the objective assessment of a system's compliance with a standard or standards); assessment of adequacy (the subjective assessment a system's fitness for purpose); and assessment of function (the validation of a system to assess whether it fulfils its specified functions).< >
The strategic significance of system and software quality to industry, commerce and the community at large is now widely recognised by all, including government. Two main philosophies are currently pursued to quality ...
详细信息
The strategic significance of system and software quality to industry, commerce and the community at large is now widely recognised by all, including government. Two main philosophies are currently pursued to quality assurance: the accreditation procedure of the software development process itself through schemes such as BS5750 and the proof of software correctness through the use of formal methods. The authors explore the extent to which these philosophies singly or collectively, satisfy industry's obligation to produce high quality software.< >
The following topics are discussed: requirements, interfaces, and groupware; software architectures and distributed systems; model checking; software components; software evolution and maintenance; and automated softw...
详细信息
The following topics are discussed: requirements, interfaces, and groupware; software architectures and distributed systems; model checking; software components; software evolution and maintenance; and automated software engineering.
Extended Automation Method 2.0 (EXAM) is employed at AUDI AG to perform the testing of automotive systems. The main drawback of EXAM is, that each test case must be devised and created individually. This procedure is ...
详细信息
Extended Automation Method 2.0 (EXAM) is employed at AUDI AG to perform the testing of automotive systems. The main drawback of EXAM is, that each test case must be devised and created individually. This procedure is apparently awkward and errorprone. Moreover, the development of increasingly complex functionality poses new challenges to the testing routine in industry. We employed Timed Usage Models to extend the EXAM test method. The usage model serves as the basis for the whole testing process, including test planning and test case generation. We derived automatically platform independent test cases for the execution in EXAM. Testbench specific code was automatically generated for the test cases in EXAM, where they were executed on hardwareintheloop simulators (HILs). Usage models were created for functionalities from power train, comfort, and energy management. The application of usage models allowed the assessment of the test effort and the systematic generation of test cases.
The need for reliable software has rapidly overtaken the ability to produce it. In control applications, particularly disastrous results may arise from errors. For many years computer scientists have been developing l...
详细信息
The need for reliable software has rapidly overtaken the ability to produce it. In control applications, particularly disastrous results may arise from errors. For many years computer scientists have been developing languages and techniques to clarify the structure of programs through establishing a sound mathematical foundation. The techniques included under the general umbrella of formal methods have been introduced especially to put the design phase of program onto an analytical basis. The authors examine their application in control systems, and especially their applicability in verifying and validating control software. The context of the article is a programme of research in developing validation techniques in control using formal methodologies. The author examines: application areas and benefits for industrial control; establishment of control software integrity; and examples of formal methods in control systems.< >
The technique of static analysis has, for some time now, been recognised as a technique necessary for the verification of critical software. Typically static analysis is performed by the use of automatic tools. One su...
详细信息
The technique of static analysis has, for some time now, been recognised as a technique necessary for the verification of critical software. Typically static analysis is performed by the use of automatic tools. One such tool, widely used for the verification of safety critical software, particularly in the fields of military avionics and nuclear power, is MALPAS. The advantages of this particular tool are that, not only does it perform the simpler analyses of code structure and data and information flow, but it also reveals the semantics of the code under analysis which may be manually or automatically compared against specifications to verify the code.< >
暂无评论