The switching program verification expert system (SVEX) automatically detects logical bugs of call handling programs and outputs information for debugging. SVEX can also reverse-engineer the service specifications fro...
详细信息
The switching program verification expert system (SVEX) automatically detects logical bugs of call handling programs and outputs information for debugging. SVEX can also reverse-engineer the service specifications from the programs. This function is used for detecting service bugs. The functions are implemented by using verification rules and by simulating the actions of programs on an object-oriented switching-system model. SVEX was applied to the development of PBX and detected logical errors automatically, in which the errors overlooked at the functional test using the target switching system were included.< >
One of the main problems to be solved by the designers of policies and algorithms for distributed systems or multiprocessors is their test and evaluation. The solution adopted in the paper is based on the design and c...
详细信息
One of the main problems to be solved by the designers of policies and algorithms for distributed systems or multiprocessors is their test and evaluation. The solution adopted in the paper is based on the design and construction of a software test bed. DASS, a simulation system to test and design distributed algorithms, is presented. With it, the designer can work in an environment similar to a real network but with increased flexibility enabling change to the parameters or the network itself. The system is implemented, in C language, on a VAX/VMS as a concurrent program composed of a variable number of processes. The creation and synchronization system calls are borrowed from the C/UNIX library available on VMS.< >
Describes developments that Brunel University has made in the area of automatic softwareverification and synthesis. Their approach is to write specifications in high-order constructive logic map the code into the sam...
详细信息
Describes developments that Brunel University has made in the area of automatic softwareverification and synthesis. Their approach is to write specifications in high-order constructive logic map the code into the same logic and use a theorem-prover to prove that the code written in the functional language ML, matches the specification. The paper describes the logic, the theorem-prover and the ML to logic mapping. It also shows how the same theorem-prover can be used to synthesise code from a specification.< >
Describes research into the design of real-time synchronisation software for a high-speed packaging machine utilising independent drives. The machine is of a novel modular design which exploits the flexibility that is...
详细信息
Describes research into the design of real-time synchronisation software for a high-speed packaging machine utilising independent drives. The machine is of a novel modular design which exploits the flexibility that is introduced by the use of software controlled independent drives. It is intended for use in flexible manufacturing applications in which large quantities of various products are produced by one high-speed machine. The research involved the specification of the control and synchronisation requirements of the machine using a concurrent language and the design and implementation of a transputer-based distributed control system capable of high-speed performance. This involved software design using the concurrent programming language Occam and software modelling and verification using Petri-nets.< >
With software increasingly being employed in safety-critical applications, there is much speculation on the nature of procedures and tools for achieving software quality. The authors explore the use of the SPADE tools...
详细信息
With software increasingly being employed in safety-critical applications, there is much speculation on the nature of procedures and tools for achieving software quality. The authors explore the use of the SPADE toolset, including the SPADE Proof Checker, together with appropriate procedures for achieving a high degree of confidence in the correctness of a piece of software with respect to a specification.< >
This research concerns the validation of software requirements expressed in formal specifications without the use of conventional prototypes. It is an investigation into the feasibility of a system which takes a forma...
详细信息
This research concerns the validation of software requirements expressed in formal specifications without the use of conventional prototypes. It is an investigation into the feasibility of a system which takes a formal specification as input and allows the end user to experiment 'directly' with the specification in order to make sure that his requirements have been captured correctly. The system is intended to behave, from the user's perspective, as if it were an implementation of the specification. The approach offers a number of benefits. Firstly, it eliminates the need for developing custom-built prototypes for each and every specification for the purpose of validation of user requirements. As a result, some of the potential drawbacks of prototyping would disappear. Secondly, the approach makes the application of formal methods in software development easier and closer to that of conventional techniques, thus contributing to the wider industrial use of formal methods.< >
Based upon a nine-node transputer network consisting of T414-15 modules interconnected in a pipeline, the authors have developed real-time software in Occam which can be configured to a number of topologies like ring,...
详细信息
Based upon a nine-node transputer network consisting of T414-15 modules interconnected in a pipeline, the authors have developed real-time software in Occam which can be configured to a number of topologies like ring, mesh etc. with the help of a static switch. The authors describe a verification methodology of an embedded message based distributed real-time software that has some unique characteristics of its own. In order to verify that the real-time concurrent software is free from errors like Ivelock, deadlock etc. and to test each module for its desired performance, the authors have chosen a version of petrinets called Occamnet as their design and verification tool. An analysis based on a type of net which corresponds to various constructs of Occam is used, and the structure of the total system kernel is arrived at in a hierarchical manner.< >
暂无评论