Sciweavers

FM
2008
Springer
137views Formal Methods» more  FM 2008»
13 years 6 months ago
JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity
Abstract. The Java Modeling Language (JML) recently switched to an assertion semantics based on "strong validity" in which an assertion is taken to be valid precisely whe...
Patrice Chalin, Frédéric Rioux
FM
2008
Springer
91views Formal Methods» more  FM 2008»
13 years 6 months ago
Provably Correct Runtime Monitoring
Irem Aktug, Mads Dam, Dilian Gurov
FM
2008
Springer
75views Formal Methods» more  FM 2008»
13 years 6 months ago
Masking Faults While Providing Bounded-Time Phased Recovery
We focus on synthesis techniques for transforming existing fault-intolerant real-time programs to fault-tolerant programs that provide phased recovery. A fault-tolerant program is ...
Borzoo Bonakdarpour, Sandeep S. Kulkarni
FM
2008
Springer
127views Formal Methods» more  FM 2008»
13 years 6 months ago
A Schedulerless Semantics of TLM Models Written in SystemC Via Translation into LOTOS
TLM (Transaction-Level Modeling) was introduced to cope with the increasing complexity of Systems-on-Chip designs by raising the modeling level. Currently, TLM is primarily used fo...
Olivier Ponsini, Wendelin Serwe
FM
2008
Springer
107views Formal Methods» more  FM 2008»
13 years 6 months ago
Automated Verification of Dense-Time MTL Specifications Via Discrete-Time Approximation
Carlo A. Furia, Matteo Pradella, Matteo Rossi
FM
2008
Springer
171views Formal Methods» more  FM 2008»
13 years 6 months ago
Assume-Guarantee Verification for Interface Automata
Interface automata provide a formalism capturing the high level interactions between software components. Checking compatibility, and other safety properties, in an automata-based ...
Michael Emmi, Dimitra Giannakopoulou, Corina S. Pa...
FM
2008
Springer
77views Formal Methods» more  FM 2008»
13 years 6 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell
FM
2008
Springer
135views Formal Methods» more  FM 2008»
13 years 6 months ago
Secret Ninja Formal Methods
The use of formal methods can significantly improve software quality. However, many instructors and students consider formal methods to be too difficult, impractical, and esoteric ...
Joseph R. Kiniry, Daniel M. Zimmerman
FM
2008
Springer
93views Formal Methods» more  FM 2008»
13 years 6 months ago
Finding Minimal Unsatisfiable Cores of Declarative Specifications
Declarative specifications exhibit a variety of problems, such as inadvertently overconstrained axioms and underconstrained conjectures, that are hard to diagnose with model checki...
Emina Torlak, Felix Sheng-Ho Chang, Daniel Jackson
FM
2008
Springer
87views Formal Methods» more  FM 2008»
13 years 6 months ago
Lazy Behavioral Subtyping
Johan Dovland, Einar Broch Johnsen, Olaf Owe, Mart...