Sciweavers

5525 search results - page 114 / 1105
» Verification of Model Transformations
Sort
View
UML
2004
Springer
15 years 8 months ago
System-on-Chip Verification Process Using UML
Abstract. In this paper, we propose a verification methodology for System-OnChip (SoC) design using Unified Modeling Language (UML). We introduce UML as a formal model to analyze a...
Qiang Zhu, Tsuneo Nakata, Masataka Mine, Kenichiro...
TACAS
1998
Springer
105views Algorithms» more  TACAS 1998»
15 years 7 months ago
Verification of Large State/Event Systems Using Compositionality and Dependency Analysis
A state/event model is a concurrent version of Mealy machines used for describing embedded reactive systems. This paper introduces a technique that uses compositionality and depend...
Jørn Lind-Nielsen, Henrik Reif Andersen, Ge...
ECLIPSE
2006
ACM
15 years 7 months ago
A toolsuite for the verification of real-time systems in Eclipse
In this work we present an Eclipse plug-in for the VInTiMe (Verifier of INtegrated TImed ModEls)1 suite of tools that combines high-level expressive power, unassisted propertypres...
Lucía Cavatorta, Guido de Caso, André...
JSA
2007
84views more  JSA 2007»
15 years 3 months ago
Optimizing data structures at the modeling level in embedded multimedia
Traditional design techniques for embedded systems apply transformations on the source code to optimize hardwarerelated cost factors. Unfortunately, such transformations cannot ad...
Marijn Temmerman, Edgar G. Daylight, Francky Catth...
SIGSOFT
2007
ACM
16 years 4 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna