2010 36th EUROMICRO Conference on Software Engineering and Advanced Applications 2010
DOI: 10.1109/seaa.2010.30
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Component Protocol Generation and Verification of Components

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Additionally we are considering other areas of research to apply the computation of exact values and exact gaps. For example the computation of exact value ranges can be used for verification of components [2].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally we are considering other areas of research to apply the computation of exact values and exact gaps. For example the computation of exact value ranges can be used for verification of components [2].…”
Section: Discussionmentioning
confidence: 99%
“…The basic block inter-procedural control flow graph BBICFG P = (blocks(P), edges(P)) (see Fig. 1) consists of the basic blocks blocks(P) as nodes and edges edges(P) ⊆ blocks(P) 2 , where (b 1 , b 2 ) ∈ edges(P) iff there is an execution path of length 1 from the end of block b 1 to the entry of block b 2 (execution of the last statement of block b 1 ). The decision coverage metric γ P d (t) := |edges(t)|/|edges(P)| is the ratio of executed edges edges(t) of the control flow graph BBICFG P for t, to all edges edges(P) in P.…”
Section: Code Coverage Metrics γmentioning
confidence: 99%
“…As we are looking to automate the matching process, we need to find a way to generate the protocols for the existing components (or contracts, or publications). We provide some of the key references to this topic on protocol generation: [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], and [41]with a brief review.…”
Section: Protocol and Matchingmentioning
confidence: 99%
“…In [37] Both and Richter presents a tool based automatic generation of the component protocol to ensure safe behavior of component interactions, based on earlier work, [36], [35]. This process is done in five steps that involves the conversion of code to reachability models using symbolic pushdown systems, solving the using the tool HalVRE (Halle's exact Value Range Extractor), and finally constructing the component protocol automaton.…”
Section: Protocol and Matchingmentioning
confidence: 99%