1996
DOI: 10.1109/32.508311
|View full text |Cite
|
Sign up to set email alerts
|

Completeness and consistency in hierarchical state-based requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
103
0
1

Year Published

2001
2001
2014
2014

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 224 publications
(106 citation statements)
references
References 17 publications
0
103
0
1
Order By: Relevance
“…Our analysis focuses on two SMV variables: Composite RA which encodes the escape maneuver, or Resolution Advisory, and Displayed Model Goal, which encodes its strength. A desirable property of Composite RA is that it should change deterministically [14]: this is essential for ensuring that Own Aircraft has predictable behavior and does not decide on different maneuvers under similar conditions. We checked that nondeterminism is not attained using a macro ND Composite RA defined in the model to encode possible nondeterminism (row 1 of Table 1).…”
Section: Case Study: Checking the Tcas II Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Our analysis focuses on two SMV variables: Composite RA which encodes the escape maneuver, or Resolution Advisory, and Displayed Model Goal, which encodes its strength. A desirable property of Composite RA is that it should change deterministically [14]: this is essential for ensuring that Own Aircraft has predictable behavior and does not decide on different maneuvers under similar conditions. We checked that nondeterminism is not attained using a macro ND Composite RA defined in the model to encode possible nondeterminism (row 1 of Table 1).…”
Section: Case Study: Checking the Tcas II Systemmentioning
confidence: 99%
“…This is a safety-critical system required on every U.S. commercial aircraft transporting more than thirty passengers, and has also been deployed in other countries. TCAS II has also been used as a classical case study for requirements modeling [18] and formal verification [14,19,4]. …”
Section: Case Study: Checking the Tcas II Systemmentioning
confidence: 99%
“…Related techniques for formal verification of specifications include: In [20], the requirements for the TCAS airborne, collision avoidance protocol formulated in RSML were checked with SMV. The model checker builds a highly abstract model to avoid the state-space explosion problem.…”
Section: Related Workmentioning
confidence: 99%
“…They contain predicates of local states and of the input variables and often involve nontrivial arithmetic predicates. While many other researchers conservatively abstract each arithmetic predicate as an independent Boolean variable [14], [15], [16], we encode each bit of the numeric inputs as a Boolean variable, resulting in more accurate analysis at the expense of requiring more Boolean variables. In addition, a guarding condition can refer to any part of the system, so the interdependencies between the BDD variables are high.…”
Section: Tcas IImentioning
confidence: 99%
“…To detect such false dependencies, one can check whether the disjunction of the guarding conditions of the transitions out of a local state with the same trigger and action events is a tautology. This can sometimes be checked efficiently using BDDs [15]. However, the syntax sometimes allows easy detection of most false dependencies of this kindÐfor example, the selfloops in Fig.…”
Section: Dependency Analysismentioning
confidence: 99%