2017 IEEE 11th International Conference on Self-Adaptive and Self-Organizing Systems (SASO) 2017
DOI: 10.1109/saso.2017.21
|View full text |Cite
|
Sign up to set email alerts
|

Embedding Verification Concerns in Self-Adaptive System Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…In [11], we verified that the MMTS code (without adaptation) satisfies these requirements and derived the verification concerns using the process outlined in Section 3.1. As an outcome of the verification process, we extract impact multipliers for use in the risk comparison calculations.…”
Section: Case Studymentioning
confidence: 95%
See 4 more Smart Citations
“…In [11], we verified that the MMTS code (without adaptation) satisfies these requirements and derived the verification concerns using the process outlined in Section 3.1. As an outcome of the verification process, we extract impact multipliers for use in the risk comparison calculations.…”
Section: Case Studymentioning
confidence: 95%
“…This meta-data indicates state variables, conditions, functions, methods, and components that play a role in the original verification process. Verification concerns may be derived from component interfaces (provides/requires) [9], the pre-and postconditions of Hoare triples to express safety and progress requirements [11], and state variables within test scenarios, such as those used for security control implementation and assessment [16].…”
Section: Verification Concernsmentioning
confidence: 99%
See 3 more Smart Citations