2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2018
DOI: 10.1109/icsme.2018.00025
|View full text |Cite
|
Sign up to set email alerts
|

Reflexion Models for State Machine Extraction and Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…Models are checked against LTL properties to validate state merges as they are encountered. In an attempt to model and verify software systems [22], state machines describing software behaviour are generated by checking a hypothetical, manually drawn model against the code. The user specifies a set of states and state invariants which are translated into relevant pre and post conditions in the code.…”
Section: Related Workmentioning
confidence: 99%
“…Models are checked against LTL properties to validate state merges as they are encountered. In an attempt to model and verify software systems [22], state machines describing software behaviour are generated by checking a hypothetical, manually drawn model against the code. The user specifies a set of states and state invariants which are translated into relevant pre and post conditions in the code.…”
Section: Related Workmentioning
confidence: 99%
“…This technique was adapted to state machine for ensuring the correspondence in terms of specified states and transitions among models and codes. 12 In the context of architecture-driven modernization, reflexion analysis was also applied to check conformance between the current and the planned architecture which are both represented with knowledge discovery metamodels. 13 Recent empirical studies 9,29 show that this technique is in widespread use in practice for architecture conformance checking.…”
Section: Architecture Conformance Checkingmentioning
confidence: 99%
“…Generally, this technique is conducted by comparing the implemented architecture and the architecture the system should have, that is, the intended architecture. There are two main means of conducting architecture conformance checking: 11 reflexion analysis 12,13 and compliance rules 14,15 . Even though several approaches to conformance checking exist in both directions (e.g., References 12 and 15), none of them explore how to check for architecture conformance in DDD‐based projects.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Murphy at al. [30], Koschke and Simon [18] and Said et al [34] propose reflection model techniques as architectural solutions for controlling the software erosion. The reflection model techniques compares a model of the implemented architecture and a hypothetical model of the intended architecture.…”
Section: Related Workmentioning
confidence: 99%