2013 35th International Conference on Software Engineering (ICSE) 2013
DOI: 10.1109/icse.2013.6606594
|View full text |Cite
|
Sign up to set email alerts
|

Strategies for product-line verification: Case studies and experiments

Abstract: Abstract-Product-line technology is increasingly used in mission-critical and safety-critical applications. Hence, researchers are developing verification approaches that follow different strategies to cope with the specific properties of product lines. While the research community is discussing the mutual strengths and weaknesses of the different strategies-mostly at a conceptual level-there is a lack of evidence in terms of case studies, tool implementations, and experiments. We have collected and prepared s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
161
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 101 publications
(162 citation statements)
references
References 28 publications
(76 reference statements)
1
161
0
Order By: Relevance
“…The area below the graph is proportional to the accumulated verification time. We also provide a supplementary web page 5 , where the detailed results of all verification runs (including the raw data and the log files) are available for download and as interactive plots.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The area below the graph is proportional to the accumulated verification time. We also provide a supplementary web page 5 , where the detailed results of all verification runs (including the raw data and the log files) are available for download and as interactive plots.…”
Section: Resultsmentioning
confidence: 99%
“…The LOOPS benchmark set consists of verification tasks that require the analysis of loops with non-static loop bounds. The benchmark set PRODUCT LINES models three software product lines used in featureinteraction detection [5]. Domain Types.…”
Section: Verification Tasksmentioning
confidence: 99%
See 1 more Smart Citation
“…For a variability-aware generation of product-line test suites, we integrated a BDD-based feature-parameter analysis into CPA/tiger and added further code to determine which test goals of which variants are covered by a given test case. For our experiments, we selected two subject systems that are well-known from several benchmarks, e.g., in context of product-line verification and feature interaction detection [3].…”
Section: Discussionmentioning
confidence: 99%
“…There, the explicit-state model checker SPIN has been used for reachability analysis, with a posteriori reasoning about test-case reuse among product variants, but without any reuse of reachability results among test goals. Applying CPAchecker for product-line verification has been proposed [3], incorporating BDD analysis for reuse of verification results [2]. Reuse of reachability analysis results for different test goals [7,8] has been presented and implemented as CPA/tiger on top of CPAchecker and corresponding reuse concepts have been applied to intermediate verification results [10].…”
Section: Related Workmentioning
confidence: 99%