2015
DOI: 10.1007/978-3-319-22969-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Towards Domain Refinement for UML/OCL Bounded Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…This study is mainly divided into 3 sub-studies (SS4.1, SS4.2, and SS4.3). The SS4.1 focuses on the work of Cadoli et al [4], [69], SS4.2 presents the work of Pérez et al [70], SS4.3 presents the work of Malgouyres and Motet [5], and SS4.3 compiles the work of Cabot et al [37]- [46].…”
Section: ) Constraint Satisfaction Problemmentioning
confidence: 99%
“…This study is mainly divided into 3 sub-studies (SS4.1, SS4.2, and SS4.3). The SS4.1 focuses on the work of Cadoli et al [4], [69], SS4.2 presents the work of Pérez et al [70], SS4.3 presents the work of Malgouyres and Motet [5], and SS4.3 compiles the work of Cabot et al [37]- [46].…”
Section: ) Constraint Satisfaction Problemmentioning
confidence: 99%
“…This is because, at the end, most of these tools relies on some kind of SAT reasoner in its core. For instance, the work by Clarisó et al [28] showed that, by means of analyzing and straightening the number of possible instances every class/association could have (a technique coming from the Constraint Satisfaction Problem literature), they could enhance the response time of a particular UML/OCL reasoning tool by x50. We think that this technique and ours are complementary since we can first, simplify the UML/OCL schema, and then, perform the previous analysis and straightening in the simplified version of it.…”
Section: Other Techniquesmentioning
confidence: 99%
“…For this purpose, a model must be given and problem bounds have to be defined. Those problem bounds can often be derived from the specification but there are also preliminary techniques that automatically extract appropriate problem bounds from a given model [31, 32]. On top of the model and the according problem bounds, a verification task can be formulated and a corresponding symbolic formulation in terms of a bit vector formula is derived.…”
Section: General Ideamentioning
confidence: 99%