• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-10-06
Xilong Zhuo, Chenyi Zhang

The problem of statically resolving virtual method calls in object-oriented (OO) programming languages has been a long standing challenge, often due to the overly complicated class hierarchy structures in modern OO programming languages such as Java, C# and C++. Traditional ways of dealing with this problem include class hierarchy analysis (CHA), variable type analysis (VTA), and retrieval of type

更新日期：2020-10-07
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-09-19
Aida Lahouij, Lazhar Hamel, Mohamed Graiet, Béchir el Ayeb

The verification of the Cloud composite services’ correctness is challenging. In fact, multiple component services, derived from different Cloud providers with different service description languages and communication protocols, are involved in the composition which may raise incompatibility issues that in turn lead to a non-consistent composition. In this work, we propose a formal approach to model

更新日期：2020-09-20
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-07-28
Matthieu Renard; Antoine Rollet; Yliès Falcone

This paper deals with runtime enforcement of timed properties with uncontrollable events. Runtime enforcement consists in defining and using an enforcement mechanism that modifies the executions of a running system to ensure their correctness with respect to the desired property. Uncontrollable events cannot be modified by the enforcement mechanisms and thus have to be released immediately. We present

更新日期：2020-07-28
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-06-22

Cell injection is an approach used for the delivery of small sample substances into a biological cell and is widely used in drug development, gene injection, intracytoplasmic sperm injection and in-vitro fertilization. Robotic cell injection systems provide the automation of the process as opposed to the manual and semi-automated cell injection systems, which require expert operators and involve time

更新日期：2020-06-22
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-06-15
Feng Sheng; Huibiao Zhu; Jifeng He; Zongyuan Yang; Jonathan P. Bowen

The hardware description language Verilog has been standardized and widely used in industry. Multithreaded Discrete Event Simulation Language (MDESL) is a Verilog-like language and it contains a rich variety of interesting features such as the event-driven computation and shared-variable concurrency as well as the realtime feature. In this paper, we present the denotational semantics for MDESL based

更新日期：2020-06-15
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-05-25
Yanhong Huang; Haiping Pang; Jianqi Shi

The functions of automobiles are becoming increasingly intelligent, which leads to the increasing number of electrical control units for one automobile. Hence, it makes software migration and extension more complicated. In order to avoid these problems, the standard OSEK/VDX has been proposed jointly by a German automotive company consortium and the University of Karlsruhe. This standard provides specifications

更新日期：2020-05-25
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-05-25
David M. Williams; Salaheddin Darwish; Steve Schneider; David R. Michael

This work presents our approach to formally model the Swiftaid system design, a digital platform that enables donors to automatically add Gift Aid to donations made via card payments. Following principles of Behaviour-Driven Development, we use Gherkin to capture requirements specified in legislation, specifically the UK Charity (Gift Aid Declarations) Regulations 2016. The Gherkin scenarios provide

更新日期：2020-05-25
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-04-16
Douglas Fraser; Ruben Giaquinta; Ruth Hoffmann; Murray Ireland; Alice Miller; Gethin Norman

We show how detailed simulation models and abstract Markov models can be developed collaboratively to generate and implement effective controllers for autonomous agent search and retrieve missions. We introduce a concrete simulation model of an Unmanned Aerial Vehicle (UAV). We then show how the probabilistic model checker PRISM is used for optimal strategy synthesis for a sequence of scenarios relevant

更新日期：2020-04-16
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-03-23
Marcello M. Bersani; Matteo Soldo; Claudio Menghi; Patrizio Pelliccione; Matteo Rossi

Developing robotic applications is a complex task, which requires skills that are usually only possessed by highly-qualified robotic developers. While formal methods that help developers in the creation and design of robotic applications exist, they must be explicitly customized to be impactful in the robotics domain and to support effectively the growth of the robotic market. Specifically, the robotic

更新日期：2020-03-23
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-02-21
S. Geisler, A. E. Haxthausen

This paper considers the challenge of designing and verifying control protocols for geographically distributed railway interlocking systems. It describes how this challenge can be tackled by stepwise development and model checking of state transition system models in a new extension of the RAISE Specification Language. Railway interlocking systems are reconfigurable systems which can be configured

更新日期：2020-02-21
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-02-11
Aaron Dutle, Mariano Moscato, Laura Titolo, César Muñoz, Gregory Anderson, François Bobot

The Automatic Dependent Surveillance-Broadcast (ADS-B) system allows aircraft to communicate current state information, including position and velocity messages, to other aircraft in their vicinity and to ground stations. The Compact Position Reporting (CPR) algorithm is the ADS-B protocol responsible for the encoding and decoding of aircraft positions. CPR is sensitive to computer arithmetic since

更新日期：2020-02-11
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-02-05
L. Baresi; M. M. Bersani; F. Marconi; G. Quattrocchi; M. Rossi

Apache Spark is probably the most widely adopted framework for developing big-data batch applications and for executing them on a cluster of (virtual) machines. In general, the more resources (machines) one uses, the faster applications execute, but there is currently no adequate means to determine the proper size of a Spark cluster given time constraints, or to foresee execution times given the number

更新日期：2020-02-05
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-01-27
Waqar Ahmad; Osman Hasan; Sofiène Tahar

Secure and continuous operation of a smart grid substation mainly depends upon the reliable functioning of its communication network. The communication system of a smart substation is typically based on a high performance Ethernet communication network that connects various intelligent embedded devices, such as Intelligent Electronic Devices (IED) andMerging Units (MU), to ensure continuous monitoring

更新日期：2020-01-27
• Form. Asp. Comput. (IF 0.516) Pub Date : 2020-01-15
Zinovy Diskin, Harald König, Mark Lawford

Owing to a production error, the reference in footnote

更新日期：2020-01-15
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-11-27
Krzysztof R. Apt; Ernst-Rüdiger Olderog

We present a history of Hoare’s logic.

更新日期：2019-11-27
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-11-15
Graeme Smith; Kirsten Winter; Robert J. Colvin

Linearizability is a widely accepted notion of correctness for concurrent objects. Recent research has investigated redefining linearizability for particular hardware weak memory models, in particular for TSO. In this paper, we provide an overview of this research and show that such redefinitions of linearizability are not required: under an interpretation of specification behaviour which abstracts

更新日期：2019-11-15
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-11-08
Damien Pous; Davide Sangiorgi

Bisimulation is an instance of coinduction. Both bisimulation and coinduction are today widely used, in many areas of Computer Science, as well as outside Computer Science. Over, roughly, the last 25 years, enhancements of the principles and methods related to bisimulation and coinduction (i.e., techniques to make proofs shorter and simpler) have become a research topic on its own. In the paper the

更新日期：2019-11-08
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-10-22
Zinovy Diskin; Harald König; Mark Lawford

Multiple (more than 2) model synchronization is ubiquitous and important for MDE, but its theoretical underpinning gained much less attention than the binary case. Specifically, the latter was extensively studied by the bx community in the framework of algebraic models for update propagation called lenses. We make a step to restore the balance and propose a notion of multiary delta lens. Besides multiarity

更新日期：2019-10-22
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-09-25
Thomas Haigh

The history of formal methods has barely been written. Haigh recapitulates his own exposure to relevant material during three phases of his development as a scholar: as a student of computer science, as a graduate student in history, and as a professor researching the history of computing. Triangulating these perspectives suggests that formal methods is one of several strands emerging from a community

更新日期：2019-09-25
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-09-02
Lawrence C. Paulson; Tobias Nipkow; Makarius Wenzel

Interactive theorem provers have developed dramatically over the past four decades, from primitive beginnings to today’s powerful systems. Here, we focus on Isabelle/HOL and its distinctive strengths. They include automatic proof search, borrowing techniques from the world of first order theorem proving, but also the automatic search for counterexamples. They include a highly readable structured language

更新日期：2019-09-02
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-08-21
Antonio Brogi; Andrea Corradini; Jacopo Soldani

Estimating the cost of a multi-component application (e.g., its resource or energy consumption) is fundamental in nowadays enterprise IT, especially if we consider that current pricing models are mainly pay per-use. While this is still manageable on small applications, it is really hard to manually estimate the cost of large-scale enterprise applications involving hundreds of interdependent application

更新日期：2019-08-21
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-08-02
Si Liu; Peter Csaba Ölveczky; Qi Wang; Indranil Gupta; José Meseguer

Designers of distributed database systems face the choice between stronger consistency guarantees and better performance. A number of applications only require read atomicity (RA) (either all or none of a transaction’s updates are visible to other transactions) and prevention of lost updates (PLU). Existing distributed transaction systems that meet these requirements also provide additional stronger

更新日期：2019-08-02
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-07-30
Diego Marmsoler; Habtom Kashay Gidey

Architectural design patterns (ADPs) are architectural solutions to common architectural design problems. They are an important concept in software architectures used for the design and analysis of architectures. An ADP usually constrains the design of an architecture and, in turn, guarantees some desired properties for architectures implementing it. Sometimes, however, the constraints imposed by an

更新日期：2019-07-30
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-07-30
J. Strother Moore

We discuss the evolutionary path from the Edinburgh Pure Lisp Theorem Prover of the early 1970s to its modern counterpart, AComputational Logic for Applicative Common Lisp, aka ACL2, which is in regular industrial use. Among the milestones in this evolution are the adoption of a first-order subset of a programming language as a logic; the analysis of recursive definitions to guess appropriate mathematical

更新日期：2019-07-30
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-07-15
Gavin Lowe

We investigate the cause of a deadlock in the implementation of a channel in a message-passing concurrency API. We model the channel implementation using the process algebra CSP, and then use the model checker FDR to find the cause of the deadlock. The bug is rather subtle, and arguably infeasible to spot by hand. We then propose a straightforward fix to the bug, and use CSP and FDR to verify this

更新日期：2019-07-15
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-06-05
Claudio Menghi; Paola Spoletini; Marsha Chechik; Carlo Ghezzi

Controllers often are large and complex reactive software systems and thus they typically cannot be developed as monolithic products. Instead, they are usually comprised of multiple components that interact to provide the desired functionality. Components themselves can be complex and in turn be decomposed into multiple sub-components. Designing such systems is complicated and must follow systematic

更新日期：2019-06-05
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-05-13
Pedro Antonino; Thomas Gibson-Robinson; A. W. Roscoe

This work develops a type of local analysis that can prove concurrent systems deadlock free. As opposed to examining the overall behaviour of a system, local analysis consists of examining the behaviour of small parts of the system to yield a given property. We analyse pairs of interacting components to approximate system reachability and propose a new sound but incomplete/approximate framework that

更新日期：2019-05-13
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-04-15
Cliff B. Jones; Nisansala Yatapanage

Decomposing the design (or documentation) of large systems is a practical necessity but finding compositional development methods for concurrent software is technically challenging. This paper includes the development of a difficult example in order to draw out lessons about such methods. The concurrent garbage collector development is interesting in several ways; in particular, the final step of its

更新日期：2019-04-15
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-03-15
Sidi Mohamed Beillahi; Mohamed Yousri Mahmoud; Sofiène Tahar

Quantum computing systems promise to increase the capabilities for solving problems which classical computers cannot handle adequately, such as integers factorization. In this paper, we present a formal modeling and verification approach for optical quantum circuits, where we build a rich library of optical quantum gates and develop a proof strategy in higher-order logic to reason about optical quantum

更新日期：2019-03-15
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-03-15
Aleksandar S. Dimovski; Claus Brabrand; Andrzej Wąsowski

Many software systems are today variational: they are built as program families or Software Product Lines. They can produce a potentially huge number of related programs, known as products or variants, by selecting suitable configuration options (features) at compile time. Many such program families are safety critical, yet the appropriate tools only rarely are able to analyze them effeciently. Researchers

更新日期：2019-03-15
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-02-11
Tsutomu Kobayashi; Fuyuki Ishikawa; Shinichi Honiden

Event-B has been attracting much interest because it supports a flexible refinement mechanism that reduces the complexity of constructing and verifying models of complicated target systems by taking into account multiple abstraction layers of the models. Although most previous studies on Event-B focused on model construction, the constructed models need to be maintained. Moreover, parts of existing

更新日期：2019-02-11
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-01-02
Marco Bozzano; Alessandro Cimatti; Cristian Mattarei

Reliability is a fundamental property for critical systems. A thorough evaluation of the reliability is required by the certification procedures in various application domains, and it is important to support the exploration of the space of the design solutions. In this paper we propose a new, fully automated approach to the reliability analysis of complex redundant architectures. Given an abstract

更新日期：2019-01-02
• Form. Asp. Comput. (IF 0.516) Pub Date : 2019-01-02
Yuhui Lin; Alan Bundy; Gudmund Grov; Ewen Maclean

The use of formal method techniques can contribute to the production of more reliable and dependable systems. However, a common bottleneck for industrial adoption of such techniques is the needs for interactive proofs. We use a popular formal method, called Event-B, as our working domain, and set invariant preservation (INV) proofs as targets, because INV proofs can account for a significant proportion

更新日期：2019-01-02
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-11-16
Xiaoju Dong; Yuxi Fu; Daniele Varacca

Petri nets form a concurrent model for distributed and asynchronous systems. They are capable of modeling information flow in a closed system, but are generally not suitable for the study of compositionality. We address the issue of Petri net compositionality by introducing extensional Petri nets. In an extensional Petri net some places are external while others are internal. Every external place is

更新日期：2018-11-16
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-10-11
Quang-Trung Ta; Ton Chanh Le; Siau-Cheng Khoo; Wei-Ngan Chin

We present a deductive proof system to automatically prove separation logic entailments by mathematical induction. Our technique is called the mutual induction proof. It is an instance of the well-founded induction, a.k.a., Noetherian induction. More specifically, we propose a novel induction principle based on a well-founded relation of separation logic models. We implement this principle explicitly

更新日期：2018-10-11
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-10-08
Fabrizio Biondi; Yusuke Kawamoto; Axel Legay; Louis-Marie Traonouez

Analysis of a probabilistic system often requires to learn the joint probability distribution of its random variables. The computation of the exact distribution is usually an exhaustive precise analysis on all executions of the system. To avoid the high computational cost of such an exhaustive search, statistical analysis has been studied to efficiently obtain approximate estimates by analyzing only

更新日期：2018-10-08
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-10-04
Andrzej Mizera; Jun Pang; Qixia Yuan

Computation of steady-state probabilities is an important aspect of analysing biological systems modelled as probabilistic Boolean networks (PBNs). For small PBNs, efficient numerical methods to compute steady-state probabilities of PBNs exist, based on the Markov chain state-transition matrix. However, for large PBNs, numerical methods suffer from the state-space explosion problem since the state-space

更新日期：2018-10-04
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-09-24
Zhiping Shi; Aixuan Wu; Xiumei Yang; Yong Guan; Yongdong Li; Xiaoyu Song

As robotic systems flourish, reliability has become a topic of paramount importance in the human–robot relationship. The Jacobian matrix in screw theory underpins the design and optimization of robotic manipulators. Kernel properties of robotic manipulators, including dexterity and singularity, are characterized with the Jacobian matrix. The accurate specification and the rigorous analysis of the Jacobian

更新日期：2018-09-24
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-08-10
Wanling Xie; Shuangqing Xiang; Huibiao Zhu

rTiMo is a real-time version of TiMo (Timed Mobility), which is a process algebra for mobile distributed systems. In this paper, we investigate the denotational semantics for rTiMo. A trace variable tr is introduced to record the communications among processes as well as the location where the communication action takes place. Based on the formalized model, we study a set of algebraic laws, especially

更新日期：2018-08-10
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-08-07
Mingsheng Ying

This paper summarises the results obtained by the author and his collaborators in a program logic approach to the verification of quantum programs, including quantum Hoare logic, invariant generation and termination analysis for quantum programs. It also introduces the notion of proof outline and several auxiliary rules for more conveniently reasoning about quantum programs. Some problems for future

更新日期：2018-08-07
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-08-06
Ian J. Hayes; Larissa A. Meinicke; Kirsten Winter; Robert J. Colvin

In this paper we introduce an abstract algebra for reasoning about concurrent programs, that includes an abstract algebra of atomic steps, with sub-algebras of program and environment steps, and an abstract synchronisation operator. We show how the abstract synchronisation operator can be instantiated as a synchronous parallel operator with interpretations in rely-guarantee concurrency for shared-memory

更新日期：2018-08-06
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-07-24
David Schneider; Michael Leuschel; Tobias Witt

Constraint satisfaction problems can be expressed very elegantly in state-based formal methods such as B. But can such specifications be directly used for solving real-life problems? In other words, can a formal model be more than a design artefact but also be used at runtime for inference and problem solving? We will try and answer this important question in the present paper with regard to the university

更新日期：2018-07-24
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-07-24
Roberto Bruni; Roberto Giacobazzi; Roberta Gori

Code protection technologies require anti reverse engineering transformations to obfuscate programs in such a way that tools and methods for program analysis become ineffective. We introduce the concept of model deformation inducing an effective code obfuscation against attacks performed by abstract model checking. This means complicating the model in such a way a high number of spurious traces are

更新日期：2018-07-24
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-07-18
Raphaël Chane-Yack-Fa; Marc Frappier; Amel Mammar; Alain Finkel

In this paper, we study the information system verification problem as a parameterized verification one. Informations systems are modeled as multi-parameterized systems in a formal language based on the Algebraic State-Transition Diagrams (ASTD) notation. Then, we use the Well Structured Transition Systems (WSTS) theory to solve the coverability problem for an unbounded ASTD state space. Moreover,

更新日期：2018-07-18
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-07-12
Catherine Dubois; Alain Giorgetti

We address automated testing and interactive proving of properties involving complex data structures with constraints, like the ones studied in enumerative combinatorics, e.g., permutations and maps. In this paper we show testing techniques to check properties of custom data generators for these structures. We focus on random property-based testing and bounded exhaustive testing, to find counterexamples

更新日期：2018-07-12
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-07-04
Morten Bisgaard; David Gerhardt; Holger Hermanns; Jan Krčál; Gilles Nies; Marvin Stenger

When working with space systems the keyword is resources. For a satellite in orbit all resources are scarce and the most critical resource of all is power. It is therefore crucial to have detailed knowledge on how much power is available for an energy harvesting satellite in orbit at every time—especially when in eclipse, where it draws its power from onboard batteries. The challenge is to maximise

更新日期：2018-07-04
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-06-18
Yaping Jing; Andrew S. Miner

In this work, we present a formal language, CTML, to reason over probabilistic systems. CTML extends stochastic temporal logics in a way that it takes a real value as input and output a real value in the range of $${[0, \infty)}$$, as opposed to 0/1 values as input and output, and it can nest real values. This allows CTML to express a rich set of queries towards the unification of model checking and

更新日期：2018-06-18
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-06-12
Guillaume Petiot; Nikolai Kosmatov; Bernard Botella; Alain Giorgetti; Jacques Julliand

Applying deductive verification to formally prove that a program respects its formal specification is a very complex and time-consuming task due in particular to the lack of feedback in case of proof failures. Along with a non-compliance between the code and its specification (due to an error in at least one of them), possible reasons of a proof failure include a missing or too weak specification for

更新日期：2018-06-12
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-05-25
Yuyan Bao; Gary T. Leavens; Gidon Ernst

Framing is important for specification and verification, especially in programs that mutate data structures with shared data, such as DAGs. Both separation logic and region logic are successful approaches to framing, with separation logic providing a concise way to reason about data structures that are disjoint, and region logic providing the ability to reason about framing for shared mutable data

更新日期：2018-05-25
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-04-25
Ling Shi; Yongxin Zhao; Yang Liu; Jun Sun; Jin Song Dong; Shengchao Qin

CSP# (communicating sequential programs) is a modelling language designed for specifying concurrent systems by integrating CSP-like compositional operators with sequential programs updating shared variables. In this work, we define an observation-oriented denotational semantics in an open environment for the CSP# language based on the UTP framework. To deal with shared variables, we lift traditional

更新日期：2018-04-25
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-04-09
Filipe Santos; Krystian Kwiecinski; Ana de Almeida; Sara Eloy; Bruno Taborda

This paper discusses the formalization of Alternative Shaper, a Spatial Grammar supplemented with procedural knowledge for supporting design generation. The nondeterministic process style perspective supports an exploratory and flexible specification of designs and the use of predicates relating shapes allow the confirmation of shape spatial restrictions on design processes. Although simple at this

更新日期：2018-04-09
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-01-26
Khaled El-Fakih; Nina Yevtushenko; Natalia Kushik

A top-down approach is presented for checking the existence and derivation of an adaptive distinguishing test case (called also an adaptive distinguishing sequence) for a nondeterministic finite state machine (NDFSM). When such a test case exists, the method returns a canonical test case that includes all other distinguishing tests of the given complete observable NDFSM. In the second part of the paper

更新日期：2018-01-26
• Form. Asp. Comput. (IF 0.516) Pub Date : 2018-01-02
Marcus Gerhold; Mariëlle Stoelinga

This work presents an executable model-based testing framework for probabilistic systems with non-determinism. We provide algorithms to automatically generate, execute and evaluate test cases from a probabilistic requirements specification. The framework connects input/output conformance-theory with hypothesis testing: our algorithms handle functional correctness, while statistical methods assess,

更新日期：2018-01-02
• Form. Asp. Comput. (IF 0.516) Pub Date : 2017-12-20
Jan B. Pedersen; Peter H. Welch

Concurrency is beginning to be accepted as a core knowledge area in the undergraduate CS curriculum—no longer isolated, for example, as a support mechanism in a module on operating systems or reserved as an advanced discipline for later study. Formal verification of system properties is often considered a difficult subject area, requiring significant mathematical knowledge and generally restricted

更新日期：2017-12-20
• Form. Asp. Comput. (IF 0.516) Pub Date : 2017-12-12
Riccardo Sisto; Piergiuseppe Bettassa Copet; Matteo Avalle; Alfredo Pironti

Designing and coding security protocols is an error prone task. Several flaws are found in protocol implementations and specifications every year. Formal methods can alleviate this problem by backing implementations with rigorous proofs about their behavior. However, formally-based development typically requires domain specific knowledge available only to few experts and the development of abstract

更新日期：2017-12-12
• Form. Asp. Comput. (IF 0.516) Pub Date : 2017-11-27
D. Strüber; J. Rubin; T. Arendt; M. Chechik; G. Taentzer; J. Plöger

Model transformation systems often contain transformation rules that are substantially similar to each other, causing maintenance issues and performance bottlenecks. To address these issues, we introduce variability-based model transformation. The key idea is to encode a set of similar rules into a compact representation, called variability-based rule. We provide an algorithm for applying such rules

更新日期：2017-11-27
• Form. Asp. Comput. (IF 0.516) Pub Date : 2017-11-13
Claudio Corrodi; Alexander Heußner; Christopher M. Poskitt

A number of high-level languages and libraries have been proposed that offer novel and simple to use abstractions for concurrent, asynchronous, and distributed programming. The execution models that realise them, however, often change over time—whether to improve performance, or to extend them to new language features—potentially affecting behavioural and safety properties of existing programs. This

更新日期：2017-11-13
• Form. Asp. Comput. (IF 0.516) Pub Date : 2017-11-09
Hui Zhang; Jinzhao Wu

Multiprocessor system on chip (MPSoC) implements system functions through tasks. It is necessary to estimate system behaviors early in the design process without actual hardware implementation. As there are a huge variety in freedom of choices in the mapping of tasks, existing researches mainly focus on the schedulability analysis and resource constraints, with a lack of concerning on how data in tasks

更新日期：2017-11-09
• Form. Asp. Comput. (IF 0.516) Pub Date : 2017-11-09
Jianwen Li; Lijun Zhang; Shufang Zhu; Geguang Pu; Moshe Y. Vardi; Jifeng He

We propose a novel algorithm for the satisfiability problem for linear temporal logic (LTL). Existing automata-based approaches first transform the LTL formula into a Büchi automaton and then perform an emptiness checking of the resulting automaton. Instead, our approach works on-the-fly by inspecting the formula directly, thus enabling to find a satisfying model quickly without constructing the full

更新日期：2017-11-09
• Form. Asp. Comput. (IF 0.516) Pub Date : 2017-11-07
Hamid Bagheri; Eunsuk Kang; Sam Malek; Daniel Jackson

The ever increasing expansion of mobile applications into nearly every aspect of modern life, from banking to healthcare systems, is making their security more important than ever. Modern smartphone operating systems (OS) rely substantially on the permission-based security model to enforce restrictions on the operations that each application can perform. In this paper, we perform an analysis of the

更新日期：2017-11-07
Contents have been reproduced by permission of the publishers.

down
wechat
bug