메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 135-144

Generating optimized code from SCR specifications

Author keywords

Code generation; Code synthesis; Formal specifications; Optimization; Requirements specifications; SCR

Indexed keywords

CODES (SYMBOLS); GRAPH THEORY; MATHEMATICAL MODELS; OPTIMIZATION;

EID: 33746083217     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1134650.1134670     Document Type: Conference Paper
Times cited : (15)

References (28)
  • 1
    • 1442288695 scopus 로고    scopus 로고
    • Generating embedded software from hierarchical hybrid models
    • R. Alur, F. Ivancic, J. Kim, I. Lee, and O. Sokolsky. Generating embedded software from hierarchical hybrid models. SIGPLAN Not., 38(7):171-182, 2003.
    • (2003) SIGPLAN Not. , vol.38 , Issue.7 , pp. 171-182
    • Alur, R.1    Ivancic, F.2    Kim, J.3    Lee, I.4    Sokolsky, O.5
  • 2
    • 0034558156 scopus 로고    scopus 로고
    • TAME: Using PVS strategies for special-purpose theorem proving
    • February
    • M. Archer. TAME: Using PVS strategies for special-purpose theorem proving. Annals of Mathematics and Artificial Intelligence, 29(1-4), February 2001.
    • (2001) Annals of Mathematics and Artificial Intelligence , vol.29 , Issue.1-4
    • Archer, M.1
  • 8
    • 33746091832 scopus 로고    scopus 로고
    • Slicing LUSTRE programs
    • VERIMAG, Grenoble, February
    • F. Gaucher. Slicing LUSTRE programs. Technical report, VERIMAG, Grenoble, February 2003.
    • (2003) Technical Report
    • Gaucher, F.1
  • 11
    • 0032203845 scopus 로고    scopus 로고
    • Using abstraction and model checking to detect safety violations in requirements specifications
    • Nov.
    • C. Heitmeyer, J. Kirby, B. Labaw, M. Archer, and R. Bharadwaj. Using abstraction and model checking to detect safety violations in requirements specifications. IEEE Trans. on Softw. Eng., 24(11), Nov. 1998.
    • (1998) IEEE Trans. on Softw. Eng. , vol.24 , Issue.11
    • Heitmeyer, C.1    Kirby, J.2    Labaw, B.3    Archer, M.4    Bharadwaj, R.5
  • 19
    • 84864199101 scopus 로고    scopus 로고
    • Static slicing of reactive programs
    • A. R. Kulkarni and S. Ramesh. Static slicing of reactive programs. In SCAM, pages 98-107, 2003.
    • (2003) SCAM , pp. 98-107
    • Kulkarni, A.R.1    Ramesh, S.2
  • 21
    • 0037614910 scopus 로고    scopus 로고
    • Program synthesis from formal requirements specifications using APTS
    • E. I. Leonard and C. L. Heitmeyer. Program synthesis from formal requirements specifications using APTS. Higher Order Symbol. Comput., 16(1-2):63-92, 2003.
    • (2003) Higher Order Symbol. Comput. , vol.16 , Issue.1-2 , pp. 63-92
    • Leonard, E.I.1    Heitmeyer, C.L.2
  • 23
    • 0026142032 scopus 로고
    • Assessment of safety-critical software in nuclear power plants
    • D. L. Pamas, G. Asmis, and J. Madey. Assessment of safety-critical software in nuclear power plants. Nuclear Safety, 32(2), 1991.
    • (1991) Nuclear Safety , vol.32 , Issue.2
    • Pamas, D.L.1    Asmis, G.2    Madey, J.3
  • 27
    • 0004096330 scopus 로고
    • A survey of program slicing techniques
    • Amsterdam, The Netherlands, The Netherlands
    • F. Tip. A survey of program slicing techniques. Technical report, Amsterdam, The Netherlands, The Netherlands, 1994.
    • (1994) Technical Report
    • Tip, F.1
  • 28
    • 0033716152 scopus 로고    scopus 로고
    • High-integrity code generation for state-based formalisms
    • New York, NY, USA. ACM Press
    • M. W. Whalen. High-integrity code generation for state-based formalisms. In ICSE '00: Proc. of the 22nd Int'l Conf. on Software Eng., pages 725-727, New York, NY, USA, 2000. ACM Press.
    • (2000) ICSE '00: Proc. of the 22nd Int'l Conf. on Software Eng. , pp. 725-727
    • Whalen, M.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.