메뉴 건너뛰기




Volumn 7916 LNCS, Issue , 2013, Pages 91-106

Static analysis techniques to verify mutual exclusion situations within SysML models

Author keywords

Invariants; Model verification; Modeling; Mutual exclusion; Petri Nets; Structural analysis; SysML

Indexed keywords

ANALYSIS TECHNIQUES; FORMAL VERIFICATIONS; INVARIANTS; MODEL VERIFICATION; MUTUAL EXCLUSIONS; STATE EXPLOSION PROBLEMS; SYSML; VERIFICATION RESULTS;

EID: 84885717314     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38911-5_6     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 2
  • 3
    • 84870666470 scopus 로고    scopus 로고
    • SysML Companion, http://www.realtimeatwork.com/software/sysml-companion/
    • SysML Companion
  • 5
    • 84885717971 scopus 로고    scopus 로고
    • TOPCASED, http://www.topcased.org
  • 6
    • 84885757441 scopus 로고    scopus 로고
    • TTool, http://ttool.telecom-paristech.fr
  • 7
    • 80855147327 scopus 로고    scopus 로고
    • TEPE: A SysML Language for Time-Constrained Property Modeling and Formal Verification
    • Knorreck, D., Apvrille, L., De Saqui-Sannes, P.: TEPE: A SysML Language for Time-Constrained Property Modeling and Formal Verification. ACM SIGSOFT Software Engineering Notes 36(1), 1-8 (2012)
    • (2012) ACM SIGSOFT Software Engineering Notes , vol.36 , Issue.1 , pp. 1-8
    • Knorreck, D.1    Apvrille, L.2    De Saqui-Sannes, P.3
  • 8
    • 80051991023 scopus 로고    scopus 로고
    • AVATAR: A SysML Environment for the Formal Verification of Safety and Security Properties
    • IEEE
    • Pedroza, G., Knorreck, D., Apvrille, L.: AVATAR: A SysML Environment for the Formal Verification of Safety and Security Properties. In: New Technologies of Distributed Systems (NOTERE), pp. 1-10. IEEE (2011), http://dx.doi.org/10. 1109/NOTERE.2011.5957992
    • (2011) New Technologies of Distributed Systems (NOTERE) , pp. 1-10
    • Pedroza, G.1    Knorreck, D.2    Apvrille, L.3
  • 11
    • 84865448973 scopus 로고    scopus 로고
    • Using Horn Clauses for Analyzing Security Protocols
    • Formal Models and Techniques for Analyzing Security Protocols. IOS Press
    • Blanchet, B.: Using Horn Clauses for Analyzing Security Protocols. In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series, vol. 5, pp. 86-111. IOS Press (2011)
    • (2011) Cryptology and Information Security Series , vol.5 , pp. 86-111
    • Blanchet, B.1
  • 12
    • 0024645936 scopus 로고
    • Petri Nets: Properties, Analysis and Applications
    • Murata, T.: Petri Nets: Properties, Analysis and Applications. Proceedings of the IEEE 77(4), 541-580 (1989)
    • (1989) Proceedings of the IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 13
    • 0020310622 scopus 로고
    • Modeling and analysis of communication and cooperation protocols using petri net based models
    • Diaz, M.: Modeling and analysis of communication and cooperation protocols using petri net based models. Computer Networks 6(6), 419-441 (1982)
    • (1982) Computer Networks , vol.6 , Issue.6 , pp. 419-441
    • Diaz, M.1
  • 16
    • 0000285139 scopus 로고
    • Improving the Linearly Based Characterization of P/T Nets
    • Rozenberg, G. (ed.) APN 1990. Springer, Heidelberg
    • Colom, J.-M., Silva, M.: Improving the Linearly Based Characterization of P/T Nets. In: Rozenberg, G. (ed.) APN 1990. LNCS, vol. 483, pp. 113-145. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.483 , pp. 113-145
    • Colom, J.-M.1    Silva, M.2
  • 22
    • 0020151817 scopus 로고
    • REBUS, A Fault-Tolerant Distributed System for Industrial Real-Time Control
    • Ayache, J.-M., Courtiat, J.-P., Diaz, M.: REBUS, A Fault-Tolerant Distributed System for Industrial Real-Time Control. IEEE Transactions on Computers 31(7), 637-647 (1982)
    • (1982) IEEE Transactions on Computers , vol.31 , Issue.7 , pp. 637-647
    • Ayache, J.-M.1    Courtiat, J.-P.2    Diaz, M.3
  • 24
    • 0000098171 scopus 로고    scopus 로고
    • Coloured Petri Nets and the Invariant Method
    • Jensen, K.: Coloured Petri Nets and the Invariant Method. Theoretical Computer Science 14(3), 317-336 (2002)
    • (2002) Theoretical Computer Science , vol.14 , Issue.3 , pp. 317-336
    • Jensen, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.