Practical application of functional and relational methods for the specification and verification of safety critical software

被引:0
|
作者
Lawford, M [1 ]
McDougall, J
Froebel, P
Moum, G
机构
[1] McMaster Univ, Hamilton, ON L8S 4L7, Canada
[2] JKM Software Technol Inc, Kettleby, ON L0G 1J0, Canada
[3] Ontario Power Generat, Toronto, ON M5G 1X6, Canada
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we describe how a functional version of the 4-variable model can be decomposed to improve its practical application to industrial software verification problems. An example is then used to illustrate the limitations of the functional model and motivate a modest extension of the 4-variable model to an 8-variable relational model. The 8-variable model is designed to allow the system requirements to be specified as functions with input and output tolerance relations, as is typically done in practice. The goal is to create a relational method of specification and verification that models engineering intuition and hence is easy to use and understand.
引用
下载
收藏
页码:73 / 88
页数:16
相关论文
共 50 条
  • [21] Application of Functional Specification and Operational Safety Conventional Methods for a Networked Control System Suitable Qualitative Analysis
    Naoui, Adel
    Ali, Saloua Bel Hadj
    Afilal, Lissan-Eddine
    Abdelkrim, Mohamed Naceur
    201415TH INTERNATIONAL CONFERENCE ON SCIENCES & TECHNIQUES OF AUTOMATIC CONTROL & COMPUTER ENGINEERING (STA'2014), 2014, : 44 - 52
  • [22] Agile methods for safety-critical software development
    Weyrauch, K
    Poppendieck, M
    Morsicato, R
    Van Schooenderwoert, N
    Pyritz, B
    EXTREME PROGRAMMING AND AGILE METHODS - XP/ AGILE UNIVERSE 2004, PROCEEDINGS, 2004, 3134 : 202 - 202
  • [23] OPERATIONAL SAFETY-CRITICAL SOFTWARE METHODS IN RAILWAYS
    GUIHO, G
    MEJIA, F
    INFORMATION PROCESSING '94, VOL III: LINKAGE AND DEVELOPING COUNTRIES, 1994, 53 : 262 - 269
  • [24] FORMAL METHODS IN THE PRODUCTION AND ASSESSMENT OF SAFETY CRITICAL SOFTWARE
    BLOOMFIELD, RE
    FROOME, PKD
    MONAHAN, BQ
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 1991, 32 (1-2) : 51 - 66
  • [25] A Compositional Verification Method for AADL Models of Safety-Critical Software
    Zhang B.-L.
    Yang Z.-B.
    Zhou Y.
    Ma Y.-Y.
    Huang Z.-Q.
    Xue L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (11): : 2134 - 2151
  • [26] Advances in modeling, verification and testing of safety-critical software architectures
    Abderrahim Ait Wakrime
    Yassine Ouhammou
    Innovations in Systems and Software Engineering, 2022, 18 : 483 - 484
  • [27] Analyzing Different Validation and Verification Techniques for Safety Critical Software Systems
    Ahmad, Waqas
    Qamar, Usman
    Hassan, Shoaib
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 367 - 370
  • [28] Advances in modeling, verification and testing of safety-critical software architectures
    Ait Wakrime, Abderrahim
    Ouhammou, Yassine
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2022, 18 (04) : 483 - 484
  • [29] Research on Formal Verification Technique for Aircraft Safety-Critical Software
    Yin, Yongfeng
    Liu, Bin
    Su, Duo
    JOURNAL OF COMPUTERS, 2010, 5 (08) : 1152 - 1159
  • [30] Verification of safety critical control policies using kernel methods
    Vertovec, Nikolaus
    Ober-Bloebaum, Sina
    Margellos, Kostas
    2022 EUROPEAN CONTROL CONFERENCE (ECC), 2022, : 1870 - 1875