Computer Science ›› 2020, Vol. 47 ›› Issue (12): 73-86.doi: 10.11896/jsjkx.190400035
Special Issue: Software Engineering & Requirements Engineering for Complex Systems
Previous Articles Next Articles
CHEN Shuo1,2, HU Jun1,2, TANG Hong-ying1, SHI Meng-ye1
CLC Number:
[1] CHENG C,LIU Y F.Research on Model Based Safety Analysis[J].Advances in Aeronautical Science And Engineering,2016,7(3):369-373. [2] GOMES A,MOTA A,SAMPAIO A,et al.Systematic Model-Based Safety Assessment Via Probabilistic Model Checking[M]//Leveraging Applications of Formal Methods,Verification and Validation.2010:625-639. [3] SANGO M,VALLÉE F,VIÉ A C,et al.MBSE and MBSA with Capella and Safety Architect Tools[M]//Complex Systems Design &Management.2017. [4] BOZZANO M,CIMATTI A,LISAGOR O,et al.Safety assessment of AltaRica models via symbolic model checking[J].Science of Computer Programming,2015,98(4):464-483. [5] GRIFFAULT A,VINCENT A.The Mec 5 model-checker[C]//International Conference on Computer Aided Verification.Springer,2004. [6] BOITEAU M,DUTUIT Y,RAUZY A,et al.The AltaRica data-flow language in use:modeling of production availability of a multi-state system[J].Reliability Engineering &System Safety,2006,91(7):747-755. [7] RUIN T,IUNG B,DESPUJOLS A,et al.Complex maintenance programs quantification (CMPQ) to better control production systems[J].Journal of Manufacturing Technology Management,2014,25(4):491-509. [8] ArNOLD A,POINT G,GRIFFAULT A,et al.The AltaRica Formalism for Describing Concurrent Systems[J].Fundamenta Informaticae,1999,40(2/3):109-124. [9] GRIFFAULT A,POINT G,KUNTZ F,et al.Symbolic computation of minimal cuts for AltaRica models[R].Talence Cedex,France:LaBRI,Université de Bordeaux,2011. [10] YONG J,QIU Z.S2N:Model Transformation from SPIN toNuSMV[C]//International Conference on Model Checking Software.2012. [11] ZHOU Y P.Research on Safety Analysis of Train Control System in Requirements Phase Based on UML-NuSMV Model[D].Beijing:Beijing Jiaotong University,2015. [12] LI Y,CAO Z N.Investigation on Formal Modeling and Verification Method Based on Specification[J].Computer Technology And Development,2017,27(6):7-10. [13] LIU K,YANG H L,LIAO H S,et al.Xml Schema Constraints Extraction Based on Model Checking[J].Computer Applications and Software,2012(11):160-164. [14] ZHANG T,XIE H,HUANG S B.The Method of Model Checking Policy of Multi-Agent Interaction[J].Journal of University of Electronic Science and Technology of China,2016,45(5):802-807. [15] SZPYRKA M,BIERNACKA A,BIERNACKI J.Methods ofTranslation of Petri Nets to NuSMV Language[C]//CS&P.2014. [16] ARCAINI P,GARGANTINI A,RICCOBENE E.AsmetaSMV:a way to link high-level ASM models to low-level NuSMV specifications[C]//International Conference on Abstract State Machines.Springer,2010. [17] CALTAIS G,LEITNER-FISCHER F,LEUE S,et al.SysML to NuSMV Model Transformation via Object-Orientation[C]//International Workshop on Design.2016. [18] LAM V S.Formal analysis of BPMN models:a NuSMV-based approach[J].International Journal of Software Engineering and Knowledge Engineering,2010,20(7):987-1023. [19] JUN H,SONG C,MINGMING W.A Transformation Method for AltaRica 3.0 to Promela and Its Verification[J].Computer Engineering &Science,2017,39(4):708-716. [20] CIMATTI A,MOVER S,TONETTA S.HyDI:A Language for Symbolic Hybrid Systems with Discrete Interaction[C]//Euromicro Conference on Software Engineering &Advanced Applications.2011. [21] PARR T.The Definitive ANTLR 4 Reference[M].PragmaticBookshelf,2013:184. [22] QUONG R W.ANTLR:A Predicated-LL(k) Parser Generator[J].Software Practice &Experience,2010,25(7):789-810. [23] PROSVIRNOVA T,RAUZY A.Guarded transition systems:Pivot modelling formalism for safety analysis[C]//Actes du Congres Lambda-Mu.2012. [24] PROSVIRNOVA T.AltaRica 3.0:a Model-Based approach for Safety Analyses[D].Paris:Ecole Polytechnique.2014. [25] CIMATTI A,CLARKE E,GIUNCHIGLIA F,et al.NUSMV:a new symbolic model checker[J].International Journal on Software Tools for Technology Transfer,2000,2(4):410-425. [26] CIMATTI A,CLARKE E,GIUNCHIGLIA E,et al.NuSMV 2:An OpenSource Tool for Symbolic Model Checking[M]//Computer Aided Verification.Berlin:Springer,2002. [27] STEWART D,WHALEN M W,COFER D,et al.Architectural Modeling and Analysis for Safety Engineering[C]//International Symposium on Model-Based Safety and Assessment.2017. [28] MORTADA H,PROSVIRNOVA T,RAUZY A.Safety Assessment of an Electrical System with AltaRica 3.0[M]//Model-Based Safety and Assessment.Cham:Springer,2014. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | LIU Dong-mei, XU Yang, WU Ze-bin, LIU Qian, SONG Bin, WEI Zhi-hui. Incremental Object Detection Method Based on Border Distance Measurement [J]. Computer Science, 2022, 49(8): 136-142. |
[3] | YANG Xiao, WANG Xiang-kun, HU Hao, ZHU Min. Survey on Visualization Technology for Equipment Condition Monitoring [J]. Computer Science, 2022, 49(7): 89-99. |
[4] | SHAO Xin-xin. TI-FastText Automatic Goods Classification Algorithm [J]. Computer Science, 2022, 49(6A): 206-210. |
[5] | ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383. |
[6] | ZHAO Ming-hua, ZHOU Tong-tong, DU Shuang-li, SHI Zheng-hao. Single Backlit Image Enhancement Based on Virtual Exposure Method [J]. Computer Science, 2022, 49(6A): 384-389. |
[7] | XU Jie, ZHU Yu-kun, XING Chun-xiao. Application of Machine Learning in Financial Asset Pricing:A Review [J]. Computer Science, 2022, 49(6): 276-286. |
[8] | LU Ting, HOU Guo-jia, PAN Zhen-kuan, WANG Guo-dong. Underwater Image Quality Assessment Based on HVS [J]. Computer Science, 2022, 49(5): 98-104. |
[9] | WANG Ben-yu, GU Yi-jun, PENG Shu-fan, ZHENG Di-wen. Community Detection Algorithm Based on Dynamic Distance and Stochastic Competitive Learning [J]. Computer Science, 2022, 49(5): 170-178. |
[10] | GUO Si-yu, WU Yan-dong. Improved Ellipse Fitting Algorithm with Outlier Removal [J]. Computer Science, 2022, 49(4): 188-194. |
[11] | XIE Yu, YANG Rui-ling, LIU Gong-xu, LI De-yu, WANG Wen-jian. Human Skeleton Action Recognition Algorithm Based on Dynamic Topological Graph [J]. Computer Science, 2022, 49(2): 62-68. |
[12] | WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42. |
[13] | CHENG Zhao-wei, SHEN Hang, WANG Yue, WANG Min, BAI Guang-wei. Deep Reinforcement Learning Based UAV Assisted SVC Video Multicast [J]. Computer Science, 2021, 48(9): 271-277. |
[14] | ZHANG Jie, YUE Shao-hua, WANG Gang, LIU Jia-yi, YAO Xiao-qiang. Multi-agent System Based on Stackelberg and Edge Laplace Matrix [J]. Computer Science, 2021, 48(8): 253-262. |
[15] | FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346. |
|