Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 536-540.

• Interdiscipline & Application • Previous Articles     Next Articles

Verification of G Language System Model Based on SPIN

XUE Yan1,WU Shu-hong1,WANG Yao-li2   

  1. Department of Computer Science and Technology,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China1
    Department of Information Engineering,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China2
  • Online:2018-06-20 Published:2018-08-03

Abstract: For large systems,in order to ensure the reliability,stability and efficiency of its operation,it is necessary to verify the system from two aspects,the business model and the system model.At present,the validation of the business model can be done through BPMN.For the system model validation,SPIN tool is selected.G language created by the NI company is a graphical block diagram language and has not yet joined the ANSI standard.Therefore,the first step is to extract the G language form,rules,grammar and other language features.SPIN does not provide direct support for the G language,so the second step is to complete the G2Promela mapping.In the work of G2Promela,mainly taking the framework of the compiler to Scanner- Parser- Optimizer- Generator (SPOG framework) as the main line,according to the first step of the pre-processing work,G2Promela mapping rules is classified and created through the method function,pointer,keywords,variables to realize the G language system model validation.The proposed method complements the gaps in the G language system model validation,thus further ensuring the performance of the G language program.

Key words: G language, G2Promela, SPIN, SPOG, System model

CLC Number: 

  • TP399
[1]CATTEL T.Modeling and Verification of sC++ Applications[C]∥Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems.Lisbon,Portugal,LNCS,1384.
[2]KOREL B.Automated software test data generation[J].IEEE Transactions on Software Engineering,1990,16(8):870-879.
[3]HOLTZMAN G.The SPIN Model Checker,Primer and Refe- rence Manual[M].Addison-Wesley Professional,2001.
[4]CHAN W,ANDERSON R J,BEAME P,et al.Model checking large software specifications[J].IEEE Transactions on Software Engineering,1998,24(7):498-520.
[5]HOLZMANN G J.The model checker SPIN[J].IEEE Transac- tions on Software Engineering,1997,23(5):279-295.
[6]HOLZMANN G J,SMITH M H.A practical method for verifying event-driven software[C]∥Proceedings of the 21st International Conference on Software Engineering.ACM,1999:597-607.
[7]王大伟,张大方,缪力.一种自动化模型检测 ANSI-C 程序的实用方法[J].计算机工程与科学,2010,32(4):79-82.
[8]郭伟,缪力,张大方,等.基于 Spin 的 UML 状态图模型检查的设计与实现[J].计算机工程与应用,2008,44(10):43-47.
[9]高晓星,李晓霞,薛冰.基于 UML 和 SPIN 的软件安全模型验证[J].长沙大学学报,2013,27(5):69-71.
[10]舒良春,饶俊,肖美华,等.基于 Promela 的 UML 建模方法及其应用[J].计算机与现代化,2010,2010(2):101-104.
[1] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[2] PAN Fang, ZHANG Hui-bing, DONG Jun-chao, SHOU Zhao-yu. Aspect Sentiment Analysis of Chinese Online Course Review Based on Efficient Transformer [J]. Computer Science, 2021, 48(6A): 264-269.
[3] LIU Tong-tong, YANG Huan, XI Yong-ming, GUO Jian-wei, PAN Zhen-kuan, HUANG Bao-xiang. Review on Intelligent Diagnosis of Spine Disease Based on Machine Learning [J]. Computer Science, 2021, 48(11A): 597-607.
[4] QIU Guo-liang, ZHANG Chi-hao. Approximability of Partition Functions of Ferromagnetic Two-state Spin Systems [J]. Computer Science, 2020, 47(5): 22-26.
[5] LI Zhi, DENG Jie, YANG Yi-long, WEI Shang-feng. Transformational Approach from Problem Models of Cyber-Physical Systems to Use Case Diagrams in UML [J]. Computer Science, 2020, 47(12): 65-72.
[6] YUAN Liang,ZHANG Yun-quan,BAI Xue-rui,ZHANG Guang-ting. Research on Locality-aware Design Mechanism of State-of-the-art Parallel Programming Languages [J]. Computer Science, 2020, 47(1): 7-16.
[7] ZHU Chao, WU Su-ping. Parallel Harris Feature Point Detection Algorithm [J]. Computer Science, 2019, 46(11A): 289-293.
[8] ZHU Yan-na,WANG Dang-hui. Design of Cache Scheduling Policies Based on MLC STT-RAM [J]. Computer Science, 2018, 45(6A): 513-517.
[9] SONG Lan, XUE Jin-yun, HU Qi-min, XIE Wu-ping, JIANG Dong-ming and YOU Zhen. Research of Automatic Verification Method about Radio Frequency Identification Protocol [J]. Computer Science, 2017, 44(9): 99-104.
[10] GUO Yan-yan, ZHANG Nan and TONG Xiang-rong. Survey on Formal Semantics of UML Sequence Diagram [J]. Computer Science, 2017, 44(2): 17-30.
[11] CHEN Guang-ying, HUANG Zhi-qiu, CHEN Zhe and KAN Shuang-long. Safety Analysis of Slat and Flap Control Unit for DO-333 [J]. Computer Science, 2016, 43(5): 150-156.
[12] HU Jun, SHI Jiao-jie, CHENG Zhen, CHEN Song and WANG Ming-ming. System Safety Modeling and Analysis Method Based on Four-variable Model [J]. Computer Science, 2016, 43(11): 193-199.
[13] SU Jin-dian. Survey on Categorical Data Type in Computer Science [J]. Computer Science, 2016, 43(10): 9-18.
[14] XIAO Mei-hua ZHU Ke MA Cheng-lin. Model Checking of Parallel Attack in Andrew Secure RPC Protocol Based on SPIN [J]. Computer Science, 2015, 42(7): 103-107.
[15] ZHAO Cui-lian, WANG Hong, FAN Zhi-jian and GUO Jing. Tracking Method of Hand Grasping Objects Based on Feedback from Camshift to Codebook Model [J]. Computer Science, 2015, 42(12): 297-301.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!