Strategies for product-line verification: case studies and experiments
Product-line technology is increasingly used in mission-critical and safety-critical applications. Hence, researchers are developing verification approaches that follow different strategies to cope with the specific properties of product lines. While the research community is discussing the mutual s...
Uložené v:
| Vydané v: | Proceedings of the 2013 International Conference on Software Engineering s. 482 - 491 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
Piscataway, NJ, USA
IEEE Press
18.05.2013
|
| Edícia: | ACM Conferences |
| Predmet: |
Social and professional topics
> Professional topics
> Management of computing and information systems
> Software management
Software and its engineering
> Software creation and management
> Software development process management
Software and its engineering
> Software creation and management
> Software verification and validation
> Formal software verification
|
| ISBN: | 1467330760, 9781467330763 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Product-line technology is increasingly used in mission-critical and safety-critical applications. Hence, researchers are developing verification approaches that follow different strategies to cope with the specific properties of product lines. While the research community is discussing the mutual strengths and weaknesses of the different strategies—mostly at a conceptual level—there is a lack of evidence in terms of case studies, tool implementations, and experiments. We have collected and prepared six product lines as subject systems for experimentation. Furthermore, we have developed a model-checking tool chain for C-based and Java-based product lines, called SPLVERIFIER, which we use to compare sample-based and family-based strategies with regard to verification performance and the ability to find defects. Based on the experimental results and an analytical model, we revisit the discussion of the strengths and weaknesses of product-line–verification strategies. |
|---|---|
| AbstractList | Product-line technology is increasingly used in mission-critical and safety-critical applications. Hence, researchers are developing verification approaches that follow different strategies to cope with the specific properties of product lines. While the research community is discussing the mutual strengths and weaknesses of the different strategies—mostly at a conceptual level—there is a lack of evidence in terms of case studies, tool implementations, and experiments. We have collected and prepared six product lines as subject systems for experimentation. Furthermore, we have developed a model-checking tool chain for C-based and Java-based product lines, called SPLVERIFIER, which we use to compare sample-based and family-based strategies with regard to verification performance and the ability to find defects. Based on the experimental results and an analytical model, we revisit the discussion of the strengths and weaknesses of product-line–verification strategies. |
| Author | Beyer, Dirk Rhein, Alexander von Wendler, Philipp Apel, Sven Größlinger, Armin |
| Author_xml | – sequence: 1 givenname: Sven surname: Apel fullname: Apel, Sven email: apel@uni-passau.de organization: University of Passau, Germany – sequence: 2 givenname: Alexander von surname: Rhein fullname: Rhein, Alexander von email: rhein@fim.uni-passau.de organization: University of Passau, Germany – sequence: 3 givenname: Philipp surname: Wendler fullname: Wendler, Philipp email: uni@philippwendler.de organization: University of Passau, Germany – sequence: 4 givenname: Armin surname: Größlinger fullname: Größlinger, Armin email: armin.groesslinger@uni-passau.de organization: University of Passau, Germany – sequence: 5 givenname: Dirk surname: Beyer fullname: Beyer, Dirk email: dirk.beyer@sosy-lab.org organization: University of Passau, Germany |
| BookMark | eNqNj01LAzEURQMqaGvXbrN0M2MyyWQSd1JsFQou1HXIx4tE20mZpOLPdwbnB3jhcTeHxz0LdN6nHhC6oaRux9w1XIpOynpq2TZnaEG56BgjnSCXaJXzJyGEUjVed4U2r2UwBT4iZBzSgI9D8idXqn3sAX_DEEN0psTU32NnMuBcTn5iTe8x_BxH4AB9ydfoIph9htXcS_S-eXxbP1W7l-3z-mFXGdp2pQrKO9a0zkGwthGSexaU5MpSMIJ4IYkLhARqOaUtUK6AcTGuVYoH2rDAluj2769xB21T-sqaEj1569lbz94jWv8T1XaIENgvmPdbkg |
| ContentType | Conference Proceeding |
| DOI | 10.5555/2486788.2486852 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| EndPage | 491 |
| GroupedDBID | 6IE 6IF 6IG 6IH 6IK 6IL 6IN AAJGR ACM ADPZR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IEGSK IERZE IJVOP OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-a157t-f9dc325ccefbb2684d3f9849b1ea60d680cf00f1b4115e149e346001994f123f3 |
| ISBN | 1467330760 9781467330763 |
| ISICitedReferencesCount | 99 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000333965800049&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Jan 31 06:36:14 EST 2024 Wed Jan 31 06:52:01 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | OpenURL |
| MeetingName | ICSE '13: 35th International Conference on Software Engineering |
| MergedId | FETCHMERGED-LOGICAL-a157t-f9dc325ccefbb2684d3f9849b1ea60d680cf00f1b4115e149e346001994f123f3 |
| PageCount | 10 |
| ParticipantIDs | acm_books_10_5555_2486788_2486852 acm_books_10_5555_2486788_2486852_brief |
| PublicationCentury | 2000 |
| PublicationDate | 20130518 |
| PublicationDateYYYYMMDD | 2013-05-18 |
| PublicationDate_xml | – month: 05 year: 2013 text: 20130518 day: 18 |
| PublicationDecade | 2010 |
| PublicationPlace | Piscataway, NJ, USA |
| PublicationPlace_xml | – name: Piscataway, NJ, USA |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | Proceedings of the 2013 International Conference on Software Engineering |
| PublicationYear | 2013 |
| Publisher | IEEE Press |
| Publisher_xml | – name: IEEE Press |
| SSID | ssj0001190117 |
| Score | 1.8328215 |
| Snippet | Product-line technology is increasingly used in mission-critical and safety-critical applications. Hence, researchers are developing verification approaches... |
| SourceID | acm |
| SourceType | Publisher |
| StartPage | 482 |
| SubjectTerms | General and reference -- Cross-computing tools and techniques -- Verification Social and professional topics -- Professional topics -- Management of computing and information systems -- Software management Software and its engineering -- Software creation and management -- Software development process management Software and its engineering -- Software creation and management -- Software verification and validation -- Formal software verification Software and its engineering -- Software organization and properties -- Software functional properties -- Formal methods -- Software verification Theory of computation -- Semantics and reasoning -- Program reasoning -- Program verification |
| Title | Strategies for product-line verification: case studies and experiments |
| WOSCitedRecordID | wos000333965800049&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LbxMxELbSigO3ohaRQpGRkDighXXsXdvcKCLiQlUpQeS22vXaaqV2GyUh7Y_gRzPjfdiNKlEO5OAk1moi-5t4Hp4HIW_T3FYo2RML_JAIYViiJzJN5ITbyk2EdHXtm03IszO1WOjz0eh3nwuzvZJNo-7u9PK_Qg1zADamzv4D3ANRmIDPADqMADuMOxrxg8LnfJhc9_f_IH35jusvJPrhbcEMzuJbDAGLqhPGvNSXsLW-eAPGdGGV2MRrqLA_GG00BIkYEIu-aC0-jV750ENgUN8_L9vYgNk2SkS76NpuDik377chROCnxWIQq-ACWobAIbzrP81x1NMr76X0ZDDIpz0zsZbzGpjue7Tse-4O5oMLuxO6N4HvRaeAIYyHPed4xRidxKLtadQJddG2BNuVFxm8MCUGyw4q9QHfVQYCfU9K1uYCBn8dak5M-tzA_uf6kmHdd96WjkKiH3dIou5jriPNZX5AjsKaaeCNZ2Rkm0MyDchSQJbGyNIY2U8UcaUdrhTwoRGuR-TH9Ov8y7ek66yRlCyTm8Tp2vBJZox1VYX1fmrutBK6YrbM0zpXqXFp6lglwGCwYERbLlAz1lo4UHUcf072m5vGviCU5anSWVkKU4OtblTJLKiMSlQ6h5XX9Zi8gZUX-AdZF2Bx4u4U3e4U3e6Mybu_PlNUwCvu-BHUXpKngXFekf3N6pc9IU_MdnO5Xr32qP4BvexqIg |
| linkProvider | IEEE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+2013+International+Conference+on+Software+Engineering&rft.atitle=Strategies+for+product-line+verification%3A+case+studies+and+experiments&rft.au=Apel%2C+Sven&rft.au=Rhein%2C+Alexander+von&rft.au=Wendler%2C+Philipp&rft.au=Gr%C3%B6%C3%9Flinger%2C+Armin&rft.series=ACM+Conferences&rft.date=2013-05-18&rft.pub=IEEE+Press&rft.isbn=1467330760&rft.spage=482&rft.epage=491&rft_id=info:doi/10.5555%2F2486788.2486852 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330763/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330763/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467330763/sc.gif&client=summon&freeimage=true |

