期刊文献+
共找到962篇文章
< 1 2 49 >
每页显示 20 50 100
A Formal Method for Developing Algebraic and Numerical Algorithms 被引量:1
1
作者 ZUO Zhengkang SU Wei +3 位作者 LIANG Zanyang HUANG Qing WANG Yuan WANG Changjing 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第2期191-199,共9页
The development of algebraic and numerical algorithms is a kind of complicated creative work and it is difficult to guarantee the correctness of the algorithms. This paper introduces a systematic and unified formal de... The development of algebraic and numerical algorithms is a kind of complicated creative work and it is difficult to guarantee the correctness of the algorithms. This paper introduces a systematic and unified formal development method of algebraic and numerical algorithms. The method implements the complete refinement process from abstract specifications to a concrete executable program. It uses the core idea of partition and recursion for formal derivation and combines the mathematical induction based on strict mathematical logic with Hoare axiom for correctness verification. This development method converts creative work into non-creative work as much as possible while ensuring the correctness of the algorithm, which can not only verify the correctness of the existing algebraic and numerical algorithms but also guide the development of efficient unknown algorithms for such problems. This paper takes the non-recursive implementation of the Extended Euclidean Algorithm and Horner's method as examples. Therefore, the effectiveness and feasibility of this method are further verified. 展开更多
关键词 algebraic and numerical algorithms formal method partition and recursion mathematical induction
原文传递
Integrating object-oriented methods and formal methods for requirement engineering 被引量:1
2
作者 陈怡海 缪淮扣 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期295-299,共5页
High quality software requirement specification is crucial for a software development. Although much efforts and research works have been done to address the problem, the errors in user requirement are still prevent u... High quality software requirement specification is crucial for a software development. Although much efforts and research works have been done to address the problem, the errors in user requirement are still prevent us from developing high quality software. To address the problem, this paper proposes integrating graphical specification technique UML with formal specification technique to construct user requirement specification. We also present a prototype tool to perform the automatic translation from UML specification into Object-Z specification. 展开更多
关键词 formal methods UML OBJECT-Z methods integration
在线阅读 下载PDF
Formal Methods for Commercial Applications Issues vs. Solutions
3
作者 Saiqa Bibi Saira Mazhar +1 位作者 Nasir Mehmood Minhas Irfan Ahmed 《Journal of Software Engineering and Applications》 2014年第8期679-685,共7页
It was advocated that in 21st century, most of software will be developed with benefits of formal methods. The benefits include faults found in earlier stage of software development, automating, checking the certain p... It was advocated that in 21st century, most of software will be developed with benefits of formal methods. The benefits include faults found in earlier stage of software development, automating, checking the certain properties and minimizing rework. In spite of their recognition in academic world and these claimed advantages, formal methods are still not widely used by commercial software industry. The purpose of this research is to promote formal methods for commercial software industry. In this paper we have identified issues in use of formal methods for commercial applications and devised strategies to overcome these difficulties which will provide motivations to use formal methods for commercial applications. 展开更多
关键词 formal methodS COMMERCIAL Applications ISSUES of formal methodS
在线阅读 下载PDF
Integrating Formal Methods in XP—A Conceptual Solution
4
作者 Shagufta Shafiq Nasir Mehmood Minhas 《Journal of Software Engineering and Applications》 2014年第4期299-310,共12页
Formal methods can be used at any stage of product development process to improve the software quality and efficiency using mathematical models for analysis and verification. From last decade, researchers and practiti... Formal methods can be used at any stage of product development process to improve the software quality and efficiency using mathematical models for analysis and verification. From last decade, researchers and practitioners are trying to establish successful transfer of practices of formal methods into industrial process development. In the last couple of years, numerous analysis approaches and formal methods have been applied in different settings to improve software quality. In today’s highly competitive software development industry, companies are striving to deliver fast with low cost and improve quality solutions and agile methodologies have proved their efficiency in acquiring these. Here, we will present an integration of formal methods, specifications and verification practices in the most renowned process development methodology of agile i.e. extreme programming with a conceptual solution. That leads towards the development of a complete formalized XP process in future. This will help the practitioners to understand the effectiveness of formal methods using in agile methods that can be helpful in utilizing the benefits of formal methods in industry. 展开更多
关键词 formal methods Specification Verification AGILE EXTREME PROGRAMMING
在线阅读 下载PDF
PLC Modeling and Checking Based on Formal Method
5
作者 Yueshan Zheng Guiming Luo +2 位作者 Junbo Sun Junjie Zhang Zhenfeng Wang 《Journal of Software Engineering and Applications》 2010年第11期1054-1059,共6页
High reliability is the key to performance of electrical control equipment. PLC combines computer technology, automatic control technology and communication technology and becomes widely used for automation of industr... High reliability is the key to performance of electrical control equipment. PLC combines computer technology, automatic control technology and communication technology and becomes widely used for automation of industrial processes. Some requirements of complex PLC systems cannot be satisfied by the traditional verification methods. In this paper, an efficient method for the PLC systems modeling and verification is proposed. To ensure the high-speed property of PLC, we proposed a technique of “Time interval model” and “notice-waiting”. It could reduce the state space and make it possible to verify some complex PLC systems. Also, the conversion from the built PLC model to the Promela language is obtained and a tool PLC-Checker for modeling and checking PLC systems are designed. Using PLC-Checker to check a classical PLC example, a counter-example is found. Although the probability of this logic error occurs very small, it could result in system crash fatally. 展开更多
关键词 Model CHECKING PLC Modeling PLC-Checker formal method
在线阅读 下载PDF
Why Formal Methods Are Considered for Safety Critical Systems?
6
作者 Monika Singh Ashok Kumar Sharma Ruhi Saxena 《Journal of Software Engineering and Applications》 2015年第10期531-538,共8页
Formal methods are the mathematically techniques and tools which are used at early stages of software development lifecycle processes. The utter need of using formal methods in safety critical system leads to accuracy... Formal methods are the mathematically techniques and tools which are used at early stages of software development lifecycle processes. The utter need of using formal methods in safety critical system leads to accuracy, consistency and correctness in proposed system. In safety critical real time application, requirements should be unambiguous and very accurate which can be achieved by using mathematical theorems. There is utter need to focus on the requirement phase which is the most critical phase of SDLC. This paper focuses on the use of Z notation for incorporating the accuracy, consistency, and eliminates ambiguity in safety critical system: Road Traffic Management System as a case study. The syntax, semantics, type checking and domain checking are further verified by using Z/EVES: a Z notation type checker tool. 展开更多
关键词 formal methods Safety CRITICAL System Z Notation Z/EVES SYNTAX & Type CHECKING Domain CHECKING
在线阅读 下载PDF
On the use of formal methods to model and verify neuronal archetypes
7
作者 Elisabetta DE MARIA Abdorrahim BAHRAMI +4 位作者 Thibaud L'YVONNET Amy FELTY Daniel GAFFÉ Annie RESSOUCHE Franck GRAMMONT 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第3期101-122,共22页
Having a formal model of neural networks can greatly help in understanding and verifying their properties,behavior,and response to external factors such as disease and medicine.In this paper,we adopt a formal model to... Having a formal model of neural networks can greatly help in understanding and verifying their properties,behavior,and response to external factors such as disease and medicine.In this paper,we adopt a formal model to represent neurons,some neuronal graphs,and their composition.Some specific neuronal graphs are known for having biologically relevant structures and behaviors and we call them archetypes.These archetypes are supposed to be the basis of typical instances of neuronal information processing.In this paper we study six fundamental archetypes(simple series,series with multiple outputs,parallel composition,negative loop,inhibition of a behavior,and contralateral inhibition),and we consider two ways to couple two archetypes:(i)connecting the output(s)of the first archetype to the input(s)of the second archetype and(ii)nesting the first archetype within the second one.We report and compare two key approaches to the formal modeling and verification of the proposed neuronal archetypes and some selected couplings.The first approach exploits the synchronous programming language Lustre to encode archetypes and their couplings,and to express properties concerning their dynamic behavior.These properties are verified thanks to the use of model checkers.The second approach relies on a theorem prover,the Coq Proof Assistant,to prove dynamic properties of neurons and archetypes. 展开更多
关键词 neuronal networks leaky integrate and fire modeling synchronous languages model checking theorem proving LUSTRE COQ formal methods
原文传递
A Hybrid Formal Description Method Based on FSM,CSP and ADT for Communication Protocol
8
作者 Li Layman(Wuhan Transportation Universityl 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第3期29-38,共10页
Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description met... Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description methods. This paper presents a new hybrid formal method for communication protocol specification. In this method, finite state machine (FSM), communication sequential process (CSP) and abstract data type (ADT) are mixed and the best features of these approaches are offered. In this paper, the main formal description techniques (FDT) for protocol engineering are brieny introduced and a hybrid formal description method based on the FSM, CSP and ADT for communication protocol is described. Finally, this paper presents the formal specification of an example protocol for LAN by using the proposed hybrid formal method. The results of studies show that the hybrid formal description method for communication protocol is an available and effective approach. 展开更多
关键词 Communication protocol formal description techniques Protocol engineering Hybrid formal method
在线阅读 下载PDF
Formal methods, statistical debugging and exploratory analysis in support of system development: Towards a verification and validation calculator tool
9
作者 Saikou Y.Diallo Ross Gore +1 位作者 Christopher J.Lynch Jose J.Padilla 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2016年第1期120-141,共22页
In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator to... In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator tool that takes as input a set of statements that capture the requirements,internal conditions of the system and expected outputs of the real system and produces as output whether the simulation satisfies the requirements,faithfully represents the internal conditions of the system and produces the expected outputs.We provide a use case to show how subject matter experts can apply the tool. 展开更多
关键词 Verification and validation formal methods modeling and simulation
原文传递
Formal Derivation of the Combinatorics Problems with PAR Method
10
作者 Lingyu SUN Yatian SUN 《Journal of Software Engineering and Applications》 2009年第3期195-199,共5页
Partition-and-Recur (PAR) method is a simple and useful formal method. It can be used to design and testify algo-rithmic programs. In this paper, we propose that PAR method is an effective formal method on solving com... Partition-and-Recur (PAR) method is a simple and useful formal method. It can be used to design and testify algo-rithmic programs. In this paper, we propose that PAR method is an effective formal method on solving combinatorics problems. Furthermore, we formally derive combinatorics problems by PAR method, which cannot only simplify the process of algorithmic program's designing, but also improve its automatization, standardization and correctness. We develop algorithms for two typical combinatorics problems, the number of string scheme and the number of error per-mutation scheme. Lastly, we obtain accurate C++ programs which are transformed by automatic transforming system of PAR platform. 展开更多
关键词 PAR method formal DERIVATION COMBINATORICS Algorithmic PROGRAMS
在线阅读 下载PDF
基于事件逻辑的改进型Helsinki协议的形式化分析
11
作者 肖美华 罗运先 钟小妹 《计算机应用与软件》 北大核心 2026年第1期325-332,共8页
安全协议是现代网络通信的基础,证明协议的安全性问题是当今研究热点之一。事件逻辑是一种基于事件系统证明协议安全属性的形式化方法,结合事件类以及事件序语言,利用原子类型表示随机数、密钥等不可猜测的数据,能有效刻画协议系统。针... 安全协议是现代网络通信的基础,证明协议的安全性问题是当今研究热点之一。事件逻辑是一种基于事件系统证明协议安全属性的形式化方法,结合事件类以及事件序语言,利用原子类型表示随机数、密钥等不可猜测的数据,能有效刻画协议系统。针对改进型Helsinki协议的安全性问题,对事件逻辑扩充谓词Fresh和FirstSend及其推理规则,利用扩充后的事件逻辑对协议进行形式化分析,首先对协议构建基本序列,然后通过事件逻辑对协议的认证性以及秘密性进行形式化规约,最后利用公理系统和推理规则证明改进型Helsinki协议满足认证性和秘密性。结果表明事件逻辑理论能有效证明安全协议的认证性和秘密性。 展开更多
关键词 安全协议 事件逻辑 形式化方法 Helsinki协议
在线阅读 下载PDF
基于时间-事件逻辑的ID-AOFE协议形式化分析
12
作者 肖美华 乔珊珊 杨科 《郑州大学学报(理学版)》 北大核心 2026年第2期48-54,共7页
公平交换协议旨在为数字信息交换提供安全、公平的机制,分析该类协议的公平性是信息安全领域中一个重要的研究内容。时间-事件逻辑具有描述协议主体知识和状态随时间变化的机制,是一种分析协议安全属性的有效方法。基于时间-事件逻辑针... 公平交换协议旨在为数字信息交换提供安全、公平的机制,分析该类协议的公平性是信息安全领域中一个重要的研究内容。时间-事件逻辑具有描述协议主体知识和状态随时间变化的机制,是一种分析协议安全属性的有效方法。基于时间-事件逻辑针对公平交换协议中主体互不信任、存在欺骗行为的特点,通过分析当协议结束运行时,是否存在使不诚实主体获得额外优势的策略来分析协议的公平性。以一个基于身份的混淆乐观公平交换(identity based-ambiguous optimistic fair exchange,ID-AOFE)协议为例进行分析,定义了一种规范的消息交互过程,对ID-AOFE协议消息交互过程中的时间进行了细粒度分析,发现协议中存在两个公平性漏洞,结合图形描述方式给出了攻击发生的全过程,说明了时间-事件逻辑理论的有效性。 展开更多
关键词 形式化方法 时间事件逻辑 ID-AOFE协议 公平性分析
在线阅读 下载PDF
Formal analysis of robust email protocol based on authentication tests 被引量:1
13
作者 蒋睿 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期147-151,共5页
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m... Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy. 展开更多
关键词 email protocol authentication tests formal method perfect forward secrecy strand space model
在线阅读 下载PDF
基于STPA的联锁系统层级安全需求建模及确认方法
14
作者 陈祖希 周林 +3 位作者 梅萌 王龙生 张宏扬 徐中伟 《中国铁道科学》 北大核心 2026年第1期185-196,共12页
针对铁路联锁系统安全需求验证中存在的动态行为建模不足和层级约束可追溯性弱等问题,提出1种基于系统理论过程分析(STPA)与形式化开发协同的安全需求建模及确认方法。首先,通过扩展STPA框架,建立多层次的安全需求模型,将顶层抽象的系... 针对铁路联锁系统安全需求验证中存在的动态行为建模不足和层级约束可追溯性弱等问题,提出1种基于系统理论过程分析(STPA)与形式化开发协同的安全需求建模及确认方法。首先,通过扩展STPA框架,建立多层次的安全需求模型,将顶层抽象的系统级安全约束逐步精化为具体的安全需求;其次,设计面向铁路联锁领域的分层精化策略,实现安全需求向形式化模型不变式与事件守卫条件的系统性转化;最后,引入形式化验证工具链,构建集定理证明、模型检测和行为仿真于一体的混合验证机制,通过数学证明完成各精化层级的验证,利用模型检验的状态空间探索与反例生成功能,全面验证由安全需求转化而来的模型不变式及线性时序逻辑(LTL)的正确性,并通过仿真复现典型运行场景,确认系统无死锁且满足预期的安全需求。结果表明:经过3次分层精化,将132条证明义务分解到4层模型中,并通过形式化验证工具进一步完成安全需求的确认,有效降低了铁路联锁系统安全需求建模的复杂性,也为铁路联锁系统的安全运行奠定了基础。 展开更多
关键词 铁路联锁系统 形式化方法 安全需求 线性时序逻辑 STPA
在线阅读 下载PDF
带递归定义的SMT公式求解技术综述
15
作者 冯维直 刘嘉祥 +1 位作者 张立军 吴志林 《软件学报》 北大核心 2026年第2期508-542,共35页
带有递归数据结构,如列表(list)和二叉树(tree)等数据类型的程序,在计算机领域被广泛使用.程序验证问题通常将程序转换为可满足性模理论(satisfiability modulo theories,SMT)公式进行求解.递归数据结构通常会转换为代数数据类型(algebr... 带有递归数据结构,如列表(list)和二叉树(tree)等数据类型的程序,在计算机领域被广泛使用.程序验证问题通常将程序转换为可满足性模理论(satisfiability modulo theories,SMT)公式进行求解.递归数据结构通常会转换为代数数据类型(algebraic data type,ADT)和整数等混合理论的一阶逻辑公式.另外,为表示递归数据结构的性质,程序中通常需要包含递归函数,递归函数在SMT中则需要通过包含量词和未解释函数的断言来表示.关注带有ADT和递归函数这两类递归定义SMT公式的求解方法.从SMT求解器、自动定理证明器和约束霍恩子句(constrained Horn clause,CHC)求解器这3方面对现有技术进行梳理和介绍.同时,对主流的求解工具进行统一实验对比,探究现有求解工具和技术在各类问题上的优势和缺陷,尝试寻找潜在的优化方向,为研究者提供有价值的分析和参考. 展开更多
关键词 形式化方法 递归函数 可满足性模理论 归纳推理 引理合成 约束霍恩子句
在线阅读 下载PDF
OpenID Connect协议的形式化分析与优化
16
作者 陈琼 缪祥华 袁梅宇 《计算机技术与发展》 2026年第2期195-200,214,共7页
OpenID Connect协议作为实现身份认证与授权的重要机制,其安全性备受关注。利用Scyther模型检测工具,在CK强安全模型约束下对该协议进行形式化分析。分析结果表明,OpenID Connect协议存在明显的安全漏洞,其中包括跨站请求伪造攻击、重... OpenID Connect协议作为实现身份认证与授权的重要机制,其安全性备受关注。利用Scyther模型检测工具,在CK强安全模型约束下对该协议进行形式化分析。分析结果表明,OpenID Connect协议存在明显的安全漏洞,其中包括跨站请求伪造攻击、重放攻击以及中间人攻击等问题。这些安全漏洞严重威胁着协议运行的安全性和用户信息的保密性。针对跨站请求伪造攻击,对state参数实施加盐哈希处理;针对重放攻击,引入时间戳校验机制,客户端请求时服务端生成精确时间戳,通过网络时间协议确保时间同步,仅处理处于预设时间窗口期内的请求;针对中间人攻击,采用SM2数字签名算法,客户端用私钥签名请求,服务器用公钥验证,服务器转发时附加自身签名,确保请求来源可信。改进后的协议在抵御上述安全攻击方面表现出色,经检验具备良好的安全性,能够为用户提供更为可靠的身份验证和授权服务,对于提升OpenID Connect协议在实际应用中的安全性具有重要意义。 展开更多
关键词 OpenID Connect协议 形式化分析 CK安全模型 Scyther 协议分析 改进
在线阅读 下载PDF
A Privilege Separation Method for Security Commercial Transactions 被引量:1
17
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
在线阅读 下载PDF
A Formal Reputation System for Trusting Wireless Sensor Network 被引量:1
18
作者 XIAO Deqin FENG Jianzhao ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第2期173-179,共7页
In this paper,a formal system is proposed based on beta reputation for the development of trustworthy wireless sensor networks(FRS-TWSN).Following this approach,key concepts related to reputation are formal described ... In this paper,a formal system is proposed based on beta reputation for the development of trustworthy wireless sensor networks(FRS-TWSN).Following this approach,key concepts related to reputation are formal described step by step for wireless sensor networks where sensor nodes maintain reputation for other sensors and use it to evaluate their trustworthiness.By proving some properties of beta reputation system,the beta distribution is founded to fit well to describe reputation system.Also,a case system is developed within this framework for reputation representation,updates and integration.Simulation results show this scheme not only can keep stable reputation but also can prevent the system from some attacks as bad mouthing and reputation cheating. 展开更多
关键词 wireless sensor networks formal method REPUTATION Beta distribution
在线阅读 下载PDF
Formal Protection Architecture for Cloud Computing System 被引量:1
19
作者 Yasha Chen Jianpeng Zhao +1 位作者 Junmao Zhu Fei Yan 《ZTE Communications》 2014年第2期63-66,共4页
Cloud computing systems play a vital role in national security. This paper describes a conceptual framework called dualsystem architecture for protecting computing environments. While attempting to be logical and rigo... Cloud computing systems play a vital role in national security. This paper describes a conceptual framework called dualsystem architecture for protecting computing environments. While attempting to be logical and rigorous, formalism method is avoided and this paper chooses algebra Communication Sequential Process. 展开更多
关键词 formal method trusted computing PRIVACY cloud computing
在线阅读 下载PDF
时间自动机主动学习算法研究进展
20
作者 曹舒 涂键 刘芳 《计算机系统应用》 2026年第1期39-51,共13页
时间自动机(timed automata,TA)是描述实时系统时间约束行为的重要形式化工具,广泛应用于嵌入式系统、通信协议等领域.传统手动构建实时系统模型的方式耗时且易出错,自动推断模型成为研究热点.本文聚焦时间自动机主动学习算法,按照数据... 时间自动机(timed automata,TA)是描述实时系统时间约束行为的重要形式化工具,广泛应用于嵌入式系统、通信协议等领域.传统手动构建实时系统模型的方式耗时且易出错,自动推断模型成为研究热点.本文聚焦时间自动机主动学习算法,按照数据存储结构以及等价查询方法进行梳理,总结了当前时间自动机领域中主动学习算法的最新研究现状,梳理其核心思想、技术框架,同时分析当前研究面临的挑战.通过对比各种方法的优势与局限性,本文希望为研究者提供一个清晰的参考框架,并提出未来可能的研究思路,旨在推动TA自动化建模理论与实践发展. 展开更多
关键词 形式化方法 时间自动机 主动学习 模型推断
在线阅读 下载PDF
上一页 1 2 49 下一页 到第
使用帮助 返回顶部