Evaluating and improving the automatic analysis of implicit invocation systems
JS Bradbury, J Dingel - ACM SIGSOFT Software Engineering Notes, 2003 - dl.acm.org
ACM SIGSOFT Software Engineering Notes, 2003•dl.acm.org
Model checking and other finite-state analysis techniques have been very successful when
used with hardware systems and less successful with software systems. It is especially
difficult to analyze software systems developed with the implicit invocation architectural style
because the loose coupling of their components increases the size of the finite state model.
In this paper we provide insight into the larger problem of how to make model checking a
better analysis and verification tool for software systems. Specifically, we will extend an …
used with hardware systems and less successful with software systems. It is especially
difficult to analyze software systems developed with the implicit invocation architectural style
because the loose coupling of their components increases the size of the finite state model.
In this paper we provide insight into the larger problem of how to make model checking a
better analysis and verification tool for software systems. Specifically, we will extend an …
Model checking and other finite-state analysis techniques have been very successful when used with hardware systems and less successful with software systems. It is especially difficult to analyze software systems developed with the implicit invocation architectural style because the loose coupling of their components increases the size of the finite state model. In this paper we provide insight into the larger problem of how to make model checking a better analysis and verification tool for software systems. Specifically, we will extend an existing approach to model checking implicit invocation to allow for the modeling of larger and more realistic systems. Our focus will be on improving the representation of events, event delivery policies and event-method bindings. We also evaluate our technique on two non-trivial examples. In one of our examples, we will show how with iterative analysis a system parameter can be chosen to meet the appropriate system requirements.