Information Technology Reference
In-Depth Information
Clarke, E. Grumberg, O. McMillan, K. and Zhao, X. (1995), “Efficient generation of coun-
terexamples and witnesses in symbolic model checking.” Proceedings of 32nd ACM/IEEE
Design Automation Conference.
Commoner, F. (1972), Deadlocks in Petri Nets, Report #CA-7206-2311, Applied Data Re-
search, Inc. Wakefield, MA.
Girault, C, and Valk R. (2003), Petri Nets for System Engineering—A Guide To Modeling ,
Verification, and Application , Berlin, Germany, Spring-Verlag.
Hazelhurst, S. (2002), On Parametric and Characteristic Representations of State Spaces ,
Technical Report. 2002-1, School of Computer Science, University of the Witwatersrand Jo-
hannesburg, South Africa, ftp://ftp.cs.wits.ac.za/pub/research/reports/TR-Wits-CS-2002-
1.ps.gz.
Hazelhurst, S. and Seger, C.-J.H. (1997), Symbolic Trajectory Evaluation. Formal Hardware
Verification:Methods and Systems in Comparison , Kropf, T. (Ed.), Springer-Verlag, Berlin,
Germany, pp. 3-79.
Hazelhurst, Scott Weissberg, Osnat Kamhi, Gila and Fix Limor (2002), “A Hybrid Verification
Approach: Getting Deep into the Design.” Annual ACM IEEE Design Automation Con-
ference, Proceedings of the 39th Annual Design Automation Conference, New Orleans,
LA.
Hekmatmpour, A. and Coulter J. (2003), “Coverage-Directed Management and Optimization
of Random Functional Verification,” Proceedings of the International Test Conference, pp
148-155.
Kovalyov, A. and McLeod, R. (1998), “New Rank Theorems for Petri Nets and their Appli-
cation to Workflow Management,” IEEE International Conference on Systems, Man, and
Cybernetics, San Diego, CA, pp. 226-231.
Kovalyov, A. McLeod, R., and Kovalyov, O. (2000), “Performance Evaluation of Communica-
tion Networks by Stochastic Regular Petri Nets,” 2000 International Conference on Parallel
and Distributed Processing Techniques and Applications (PDPTA' 2000), pp. 1191-1998.
McMillan, K.L. (1993), Symbolic Model Checking, Kluwer Academics, Norvell, MA.
Paradkar, A. (2000), “SALT—An Integrated Environment to Automate Generation of Function
Tests for APIs,” Proceedings of the 11th IEEE International Symposium on Software
Reliability Engineering, San Jose, CA, Oct.
Pressman, Roger S. (1997), Software Engineering—A Practitioner's Approach , 4th., McGraw-
Hill, NewYork.
Adrion, W. Richards Branstad, Martha A. and Cherniavsky, John C. (1982), “Validation,
verification, and testing of computer software.” ACM Computing Surveys Volume 14 ,#2
pp. 159-192.
Tasiran, S. and Keutzer, K. (2001), “Coverage metrics for functional validation of hardware
designs.” IEEE Design and Test of Computers , Volume 18 , pp 36-45.
Wakefield, Amory (2008), “Early Verification and Validation in Model-Based Design,” Pro-
ceedings of the Mathworks Automotive Conference.
Daliang, Wang, Dezheng, Zhang, Gao, Li-xin, Jian-ming, Liu, and Zhang Huansheng (2008)
“Process Knowledge Verification Method Based on Petri Net,” Proceedings of the 1st
International Conference on Forensic Applications and Techniques in Telecommunications,
Information, and Multimedia and Workshop, Adelaide, Australia.
Yuan, J. Shen, J. Abraham, J. and Aziz A. (1997), “On Combining Formal and Informal
Verification.” Proceedings of CAV '97, pp. 376-387.
Search WWH ::




Custom Search