Run-Time Analysis of Temporal Constrained Objects

被引:2
|
作者
Kannimoola, Jinesh M. [1 ]
Jayaraman, Bharat [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Ctr Cybersecur Syst & Networks, Amritapuri, Kollam, India
[2] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY USA
关键词
Temporal constraints objects; Time-based simulation; Run-time verification; Finite state models; Error analysis; Predicate abstraction; Visualization;
D O I
10.1007/978-3-030-00801-7_2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The programming paradigm of constrained objects is a declarative variant of the object-oriented paradigm wherein objects define the structure of a system and declarative constraints (rather than imperative methods) define its behavior. Constrained objects have many uses in the engineering domain and computation in this paradigm is essentially constraint solving. This paper is concerned with an extension of constrained objects called temporal constrained objects, which are especially appropriate for modeling dynamical systems. The main extensions are series variables and metric temporal operators to declaratively specify time-varying behavior. The language TCOB exemplifies this paradigm and the execution of TCOB programs consists of constraint solving within a time-based simulation framework. One of the challenges in TCOB is identifying errors owing both to the complexity of programs and the underlying constraint solving methods. We address this problem by extracting a run-time trace of the execution of a TCOB program and providing an analysis of the cause of error. The run-time trace also serves as a basis, in many cases, for constructing a finite-state machine which in turn can be used for 'model-checking' properties of the system. The paper also presents abstraction techniques for dealing with simulations that result in large state spaces.
引用
收藏
页码:20 / 36
页数:17
相关论文
共 50 条
  • [31] GENERATION OF RUN-TIME ENVIRONMENTS
    KAISER, GE
    SIGPLAN NOTICES, 1986, 21 (07): : 51 - 57
  • [32] Run-time cache bypassing
    Johnson, TL
    Connors, DA
    Merten, MC
    Hwu, WMW
    IEEE TRANSACTIONS ON COMPUTERS, 1999, 48 (12) : 1338 - 1354
  • [33] RUN-TIME DECLARATION ELABORATION
    FAUST, D
    SIGPLAN NOTICES, 1984, 19 (03): : 32 - 38
  • [34] On the effectiveness of run-time checks
    van der Meulen, MJP
    Strigini, L
    Revilla, MA
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 151 - 164
  • [35] A run-time system for WCL
    Rowstron, A
    Wray, S
    INTERNET PROGRAMMING LANGUAGES, PROCEEDINGS, 1999, 1686 : 78 - 96
  • [36] MULTIPROCESSORS AND RUN-TIME COMPILATION
    SALTZ, J
    BERRYMAN, H
    WU, J
    CONCURRENCY-PRACTICE AND EXPERIENCE, 1991, 3 (06): : 573 - 592
  • [37] RUN-TIME DIAGNOSTICS IN PASCAL
    WHITE, NH
    BENNETT, KH
    SOFTWARE-PRACTICE & EXPERIENCE, 1985, 15 (04): : 359 - 367
  • [38] Using object-level run-time metrics to study coupling between objects
    Mitchell, Áine
    Power, James F.
    Proc ACM Symp Appl Computing, 1600, (1456-1462):
  • [39] Run-time detection of buffer overflow attacks without explicit sensor data objects
    Pyo, C
    Kim, T
    Bae, B
    Lee, G
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 50 - 54
  • [40] Model-Based Run-Time Checking of Security Permissions Using Guarded Objects
    Jurjens, Jan
    RUNTIME VERIFICATION, 2008, 5289 : 36 - 50