B. Mediouni, I. Dragomir, Ayoub Nouri, S. Bensalem
{"title":"Model-Based Design of Resilient Systems Using Quantitative Risk Assessment","authors":"B. Mediouni, I. Dragomir, Ayoub Nouri, S. Bensalem","doi":"10.1007/978-3-030-65955-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_11","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131739520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-path Coverage of All Final States for Model-Based Testing Theory Using Spark In-memory Design","authors":"W. Adoni, M. Krichen, Tarik Nahhal, A. Elbyed","doi":"10.36227/techrxiv.13283477.v1","DOIUrl":"https://doi.org/10.36227/techrxiv.13283477.v1","url":null,"abstract":"This paper deals with an efficient and robust distributed framework for finite state machine coverage in the field model based testing theory. All final states coverage in large-scale automaton is inherently computing-intensive and memory exhausting with impractical time complexity because of an explosion of the number of states. Thus, it is important to propose a faster solution that reduces the time complexity by exploiting big data concept based on Spark RDD computation. To cope with this situation, we propose a parallel and distributed approach based on Spark in-memory design which exploits A* algorithm for optimal coverage. The experiments performed on multi-node cluster prove that the proposed framework achieves significant gain of the computation time.","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123697973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Generic Framework for Formal Verification and Performance Analysis of Real-Time Scheduling Algorithms","authors":"Salwa Habbachi, Zhiwu Li, M. Khalgui","doi":"10.1007/978-3-030-65955-4_9","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_9","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120966427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faustin Ahishakiye, José-Ignacio Requeno Jarabo, L. Kristensen, V. Stolz
{"title":"Coverage Analysis of Net Inscriptions in Coloured Petri Net Models","authors":"Faustin Ahishakiye, José-Ignacio Requeno Jarabo, L. Kristensen, V. Stolz","doi":"10.1007/978-3-030-65955-4_6","DOIUrl":"https://doi.org/10.1007/978-3-030-65955-4_6","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121359361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yohan Boichut, J. Couvreur, Xavier Ferry, Mohamadou Tafsir Sakho
{"title":"Modeling Concurrent Behaviors as Words","authors":"Yohan Boichut, J. Couvreur, Xavier Ferry, Mohamadou Tafsir Sakho","doi":"10.1007/978-3-030-35092-5_1","DOIUrl":"https://doi.org/10.1007/978-3-030-35092-5_1","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134092798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static Detection of Event-Driven Races in HTML5-Based Mobile Apps","authors":"P. T. Lau","doi":"10.1007/978-3-030-35092-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-35092-5_3","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Standard Zeno-Free Simulation Semantics for Hybrid Dynamical Systems","authors":"Ayman Aljarbouh","doi":"10.1007/978-3-030-35092-5_2","DOIUrl":"https://doi.org/10.1007/978-3-030-35092-5_2","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128602440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysing Security Protocols Using Scenario Based Simulation","authors":"Farah Al-Shareefi, A. Lisitsa, C. Dixon","doi":"10.1007/978-3-030-35092-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-35092-5_4","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123372975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Tchinda, Annie Choquet-Geniet, Gaëlle Largeteau-Skapin
{"title":"Importance-Based Scheduling to Manage Multiple Core Defection in Real-Time Systems","authors":"Y. Tchinda, Annie Choquet-Geniet, Gaëlle Largeteau-Skapin","doi":"10.1007/978-3-030-35092-5_7","DOIUrl":"https://doi.org/10.1007/978-3-030-35092-5_7","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129125146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating Latency for Synchronous Dataflow Graphs Using Periodic Schedules","authors":"Philippe Glanon, S. Azaiez, C. Mraidha","doi":"10.1007/978-3-030-35092-5_6","DOIUrl":"https://doi.org/10.1007/978-3-030-35092-5_6","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}