Proceedings of the Fourth Annual Symposium on Logic in computer science
Argumentation-based design rationale: what use at what cost?
International Journal of Human-Computer Studies
An empirical evaluation of three methods for deadlock analysis of Ada tasking programs
ISSTA '94 Proceedings of the 1994 ACM SIGSOFT international symposium on Software testing and analysis
Acquisition and exploitation of gradual knowledge
International Journal of Human-Computer Studies
Principles for generalised testing of knowledge bases
Principles for generalised testing of knowledge bases
Applications of abduction: knowledge-level modelling
International Journal of Human-Computer Studies
IEEE Transactions on Software Engineering - Special issue on formal methods in software practice
Questions, options, and criteria: elements of design space analysis
Design rationale
POMIV '96 Proceedings of the DIMACS workshop on Partial order methods in verification
From object-oriented to goal-oriented requirements analysis
Communications of the ACM
Inferring Declarative Requirements Specifications from Operational Scenarios
IEEE Transactions on Software Engineering
Patterns in property specifications for finite-state verification
Proceedings of the 21st international conference on Software engineering
Bandera: extracting finite-state models from Java source code
Proceedings of the 22nd international conference on Software engineering
Applications of Abduction: Testing Very Long Qualitative Simulations
IEEE Transactions on Knowledge and Data Engineering
Validating Requirements for Fault Tolerant Systems using Model Checking
ICRE '98 Proceedings of the 3rd International Conference on Requirements Engineering: Putting Requirements Engineering to Practice
Exploiting Symmetry In Temporal Logic Model Checking
CAV '93 Proceedings of the 5th International Conference on Computer Aided Verification
Applications of Abduction: Testing Very Long Qualitative Simulations
IEEE Transactions on Knowledge and Data Engineering
On the value of learning from defect dense components for software defect prediction
Proceedings of the 6th International Conference on Predictive Models in Software Engineering
How good is your blind spot sampling policy
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
Hi-index | 0.00 |
Early testing of requirements can decrease the cost of removing errors in software projects. However, unless done carefully, that testing process can significantly add to the cost of requirements analysis. We show here that requirements expressed as topoi diagrams can be built and tested cheaply — using our SP2 algorithm, the formal temporal properties of a large class of topoi can be proven very quickly, in time nearly linear in the number of nodes and edges in the diagram. There are two limitations to our approach. Firstly, topoi diagrams cannot express certain complex concepts such as iteration and sub-routine calls. Hence, our approach is more useful for requirements engineering than for traditional model checking domains. Secondly, our approach is better for exploring the temporal occurrence of properties than the temporal ordering of properties. Within these restrictions, we can express a useful range of concepts currently seen in requirements engineering, and a wide range of interesting temporal properties.