Abstract. Static analysis tools, such as OCLE and USE, can be used to analyze structural properties of class models. The USE tool also provides support for analyzing specified operations through interactive simulations in which users provide operation parameters, and manually assign values to state elements to reflect the effect of an operation. In this paper we describe an approach to statically analyzing behavior that does not require a user to manually simulate behavior. The approach involves transforming a class model into a static model of behavior, called a Snapshot Model. A Snapshot Model characterizes sequences of snapshots, where a snapshot describes an application state. A scenario describing a sequence of operation invocations ca...
International audienceThis paper presents a Scenario Based Testing approach for UML/OCL behavioral m...
1Aims of the chapter By means of the first case study, this chapter will allow us to illustrate the ...
The focus of the paper is on the analysis of performance effects of different security solutions mod...
The specification of a software system must include all relevant static and dynamic aspects of the d...
Aspect-oriented modeling (AOM) allows software designers to describe features that address pervasive...
The purpose of the paper is to present our approach for specifying system behavior during analysis, ...
We propose a novel method for recovering certain elements of the UML model of a software system. The...
We present a Static Verification Tool (SVT), a system that performs static verification on UML model...
Abstract: Documenting system behavior explicitely using graphical models (e.g. UML activity or seque...
Abstract: Documenting system behavior explicitely using graphical models (e.g. UML activity or seque...
Abstract: This paper presents a new notation for the formal representation of the static structure a...
The development of Behavioral Dependency Analysis (BDA) techniques and the visualization of such dep...
The focus of the paper is on the analysis of performance effects of different security solutions mod...
ABSTRACT The purpose of the paper is to present our approach for specifying system behavior. Our app...
Modelling system behaviour by means of UML Behavioral State Machines is an established practice in s...
International audienceThis paper presents a Scenario Based Testing approach for UML/OCL behavioral m...
1Aims of the chapter By means of the first case study, this chapter will allow us to illustrate the ...
The focus of the paper is on the analysis of performance effects of different security solutions mod...
The specification of a software system must include all relevant static and dynamic aspects of the d...
Aspect-oriented modeling (AOM) allows software designers to describe features that address pervasive...
The purpose of the paper is to present our approach for specifying system behavior during analysis, ...
We propose a novel method for recovering certain elements of the UML model of a software system. The...
We present a Static Verification Tool (SVT), a system that performs static verification on UML model...
Abstract: Documenting system behavior explicitely using graphical models (e.g. UML activity or seque...
Abstract: Documenting system behavior explicitely using graphical models (e.g. UML activity or seque...
Abstract: This paper presents a new notation for the formal representation of the static structure a...
The development of Behavioral Dependency Analysis (BDA) techniques and the visualization of such dep...
The focus of the paper is on the analysis of performance effects of different security solutions mod...
ABSTRACT The purpose of the paper is to present our approach for specifying system behavior. Our app...
Modelling system behaviour by means of UML Behavioral State Machines is an established practice in s...
International audienceThis paper presents a Scenario Based Testing approach for UML/OCL behavioral m...
1Aims of the chapter By means of the first case study, this chapter will allow us to illustrate the ...
The focus of the paper is on the analysis of performance effects of different security solutions mod...