To err is human, and machines help us avoiding errors. This thesis presents two ways, based on verification technology, to prevent failures.Safety critical Real-Time Java applications usually need a certification. Tests fulfilling specific coverage criteria can be part of such certification, like in the DO-178 standard. This thesis presents the KeYTestGen tool, an automated test case generator fulfilling certification-demanded coverage criteria by construction. The work also develops a formal specification of the Real-Time Java API to direct the search for input values and generate code that checks the expectations on the tests. The KeYTestGen tool found an inconsistency between a commercial Real-Time Java implementation and its specificat...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
Well logically verified and tested software may fail because of undesired physical phenomena provoki...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
<p> To err is human, and machines help us avoiding errors. This thesis presents two ways, based on v...
When computing with floating-point numbers, programmers choose a certain floating-point precision (l...
When computing with floating-point numbers, programmers choose a certain floating-point precision (l...
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for th...
Formal verification is usually taught with a focus on functional languages, such as Agda, or special...
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for th...
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for th...
We present the test case generation method and tool KeYTestGen in the context of real-time Java appl...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
We present the test case generation method and tool KeYTestGen in the context of real-time Java appl...
We present the test case generation method and tool KeY-TestGen in the context of real-time Java app...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
Well logically verified and tested software may fail because of undesired physical phenomena provoki...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
<p> To err is human, and machines help us avoiding errors. This thesis presents two ways, based on v...
When computing with floating-point numbers, programmers choose a certain floating-point precision (l...
When computing with floating-point numbers, programmers choose a certain floating-point precision (l...
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for th...
Formal verification is usually taught with a focus on functional languages, such as Agda, or special...
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for th...
Real-time systems, and in particular safety-critical systems, are a rich source of challenges for th...
We present the test case generation method and tool KeYTestGen in the context of real-time Java appl...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
We present the test case generation method and tool KeYTestGen in the context of real-time Java appl...
We present the test case generation method and tool KeY-TestGen in the context of real-time Java app...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
Well logically verified and tested software may fail because of undesired physical phenomena provoki...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...