Skip to main content
Log in

Relating software validation to technology trends

  • Introduction
  • Published:
International Journal on Software Tools for Technology Transfer Aims and scope Submit manuscript

Abstract

Large scale software engineering is undergoing substantial shifts due to a combination of technological and economic developments. These include the prevalence of software for embedded systems, global software development across geographically distributed teams, the technological shift towards multi-core platforms, and the inevitable shift towards software being used as a service. In this overview article, we discuss some of the challenges that lie ahead for software validation, due to such technological developments. In particular, we provide a brief introduction to the papers appearing in this special issue, many of which specifically focus on validation of software running on real-time embedded systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. http://www.stsc.hill.af.mil/crosstalk/1994/06/xt94d06e.asp.

  2. Booch even calls this state of affairs “normal” in [6].

  3. See http://www.computerworld.com/s/article/9199918/In_historic_shift_smartphones_tablets_to_overtake_PCs for latest news.

References

  1. Margaria, T., Steffen, B. (eds.): Proceedings of the Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15–19 November 2006, IEEE Computer Society (2006)

  2. Margaria, T., Steffen, B. (eds.): Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008 Communications in Computer and Information Science, vol. 17. Springer, Berlin (2008)

  3. Margaria, T., Steffen, B. (eds.): Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010, Lecture Notes in Computer Science, vol. 6415. Springer, Berlin (2010)

  4. Dijkstra, E.W.: The humble programmer—ACM Turing Award Lecture. Commun. ACM 15(10), 859866 (1972)

    Article  Google Scholar 

  5. Brooks Jr, F.P.: No silver bullet: essence and accidents of software engineering. IEEE Comput. 20(4), 1019 (1987)

    Article  MathSciNet  Google Scholar 

  6. Booch, G.: Object-Oriented Analysis and Design with Applications. Addison-Wesley, Boston (1994)

    Google Scholar 

  7. Brooks Jr, F.P.: The mythical man-month: after 20 years. IEEE Softw. 12(5), 5760 (1995)

    Article  Google Scholar 

  8. Holzmann, G.J.: Conquering complexity. IEEE Comput. 40(12), 111–113 (2007)

    Article  Google Scholar 

  9. Wirsing, M., Banatre, J. P., Holzl. M. M., Rauschmayer, A. (eds.): Software-Intensive Systems and New Computing Paradigms—Challenges and Visions. Lecture Notes in Computer Science, vol. 5380. Springer, Berlin (2008)

  10. Leveson, N.G., Turner, C.S.: An investigation of the Therac-25 accidents. IEEE Comput. 26(7), 1841 (1993)

    Article  Google Scholar 

  11. Robinson, K.: Ariane 5: flight 501 failurea case study. http://www.cse.unsw.edu.au/se4921/PDF/ariane5-article.pdf (2011)

  12. Hoare, C.A.R.: The verifying compiler: a grand challenge for computing research. J. ACM 50(1), 63–69 (2003)

    Article  Google Scholar 

  13. Hoare, C.A.R., Misra, J., Leavens, G.T., Shankar, N.: The verified software initiative: a manifesto. ACM Comput. Surv. 41(4), 22:1–22:8 (2009)

    Google Scholar 

  14. Object Managment Group. Model driven architecture—a technical perspective. Document number ORMSC 2001-07-01 (2001)

  15. Szyperski, C.: Component Software, Beyond Object-Orients Programming. Addison-Wesley, Boston (1997)

    Google Scholar 

  16. Broy, M.: Seamless Method- and Model-based Software and Systems engineering. The Future of Software Engineering. Springer, Berlin (2011)

    Google Scholar 

  17. Liu, Z., He, J., Li, X., Chen, Y.: A relational model for formal object-oriented requirements analysis in UML. In: Proceedings of the 5th International Conference on Formal Engineering Methods. LNCS, vol. 2885, pp. 641–664. Springer, Berlin (2003)

  18. Chen, X., Liu, Z., Mencl, V.: Separation of concerns and consistent integration in requirements modelling. In: Proceedings of the 33rd Conference on Current Trends in Theory and Practice of Computer Science. LNCS, vol. 4362, pp. 819–831. Springer, Berlin (2007)

  19. Ke, W., Li, X., Liu, Z., Stolz, V.: rCOS: a formal model-driven engineering method for component-based software. Front. Comput. Sci. China 6(1), 17–39 (2012)

    MathSciNet  Google Scholar 

  20. Chen, Z., Liu, Z., Ravn, A.P., Stolz, V., Zhan, N.: Refinement and verification in component-based model-driven design. Sci Comput. Program. 74(4), 168–196 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  21. Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Upper Saddle River (1985)

    MATH  Google Scholar 

  22. Roscoe, A.W.: Theory and Practice of Concurrency. Prentice-Hall, Upper Saddle River (1997)

    Google Scholar 

  23. Milner, R.: Communication and Concurrency. Prentice-Hall Inc., Upper Saddle River (1989)

    MATH  Google Scholar 

  24. Lynch, N.A., Tuttle, M.R.: An introduction to input/output automata. CWI Q. 2(3), 219246 (1989)

    MathSciNet  Google Scholar 

  25. de Alfaro, L., Henzinger, T.A.: Interface automata. SIGSOFT Softw. Eng. Notes 26(5), 109–120 (2001)

    Article  Google Scholar 

  26. He, J., Li, X., Liu, Z.: rCOS: a refinement calculus of object systems. Theor. Comput. Sci. 365(1–2), 109142 (2006)

    MathSciNet  Google Scholar 

  27. Liu, Z., Mencl, V., Ravn, A.P., Yang, L.: Harnessing theories for tool support. In: Proceedings of the Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15–19 November 2006, IEEE Computer Society (2006)

  28. Aichernig, B.K., He, J., Liu, Z., Reed, M.G.: Integrating theories and techniques for program modeling, design and verification. In: Proceedings of the 1st IFIP Conference on Verified Software: Theories, Tools, Experiments (VSTTE). LNCS, vol. 4171, pp. 291–300. Springer, Berlin (2005)

  29. Wang, Z., Li, J., Zhao, Y., Qi, Y., Pu, G., He, J., Gu, B.: SPARDL: a requirement modeling language for periodic control systems. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  30. Li, X., Liu, Z., Schäf, M., Yin, L.: AutoPA: automatic prototyping from requirements. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  31. De A., Roychoudhury, A., D’Souza, D.: WOMM: a weak operational memory model. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  32. Xu, Z., Kremenek, T., Zhang, J.: A memory model for static analysis of C programs. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  33. Li, Q., Zhao, J., Li, X.: Optimize context-sensitive Andersen-style points-to analysis by method summarization and cycle-elimination. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  34. Ma, X., Wang, J., Dong, W.: Computing must and may alias to detect null pointer dereference. In: Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008 Communications in Computer and Information Science, Springer, Berlin (2008)

  35. Wang, J., Yi, X., Yang, X.: Towards a framework for scalable model checking of concurrent C programs. In: Proceedings of the Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15–19 November 2006, IEEE Computer Society (2006)

  36. Dong, J.S., Feng, Y., Sun, J., Sun, J.: Context awareness systems design and reasoning. In: Proceedings of the Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15–19 November 2006, IEEE Computer Society (2006)

  37. Pu, G., Zhu, H., He, J., Qiu, Z., Yang, H., Zhao, X.: Patterns with algebraic properties in BPEL0. In: Proceedings of the Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15–19 November 2006, IEEE Computer Society (2006)

  38. Zhan, N.: Connecting algebraic and logic descriptions of concurrent systems. In: Proceedings of the Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15–19 November 2006, IEEE Computer Society (2006)

  39. Liu, Z., Morisset, C., Stolz, V.: A component-based access control monitor. In: Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008 Communications in Computer and Information Science, Springer, Berlin (2008)

  40. Gomes, A., Mota, A., Sampaio, A., Ferri, F., Buzzi, J.: Systematic model-based safety assessment via probabilistic model checking. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  41. Chakraborty, J., D’Souza, D., Kumar, K.N.: Analyzing message sequence graph specifications. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  42. Ravn, A.P., Srba, J., Vighio, S.: A formal analysis of the web services atomic transaction Protocol with UPPAAL. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  43. Sun, J., Liu, Y., Dong, J.S.: Model checking CSP revisited: introducing a process analysis toolkit. In: Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008 Communications in Computer and Information Science, Springer, Berlin (2008)

  44. De, A., Roychoudhury, A., D’Souza, D.: WOMM: a weak operational memory model. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  45. Chakraborty, J., D’Souza, D., Kumar, K.N.: Analysing message sequence graph specifications. In: Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation—4th International Symposium on Leveraging Applications, ISoLA 2010. Lecture Notes in Computer Science. Springer, Berlin (2010)

  46. Wang, F.: REDLIB for the formal verification of embedded systems. In: Proceedings of the Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15–19 November 2006, IEEE Computer Society (2006)

  47. Xia, B., Yang, L., Zhan, N.: Program verification by reduction to semi-algebraic systems solving. In: Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008 Communications in Computer and Information Science, Springer, Berlin (2008)

  48. Yang, L., Zhou, C., Zhan, N., Xia, B.: Recent advances in program verification through computer algebra. Front. Comput. Sci. China 4(1), 1–16 (2010)

    Article  Google Scholar 

  49. Jifeng, H.: Modelling coordination and compensation. In: Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008 Communications in Computer and Information Science, Springer, Berlin (2008)

  50. Li, X., Pan, M.: Timing analysis of MSC Specifications with Asynchronous Concatenation (in this volume)

  51. Chen, C., et al.: Formal modeling and validation of stateflow diagrams (in this volume)

  52. Mota, A., et al.: Constructive model-based analysis for safety assessment (in this volume)

  53. Nyman, U., et al.: Compositional verification of real-time systems using Ecdar (in this volume)

Download references

Acknowledgments

We would like to thank the authors of the papers presented at the special tracks, and all the participants for the discussion. The PC members and reviewers of the special traces too have made a great contribution through the professional work they did. Last, but not the least, we would like to thank Tiziana Margaria and Bernhard Steffen for giving us the opportunities to organize the special tracks. The work of Z. Liu was supported by Macau Science and Technology Development grants GAVES and SAFEHR and the Chinese Natural Science Foundation Grants No. 60970031, 61103013. The work of A. Roychoudhury was partially supported by a Singapore Ministry of Education research Grant MOE2010-T2-2-073.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiming Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, Z., Roychoudhury, A. Relating software validation to technology trends. Int J Softw Tools Technol Transfer 14, 631–638 (2012). https://doi.org/10.1007/s10009-012-0259-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10009-012-0259-5

Keywords

Navigation