• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Huaiguang, Wu Guoqing, Chen Shu, and Wan Li. A Software Behavior Oriented Requirements Model and Properties Verification[J]. Journal of Computer Research and Development, 2011, 48(5): 869-876.
Citation: Wu Huaiguang, Wu Guoqing, Chen Shu, and Wan Li. A Software Behavior Oriented Requirements Model and Properties Verification[J]. Journal of Computer Research and Development, 2011, 48(5): 869-876.

A Software Behavior Oriented Requirements Model and Properties Verification

More Information
  • Published Date: May 14, 2011
  • Requirements model and its verification are important procedures in software requirements. In this paper, the existing methods on requirements model are discussed and the related works of software behavior are concerned; furthermore, why utilizing software behavior in requirements model is illuminated. So a software behavior oriented requirements model is proposed formally which is named behavior description language (BDL). Its syntax and semantics of the model are given subsequently, and the hierarchy of behavior-oriented requirements model is presented based on BDL. In order to compare BDL with the current results and make full use of the latter related tools, the transformational relation is considered between BDL and CCS (calculus of communication system) which is an algebra process developed by Milner Robin. A transformation function which maps BDL into CCS is constructed and denoted by M. For the sake of verifying properties of behavior-oriented requirements model, consistency of system, safety of system, behavioral trust and behavioral non-termination are depicted by μ-calculus, which is used to describe properties of labeled transition systems and for verifying these properties. At the end, an example described by BDL is analyzed and the specified properties are verified through CWB (Concurrency WorkBench) which is a model checking tool of CCS.
  • Related Articles

    [1]Wang Jianwei, Hao Zhongxiao. Node Probability Query Algorithm in Probabilistic XML Document Tree[J]. Journal of Computer Research and Development, 2012, 49(4): 785-794.
    [2]Meng Xiangfu, Yan Li, Zhang Wengbo, Ma Zongmin. XML Approximate Query Approach Based on Attribute Units Extension[J]. Journal of Computer Research and Development, 2010, 47(11): 1936-1946.
    [3]Liu Xiping, Wan Changxuan, and Liu Dexi. Effective XML Vague Content and Structure Retrieval and Scoring[J]. Journal of Computer Research and Development, 2010, 47(6): 1070-1078.
    [4]Yang Weidong and Shi Baile. A Survey of XML Stream Management[J]. Journal of Computer Research and Development, 2009, 46(10): 1721-1728.
    [5]Wang Xin, Yuan Xiaojie, Wang Chenying, and Zhang Haiwei. XN-Store: A Storage Scheme for Native XML Databases[J]. Journal of Computer Research and Development, 2008, 45(7).
    [6]Wan Jing, Hao Zhongxiao. Study of Multi-Valued Dependency in Strong Total Order Temporal Scheme with Multiple Time Granularities[J]. Journal of Computer Research and Development, 2008, 45(6).
    [7]Wu Yonghui. The Sufficient and Necessary Condition for No Implicit Redundancies in an XML Schema[J]. Journal of Computer Research and Development, 2007, 44(12): 2106-2111.
    [8]Hao Zhongxiao, Li Yanjuan. Normalization of Temporal Scheme with Respect to Temporal Multivalued Dependency with Multiple Time Granularities[J]. Journal of Computer Research and Development, 2007, 44(5): 853-859.
    [9]Lü Teng, Yan Ping. Functional Dependencies and Inference Rules for XML[J]. Journal of Computer Research and Development, 2005, 42(5): 792-796.
    [10]Zhang Zhongping, Wang Chao, Zhu Yangyong. Constraint-Based Normalization Algorithms for XML Documents[J]. Journal of Computer Research and Development, 2005, 42(5): 755-764.

Catalog

    Article views (700) PDF downloads (588) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return