{"id":"https://openalex.org/W2129886807","doi":"https://doi.org/10.1109/cmpsac.2003.1245381","title":"Rapid verification of embedded systems using patterns","display_name":"Rapid verification of embedded systems using patterns","publication_year":2004,"publication_date":"2004-03-01","ids":{"openalex":"https://openalex.org/W2129886807","doi":"https://doi.org/10.1109/cmpsac.2003.1245381","mag":"2129886807"},"language":"en","primary_location":{"id":"doi:10.1109/cmpsac.2003.1245381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cmpsac.2003.1245381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063411746","display_name":"Wei\u2010Tek Tsai","orcid":"https://orcid.org/0000-0002-4049-3706"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"W.T. Tsai","raw_affiliation_strings":["Department of Computer Science and Engineering, Arizona State University, Tempe, AZ, USA","Department of Computer Science & Engineering, Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Department of Computer Science & Engineering, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100758676","display_name":"Lang Yu","orcid":"https://orcid.org/0000-0002-9083-5313"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"L. Yu","raw_affiliation_strings":["Department of Computer Science and Engineering, Arizona State University, Tempe, AZ, USA","Department of Computer Science & Engineering, Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Department of Computer Science & Engineering, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023934154","display_name":"Feng Zhu","orcid":"https://orcid.org/0000-0001-5044-8805"},"institutions":[{"id":"https://openalex.org/I4210115145","display_name":"University of Minnesota, Duluth","ror":"https://ror.org/01hy4qx27","country_code":"US","type":"education","lineage":["https://openalex.org/I4210115145"]},{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"F. Zhu","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Minnesota, Minneapolis, MN, USA","University of Minnesota, Duluth"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Minnesota, Minneapolis, MN, USA","institution_ids":["https://openalex.org/I130238516"]},{"raw_affiliation_string":"University of Minnesota, Duluth","institution_ids":["https://openalex.org/I4210115145"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079873020","display_name":"Robin Paul","orcid":"https://orcid.org/0000-0003-3727-8025"},"institutions":[{"id":"https://openalex.org/I1330347796","display_name":"United States Department of Defense","ror":"https://ror.org/0447fe631","country_code":"US","type":"funder","lineage":["https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. Paul","raw_affiliation_strings":["Department of Defense, Washington D.C., DC, USA","United States Department of Defense"],"affiliations":[{"raw_affiliation_string":"Department of Defense, Washington D.C., DC, USA","institution_ids":["https://openalex.org/I1330347796"]},{"raw_affiliation_string":"United States Department of Defense","institution_ids":["https://openalex.org/I1330347796"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063411746"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":6.0691,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.96752952,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"1694","issue":null,"first_page":"466","last_page":"471"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8150185346603394},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.5366923213005066},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5235238075256348},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5152871608734131},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.5013046264648438},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4940264821052551},{"id":"https://openalex.org/keywords/temporal-logic","display_name":"Temporal logic","score":0.45567330718040466},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.45483914017677307},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3760729432106018},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3235042691230774},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.102958083152771}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8150185346603394},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.5366923213005066},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5235238075256348},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5152871608734131},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.5013046264648438},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4940264821052551},{"id":"https://openalex.org/C25016198","wikidata":"https://www.wikidata.org/wiki/Q781833","display_name":"Temporal logic","level":2,"score":0.45567330718040466},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.45483914017677307},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3760729432106018},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3235042691230774},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.102958083152771}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cmpsac.2003.1245381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cmpsac.2003.1245381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W151075503","https://openalex.org/W1518695183","https://openalex.org/W1565169360","https://openalex.org/W1649645444","https://openalex.org/W1996832037","https://openalex.org/W2109404197","https://openalex.org/W2112561088","https://openalex.org/W2129886807","https://openalex.org/W2267857323","https://openalex.org/W2893747529","https://openalex.org/W3000135916","https://openalex.org/W4206355825","https://openalex.org/W6676071386"],"related_works":["https://openalex.org/W1551070491","https://openalex.org/W2034301573","https://openalex.org/W2350953867","https://openalex.org/W1592102986","https://openalex.org/W2166027622","https://openalex.org/W2612218842","https://openalex.org/W2103740034","https://openalex.org/W1513903619","https://openalex.org/W2030935018","https://openalex.org/W2203774400"],"abstract_inverted_index":{"Verification":[0],"pattern":[1],"(VP)":[2],"is":[3,30],"a":[4,72,101,113],"new":[5],"technique":[6],"to":[7,17,31,43,125,132,144,174],"test":[8,18,44,147],"embedded":[9,21,177],"systems":[10,22],"rapidly,":[11],"and":[12,37,82,121,167],"it":[13],"has":[14],"been":[15],"used":[16,158,172],"industrial":[19],"safety-critical":[20],"successfully.":[23],"The":[24],"key":[25],"concept":[26],"of":[27,48],"this":[28,53,78,98,111,153],"approach":[29],"classify":[32],"system":[33,89,95,104,117],"scenarios":[34,47,90,105],"into":[35,106],"patterns,":[36],"use":[38],"the":[39,46,49,123,127],"same":[40,50],"code":[41],"template":[42],"all":[45],"pattern.":[51],"In":[52,77,110,152],"way,":[54,79,112,154],"testing":[55],"effort":[56],"can":[57,68,85,115,156,170],"be":[58,86,157,171],"greatly":[59],"reduced.":[60],"This":[61,137],"paper":[62,99,138],"extends":[63],"VPs":[64,155],"so":[65],"that":[66],"they":[67],"fully":[69],"interoperate":[70],"with":[71],"formalized":[73],"scenario":[74],"model":[75,135],"ACDATE.":[76],"various":[80],"static":[81],"dynamic":[83],"analyses":[84,166],"performed":[87],"on":[88,94],"as":[91,93],"well":[92],"patterns.":[96],"Furthermore,":[97],"provides":[100,140],"mapping":[102,124],"from":[103,150],"temporal":[107,128],"logic":[108,129],"expressions.":[109],"practitioner":[114],"specify":[116],"constraints":[118],"in":[119,159],"scenarios,":[120],"follow":[122],"obtain":[126],"expressions":[130],"easily":[131],"perform":[133],"formal":[134,168],"checking.":[136],"also":[139],"an":[141,160],"OO":[142],"framework":[143],"support":[145],"automated":[146],"script":[148],"development":[149],"VPs.":[151],"integrated":[161],"process":[162],"where":[163],"both":[164],"semi-formal":[165],"techniques":[169],"together":[173],"develop":[175],"mission-critical":[176],"applications.":[178]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
