“…On the one hand, our assertions are external and evaluated at runtime, whereas driving the system's execution in such a way that every computation state complies with the constraints makes the assertions internal to the programmed strategy. On the other hand, the strategy of [16,28] never results in violated assertions, which is essential for automatic trace slicing to be fired according to our approach. As another difference, we are able to check assertions that regard: 1) the normalizations carried out by using the equational part of the rewriting theory; and 2) system properties that are not necessarily global invariants but can only hold in those states that match a given state template.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, to the best of our knowledge, no general built-in support is provided in Maude or the MFE for the runtime checking of user-defined assertions. Related to our work, generic strategies are defined in [16,28] to guarantee that a set of invariants (that can be expressed in different logics) are satisfied at every computed state. This is achieved by avoiding the execution of actions that otherwise would conduct the system to states that do not satisfy the constraints.…”
Abstract. This paper introduces the idea of using assertion checking for enhancing the dynamic slicing of Maude computation traces. Since trace slicing can greatly simplify the size and complexity of the analyzed traces, our methodology can be useful for improving the diagnosis of erroneous Maude programs. The proposed methodology is based on (i) a logical notation for specifying two types of user-defined assertions that are imposed on execution runs: functional assertions and system assertions; (ii) a runtime checking technique that dynamically tests the assertions and is provably safe in the sense that all errors flagged are definite violations of the specifications; and (iii) a mechanism based on equational least general generalization that automatically derives accurate criteria for slicing from falsified assertions.
“…On the one hand, our assertions are external and evaluated at runtime, whereas driving the system's execution in such a way that every computation state complies with the constraints makes the assertions internal to the programmed strategy. On the other hand, the strategy of [16,28] never results in violated assertions, which is essential for automatic trace slicing to be fired according to our approach. As another difference, we are able to check assertions that regard: 1) the normalizations carried out by using the equational part of the rewriting theory; and 2) system properties that are not necessarily global invariants but can only hold in those states that match a given state template.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, to the best of our knowledge, no general built-in support is provided in Maude or the MFE for the runtime checking of user-defined assertions. Related to our work, generic strategies are defined in [16,28] to guarantee that a set of invariants (that can be expressed in different logics) are satisfied at every computed state. This is achieved by avoiding the execution of actions that otherwise would conduct the system to states that do not satisfy the constraints.…”
Abstract. This paper introduces the idea of using assertion checking for enhancing the dynamic slicing of Maude computation traces. Since trace slicing can greatly simplify the size and complexity of the analyzed traces, our methodology can be useful for improving the diagnosis of erroneous Maude programs. The proposed methodology is based on (i) a logical notation for specifying two types of user-defined assertions that are imposed on execution runs: functional assertions and system assertions; (ii) a runtime checking technique that dynamically tests the assertions and is provably safe in the sense that all errors flagged are definite violations of the specifications; and (iii) a mechanism based on equational least general generalization that automatically derives accurate criteria for slicing from falsified assertions.
“…As previously mentioned, such conditions can be expressed in different logics. We have already experimented with predicates expressed in propositional logic and linear temporal logic [8]. The temporal logic we have considered is the same that Maude uses in its model checker [11], and the approach used to deal with temporal logic is similar to the one proposed by Havelund and Roşu in [15] for monitoring Java programs.…”
Section: Reasoning About the Maude Specificationsmentioning
confidence: 99%
“…Different built-in strategies for executing specifications are available in Maude, and also facilities for defining our own rewriting strategies are available [5], thus guiding the rewrites depending on our specific needs. The detailed process for expressing constraints and invariants on the system and for defining execution strategies based on them is outside the scope of this paper, and has been reported in [8].…”
“…ODP's notion of subtyping-A is a subtype of B if every <X> that satisfies A also satisfies B-corresponds to Maude's class inheritance. On the other hand, the ODP's notion of inheritance, that allows the suppression and modification of the attributes and methods of the base class [17,[2][3][4][5][6][7][8][9].21] corresponds to Maude's module inheritance. Throughout the paper, by inheritance we will mean Maude's notion of class inheritance, i.e.…”
The ODP computational viewpoint describes the functionality of a system and its environment, in terms of a configuration of objects which interact at interfaces. Computational
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.