skip to main content
10.1145/322609.322652acmconferencesArticle/Chapter ViewAbstractPublication PagescscConference Proceedingsconference-collections
Article
Free Access

Functional path analysis: an approach to software verification

Authors Info & Claims
Published:01 February 1988Publication History

ABSTRACT

A widely accepted approach to software development involves successive refinement of design and requirements specifications from a top-level description of the system down to the code level. As the system is refined, it is verified at each phase of development before proceeding to the next phase. In the past, several tools and techniques have been developed to assist in the development and verification process.

Tools have been developed and have been in use for many years to examine the testability and system information flow in hardware systems. These problems are approached as a knowledge base verification and validation problem. Several strong analogues exist between hardware and software systems. However, several fundamental differences exist which affect the approach to modeling and verifying the system.

This paper briefly describes past efforts in verifying hardware and software systems and then presents a preliminary synthesis and extension of these past efforts to the software verification problem. We then conclude with an assessment of our current status and note future directions and recommendations for research in this area.

References

  1. 1.James Martin and Carma McClure, Structured Technlgues for Computing, Prentice-Hall, Inc., Englewood Cliffs, New Jersey, 1985, pp. 671-675. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.William E. Howden, "The Theory and Practice of Functional Testing," IEEE Software, September 1985, p. 6.Google ScholarGoogle Scholar
  3. 3.Jerry L. Graham, "Knowledge Base Verlficatlon," Proceedlngsl~87 Symposium on Space Technological Challenges for the Future, U.S. Naval Academy, Annapolis, Maryland, May 1987.Google ScholarGoogle Scholar
  4. 4.Shashl Phoha, "A Quantlflable Methodology for Software Testing: Using Path Analysis," United States Air Force Report ESD-TR-81-259, Hanscom Air Force Base, Massachusetts, December 1981.Google ScholarGoogle Scholar
  5. 5.Will,am E. Howden, pp. 6-17.Google ScholarGoogle Scholar
  6. 6.W. R. Simpson and H. S. Balaban, "The ARINC Research System Testability and Maintenance Program (STAMP)," Proceedings 1982 IEEE AUTOTESTCON Conference, Dayton, Ohio, October 1982.Google ScholarGoogle Scholar
  7. 7.W. R. Simpson and B. A. Kelley, "Multi- Dimensional Context Representation of Knowledge-Base Information," Proceedings of the 1987 Data Fusion Symposium (DFS-87), Laurel, Maryland, June 1987.Google ScholarGoogle Scholar
  8. 8.B. A. Kelley and W. R. Simpson, "The Use of Information Theory in Proposltlonal Calculus," Proceedings of the 1987 Data Fusion S~g~oslum (DFS-87), Laurel, Maryland, June 1987.Google ScholarGoogle Scholar
  9. 9.The appropriateness of a stage being applied depends upon the level of detail of the system documentat ion.Google ScholarGoogle Scholar

Index Terms

  1. Functional path analysis: an approach to software verification

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  CSC '88: Proceedings of the 1988 ACM sixteenth annual conference on Computer science
                  February 1988
                  770 pages
                  ISBN:0897912608
                  DOI:10.1145/322609

                  Copyright © 1988 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 February 1988

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader