<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Verification of Non-Functional Requirements Using Formal Semantics</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Danielle</forename><surname>Gaither</surname></persName>
							<email>dcg0063@unt.edu</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science and Engineering</orgName>
								<orgName type="institution">University of North Texas Denton</orgName>
								<address>
									<region>Texas</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Verification of Non-Functional Requirements Using Formal Semantics</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">679E8088AD957EF680B8757821F8E5E1</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T01:17+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Studies have shown that finding defects in a software system is much cheaper in terms of both money and time spent when done during requirements analysis, as opposed to development or testing. To this end, significant advances have been made in the early detection of system defects. However, research on exposing unexpected system behaviors is relatively scant, especially regarding to non-functional requirements (NFRs). We propose a model-driven approach grounded in formal semantics to expose unexpected behaviors in a set of NFRs and propose future work for evaluating the effectiveness of such an approach.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>I. INTRODUCTION</head><p>Boehm and Basili <ref type="bibr" target="#b0">[1]</ref> claim that remedying software defects can be 100 times more expensive during testing than during requirements gathering. Requirements engineering (RE) involves eliciting natural language requirements from system stakeholders and trying to impose a structure on that information <ref type="bibr" target="#b1">[2]</ref>. Most approaches to the RE process rely on using the requirements to derive one or more models of some aspect of the system, such as data or behavior.</p><p>One such requirements analysis solution is the Causal Component Model (CCM) <ref type="bibr" target="#b2">[3]</ref>, which attempts to expose unexpected behaviors in a system. Although Foyle and Hooey <ref type="bibr" target="#b3">[4]</ref> raised concerns about the lack of accounting for unexpected behaviors in RE tools in 2003, very little work has been done in this area since then. We believe that a requirements analysis tool in this domain should be able to analyze non-functional requirements such as timing and security properties. Many requirements analysis methods either focus solely on functional requirements, or on later stages of system implementation <ref type="bibr" target="#b2">[3]</ref>.</p><p>The remainder of this paper will be structured as follows: first will be discussions of CCM and a survey of related work in the area, including an explanation of how our proposed work improves upon existing approaches. The next section includes a discussion of the approaches and goals intended for the proposed work, including the research questions to be answered. An overview of preliminary and remaining work will follow, as well as a discussion of the merit and impact of the proposed work. The paper will end with a brief conclusion.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. BACKGROUND AND RELATED WORK</head><p>In this section we provide background on the causal component model (CCM), first proposed by Aceituna and Do <ref type="bibr" target="#b2">[3]</ref>, and provide a survey of related work in the field.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. The Causal Component Model</head><p>The purpose of CCM is to analyze a given set of requirements for the purpose of detecting potential unexpected system behaviors <ref type="bibr" target="#b2">[3]</ref>. Further details about the CCM method are described in Section III.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Related Work</head><p>Many approaches to the RE process are model-based in some form, such as goal-oriented and scenario-based approaches. Goal-oriented approaches consider a system from the perspective of the goals intended to be satisfied by that system <ref type="bibr" target="#b4">[5]</ref>. The goals are often expressed in terms of an ontology specific to the domain of the problem at hand <ref type="bibr" target="#b5">[6]</ref>. A scenario-based approach considers the system as an aggregation of potential use-cases <ref type="bibr" target="#b6">[7]</ref>. Both approaches can be and have been used at varying levels of abstraction to construct system models. However, Carrillo de Gea et al. <ref type="bibr" target="#b7">[8]</ref> note that requirements modeling is one of the least supported features among current RE tools. Combining a model-based approach with the detection of unexpected behaviors and the addition of NFRs can therefore contributing to advancing the state of RE as a whole.</p><p>Bryant et al. <ref type="bibr" target="#b8">[9]</ref> discussed some of the benefits and challenges of formalizing the semantics of domain-specific modeling languages. One benefit is amenability to formal verification methods, which is well-suited to safety-and security-critical systems. Hessel et al. <ref type="bibr" target="#b9">[10]</ref> used timed automata via the UPPAAL model checker <ref type="bibr" target="#b10">[11]</ref> to generate test cases for a realtime system. Lee and Bryant <ref type="bibr" target="#b11">[12]</ref> implemented a two-level grammar using VDM++, the Vienna Development Method meta-language <ref type="bibr" target="#b12">[13]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. APPROACHES AND GOALS</head><p>This section will outline the goals of the intended work and the approaches to be studied. The goals of our work are: creating a formal semantics for quantifiable NFRs, and applying the created semantics to a requirements analysis tool. Our approach is explained in Figure <ref type="figure" target="#fig_0">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Establishing a Formal Semantics for Quantifiable NFRs</head><p>The approach for creating the formal semantics will be based on a timed denotational semantics, and the requirements analysis process will use the CCM tool as an example. These The process begins with requirements elicitation (Step 1 in Figure <ref type="figure" target="#fig_0">1</ref>). The elicited requirements will then be used to create a CCM instance (Step 2 in Figure <ref type="figure" target="#fig_0">1</ref>). This information will serve as an input to create specific semantics for that CCM instance based on the larger semantic specification (Step 3 in Figure <ref type="figure" target="#fig_0">1</ref>). Step 3a is optional, involving Coq's code generation capabilities, which can be combined with other code for analysis purposes.</p><p>The analysis will attempt to detect unexpected behaviors in NFRs for real-time embedded systems. If unexpected behaviors are found, the process returns to the elicitation phase for clarification. The whole process is repeated until all parties are satisfied with the quality of the CCM instance (Step 4 in Figure <ref type="figure" target="#fig_0">1</ref>).</p><p>There is some precedent in the literature for creating and using a formal semantics for timed operations. Li <ref type="bibr" target="#b13">[14]</ref> used duration calculus to extend the RAISE specification language to support timed operations. Duration calculus is an extension of interval logic <ref type="bibr" target="#b14">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Applying Formal Semantics to the Requirements Analysis Process</head><p>Since the idea of the CCM approach is to find system defects in the requirements-analysis phase, the lack of an actual system presents particular difficulties with regard to NFRs. An alternative approach is to verify such properties logically by creating a formal semantic specification and analyzing said specification with currently existing tools.</p><p>The proposed changes to the CCM involve expanding the rule application and analysis phases. A formal semantics will be created for quantifiable NFRs, and the semantics will be used to check the validity of the NFRs. Note that the basic CCM approach does not change. The proposed updates merely broaden its scope. While the change might appear cosmetic, the implementation will require structural change in the CCM tool, as representing timed operations adds some complexity to the implementation <ref type="bibr" target="#b15">[16]</ref>, <ref type="bibr" target="#b16">[17]</ref>, <ref type="bibr" target="#b17">[18]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Research Questions</head><p>The intent is to establish a formal denotational semantics for CCM for the purpose of supporting non-functional requirements, including timing information. The research should answer the following questions:</p><p>RQ1. How can we add formal semantics to a requirements analysis system, such as CCM, to incorporate NFRs? RQ2. How does adding formal semantics and timed operations increase the expressiveness of a requirements analysis system? RQ3. What properties can be proven about NFRs once a formal semantics is established?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D. Evaluation Methods and Metrics</head><p>For a tool or approach to be useful, it generally has to satisfy two main criteria. First, it needs to perform the tasks it claims to perform, and second, it needs to do so in a way that offers some sort of advantage over competing methods. To satisfy the first criterion, we intend to implement the formal semantics we create in a theorem-proving tool such as Coq <ref type="bibr" target="#b18">[19]</ref>. This will allow the correctness and completeness of the semantics to be established. To satisfy the second criterion, we expect the main advantage our approach will offer will be time savings compared to similar analysis methods. A human study will be necessary to evaluate the truth of this claim. One possible experiment could involve groups being given the same set of requirements and constructing analysis models using various methods. It is important to have a large enough sample size to control for variations in individual ability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. COMPLETED AND REMAINING WORK</head><p>This section will describe preliminary work that has already been performed, to include: formalizing the semantics of a domain-specific modeling language, establishing the link between domain-specific modeling and requirements analysis, and domain analysis with respect to requirements engineering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Establishing a Formal Semantics for a Domain-Specific Modeling Language</head><p>Preliminary work has been done in the area of creating and implementing semantics for a domain-specific modeling language. As a proof-of-concept, the MicroRPG modeling language was created to model a simple game. The abstract syntax of MicroRPG was established using a metamodel.</p><p>A denotational semantics was created for the MicroRPG metamodel and implemented in Haskell <ref type="bibr" target="#b19">[20]</ref>. Current work is focused on establishing a denotational semantics based on statecharts that can then be applied to analysis frameworks such as CCM.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Summary of Preliminary and Remaining Work</head><p>Our preliminary work in this area has shown the potential benefits of providing a formal denotational semantics for a domain-specific model. We have taken the following steps: created a modeling language for a sample domain, created and implemented a denotational semantics for a modeling language, and analyzed appropriate domains for a formal semantics-based requirements analysis tool.</p><p>We have recently completed a pilot study that uses statecharts as the basis for a formal semantics. The results of this pilot study have been accepted for publication <ref type="bibr" target="#b20">[21]</ref>.</p><p>The following work remains to be done: establish a largerscale denotational semantics for NFRs for real-time embedded systems, implement the denotational semantics in a manner consistent with a CCM implementation, use the newly-enhanced CCM to verify timing properties and other quantifiable NFRs for a sample real-time embedded system, and perform empirical studies to evaluate the effectiveness of proposed CCM improvements.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. MERIT AND IMPACT</head><p>Since many real-world operations are time-sensitive in some fashion, a robust requirements analysis system needs to be able to support such operations. Adding support for timed operations to CCM will make it more expressive and allow it to be used for more applications than is currently possible. Since functional requirements and nonfunctional requirements cannot be completely separated, it makes sense for a comprehensive requirements analysis solution to handle both. Another benefit is that formal analysis tools can be especially useful for mission-critical applications. Finally, a particular benefit of the denotational semantics-based approach is independence from a particular implementation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VI. CONCLUSIONS AND FUTURE WORK</head></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 :</head><label>1</label><figDesc>Fig. 1: An overview of the proposed approach.</figDesc><graphic coords="2,51.53,46.96,508.94,454.84" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We proposed a model-based approach for detecting unexpected behaviors of requirements, particularly non-functional requirements, which have not received the same attention in research as functional requirements have to date. This work is in its early stages, so there is significant potential for future work. While timing and security requirements are important, there are also things like safety requirements to be considered. Also, we would like to build on our current work to analyze more complex sets of non-functional requirements. Integration with existing requirements analysis tools is also another priority for future work.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Software defect reduction top 10 list</title>
		<author>
			<persName><forename type="first">B</forename><surname>Boehm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">R</forename><surname>Basili</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="135" to="137" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Defining visions in context: Models, processes and tools for requirements engineering</title>
		<author>
			<persName><forename type="first">R</forename><surname>Dömges</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jacobs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jarke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">W</forename><surname>Nissen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Pohl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Maiden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sutcliffe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Taylor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Till</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Constantopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Spanoudakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Vassiliou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Grosz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Plihon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rolland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Schmitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schwer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Si-Said</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Souveyet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bubenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gustas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Holm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Johannesson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ljungberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Wangler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="515" to="547" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Exposing the Susceptibility of Off-Nominal Behaviors in Reactive System Requirements</title>
		<author>
			<persName><forename type="first">D</forename><surname>Aceituna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Do</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE International Requirements Engineering Conference</title>
				<meeting>the IEEE International Requirements Engineering Conference</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="136" to="145" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Improving Evaluation and System Design Through the Use of Off-Nominal Testing: A Methodology for Scenario Development</title>
		<author>
			<persName><forename type="first">D</forename><surname>Foyle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Hooey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">the Twelfth International Symposium on Aviation Psychology</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Goal-oriented requirements engineering: a guided tour</title>
		<author>
			<persName><forename type="first">A</forename><surname>Van Lamsweerde</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings Fifth IEEE International Symposium on Requirements Engineering</title>
				<meeting>Fifth IEEE International Symposium on Requirements Engineering</meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="249" to="262" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Why Goal-Oriented Requirements Engineering</title>
		<author>
			<persName><forename type="first">E</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mylopoulos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th International Workshop on Requirements Engineering</title>
				<meeting>the 4th International Workshop on Requirements Engineering</meeting>
		<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="15" to="22" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Supporting scenario-based requirements engineering</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Sutcliffe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="1072" to="1088" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Requirements engineering tools: Capabilities, survey and assessment</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Carrillo De Gea</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Nicolás</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Fernández Alemán</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Toval</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ebert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vizcaíno</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and Software Technology</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="1142" to="1157" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Challenges and directions in formalizing the semantics of modeling languages</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">R</forename><surname>Bryant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mernik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Clarke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">B</forename><surname>France</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Karsai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Science and Information Systems</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="225" to="253" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Testing real-time systems using UPPAAL</title>
		<author>
			<persName><forename type="first">A</forename><surname>Hessel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">G</forename><surname>Larsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mikucionis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nielsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Pettersson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Skou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">4949</biblScope>
			<biblScope unit="page" from="77" to="117" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">A Tutorial on Uppaal</title>
		<author>
			<persName><forename type="first">G</forename><surname>Behrmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>David</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Larsen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Springer-Verlag</publisher>
			<biblScope unit="volume">3185</biblScope>
			<pubPlace>Berlin Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Automated conversion from requirements documentation to an object-oriented formal specification language</title>
		<author>
			<persName><forename type="first">B.-S</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">R</forename><surname>Bryant</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2002 ACM symposium on Applied computing</title>
				<meeting>the 2002 ACM symposium on Applied computing</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="932" to="936" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">VDM++, a formal specification language for object-oriented designs</title>
		<author>
			<persName><forename type="first">E</forename><surname>Dürr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Van Katwijk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Computer Systems and Software Engineering</title>
		<imprint>
			<biblScope unit="page" from="214" to="219" />
			<date type="published" when="1992">1992</date>
			<publisher>IEEE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Towards a denotational semantics of timed RSL using Duration Calculus</title>
		<author>
			<persName><forename type="first">L</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computer Science and Technology</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="64" to="76" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Duration Calculus : Logical Foundations</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Hansen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Chaochen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Formal Aspects of Computing -Springer</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="283" to="330" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A theory of timed automata</title>
		<author>
			<persName><forename type="first">R</forename><surname>Alur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Dill</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">126</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="183" to="235" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Timed automata: Semantics, algorithms and tools</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bengtsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Yi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">3098</biblScope>
			<biblScope unit="issue">316</biblScope>
			<biblScope unit="page" from="87" to="124" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Why timed sequence diagrams require three-event semantics</title>
		<author>
			<persName><forename type="first">Ø</forename><surname>Haugen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">E</forename><surname>Husa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Runde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Stølen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Workshop on Scenarios: Models, Transformations and Tools</title>
				<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">3466</biblScope>
			<biblScope unit="page" from="1" to="25" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">The Coq proof assistant</title>
		<ptr target="https://coq.inria.fr" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
		<respStmt>
			<orgName>INRIA</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Toward Denotational Semantics of Domain-Specific Modeling Languages for Automated Code Generation</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gaither</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">R</forename><surname>Bryant</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Presented at the International Workshop on the Globalization of Modeling Languages</title>
				<meeting><address><addrLine>Miami</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Toward detection of abnormal behaviors in timing and security requirements</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gaither</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Do</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">R</forename><surname>Bryant</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">24th Asia-Pacific Software Engineering Conference</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note>to be published</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
