State Based Static and Dynamic Formal Analysis of UML State Diagrams
490
9, No. 8, 2010, pp. 1521-1556.
doi:10.3923/itj.2010.1521.1556
[6] R. Borges and A. Mota, “Integrating UML and Formal
Methods,” Electronic Notes in Theoretical Computer
Science, Vol. 84, 2003, pp. 97-112.
[7] M. Brendan and J. S. Dong, “Blending Object-Z and
Timed CSP: An Introduction to TCOZ,” Proceedings of
International Conference on Software Engineering, Kyoto,
19-25 April 1998, pp. 95-104.
[8] W. S. Changchien, J. J. Shen and T. Y. Lin, “A Preli-
minary Correctness Evaluation Model of Object-Oriented
Software Based on UML,” Journal of Applied Sciences,
Vol. 2, No. 3, 2002, pp. 356-365.
doi:10.3923/jas.2002.356.365
[9] A. Dennis, B. H. Wixom and D. Tegarden, “Systems
Analysis and Design with UML,” 3rd Edition, Wiley,
New York, 2005, 576 p.
[10] Z. Derakhshandeh, B. T. Ladani and N. Nematbakhsh,
“Modeling and Combining Access Control Policies Using
Constrained Policy Graph,” Journal of Applied Sciences,
Vol. 8, 2008, pp. 3561-3571.
doi:10.3923/jas.2008.3561.3571
[11] J. Derrick and G. Smith, “Structural Refinement of
Object-Z/CSP Specification,” Proceedings of 2nd Inter-
national Conference on Integrated Formal Methods, Spr-
inger-Verlag, London, Vol. 1945, 2000, pp. 194-213.
[12] S. A. Ehikioya and B. Ola, “A Comparison of Formalisms
for Electronic Commerce Systems,” Proceedings of In-
ternational Conference on Computational Cybernetics,
Vienna, 30 August-1 September 2004, pp. 253-258.
[13] F. Gervais, M. Frappier and R. Laleau, “Synthesizing B
Specifications from EB3 Attribute Definitions,” Pro-
ceedings of 5th International Conference on Integrated
Formal Methods, Springer, Berlin, Vol. 3771, 2005, pp.
207-226.
[14] A. Hall, “Correctness by Construction: Integrating For-
mality into a Commercial Development Process,” Pro-
ceedings of International Symposium of Formal Methods
Europe, Vol. 2391, 2002, pp. 139-157.
[15] K. E. Hamdy, M. A. Elsoud and A. M. El-Halawany,
“UML-Based Web Engineering Framework for Modeling
Web Application,” Journal of Software Engineering, Vol.
5, No. 2, 2011, pp. 49-63. doi:10.3923/jse.2011.49.63
[16] O. Hasan and S. Tahar, “Verification of Probabilistic
Properties in the HOL Theorem Prover,” Proceedings of
the Integrated Formal Methods, Vol. 4591, 2007, pp
333-352. doi:10.1007/978-3-540-73210-5_18
[17] X. He, “Formalizing UML Class Diagrams: A Hiera-
rchical Predicate Transition Net Approach,” Procee-
dings of 24th Annual International Computer Software
and Applications Conference, Taipei, 25-28 October 2000,
pp. 217-222.
[18] M. Heiner and M. Heisel, “Modeling Safety Critical
Systems with Z and Petri-Nets,” Proceedings of Inter-
national Conference on Computer Safety, Reliability and
Security, Springer-Verlag, London, 26-28 October 1999,
pp. 361-374. doi:10.1007/3-540-48249-0_31
[19] D. Jackson, I. Schechter and I. Shlyakhter, “Alcoa: The
Alloy Constraint Analyzer,” Proceedings of International
Conference on Software Engineering, Limerick, 4-11
June 2000, pp. 730-733.
[20] H. Leading and J. Souquieres, “Integration of UML and B
Specification Techniques: Systematic Transformation f rom
OCL Expressions into B,” Proceedings of 9th Asia-
Pacific Software Engineering Conference, Gold Coast,
4-6 December 2002, p. 495.
doi:10.1109/APSEC.2002.1183053
[21] Liu and C. Chen, “An Improved Quasi-Static Scheduling
Algorithm for Mixed Data-Control Embedded Software,”
Journal of Applied Sciences, Vol. 6, No. 7, 2006, pp.
1571-1575. doi:10.3923/jas.2006.1571.1575
[22] Z. M. Ma, “Fuzzy Conceptual Information Modeling in
UML Data Model,” International Symposium on Com-
puter Science and Computational Technology, Shanghai,
20-22 December 2008, pp. 331-334.
doi:10.1109/ISCSCT.2008.353
[23] R. Miles and K. Hamilton, “Learning UML 2.0,” 1st
Edition, O’Reilly Media, Sebastopol, 2006, 288 p.
[24] A. Moeini and R. O. Mesbah, “Specification and Deve-
lopment of Database Applications Based on Z and SQL,”
Proceedings of International Conference on Information
Management and Engineering, Kuala Lumpur, 3-5 April
2009, pp. 399-405.
[25] A. M. Mostafa, A. I. Manal, E. B. Hate m and E. M. Saad,
“Toward a Formalization of UML2.0 Meta-Model Using
Z Specifications,” Proceedings of 8th ACIS International
Conference on Software Engineering, A rtificial In t elligence,
Networking and Parallel/Distri buted Computing, Qingdao,
Vol. 3, 2007, pp. 694-701. doi:10.1109/SNPD.2007.508
[26] H. Podeswa, “UML for IT Business Analyst,” 2nd Edi-
tion, Course Technology, 2009, 372 p.
[27] T. B. Raymond, “Integrating Formal Methods by Uni-
fying Abstractions,” Springer, Berlin, Vol. 2999, 2004, pp.
441-460.
[28] S. Sengupta and S. Bhattacharya, “Formalization of UML
Diagrams and Consistency Verification: A Z Notation
Based Approach,” Proceedings of India Software Engi-
neering Conference, Hyderabad, 19-22 February 2008, pp.
151-152. doi:10.1145/1342211.1342248
[29] Z. Shi, “Intelligent Target Fusion Recognition Based on
Fuzzy Petri Nets,” Information Technology Journal, Vol.
11, No. 4, 2012, pp. 500-503.
doi:10.3923/itj.2012.500.503
[30] M. Shroff and R. B. France, “Towards Formalization of
UML Class Structures in Z,” 21st International Con-
ference on Computer Software and Applications, Wash-
ington, 11-15 August 1997, pp. 646-651.
[31] J. M. Spivey, “The Z Notation: A Reference Manual,”
Prentice-Hall, Englewood Cliffs, 1989.
[32] J. Sun, J. S. Dong, J. Liu and H. Wang, “A XML/XSL
Approach to Visualize and Animate TCOZ,” Proceedings
of 8th Asia-Pacific Software Engineering Conference,
Macao, 4-7 December 2001, pp. 453-460.
[33] X. Than, H. Miao and L. Liu, “Formalizing Semantics of
UML Statecharts with Z,” Proceedings of 4th Inter-
Copyright © 2012 SciRes. JSEA