Method and apparatus for analyzing computer code using weakest p

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

G06F 945

Patent

active

060290021

ABSTRACT:
An analyzer for maintaining and analyzing source code is disclosed. The analyzer includes a software translator for converting conventional source code into an intermediate language, slicing capability based upon weakest precondition determination, dual direction flow analysis and incorporation of a computational model to facilitate iterative code.

REFERENCES:
patent: 5179698 (1993-01-01), Bachman et al.
patent: 5193182 (1993-03-01), Bachman et al.
patent: 5193183 (1993-03-01), Bachman
patent: 5293631 (1994-03-01), Rau et al.
patent: 5307492 (1994-04-01), Benson
patent: 5315709 (1994-05-01), Alston, Jr. et al.
Dijkstra, E.W. "Guarded Commands, Non-determinancy and a Calculus for the Derivation of Programs", 1975 International Conference on Reliable Software, Los Angeles, California, Apr. 1975, pp. 2-2.13.
Ferrans, J.C. et al., "HyperWeb: A Framework for Hypermedia-Based Enviornments", SIGSOFT '92, Tyson's Corner, Virginia, Dec. 1992, pp. 1-10.
Hart, J.M., "Experience with Logical Code Analysis in Software Reuse and Re-Engineering", American Institute of Aeronautics and Astronautics, (1995) pp. 549-558.
Pizzarello, A., "New Method for Location of Software Defects", AQuis '93, Venice, Italy, Oct. 1993, pp. 143-156.
Ward, M., "Abstracting a Specification from Code", Software Maintenance: Research and Practice, vol. 5, 101-122 (1993).
Ward, M.P. et al., "Formal Methods for Legacy Systems", Software Maintenance: Research and Practice, vol. 7, 203-219 (1995).
Bernot, G. Gaudel, M-C., LeGall, P., Marre, B., "Experience with Black-box Testing from Formal Specifications," AQuLS93 Venice, Italy, pp. 75-84 (1993).
Bijlsma, A., "Calculating with Pointers, " Science of Computer Programming, vol. 12, No. 2, pp. 191-205 (Jul. 1989).
Bowen, J.P., Hinchey, M.G., "Seven More Myths of Formal Methods, " IEEE Software pp.34-41 (Jul. 1995).
Craigen, D., Gerhart, S., Ralston, T., "Formal Methods Realty Check: Industrial Usage," IEEE Transactions on Software Engineering, pp. 90-98 (Feb. 1995).
Fenton, N., "How Effective are Software Engineering Methods?" J. Systems Software, 22: 141-146 (1993).
Floyd, R.W., "Assigning Meaning to Programs, " Proc. Symp. on Applied Math, American Mathematical Society, vol. 19, 99. 19-32 (1967).
Gallagher, K.B. and Lyle, J.R., "Using Program Slicing in Software Maint.," IEEE Trans. on Software Engineering, vol. 17, No. 8, pp. 751-761 (Aug. 1991).
Hoare, C.A.R., "An Axiomatic Approach to Computer Programming, " Comm. of the ACM, vol. 12, No. 10, pp. 576-583 (Oct. 1969).
Hoare, C.A.R., "Proof of Correctness of Data Representations," Acta Informatica, vol. 1, No. 4, pp. 271-281 (1972).
Horowitz, E., and Sahne, S., "Fundamentals of Data Structures," pp. 306-309, Computer Science Press, Inc. (1976).
Humphrey, W.S., Kitson, D.H., "Prelim. Report on Conducting SEI-Assisted Assessments of Software Engineering Capability, " SEI Technical Report, SEI-87-TR-16 (Jul. 1987).
Livadas, P.E., and Croll, S., "A New Algorithm for the Calculation of Transitive Dependencies," Software Maint: Research and Pract., vol. 7, pp. 151-176 ( 1995).
Manna, Z., Waldinger, R., "Problematic Features of Programming Languages: A Situational Calculus Approach, " Acta Informatica, vol. 16, pp. 371-426 (1981).
Misra, J., Safety Properties, U.T. Austin Report (1992).
Pizzarello, A., "Formal Methods in Corrective Software Maintenance," Proc. of Formal Methods for Software Development, and International Seminar, AICA, Milan, Italy (1992).
Pizzarello, A., et al., Program Maintenance Techniques, Lectures Notes, Peritus Software Services, Inc., Billerica, MA (Aug. 25, 1995).
Sharir, M., "Structural Analysis: A New Approach to Flow Analysis In Optimizing Compliers," Computer Languages, vol. 5, pp. 141-153 (1980).
Staskauskas, M., "Specification and Verification of Large-Scale Reactive Programs," Ph.D. Thesis from the University of Texas, Austin (May 1992).
Pizzarello, A., "An Industrial Experience in the Use of Unity," Lecture Notes in Computer Science, Springer-Verlag 574 (1991).
Pizzarello, A., "Formal Techniques For Understanding Programs," originally presented at the 8th Intl. Software Quality Week, San Francisco, CA, May 30-Jun. 2, 1995.
Weiser, M., "Programmers Use Slices When Debugging," Commun. Ass. Comput. Mach., vol. 25, No. 7, pp. 446-452 (1982).
Weiser, M., "Program Slicing," IEEE Transactions on Software Engineering, vol. SE-10 No. 4, pp. 352-357 (1984).
Aho et al., "Compilers Principles, Techniques, and Tools," Addison-Wesley Pub, pp. 12-13, 49, 432-433, 633-636, 638-639, 643-648, 1988.
Shahmehri et al., "Semi-automatic bug localization in software maintenance," IEEE Comp. Soc. Press, pp. 30-36, Nov. 29, 1990.
Clarke et al., "Software fault trees adn weakest preconditions: a comparison and analysis," Software Eng Journal, vol 8, Iss 4, pp. 225-236, Jul. 1993.
Antonio Pizzarello, "Formal Methods for Supporting Software Maintenance: Techniques and Tools", Peritus Software Services, Inc., (Sept/Oct. (1995) ), pp. 1-14.
Antonio Pizzarello, "A New Method for Location of Software Defects", Peritus Software Services, Inc., (1994), pp. 1-15.
Antonio Pizzarello, "A New Method of Software Defects", Peritus Software Services, Inc., (1995) , pp. 1-19.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for analyzing computer code using weakest p does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for analyzing computer code using weakest p, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for analyzing computer code using weakest p will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-527683

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.