[1]
|
N. H. Ali, Z. Shukur and S. Idris, “A Design of an Assessment System for UML Class Diagram,” International Conference on Computational Science and Applications, Kuala Lampur, 26-29 August 2007, pp. 539-546.
doi:10.1109/ICCSA.2007. 31
|
[2]
|
A. M. Mostafa, A. I. Manal, E. B. Hatem and E. M. Saad, “Toward a Formalization of UML2.0 Meta-Model Using Z Specifications,” Proceedings of 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Qingdao, 30 July-1 August 2007, pp. 694-701.
doi:10.1109/SNPD. 2007.508
|
[3]
|
K. E. Hamdy, M. A. Elsoud and A. M. El-Halawany, “UML-Web Engineering Framework for Modeling Web Application,” Journal of Software Engineering, Vol. 5, No. 2, 2011, pp. 49-63. doi:10.3923/jse.2011.49.63
|
[4]
|
X. He, “Formalizing UML Class Diagrams: A Hierarchical Predicate Transition Net Approach,” Proceedings of Twenty-Fourth Annual International Computer Software and Applications Conference, Taipei, 25-27 October 2000, pp. 217-222. doi:10.1109/CMPSAC.2000. 884721
|
[5]
|
M. Shroff and R. B. France, “Towards Formalization of UML Class Structures in Z,” 21st International Conference on Computer Software and Applications, Washington DC, 11-15 August 1997, pp. 646-651.
|
[6]
|
N. A. Zafar and F. Alhumaidan, “Transformation of Class Diagrams into Formal Specification,” International Journal Computer Science and Network Security, Vol. 11, No. 5, 2011, pp. 289-295.
|
[7]
|
B. Akbarpour, S. Tahar and A. Dekdouk, “Formalization of Cadence SPW Fixed-Point Arithmetic in HOL,” Formal Methods in System Design, Vol. 27, 2005, pp. 173200.
|
[8]
|
H. Beek, A. Fantechi, S. Gnesi and F. Mazzanti, “State/ Event-Based Software Model Checking,” Proceedings of 4th International Conference on Integrated Formal Methods, Canterbury, 4-7 April 2004, pp. 128-147.
|
[9]
|
J. Derrick and G. Smith, “Structural Refinement of ObjectZ/CSP Specification,” Proceedings of 2nd International Conference on Integrated Formal Methods, Dagstuhl Castle, 1-3 November 2000, pp. 194-213.
|
[10]
|
O. Hasan and S. Tahar, “Verification of Probabilistic Properties in the HOL Theorem Prover,” Proceedings of the 6th International Conference of Integrated Formal Methods, Oxford, 2-5 July 2007, pp. 333-352.
|
[11]
|
T. B. Raymond, “Integrating Formal Methods by Unifying Abstractions,” Springer, Berlin, 2004, pp. 441-460.
|
[12]
|
D. Jackson, I. Schechter and I. Shlyakhter, “Alcoa: The Alloy Constraint Analyzer,” Proceedings of International Conference on Software Engineering, Limerick, 4-11 June 2000, pp. 730-733. doi:10.1109/ICSE. 2000.870482
|
[13]
|
J. Sun, J. S. Dong, J. Liu and H. Wang, “A XML/XSL Approach to Visualize and Animate TCOZ,” Proceedings of 8th Asia-Pacific Software Engineering Conference, Macao, 4-7 December 2001, pp. 453-460.
doi:10.1109/APSEC.2001.991514
|
[14]
|
A. Moeini and R. O. Mesbah, “Specification and Development of Database Applications Based on Z and SQL,” Proceedings of International Conference on Information Management and Engineering, Kuala Lumpur, 3-5 April 2009, pp. 399-405. doi:10.1109/ICIME.2009.143
|
[15]
|
X. G. Zhang and H. Liu, “Formal Verification for CCML Based Web Service Composition,” Information Technology Journal, Vol. 10, No. 9, 2011, pp. 1692-1700.
doi:10.3923/ itj.2011.1692.1700
|
[16]
|
S.-K. Kim and D. Carrington, “An Integrated Framework with UML and Object-Z for Developing a Precise and Understandable Specification: The Light Control Case Study,” Proceedings of 7th Asia-Pacific Software Engineering Conference (APSEC), 5-8 December 2000, pp. 240-248. doi:10.1109/APSEC.2000.896705
|
[17]
|
M. Heiner, and M. Heisel, “Modeling Safety Critical Systems with Z and Petri-Nets,” Proceedings of International Conference on Computer Safety, Reliability and Security, Toulouse, 27-29 September 1999, pp. 361-374.
|
[18]
|
E. Cunha, M. Custodio, H. Rocha and R. Barreto, “Formal Verification of UML Sequence Diagrams in the Embedded Systems Context,” Brazilian Symposium on Computing System Engineering (SBESC), 2011, pp. 39-45.
|
[19]
|
H. Leading and J. Souquieres, “Integration of UML and B Specification Techniques: Systematic Transformation from OCL Expressions into B,” Proceedings of 9th Asia-Pacific Software Engineering Conference, Gold Coast, 4-6 December 2002, p. 495.
|
[20]
|
Z. Shi, “Intelligent Target Fusion Recognition Based on Fuzzy Petri Nets,” Information Technology Journal, Vol. 11, No. 4, 2012, pp. 500-503.
doi:10.3923/itj.2012.500.503
|
[21]
|
C. Yong, “Application of Wu’s Method to Proving Total Correctness of Recursive Program,” Information Technology Journal, Vol. 9, No. 7, 2010, pp. 1431-1439.
doi:10.3923/ itj.2010.1431.1439
|
[22]
|
Z. M. Ma, “Fuzzy Conceptual Information Modeling in UML Data Model,” International Symposium on Computer Science and Computational Technology, Shanghai, 20-22 December 2008, pp. 331-334.
doi:10.1109/ ISCSCT.2008.353
|
[23]
|
Z. X. Wang, H. He, L. Chen and Y. Zhang, “Ontology Based Semantics Checking for UML Activity Model,” Information Technology Journal, Vol. 11, No. 3, 2012, pp. 301-306. doi:10.3923/itj. 2012.301.306
|
[24]
|
M. T. Bhiri, K. Mourad, M. Graiet and P. Aniorte, “UML/ OCL and Refinement,” 18th IEEE International Conference and Workshops on Engineering of Computer-Based Systems, Las Vegas, 27-29 April 2011, pp. 14-158.
|
[25]
|
S. A. Ehikioya and B. Ola, “A Comparison of Formalisms for Electronic Commerce Systems,” Proceedings of International Conference on Computational Cybernetics, Vienna, 30 August-1 September 2004, pp. 253-258.
doi:10.1109/ICCCYB. 2004.1437721
|
[26]
|
W. S. Changchien, J. J. Shen and T. Y. Lin, “A Preliminary Correctness Evaluation Model of Object-Oriented Software Based on UML,” Journal of Applied Sciences, Vol. 2, No. 3, 2002, pp. 356-365.
doi:10.3923/jas.2002.356.365.
|
[27]
|
Z. Derakhshandeh, B. T. Ladani and N. Nematbakhsh, “Modeling and Combining Access Control Policies Using Constrained Policy Graph (CPG),” Journal of Applied Sciences, Vol. 8, No. 20, 2008, pp. 3561-3571.
doi:10.3923/jas.2008.3561.3571
|
[28]
|
C. Liu and X. M. Dong, “An Improved Quasi-Static Scheduling Algorithm for Mixed Data-Control Embedded Software,” Journal of Applied Sciences, Vol. 6, No. 7, 2006, pp. 1571-1575.
|
[29]
|
S. Sengupta and S. Bhattacharya, “Formalization of UML Diagrams and Consistency Verification: A Z Notation Based Approach,” Proceedings of India Software Engineering Conference, Hyderabad, 19-22 February 2008, pp. 151-152. doi:10.1145/ 1342211.1342248
|
[30]
|
X. Than, H. Miao and L. Liu, “Formalizing Semantics of UML Statecharts with Z,” Proceedings of 4th International Conference on Computer & Information Technology, Wuhan, 14-16 September 2004, pp. 1116-1121.
doi:10.1109/ CIT.2004.1357344
|
[31]
|
R. Borges and A. Mota, “Integrating UML and Formal Methods,” Electronic Notes in Theoretical Computer Science, Vol. 184, 2003, pp. 97-112.
doi:10.1016/j.entcs.2007.03.017
|
[32]
|
H. Podeswa, “UML for IT Business Analyst,” 2nd Edition, Course Technology, 2009.
|
[33]
|
A. Dennis, B. H. Wixom and D. Tegarden, “Systems Analysis and Design with UML,” 3rd Edition, Wiley, Hoboken, 2005.
|
[34]
|
R. Miles, and K. Hamilton, “Learning UML 2.0,” O’Reilly Media, 2006.
|
[35]
|
S. Zarina, N. Alias, M. M. Halip and B. Idrus, “Formal Specification and Validation of Selective Acknowledgement Protocol Using Z/EVES Theorem Prover,” Journal of Applied Sciences, Vol. 6, No. 8, 2006, pp. 1712-1719.
doi:10.3923/jas.2006.1712.1719
|
[36]
|
J. M. Wing, “A Specifier, Introduction to Formal Methods,” Computer Journal, Vol. 23, No. 9, 1990, pp. 8-24.
doi:0.1109/2.58215.
|
[37]
|
F. Gervais, M. Frappier and R. Laleau, “Synthesizing B Specifications from EB3 Attribute Definitions,” Proceedings of 5th International Conference on Integrated Formal Methods, Eindhoven, 29 November-2 December 2005, pp. 207-226.
|
[38]
|
A. Hall, “Correctness by Construction: Integrating Formality into a Commercial Development Process,” Proceedings of International Symposium of Formal Methods Europe, Copenhagen, 22-24 July 2002, pp. 139-157.
|
[39]
|
M. Brendan and J. S. Dong, “Blending Object-Z and Timed CSP: An Introduction to TCOZ,” Proceedings of International Conference on Software Engineering, Kyoto, 19-25 April 1998, pp. 95-104.
doi:10.1109/ICSE.1998.671106.
|
[40]
|
M. Bo, W. Huang and J. Qin, “Automatic Verification of Security Properties of Remote Internet Voting Protocol in Symbolic Model,” Information Technology Journal, Vol. 9, No. 8, 2010, pp. 1521-1556.
doi:10.3923/itj.2010. 1521.1556.
|
[41]
|
K. Araki, A. Galloway and K. Taguchi, “Using a Process Algebra to Control B Operations,” Proceedings of 1st International Conference on Integrated Formal Methods, London, 26-28 October 1999, pp. 437-456.
|
[42]
|
S. Bennett, S. McRobb and R. Farmer, “Object-Oriented Systems Analysis and Design Using UML,” 4th Edition, McGraw-Hill, New York, 2011
|
[43]
|
I. Jacobson, M. Christerson, P. Jonsson and G. Overgaad, “Object-Oriented Software Engineering: A Use Case Driven Approach,” Addison-Wesley, Wokingham,1992,.
|