posted by user: adel_ayara || 1637 views || tracked by 4 users: [display]

MVV 2010 : Model-Based Verification & Validation: From Research to Practice

FacebookTwitterLinkedInGoogle

Link: http://www2.wmin.ac.uk/bolotoa/MVV2010/mvv-2010.html
 
When Jun 9, 2010 - Jun 11, 2010
Where Singapore
Submission Deadline Feb 10, 2010
Notification Due Mar 10, 2010
Final Version Due Apr 1, 2010
 

Call For Papers

MVV 2010 Call for Papers


Goals and Description
=====================

The costs entailed by software failures demonstrate that the systematic development of software in a certain quality is still a challenge, even after decades of research. One reason for this can certainly be found within the individual projects. Often, known techniques of quality assurance are not well understood and properly used due to deadline and budget restrictions. However, another reason is the lack of techniques for quality assurance for specific types of software and software developed according to specific programming and modeling techniques.
Many ad-hoc security specifications, models, and protocols, which were implemented in software components in the past, turned out to be vulnerable to some extent. Formal verification and validation methods have the potential to increase user confidence in software artifacts. Therefore, theoretical foundations for security assurance should be investigated to discover new methods that will bring high certainty to the trustworthiness of software entities.
Verification and validation (V&V) methods deliver important analytical techniques for quality assurance. In model-based V&V, the software under consideration is analysed by means of a model that focuses on certain aspects, often on the behavior of the software. Models frequently used are finite state machines and flow graphs which are associated with such techniques as formal verification, control and data flow analysis, test case generation, and model checking.
The successful 1st Workshop hold in conjunction with SSIRI 2009 in Shanghai (July 2009) showed the tight links between the model based V&V and general issues of Secure Software Integration and Reliability Improvement and indicated great interest to the workshop themes among the conference participants. The 2d MVV workshop will continue this fruitful collaboration between MVV and SSIRI, aiming at giving researchers and practitioners in the area a platform to present their results and experience to a broader audience.


Topics of interest
==================

* Formal methods and theories in model-based V&V
* Simulation by models, forecasts of behavior and properties by models
* Models and modeling notations for programming and V&V
* Tools for model-based V&V
* Model-based security evaluation
* V&V of security specifications, models, and protocols
* Theoretical foundations of security analysis and design
* Formal models for security testing
* Testing with software usage models
* Test case generation based on formal and semi-formal models
* Test coverage metrics and criteria for model-based testing
* Models as test oracles, test validation with models
* Application of model checking in testing
* Model-based V&V of reactive and object-oriented systems
* Model-based verification and validation of tests
* Experience reports and requirements from model-based V&V and model-based development in practice


Important dates
===============

February 10: submission deadline
March 10: notification date
April 1: camera-ready
June 9-11: MVV 2010 workshop (1-day workshop during the main conference)


Format and Proceedings
======================

Submit original papers (not published or submitted elsewhere) with a maximum of eight pages. Include the title of the paper, the name and affiliation of each author, a 150-word abstract, and up to 6 keywords. The format of your submission must follow the IEEE conference proceedings format (http://www.computer.org/portal/pages/cscps/cps/cps_forms.html).

Please submit your paper at http://paris.utdallas.edu/ssiri10/start/www/Model-basedVerificationandValidation/.

Accepted submissions will be published by IEEE Press and available in the IEEE digital library. For this, one of the authors needs to register and present the accepted submission. During the workshop, each paper will have a slot of 30 minutes, with 20-25 minutes presentation.


Organizers
==========

Alexander Bolotov (a.bolotov{at}wmin.ac.uk)
University of Westminster, UK

Axel Hollmann (hollmann{at}adt.upb.de)
University of Paderborn, Germany

Tugkan Tuglular (tugkantuglular{at}iyte.edu.tr)
Izmir Institute of Technology, Turkey


Program Committee

Related Resources

Embedded Systems for AI-Based Health Mon 2022   Embedded Systems for AI-Based Health Monitoring in Cyber Physical Systems
HUSO 2022   4th Canadian International Conference on Humanities & Social Sciences 2022
VMCAI 2022   Verification, Model Checking and Abstract Interpretation
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
JCRAI 2022-Ei Compendex & Scopus 2022   2022 International Joint Conference on Robotics and Artificial Intelligence (JCRAI 2022)
ICST 2022   15th IEEE International Conference on Software Testing, Verification and Validation (ICST) 2022
MODELSWARD 2022   10th International Conference on Model-Driven Engineering and Software Development
ATVA 2022   The 20th International Symposium on Automated Technology for Verification and Analysis
ICoIV 2022 - Ei Compendex & Scopus 2022   2022 International Conference on Intelligent Vehicles (ICoIV 2022)
CAV 2022   Computer Aided Verification