A closed-loop model-based design approach based on automatic verification and transformation

Kun Zhang, Jonathan Sprinkle

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Domain-specific modeling languages effectively constrain structural concepts, but constraints that are not easily captured with structural constraints are still important to fix at design time. In practice these kinds of constraints are implicitly left to be carried out by the domain modelers. This paper explores the process of incorporating system behavioral (not just structural) constraints into a DSML, and studies the way of generating feasible transformation solutions if those constraints fail, based on a transformation library constructed in advance. Our approach is to carry out the verification process through code generation, but utilize the results of verification as an input to a model transformation generator. The output transformation then operates on the original model. As a case study, we applied the approach to finite state machine (FSM) models that control a cyber-physical system.

Original languageEnglish (US)
Title of host publicationDSM 2014 - Proceedings of the 2014 ACM SIGPLAN Workshop on Domain-Specific Modeling, Part of SPLASH 2014
PublisherAssociation for Computing Machinery
Pages1-6
Number of pages6
ISBN (Electronic)9781450321563
DOIs
StatePublished - Oct 21 2014
Event14th Workshop on Domain-Specific Modeling, DSM 2014 - Portland, United States
Duration: Oct 21 2014Oct 21 2014

Publication series

NameDSM 2014 - Proceedings of the 2014 ACM SIGPLAN Workshop on Domain-Specific Modeling, Part of SPLASH 2014

Other

Other14th Workshop on Domain-Specific Modeling, DSM 2014
Country/TerritoryUnited States
CityPortland
Period10/21/1410/21/14

Keywords

  • Closed-loop design
  • Constraints verification
  • Model transformation

ASJC Scopus subject areas

  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'A closed-loop model-based design approach based on automatic verification and transformation'. Together they form a unique fingerprint.

Cite this