Traceability for Model Checking Sample Clauses

Traceability for Model Checking. ‌ Over the past two decades, model checking in its various flavors has made impressive progress in terms of applicability in industry. As one example, the approach has become a standard technique for the verification of hardware circuits. As another example, this author’s company applies model checking to verify interlocking system configurations for customers from railway in- dustry, where the configurations are specified in a domain-specific language and then automatically verified for sanity and safety. Apart from the capability to automatically verify system properties provided in temporal logic, a question that commonly arises in industrial projects in safety-critical domains is that of tracing. For the technique to be of value for certification-related activities, it must be possible to identify and relate the configurations and results of the verification process, which naturally leads to the notion of traceability, the purpose of which is to relate certain information and artefacts related to the verification process. Questions to which a traceability implementation should be able to automatically provide answers include: • Is requirement X satisfied for model Y? • Which model checking queries exercise requirement X? • Which is the last model version for which model checking query X failed? It is no surprise that traceability typically is stored as some form of database which relates entities according to a well-defined scheme. We do not con- tribute to these fundamentals, but rather present a scheme that appears well-suited for covering industrial needs related to model checking for safety- critical systems.
AutoNDA by SimpleDocs

Related to Traceability for Model Checking

  • Minimum Customer Support Requirements for TIPS Sales Vendor shall provide timely and commercially reasonable support for TIPS Sales or as agreed to in the applicable Supplemental Agreement.

  • Service Description The Parties will provide Common Channel Signaling (CCS) to one another via Signaling System 7 (SS7) network Interconnection, in accordance with prevailing industry standards. Use of a third party provider of SS7 trunks is permitted.

  • Product Warranty for Software Deliverables During the Project warranty period, defects in the materials or workmanship of the Software Deliverables specified and furnished by or through Contractor shall be repaired or replaced by Contractor at no cost or expense to the Authorized User. Contractor shall extend the Project warranty period by the cumulative period(s) of time, after notification, during which the Software Deliverables require servicing or replacement (down time) or is in the possession of the Contractor, its agents, officers, Subcontractors, distributors, resellers or employees . The Commissioner agrees that Contractor is not responsible for any modification of the Software Deliverables made by an Authorized User without Contractor’s approval.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Data Retention The Company will hold and use the Data only as long as is necessary to implement, administer and manage the Grantee’s participation in the Plan, or as required to comply with legal or regulatory obligations, including under tax and security laws.

  • Service Details C1.1 This Agreement applies in respect of the following details: Provider Legal Entity Name «PROVIDER_NAME» Provider Legal Entity Number «PROVIDER_NUMBER» Facility Name and Physical Address [insert Facility name and address] Service Category Name Service Category ID

  • Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.

  • Service Descriptions Available services for Transitional and Enhanced Supervision Services a. One (1) one-to-one meeting with the Contractor per week for case management services.

  • Technical Feasibility of String While ICANN has encouraged and will continue to encourage universal acceptance of all top-­‐level domain strings across the Internet, certain top-­‐level domain strings may encounter difficulty in acceptance by ISPs and webhosters and/or validation by web applications. Registry Operator shall be responsible for ensuring to its satisfaction the technical feasibility of the TLD string prior to entering into this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.