Model Checking Unbounded Artifact-Centric Systems

Total Page:16

File Type:pdf, Size:1020Kb

Model Checking Unbounded Artifact-Centric Systems Model Checking Unbounded Artifact-Centric Systems Alessio Lomuscio and Jakub Michaliszyn Department of Computing, Imperial College London, UK Abstract important to establish at a fundamental level under what conditions an artifact-system can actually be verified. Artifact-centric systems are a recent paradigm for represent- The verification problem for ACS specified by quantified ing and implementing business processes. We present further results on the verification problem of artifact-centric systems temporal specifications is known to be undecidable (Deutsch specified by means of FO-CTL specifications. While the gen- et al. 2009; Hariri et al. 2011; Belardinelli, Lomuscio, and eral problem is known to be undecidable, results in the lit- Patrizi 2011) and considerable research has gone into the erature prove decidability for artifact systems with infinite exploration of decidable fragments. domains under boundedness and conditions such as unifor- Contribution. In this paper we explore novel boundaries mity. We here follow a different approach and investigate the in the decidability conditions for the model checking prob- general case with infinite domains. We show decidability of lem of ACS against quantified, temporal specifications. While the model checking problem for the class of artifact-centric much of the recent work has focused on the identification of systems whose database schemas consist of a single unary relational properties on the generated models for complete relation, and we show that that the problem is undecidable if artifact systems are defined by using one binary relation or and decidable abstraction procedures, an alternative avenue of two unary relations. investigation consists in considering classes of specifications for the artifacts’ transitions. To this end, we here define the logic CARL which we use to model the artifacts’ lifecycles. 1 Introduction By using CARL to model the artifacts’ evolutions, we can ex- Artifact-centric systems (ACS) have been put forward as press Boolean combinations of the basic relational properties: a framework for reasoning about and implementing data- “check that the relation is empty, “add one arbitrary element aware business processes (Alonso et al. 2004; Hull 2008; to the relation”, “remove one arbitrary element”, and “leave Hull et al. 2011). Artifacts are constructs consisting of data the relation unchanged”. We show that model checking ACS and lifecycles. The data component is given by means of described via CARL against reachability specifications is un- a relational database, i.e., a set of finite relations with fixed decidable thereby providing further insights on the difficulty schema. The lifecycles describe how the artifacts may interact of verifying data-aware systems. and evolve over time. We then focus on restricting the database schema appear- ACS can be programmed via the Guard-Stage-Milestone ing in the ACS. We show that the model checking problem (GSM) language (Hull et al. 2011). The iHub (Heath III remains undecidable if the schema contain either one rela- et al. 2013) is a production and execution suite for ACS tion of arity greater than one, or at least two arbitrary re- implemented in GSM. Both GSM and the iHub are designed lations. Our undecidability proofs involve the encoding of to help stakeholders encode business interactions intuitively two-counter machines (Minsky 1967). and efficiently. Finally, we show that the model checking problem is decid- A problem that naturally arises is whether ACS are cor- able if we consider only artifacts whose schema consists of a rect against specifications. GSMC, a model checking tool single unary relation and sentence-atomic temporal specifi- for GSM systems, has recently been put forward (Gonzalez, cations. We prove this result in three steps. Firstly, we study Griesmayer, and Lomuscio 2012) to assess this problem. the expressive power of first-order logic over unary relations While GSMC has shown considerable promise, verifying using Ehrenfeucht-Fraisse games. Then, we show how to GSM programs via model checking remains highly problem- transform an ACS and a specification into an infinite Kripke atic. Classical techniques based on model checking (Clarke, structure and a CTL specification. Finally, we prove that the resulting infinite Kripke structure can be encoded as a push- Grumberg, and Peled 1999) are typically insufficient as they ∗ normally tackle finite-state systems. Yet artifacts exhibit in- down system. We then define a CTL specification that the finitely many different possible configurations. It is therefore pushdown system satisfies if and only if the ACS satisfies the original FO-CTL specification. Since the former problem Copyright c 2014, Association for the Advancement of Artificial is decidable (Bozzelli 2007), we conclude that the latter is Intelligence (www.aaai.org). All rights reserved. decidable as well. Related Work. Previous research on verifying artifact- and a set of artifact transitions, which account for the artifact centric systems has focused on abstraction techniques where data models and the artifact lifecycles, respectively. semantical conditions such as “uniformity” and “weak Definition 1 (Database schema). A database schema is a set acyclicity” are shown to guarantee decidability under the D = fP1=a1;:::;Pn=ang of relation (or predicate) symbols assumption that systems are bounded, i.e., either the states P , each associated with its arity a 2 . or the runs do not contain more than a given number i i N of predicates (Belardinelli, Lomuscio, and Patrizi 2012b; Definition 2 (Database interpretation). Given a database Hariri et al. 2013). Differently from these approaches, the schema D, a D-interpretation (or D-instance) over an count- investigation here presented makes no assumption on the able interpretation domain U is a mapping D associating boundedness of the artifact-systems to be studied. each relation symbol Pi with a finite ai-ary relation over U, ai Model checking artifact-centric systems against a quan- i.e., D(Pi) ⊆ U . tified version of LTL was studied in (Deutsch et al. 2009). The set of all D-interpretations over a given domain U is It was shown that the problem is generally undecidable, but denoted by ID(U). The active domain of D, adom(D), is becomes decidable if one considers guarded artifact systems the set of all U-elements occurring in some tuple of some and guarded specifications, a form of quantification where predicate interpretation D(Pi). no variables appear free in a temporal context. A PSPACE model checking algorithm for fixed-arity schemas is also 2.1 Artifact systems shown in (Deutsch et al. 2009). While the results presented are positive, compared to the classes of artifacts studied here, To model transitions between states of the underlying the expressivity of the fragment studied is limited. databases, we use unprimed and primed relational symbols from D, that refer to relations in the current and the successor More recently (Hariri et al. 2013) presented results on state, respectively. Intuitively, given two states (i.e., two D- the model checking problem against specifications given interpretations) D and D0, the operator ⊕ constructs a new in the first-order extension of the µ-calculus. The problem “joint” interpretation D⊕D0, interpreting unprimed relational is undecidable in this setting; however, it is shown that by symbols in D, and primed in D0. adding additional restrictions, including forbidding fresh, unbounded data along a run, the problem is decidable. Also in As we study artifacts systems whose transitions are de- that line, and differently from this paper, systems are assumed scribed by various logics, below we introduce the notion of to be bounded and sufficient conditions based on acyclicity an artifact system over a logic LD. for boundedness are established. Definition 3 (LD-artifact system). An LD-artifact system is While all results above focus on complete procedures, in a tuple S = hD; U; D0; Ti, where: recent work (Belardinelli and Lomuscio 2013) partial model •D = fP =a ;:::;P =a g is a database schema; checking procedures against the universal fragment of FO- 1 1 n n CTL have been explored. Differently from (Belardinelli, Lo- • U is a countable interpretation domain; muscio, and Patrizi 2012b) these are given for bounded but • D0 is an initial database instance; possibly non-uniform artifact-centric systems. Conversely, • T is a finite set of sentences of the logic LD, called artifact the results established in this paper concern unbounded, but transitions. uniform systems. In the definition above we assume that the sentences of Scheme of the paper. In Section 2 we provide the back- the logic L state properties of D ⊕ D0, i.e., the notion ground on ACS and relevant concepts, and we define the D “D ⊕ D0 j= Φ” is defined for every sentence Φ of L . model checking problem. We observe that the problem is LD D generally undecidable. In Section 3 we investigate the impli- The semantics of an artifact system is given in terms of its cations of restricting the database schemas and the expressive possible executions, captured by a Kripke structure, whose power of the language used to model the artifacts’ lifecycles. states are instances of the database schema and whose transi- We show that under various restrictions the problem remains tions correspond to executions of artifact transitions. undecidable. In Section 4 we characterise a scenario in which Definition 4 (Kripke structures). A Kripke structure is a tuple the model checking problem is decidable and explore its com- K = hΣ; D0; τ; πi, where Σ is the set of states; D0 2 Σ is plexity. Taken together the results in the two sections show the initial state; τ ⊆ Σ × Σ is the transition relation; π is the that the conditions we identify can be interpreted as being labelling function. maximal for decidability. We conclude in Section 5. For convenience, we assume a single initial state, but all the results presented below also hold if we allow any finite 2 Verifying Artifact Systems number of initial states.
Recommended publications
  • Artifact-Centric Modeling of Business Processes Using UML Diagrams
    Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2016) Artifact-Centric Modeling of Business Processes Using UML Diagrams David Grünert, Thomas Keller, and Elke Brucker-Kley ZHAW School of Management and Law Institute of Business Information Technology 8401 Winterthur, Switzerland {grud, kell, brck}@zhaw.ch Abstract and hidden in the process model. Accordingly, the positioning of information at the center of modeling was termed data- or infor- The modeling of business processes to date has focused on an mation-centric process modeling [2], [3], [4], [5]. Information activity-based perspective while business artifacts associated with entities are modeled by state charts. Transitions are triggered by the process have been modeled on an abstract and informal level. activities. Associated roles are defined by means of use case Ad hoc, dynamic business processes have recently emerged as a diagrams. In [5], the term opportunistic BPM (oBPM) was intro- requirement. Subsequently, BPMN was extended with ad hoc duced for this kind of approach. The duality between activity- sub-processes and a new standard, Case Management Modeling and information-centric models was shown in [6]. and Notation (CMMN), has been created by the Object Manage- Many artifact-centric approaches defined new or extended model ment Group (OMG). CMMN has an information-centric ap- syntax [6]. However, a new or extended modeling syntax increas- proach, whereas the extension of BPMN adheres to an activity- es complexity for all parties involved in designing, reading, and based perspective. The focus on BPMN and on processes in gen- implementing the modeled process and requires adapted model- eral has caused UML to fade into the background.
    [Show full text]
  • Xerox University Microfilms 300 North Zeeb Road Ann Arbor, Michigan 48106 74-2001
    CULTURAL FORMATION PROCESSES OF THE ARCHAEOLOGICAL RECORD: APPLICATIONS AT THE JOINT SITE, EAST-CENTRAL ARIZONA Item Type text; Dissertation-Reproduction (electronic) Authors Schiffer, Michael B. Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 11/10/2021 00:04:31 Link to Item http://hdl.handle.net/10150/288122 INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1. The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in the adjacent frame. 3.
    [Show full text]
  • Plantuml Language Reference Guide (Version 1.2021.2)
    Drawing UML with PlantUML PlantUML Language Reference Guide (Version 1.2021.2) PlantUML is a component that allows to quickly write : • Sequence diagram • Usecase diagram • Class diagram • Object diagram • Activity diagram • Component diagram • Deployment diagram • State diagram • Timing diagram The following non-UML diagrams are also supported: • JSON Data • YAML Data • Network diagram (nwdiag) • Wireframe graphical interface • Archimate diagram • Specification and Description Language (SDL) • Ditaa diagram • Gantt diagram • MindMap diagram • Work Breakdown Structure diagram • Mathematic with AsciiMath or JLaTeXMath notation • Entity Relationship diagram Diagrams are defined using a simple and intuitive language. 1 SEQUENCE DIAGRAM 1 Sequence Diagram 1.1 Basic examples The sequence -> is used to draw a message between two participants. Participants do not have to be explicitly declared. To have a dotted arrow, you use --> It is also possible to use <- and <--. That does not change the drawing, but may improve readability. Note that this is only true for sequence diagrams, rules are different for the other diagrams. @startuml Alice -> Bob: Authentication Request Bob --> Alice: Authentication Response Alice -> Bob: Another authentication Request Alice <-- Bob: Another authentication Response @enduml 1.2 Declaring participant If the keyword participant is used to declare a participant, more control on that participant is possible. The order of declaration will be the (default) order of display. Using these other keywords to declare participants
    [Show full text]
  • The Development of an Object-Oriented Software
    Object-Oriented Design Lecture 18 Implementation Workflow Sharif University of Technology 1 Department of Computer Engineering Implementation Workflow • Implementation is primarily about creating code. However, the OO analyst/designer may be called on to create an implementation model. • The implementation workflow is the main focus of the Construction phase. • Implementation is about transforming a design model into executable code. Sharif University of Technology 2 Implementation Modeling • Implementation modeling is important when: • you intend to forward-engineer from the model (generate code); • you are doing CBD in order to get reuse. • The implementation model is part of the design model. • Artifacts - represent the specifications of real-world things such as source files: • components are manifest by artifacts; • artifacts are deployed onto nodes. • Nodes - represent the specifications of hardware or execution environments. Sharif University of Technology 3 Implementation Model Sharif University of Technology 4 Implementation Workflow: Activities • The Implementation Workflow consists of the following activities: • Architectural Implementation • Integrate System • Implement a Component • Implement a Class • Perform Unit Test Sharif University of Technology 5 Architectural Implementation • The UP activity Architectural Implementation is about identifying architecturally significant components and mapping them to physical hardware. • The deployment diagram maps the software architecture to the hardware architecture. • Deployment
    [Show full text]
  • A Model-Driven Methodology Approach for Developing a Repository of Models Brahim Hamid
    A Model-Driven Methodology Approach for Developing a Repository of Models Brahim Hamid To cite this version: Brahim Hamid. A Model-Driven Methodology Approach for Developing a Repository of Models. 4th International Conference On Model and Data Engineering (MEDI 2014), Sep 2014, Larnaca, Cyprus. pp.29-44, 10.1007/978-3-319-11587-0_5. hal-01387744 HAL Id: hal-01387744 https://hal.archives-ouvertes.fr/hal-01387744 Submitted on 26 Oct 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Open Archive TOULOUSE Archive Ouverte ( OATAO ) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where p ossible. This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 15256 The contribution was presented at MEDI 2014: http://medi2014.cs.ucy.ac.cy/ To cite this version : Hamid, Brahim A Model-Driven Methodology Approach for Developing a Repository of Models. (2014) In: 4th International Conference On Model and Data Engineering (MEDI 2014), 24 September 2014 - 26 September 2014 (Larnaca, Cyprus). Any corresponde nce concerning this service should be sent to the repository administrator: staff -oatao@listes -diff.inp -toulouse.fr A Model-Driven Methodology Approach for Developing a Repository of Models Brahim Hamid IRIT, University of Toulouse 118 Route de Narbonne, 31062 Toulouse Cedex 9, France [email protected] Abstract.
    [Show full text]
  • Working with Deployment Diagram
    UNIVERSITY OF ENGINEERING AND TECHNOLOGY, TAXILA FACULTY OF TELECOMMUNICATION AND INFORMATION ENGINEERING SOFTWARE ENGINEERING DEPARTMENT Lab # 09 Working with Deployment Diagram You’ll learn in this Lab: What a deployment diagram is Applying deployment diagrams Deployment diagrams in the big picture of the UML A solid blueprint for setting up the hardware is essential to system design. The UML provides you with symbols for creating a clear picture of how the final hardware setup should look, along with the items that reside on the hardware What is a Deployment Diagram? A deployment diagram shows how artifacts are deployed on system hardware, and how the pieces of hardware connect to one another. The main hardware item is a node, a generic name for a computing resource. A deployment diagram in the Unified Modeling Language models the physical deployment of artifacts on nodes. To describe a web site, for example, a deployment diagram would show what hardware components ("nodes") exist (e.g., a web server, an application server, and a database server), what software components ("artifacts") run on each node (e.g., web application, database), and how the different pieces are connected (e.g. JDBC, REST, RMI). In UML 2.0 a cube represents a node (as was the case in UML 1.x). You supply a name for the node, and you can add the keyword «Device», although it's usually not necessary. Software Design and Architecture 4th Semester-SE UET Taxila Figure1. Representing a node in the UML A Node is either a hardware or software element. It is shown as a three-dimensional box shape, as shown below.
    [Show full text]
  • Object-Oriented Representation of Electro-Mechanical Assemblies Using UML [8]
    NISTIR 7057 Object-Oriented Representation of Electro- Mechanical Assemblies Using UML Sudarsan Rachuri Young-Hyun Han Shaw C Feng Utpal Roy Fujun Wang Ram D Sriram Kevin W Lyons NISTIR 7057 Object-Oriented Representation of Electro- Mechanical Assemblies Using UML Sudarsan Rachuri Young-Hyun Han Shaw C Feng Utpal Roy Fujun Wang Ram D Sriram Kevin W Lyons October 03 U.S. DEPARTMENT OF COMMERCE Donald L. Evans, Secretary TECHNOLOGY ADMINISTRATION Phillip J. Bond, Under Secretary of Commerce for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arden L. Bement, Jr., Director Table of Contents 1 INTRODUCTION..................................................................................................... 2 2 PREVIOUS WORK.................................................................................................. 3 2.1 ISO STANDARD FOR PRODUCT DATA REPRESENTATION ..................................... 3 2.2 ISO WORKING GROUP PROPOSAL ....................................................................... 6 2.3 RESEARCH AT NIST............................................................................................. 8 2.3.1 Open Assembly Design Environment Project............................................. 9 2.3.2 Design for Tolerancing of Electro-mechanical Assemblies Project......... 10 2.3.3 NIST Core Product Model ....................................................................... 11 2.3.4 Other Systems............................................................................................ 12 3 UML REPRESENTATION
    [Show full text]
  • The IBM Rational Unified Process for System Z
    Front cover The IBM Rational Unified Process for System z RUP for System z includes a succinct end-to-end process for z practitioners RUP for System z includes many examples of various deliverables RUP for System z is available as an RMC/RUP plug-in Cécile Péraire Mike Edwards Angelo Fernandes Enrico Mancin Kathy Carroll ibm.com/redbooks International Technical Support Organization The IBM Rational Unified Process for System z July 2007 SG24-7362-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (July 2007) This edition applies to the IBM Rational Method Composer Version 7.1 © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this IBM Redbooks publication . .x Become a published author . xii Comments welcome. xii Part 1. Introduction to the IBM Rational Unified Process for System z. 1 Chapter 1. Introduction. 3 1.1 Purpose. 4 1.2 Audience . 4 1.3 Rationale . 4 1.4 Scope . 5 1.5 Overview . 5 Part 2. The IBM Rational Unified Process for System z for Beginners . 9 Chapter 2. Introduction to the IBM Rational Unified Process and its extension to Service-Oriented Architecture. 11 2.1 Overview . 12 2.2 Introduction to RUP. 13 2.2.1 The heart of RUP . 13 2.2.2 The IBM Rational Method Composer (RMC) platform . 13 2.3 Key principles for successful software development.
    [Show full text]
  • Best Practices for Managing Your Artifactory Database
    Best Practices for Managing Your Artifactory Database How to monitor your Artifactory Database and improve performance Copyright © 2020 JFrog Ltd. April 2020 | www.jfrog.com Table of Contents Table of Contents .............................................................................................................................. 1 Introduction ....................................................................................................................................... 2 What is the Artifactory Database? ................................................................................................ 2 Preliminary Considerations ........................................................................................................... 3 Database connections ..................................................................................................................... 4 Configurable parameters ................................................................................................................ 5 Defaults ..................................................................................................................................... 5 Parameters ............................................................................................................................... 5 Timeout ..................................................................................................................................... 5 Database performance factors ....................................................................................................
    [Show full text]
  • Part E Historic Artifact Cataloging Methods And
    PART E HISTORIC ARTIFACT CATALOGING METHODS AND UTILIZED CODES Archaeology of the Puncheon Run Site (7K-C-51) Volume III: Data Summaries CONTENTS PAGE I. ARTIFACT CATALOGING AND METHODS ................................ E-1 A. Laboratory Processing ................................................ E-1 B. Analytical Methods .................................................. E-1 1. Historic Ceramic Methods of Analysis ............................... E-2 2. Glass Methods of Analysis ........................................ E-3 3. Pipes Methods of Analysis ........................................ E-4 4. Small Finds/Architectural Methods of Analysis ........................ E-5 5. Faunal Methods of Analysis ....................................... E-5 II. REFERENCES CITED .................................................... E-7 TRANSLATIONS OF UTILIZED CODES Archaeology of the Puncheon Run Site (7K-C-51) Volume III: Data Summaries E-i I. ARTIFACT CATALOGING AND METHODS A. LABORATORY PROCESSING All artifacts were transported from the field to Berger’s laboratory in East Orange, New Jersey. In the field, artifacts were bagged in 4-mil resealable plastic bags, within paper bags. Artifact cards bearing provenience information were included in the plastic bags. The same information was written onto the paper bags. A field/catalog number was assigned to each unique provenience in the field, and this number appeared with all of the provenience information. The field/catalog number, along with the accession number obtained from the Delaware State Museum, was used to track artifact processing. The accession numbers assigned to the site are as follows: 97/0051, 97/0052, and 97/0053 for the Phase I; 97/0055, 97/0058, and 97/0059 for the Phase II; and 98/0002 for the Phase III. In the laboratory, provenience information on each artifact card and bag was checked against a master list of accession/field/catalog numbers with their proveniences.
    [Show full text]
  • Deployment Diagrams Deployment Diagrams
    DEPLOYMENT DIAGRAMS DEPLOYMENT DIAGRAMS • Deployment diagrams are used to visualize the topology of the physical components of a system. • The purpose of deployment diagrams can be described as: • Visualize hardware topology of a system. • Describe the hardware components used to deploy software components. • Describe runtime processing nodes. Definitions • Deployment diagram is a structure diagram which shows architecture of the system as deployment (distribution) of software artifacts to deployment targets. • Artifacts represent concrete elements in the physical world that are the result of a development process. Examples of artifacts are executable files, libraries, archives, database schemas, configuration files, etc. • Deployment target is usually represented by a node which is either hardware device or some software execution environment. Nodes could be connected through communication paths to create networked systems of arbitrary complexity. UML deployment diagram nodes and edges • Node/deployment target • Artifact • Manifests • Deployment specification • Deploy Node • Node is a deployment target which represents computational resource upon which artifacts may be deployed for execution. • Node is shown as a perspective, 3-dimensional view of a cube. • Node is specialized by: Device Execution environment Hierarchical Node Artifact • An artifact is a classifier that represents some physical entity, a piece of information that is used or is produced by a software development process. • Some real life examples of UML artifacts are: 1. text document 2. source file 3. script 4. binary executable file 5. archive file 6. database table Device Node • A device is a node which represents a physical computational resource with processing capability upon which artifacts may be deployed for execution. • A device is rendered as a node (perspective, 3-dimensional view of a cube) annotated with keyword «device».
    [Show full text]
  • Telelogic Tau 3.1 UML Tutorial © 2002-2007 Copyright Telelogic AB
    Telelogic Tau 3.1 UML Tutorial © 2002-2007 Copyright Telelogic AB. Terms of use Telelogic grants you the right to use the Program and the Documentation on one computer or in one local computer net- work at any one time according to the terms and conditions in the License. The Program and the Documentation are owned by Telelogic and are protected by national copyright laws and international copyright treaties. This License does not con- vey to you an interest in the Program or the Documentation, but only a limited right of use in accordance with the terms of this License. No part of this Documentation may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language in any form except as provided in this License. Telelogic does not warrant that the Documentation will meet your requirements or that the operation of the Program will be according to the Documentation, uninterrupted and error free. You are solely responsible for the selection and operation of the Program to achieve your intended results and for the results actually obtained. Information in this Documentation is subject to change without notice. Trademarks Telelogic®, Telelogic DOORS®, Telelogic TAU®, Telelogic DocExpress®, Telelogic DOORSnet® and Telelogic Ac- tiveCM® are the registered trademarks of Telelogic. Telelogic DOORS®/Analyst™, Telelogic DOORS® XT™, Telelogic TAU®/Architect™ , Telelogic TAU®/Develop- er™ , Telelogic TAU®/Tester™ , Telelogic TAU®/Model Author™ , Telelogic SYNERGY™ , Telelogic SYNER- GY™/CM , Telelogic SYNERGY™/Change, Telelogic Dashboard™ and Telelogic Logiscope™ are trademarks of Tele- logic. All other trademarks are the properties of respective holders. ii Telelogic Tau 3.1 User Guide May 2007 How to contact Customer Support The Help Desk is the single point of contact for all support related commu- nication regarding the Telelogic Tau products: • Telelogic Help Desk at our offices.
    [Show full text]