Q2. What are the main constraints used to control the routing of control token over edges?
Control nodes such as join, fork, merge, decision, initial and final are used to control the routing of control token over edges and specify the sequence of actions (concurrency, synchronization).
Q3. What are the advantages of the proposed approach in the context of predicting the behavior of systems?
The practical advantages of the proposed approach in the context of predicting the behavior of systems, consists on providing key decision for errors minimization and product cost reducing via probabilistic model checking.
Q4. What are the limitations of the proposed approach?
The limitations of the proposed approach relate to the problem of state explosion, the authors explain in their work how to reduce the number of state by removing just the negligible states that are not time-constrained.
Q5. What is the meaning of a control token on an incoming control flow?
A control token on an incoming control flow enables the execution of an action and offers a control token on outgoing control flow when action completes its execution.
Q6. What is the main concern of formal verification methods?
formal verification methods have become essential tools for developing safety–critical systems, where its behavioral correctness is a main concern.
Q7. What are the main challenges of software development?
Constraints on software development in terms of functionality, performance, reliability and time to market are becoming more stringent.
Q8. How many time units should be turned off after turning on the camera?
For the third property, the minimum reward or minimum expected time that the TurnOff action should be activated after turning on the camera is equal to 3.448 time units.
Q9. What is the main reason why accelerated verification is so beneficial?
accelerate the verification and maintenance process atpreliminary design is extremely beneficial as compared to fixing them at the testing phase.
Q10. What is the simplest way to verify a SysML activity diagram?
Soeanu, Debbabi, and Hassaine (2007) propose a probabilistic verification of SysML activity diagram where the execution time of actions are represented as constraints (i.e. A note artifact in SysML activity diagram).
Q11. What criteria are used to compare the framework to the existing works?
As a summary, in Table 1 the authors compare their framework to the existing works by taking consideration five criteria: SysML language, time constraints, data workflow, formalization, soundness and automation.