• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Monitoring time property in time-sensitive LSC

    2015-02-10 12:26:02HaiyangXuYiZhuangandJingjingGu

    Haiyang Xu,YiZhuang,and Jingjing Gu

    1.Schoolof Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China; 2.Schoolof Science and Information,Qingdao Agricultural University,Qingdao 266109,China

    Monitoring time property in time-sensitive LSC

    Haiyang Xu1,2,YiZhuang1,*,and Jingjing Gu1

    1.Schoolof Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China; 2.Schoolof Science and Information,Qingdao Agricultural University,Qingdao 266109,China

    In order to accurately describe the software requirements and automatically extract property formulas,the time property of the live sequence chart(LSC)is focused.For the timesensitive LSC(TLSC),the formalsyntax and semantic are defined by introducing the formaldefinitions ofclock and timing constraints. The main function of the TLSC is to extract the temporal logic formula,so basic rules and combination rules are proposed to translate the TLSC into the universalfragmentofcomputation tree logic(CTL)formula.To improve the efficiency of model check, transitivity is also used to optimize the formula.The optimization method could reduce the size of the formula under the condition ofequivalence.Finally,a case study is introduced to illustrate how to establish the TLSC of requirements.In terms of the proposed transformation rules,the time property formula is extracted from the TLSC,and the design model is assured which is consistent with the property formula.The results show that the method with respect to the automatic extraction of the logic formula from the TLSC can efficiently monitorthe time property ofsoftware systems.

    live sequence chart(LSC),timing constraint,temporal logic,transformation rule.

    1.Introduction

    In the process of system modeling and simulation,itis importantto accurately acquire the specification of a system, and makes it correct.Our motivation is to formally transform the specification and make what you wrote capture whatyou meant.Scenario-based language can graphically describe the software requirements,and can be used to verify the property of the design model.Live sequence chart (LSC)is one of the scenario-based modeling and specification languages,and it can be used at the stages of software design and developmentprocess.Atthe design stage, the LSC can be used to verify the properties of communication protocol,and assure the correctness of protocol behavior.At the development stage,the LSC can provide a specification for implementations that need to be verified[1].From the view of the property role,the LSC can describe the observe events among the system processes. While the LSC still adopts the timer and time interval in a message sequence chart(MSC),its application would be limited in the description ofcharacters and behaviorofthe realtime software system[2].

    Model check can be used to verify whether a software modelsatisfies a given property ornot.There are two kinds of practicalmodelcheck categories.One is to translate requirementspecification of a software system into a set of temporal logic formulas,the other is to use an automaton to express the requirementspecification[3,4].Mostof the existing researches focus on translating LSC into automaton,or translating LSC into time B¨uchi automaton.There are few researches on translating LSC into temporallogic, and now no research on the transformation from the timesensitive LSC(TLSC)into temporallogic.

    In the scenario-based software engineering,temporal logic is widely used to describe the software requirements [5,6],and model check is used to verify the consistency between the software modeland requirementspecification [7,8].While as the complexity of the logic structure,it is impracticalto require developers to directly use the temporallogic formula to signify the requirementspecification of a software system,it hinders formalverification in industrialapplications.Many researchers suggestusing the LSC to denote requirementspecification of the software system and extracting property formulas that need to be verified from the scenario-based language.However,the transformation rules from the LSC to temporal logic are nonstandard,and the software developers are differentin software requirementunderstanding,so the temporallogic formulas extracted from the LSC are different.Mostresearchers focus on the safety property and the liveness property,they rarely research on the time property of software behavior.

    Forefficiently describing the properties and behaviorof the real time software,and automatically translating requirementspecification into logic formulas,we start from the existing scenario-based language,and focus on the definition and description of the time property in the scenario-based language.We present the TLSC to denote the requirements of the realtime software,which is the basis of translating requirement specification into temporal logic formulas.

    We focus on the time property of the LSC,and introduce the formal definitions of clock and timing constraints.Based on the LSC,we propose the TLSC,and formally define its syntax and semantics.For eliminating the difference in extracting the property formula between developers and establishing the standard transformation rules,we presentthe basic transformation rules from TLSC to temporal logic formulas and the complex rules,which use logicalconnectors to compose the basic rules and combine path quantifier with basic rules.As the transfer efficiency from TLSC to temporallogic affects the complexity of verification work,we use transitivity to redefine the order property for optimizing formulas,and the improved method could reduce the size offormulas underthe formulas equivalence.

    The remainder of the paper is organized as follow.Section 2 introduces some background on the LSC.The formal syntax and semantics of the TLSC are given in Section 3. In Section 4,we presentthe basic transformation rules and the combination rules.The result formula is further optimized in Section 5.Section 6 gives a case study to illustrate how to use the TLSC to describe the message sequence, and how to generate temporallogic formulas.Concluding remarks are given in Section 7.

    2.Preliminaries

    MSC has been standardized by the International Telecommunication Union(ITU)as the standard language and specification in the telecommunication behavior of real time systems,and ithas widespread in the developmentof industry software[9].While the weak partialorder semantics of the MSC makes it unable to describe some behavioral requirements[10],the MSC cannot precisely distinguish requirement and executable specification[11–13]. The faultof the MSC limits its expression ability.

    Based on the extension ofthe ITUstandard forthe MSC, Damm and Harelproposed an LSC for scenarios[11].The LSC can model scenario-based software behavior in the form of a sequence diagram,and it is suitable to express the communication between processes[14].There is a universal mode and an existential mode in the LSC through adding liveness to the chart,so LSC can specify mandatory behavior and provisionalbehavior of a system.In the universalchart,allruns ofthe system satisfy the given scenario.While using the existentialchartto specify,the scenario can be satisfied by atleastone run ofthe system.Fig. 1 shows a universalchartof the LSC.An existential chart can represent the provisional scenario,and it is an inadequacy description for requirements.The existential chart is suitable for the early stage of software lifecycle.After gathering more software information,we can refine the existential chart to the universalchart[15].The messages of the LSC are divided into pre-chartand main-chart,both of which respectively denote the activation condition and the response eventof the scenario.In the universalchart,once the message in pre-chartis sent,itwillforce the message in main-chartto occur.While in the existentialchart,itwould notguarantee the message of main-chartto occur.

    Fig.1 Universal chart of LSC

    Hot and cold temperatures are introduced into LSC for chartelements,such as location,message and condition,to indicate thatchartelements must or may occur.As shown in Fig.1,LSC provisional behavior is represented by the dashed line,mandatory behavioris represented by the solid line.The pre-chart of the universal chart is specified by the dashed hexagon,the main-chartis drawn with the solid rectangle.The synchronous message is depicted by a solid arrow,while the asynchronous message is depicted by a dashed one.The two messages indicate thatthe communication between two instances must or may complete.The mandatory condition is denoted by the solid line hexagon, and the provisionalcondition is denoted by the dashed line hexagon.In Fig.1,Cond1denotes the mandatory condition,and it associates with I3and I4.When I3and I4satisfy Cond1atthe same time,I3willsend the synchronous message m4to I4.Cond2denotes the provisional condition,if I2satisfies the condition,I2will send the asynchronous message m5to I3.

    The LSC extends the traditional MSC with mandatory behavior and forbidden behavior,and itcould specify scenario-based behavior specification of the reactive system in a more precise manner[16–18].The LSC has been successfully used in practicalhardware and software verification,such as the air traffic controlsystem[19]and therailway traffic management system[20].While the LSC still utilizes the timing constraint notations in the MSC, such as timer and time interval,doing this restricts the application of the LSC.

    3.Syntax and semantics of TLSC

    Compared with the MSC,the LSCnotonly remains advantages,such as visualization and understanding,butalso has the stronger expression ability which is similar to temporal logic[21].While the weakness of the LSC in the time property causes the addition of the expression of time for the LSC,which makes it equalto temporallogic formulas in the expression[22,23].To be more suitable for specifying the behavior and property of real time software,we extend LSC with formal clock and timing constraints to denote the time eventand time delay.Firstly we define the formalsyntax of TLSC,and then give the semantics of the universalchartin TLSC based on trace.

    3.1 Formalsyntax of TLSC

    Aimming to add the formal timing constraints for LSC [24],we firstly introduce some definitions abouttime,such as clock constraintand clock interpretation.

    Definition 1(clock constraint)For a set C of clock variables,Φ(C)is a set of clock constraint?on C.And the clock constraint?is defined by

    where x∈C is a clock variable,and c is a constantin Q+(Q+is the setofnonnegative integer).

    Definition 2(clock interpretation)For a set C of clock variables,v is a clock interpretation for C.It is a mapping from C to R+and is defined by v:C→R+. Where v assigns a positive realvalue to each clock x,and x is a clock variable.

    Clock constraints denote the time condition that should be satisfied when the eventoccurs.Aclock interpretation v could satisfy a clock constraint(denoted by v|=?)if and only if the value of?is true for the given value v.

    Let the notation[?]={v|v|=?}denote the set of clock interpretation v that satisfies the clock constraint?. Forthe precursortime setand succeed time setofthe clock constraint?,we respectively use the notations pre(?)= {v|v<min([?])}and succ(?)={v|v>max([?])}to describe the clock values which occurbefore and after the clock constraint?[25].

    Definition 3(TLSC)A TLSC is a tuple TLSC=〈I,Loc,E,C,δ,Mode,inv,μ〉,where

    I is a setof instances in TLSC;

    Loc is a setof locations in TLSC;

    E is a set of events in TLSC,events are grouped into two sets:condition(Con)and message(Msg),thatis,E= Con∪Msg;

    C is a finite setof clock variables;

    δ:E→Loc is an eventmapping function,itmaps each eventto a location;

    Mode:E→{cold,hot}is a behavior mapping function,itdenotes an eventis provisionalor mandatory;

    inv:Loc→Φ(C)is a timing constraint function,it assigns timing constraints for each location〈i,l〉and the timing constraint inv(l)is the invariantofthe location;

    μ:E→Φ(C)is a time interval function,it defines the time intervalof events,which denote the minimum and maximum time delay when an eventoccurs.

    To more clearly understand the formal syntax of the TLSC,we give an example to depictthe timing constraints in the TLSC,as shown in Fig.2.When the instance I1is in the location〈I1,1〉and satisfies the invariant?,then I1will send the synchronization message m to I2.The message m should be sentand received within the time interval constraint[t1,t2]of the clock x,and the clock y is reset to 0.

    Fig.2 Timing constraint in TLSC

    3.2 Semantic of TLSC

    In the section,we give the trace-based formalsemantic of the universalchartin the TLSC.

    We use the symbol tl to denote a universal chart of TLSC,and use the set I={i1,i2,...,in}to denote all instances in tl.An instance may be a process,an object, or a component,etc.Each instance has an instance line, and we stilluse the same symbol I to denote the instance line.The finite locations are marked with numbers in instance lines by top-down.For the instance line i and the chart tl,the set of locations is given by dom(tl,i)= {l0(i),l1(i),...,lmax(i)}.Thus,we define a finite set of locations Loc={〈i,l〉|i∈I∧l∈dom(tl,i)}to representallthe locations in the chart tl.

    In terms of Definition 3,there are two kinds ofevents in the chart tl,so E=Con∪Msg.

    Definition 4The event E in one location l of the instance I is defined by

    E:=[Con|ε],Msg|ε

    Con:=[hot|cold],Boolexp

    Msg:=[?|ε],<[hot|cold],〈i,l〉,m,[?|ε],〈i?,l?〉>

    We regard the condition and message appearing in location as an event.When the condition Con satisfies theBoolean expression Boolexp,the system will execute the following event.The message is restrained by the sender and the timing constraint.The temperature values hot and cold indicate the message must or may occur,that is a synchronous message or an asynchronous message.The symbol〈i,l〉represents the senderof the message,and the sender also may be restrained by time.Once the sender satisfies the timing constraints,itwillsend the message m, which occurs during the minimum and maximum time delay.The symbol〈i?,l?〉represents the receiver of the message.

    Definition 5CUT is the set of locations of all the instances in TLSC.And itis defined by CUT={cut|cut= (<i1,l1>,...,<in,ln>)∧i∈I∧l∈dom(tl,i)}, where cut is a mapping of current locations of all the instances in TLSC,and denotes a state ofsystem runs.If cut, cut?∈CUT,and cut=(<i1,l1>,...,<in,ln>),

    Then cut?is a successor of the location<j,lj>of cut denoted by cut?=succ(cut,<i,li>).

    The definition of CUT considers not only the current locations of instances,but also the timing constraint?in locations.

    Definition 6The symbolδis a message function of the location〈i,li〉and its mapping relationship is defined by

    In terms of the message functionδ,we can define the partialorderrelation between messages by?.

    If the messages are in the same instance line,there is

    If the messages are in differentinstance lines,there is

    We denote the immediate successor of the message m by succ(m)={n|m?n∧n/=ε}.

    Definition 7(order property)Given two messages ei=δ(i,li)and ej=δ(j,lj),if messages eiand ejsatisfy the partialorder ei?ej,then the orderproperty is

    which denotes that the message ejwill not occur until eioccurs.

    If messages eiand ejsatisfy the partial order ei?ejand ej=succ(ei),then the order property is

    which denotes that the message ejwill occur next to ei, when eioccurs.

    Definition 8(execution trace)Let a CUT sequence r=(cut0,v0),(cut1,v1),...,(cutk,vk)be a run of TLSC.Where cutidenotes a mapping ofcurrentlocations of all the instances in TLSC,and videnotes the clock interpretation of the current state.cut0is the starting point and clock interpretation v0=0,and cutkis the terminal point.(cuti,vi)=succ((cuti?1,vi?1),〈i,li〉)(i= 0,1,...,k?1).The setofallruns is denoted by the symbol Runs.We use rk={r|?r∈Runs∧|r|=k} to denote the subpath of the run r with k path,and use Path(cuti,vi)={r|?r∈Runs∧cut0=cuti}to denote a path of a run starting at(ci,vi).An execution trace is the trace ofa CUT sequence,and is denoted byπ=trace(r)

    Thatis,π=π0,π1,...,πk?1denotes the events thattrigger the state transition,and

    In terms of the execution trace,we define the trace-based language of the TLSC tl to be

    The language L of the TLSC consists of the eventchain thattriggers the state transition.The problem thatthe software modelwhether satisfies the requirementspecification or not,can be reduced to the inclusion of language.

    Since both pre-chartand main-chartcan be represented as a chain of events,they are the basic charts of an LSC. An LSC can be represented by a pre-chartand a fullchart, where the full chart is the concatenation of the pre-chart and the main-chart[5].The trace languages ofthe pre-chart and fullchartcan be defined byThe eventchain ofthe fullchartlanguage composes of the events with Cartesian product in the run of the pre-chart and main-chart.

    4.Transformation of TLSC into temporal logic formula

    As linear temporal logic(LTL)formulas cannot express the property in some pathes,the existentialchartcan be refined to a universalchart[15,26].We focus on the method extracting computation tree logic(CTL)formulas from the TLSC universalchart[27].A CTL formula can be written in the form of negation normal form(NNF),so each formula can be translated into an equivalentformula in NNF [28,29],thus all kinds of operators in formulas can be reduced.Based on the above analysis,we only use the formulas in NNF.ACTL is one subset of CTL formulas,and there is only the path quantifier A to express the branch of states,so the temporal operators in logic formulas are restricted to{AX,AF,AG,AU,AR}.We further use the sub logic ACTL of the CTL.In the process of translating the universal chart of the TLSC into temporal logic,we only discuss how to translate itinto ACTL formulas.

    If the event defined in the pre-chartoccurs in the given order,the sequence of events defined in the main-chart mustoccur in the given order[5].Thatis,a universalchart ofthe TLSCcan be used to specify requirementsin temporal formula form.In terms of the trace-based semantic of the TLSC,we will translate the scenario-based TLSC requirementinto an ACTL formula.The transformation rule setis composed of two rules:the basic rules and the combination rules.

    4.1 Basic rules

    In the basic rules,we do notconsiderthe effects ofthe path quantifier.The transformation rules are to translate a TLSC message into a simple ACTL formula.Firstly,we give the formaldefinition of the CTL formula:

    PQ is a set of the path quantifier,which denotes the branch of the states.TO is a set of temporal operator, which denotes the order relationship between two states. AP is a setof atomic proposition.

    Rule 1(single message transformation rule)The name of the message is mapped to an atomic proposition. In terms of the behavior mapping function,we decide the temporaloperator and generate a unary temporalformula, which nesta binary temporalformula.The temporaloperator of the binary temporalformula is U,the first element is the negation of atomic proposition,the second element is atomic proposition.If the sender of the message is limited by the timing constraint,then the constraint is mapped to the operator U.The delay intervalconstraintof the message is mapped to a formula thatconjuncts with the atomic proposition.The formaldescription is as follows.

    mapSingleMsgToCTL:SingleMsg→CTL

    Fig.3 Basic transformation rules

    Fig.3 shows the basic transformation rules which translate a single message into an ACTL formula.Fig.3(a) denotes that message and location are not limited by the timing constraint,and the temperature of the message is hot,so it is directly translated into an ACTL formula G((?m)Um).The hot temperature denotes the message must occur,thus we adopt the temporaloperator G to denote that atomic proposition always occurs.Fig.3(b)denotes that the location of the message sender would satisfy the timing constraint?,and then itcan be sent.Hence the ACTL formula is G((?m)U?m).In Fig.3(c),except the constraint on location,the message also needs to sa-tisfy the delay constraintΦ,so the TLSC is translated into G((?m)U?(m∧Φ).

    Fig.3(d)shows an ACTL formula translated from an asynchronous message.The temperature of the message is cold,and the sender is notlimited by the timing constraint, so the ACTL formula is F((?m)Um).The cold temperature denotes that the message maybe occur,so we adopt the temporal operator F to show that the atomic proposition will occur in the future.Fig.3(e)shows the timing constraint?on the sender location,so the ACTL formula is F((?m)U?m).Fig.3(f)also shows the delay constraint Φon the message thatshould be satisfied,so the translated resultis F((?m)U?(m∧Φ).

    4.2 Combination rules

    We have defined the basic transformation rules,but they can only refer to a single message and they cannot deal with the situation of multiple messages.Now we present the combination rules,which are divided into two kinds. One is to use logicalconnective to combine the basic transformation rules,the other is to combine the path quantifier with transformation rules.

    Lemma 1(proposition composability)Let TLSC=<I,Loc,E,C,δ,Mode,inv,μ>be a TLSCmodel,cutiis a state of the run r of the TLSC,φandψare ACTL formulas,then

    (i)if TLSC,cuti|=φand TLSC,cuti|=ψ,then TLSC,cuti|=φ∧ψ,T LSC,cuti|=φ∨ψ;

    (ii)if TLSC,cuti|=φand TLSC,cuti|=ψ,then TLSC,cuti|=φ→ψ.

    In the universalchart,allruns satisfy the given scenario. We give the combination rules,which are used to combine the ACTL formula corresponding with message in differentstates of runs.

    Rule 2(combination rule)Forthe two messages in the run r of the TLSC,they respectively correspond to a temporal logic formula.If the two messages are in the same sub chart,the relationship between formulas is logicalconjunction.If the two messages are in different sub charts, the relationship is logicalimplication.The mapping rule is described as follows:

    combineMsg ToCTL:Msg→CTL

    ?m1,m2:Msg·combineMsg ToCTL(m1,m2)=

    {ctl,ctl1,ctl2:CTL|ctl1=mapSingleMsg ToCTL (m1)∧ctl1=mapSingleMsg ToCTL(m2)

    if(type(m1)==type(m2)∧m2==succ(m1)) then ctl=ctl1∧ctl2∧φm1,m2

    if(type(m1)!=type(m2)∧type(m1)== pre-chart)then ctl=ctl1→ctl2}.

    The function type returns the type ofsub charts to which message belongs.

    Fig.4 shows an example of combination formulas.In Fig.4(a),the messages m and n satisfy n=succ(m).After the message m occurs,ifthe location of I2satisfies the timing constraint?,then the message n occurs.And according to the order property defined in Definition 7,the combination formula is

    In Fig.4(b),the message m occurs in the pre-chart.Satisfying the timing constraint?on the sender location,the message n occurs in the main-chart and also satisfies the delay constraintΦ.The combination formula is

    Fig.4 Combination formula oftwo messages

    If messages m and n in Fig.4(a)are all applied in the form of Fig.3(c),then the combined result is G((?m)∧(?n))U?1(m∧Φ1)∧(X?2(n∧Φ2)).As the message is the trace of the CUT sequence,in terms ofthe trace-based language,the ACTL formula of the universal chart is defined by

    Let Lpchand Lfchrespectively denote the trace-based language of the pre-chart and full chart,andφπdenote the ACTL formula of the sub chartwhereπis the trace of the CUT sequence.

    Lemma 2(path quantifier composability)

    Let TLSC=<I,Loc,E,C,δ,Mode,inv,μ>be a TLSC model,r is a run of TLSC,φis an ACTL formula, then

    The universalchartis used to denote the mandatory scenario.If the eventin the pre-chart is activated,there must be a response event in the main chart.Thus,the general ACTL formula of the universal chart is further described as follows:

    For the ACTL formulaφπofthe TLSC sub chart,ifthe temperature of the message is hot,then the ACTL formula is AGφ,which denotes thatφis true in all the achieved states of runs.If the temperature of the message is cold, then the ACTL formula is EFφ,and it denotes that there exists a run in whichφis true.

    Theorem 1Let T LSC=<I,Loc,E,C,δ,Mode, inv,μ>be a TLSC model,r is a run of the TLSC,rkis a sub run with the length k,φis an ACTL formula,then cut|=φiff cutk|=φ.

    ProofUsing induction

    Ifφ=AP,then T LSC,rk|=AP means AP∈L(rk), and in terms of the semantic of CTL,we have T LSC,r|= ~φ.

    Ifφ=γ∧ψ,then in terms of the Lemma 1, TLSC,rk|=γand T LSC,rk|=ψ.And in terms of the induction assumption,TLSC,r|=γand TLSC,r|=ψ, thatis TLSC,r|=γ∧ψ.

    Ifφ=γ∨ψ,then in terms of Lemma 1,TLSC,rk|=γ or TLSC,rk|=ψ.And in terms of the induction assumption,T LSC,r|=γor TLSC,r|=ψ,thatis TLSC,r|= γ∨ψ.

    For the temporaloperators,we consider in case of AG, φ=AGψ.

    In terms of Lemma 2,for?i?k,and TLSC,rki|=ψ, we have T LSC,cuti|=ψ.

    For?i>k,suppose that rk+1is a sub run of TLSCwith the length k+1,and rkis a path prefix of rk+1.Then there is a Path(cut0,v0)such that rk+1∈Path(cut0,v0)∧rk∈Path(cut0,v0).Then rk+1=rk∧cutk+1or rk+1= rk∨cutk+1.In terms ofthe induction assumption,TLSC, rk+1|=ψ.And in terms of Lemma 2,TLSC,r|=AGψ. ? Theorem 1 shows thatthe run of the TLSC satisfies the bounded semantic of the ACTL.That is,if the property holdsin bounded semantic,then itmusthold in CTL.Thus, the temporal logic formula extracting from the specification can be used to bounded modelchecking[30].

    5.Optimized formula

    In the practicalapplication,the major limitation is thatthe length ofthe temporallogic formula directly influences the verification efficiency.Even for the moderate sized LSC, its translated result grows large and it is also against the verification of model checking tools.If there are lots of concurrentoperations,itwillmake a higher costof formal verification[31].To improve the formalverification of the LSC,Klose et al.propose bonded and time bounded subclasses of the LSC to quickly check whetherthe modelsatisfies the requirements or not[2].Although this method is faster than LTL modelchecking,butless is powerful.In terms of the transformation from LSC to temporal logic, Kumar etal.presenta rigor method which uses logic minimization over the unitl(U)operator to improve the size of the formula,and reduce the verification time and state space[1].The size of the reduction formula is at most quadratic size of the chart.Based on the method,we make use of transitivity to redefine the time order property,and optimize the order formula transformed from the TLSC to reduce the size of the formula.

    Let p∈Msgp,m∈Msgmand e∈Msg respectively denote the messages in pre-chart,main-chartand fullchart. In terms of the transformation rules,we can translate the TLSC into the ACTL formula.We define the order property in Definition 7,and if the messages eiand ejsatisfy the partial relation ei/?ej,then the uniqueness property can be represented byχei,ej=(?ei∧?ej)U(ei∧X((?ei∧?ej)Uei))[1].This means that message eioccurs twice before ej.The ACTL formula can be defined by

    The above formula only contains the order property and the uniqueness property between messages,not considers the timing constraints.In addition,the sheersize ofthe formula effects the properties verification.Based on the formula,we add the timing constraints to optimize the formula.

    Lemma 3For a given execution traceπ=π0,π1,... and three messages eu,ev,et,and ev=succ(eu),et= succ(ev)

    Lemma 3 shows thatthe order properties between messages satisfy transitivity,and the relationship between timing constraints is logicalconjunction.The lemma reduces the order properties between two messages of a message sequence to the orderproperties between the head message and other messages,and can simplify the ACTL formula.

    Lemma 4For a message set N and a message ej,if?ei∈N and N={e|e∈succ(ej)},ej?ei,then the execution traceπ=π0,π1,...satisfies

    Lemma 4 shows if a message satisfies different timing constraints,then it would have several successors.Thus those successors would notoccuruntilitsatisfies the minimum timing constraint.

    According to Lemma 4,the order property defined in Definition 7 can be redefined by

    Forthe optimization ofthe uniquenessproperty,we only ought to establish the uniqueness formulas between each message of the sub chart and the final message[32],and we do not need to establish the uniqueness formulas between any two messages.

    According to Lemma 3,Lemma 4 and uniqueness optimized formulas[1],the ACTL formula can be optimized as pj=Maxp(ij)denotes the final message in instance ijof the pre-chart.mj=Maxm(ij)denotes the final message in instance ijof the main-chart.Finv+umjdenotes that the message mjwould occur in the end,whose timing constraintis the sum of timing constraintin the sender location and the time delay when the eventoccurs.

    Theorem 2Letφbe an ACTL formula,φ?be an optimized ACTL formula,ψbe an LTL formula.Then the execution traceπ=π0,π1,...satisfies

    (i)TLSC,π|=φiff TLSC,π|=φ?; (ii)φ??ψif fψcan be denoted asφ.

    ProofFor(i),by Lemma 3,Lemma 4 and uniqueness optimized formulas[1],itcan be proved.

    For(ii),according to the conclusion proposed by Clarke and Draghilescu[33]:a CTL formula is equivalent to an LTL formula,if and only if after removing the path quantifier,the CTL formula is also equivalent.Furthermore,Boja′nczyk[34]presented an algorithm to distinguish whetheran LTL formula can be denoted as an ACTL formula or not.?

    6.Case study

    We illustrate the use of the TLSC in the contextof an embedded software froma controlsystem.The aim is notonly to demonstrate the applicability of the TLSC to monitor the property of the software system,but also to translate the TLSC into ACTL formulas.We can achieve the liveness formula,safety formula and real time formula,then we analyze and verify the realtime formula.

    6.1 TLSC modeling

    The controlsoftware consists of sensor,database(DB),information processing(IP),equipmentcontrol(EC)and execution unit(EU).The DB module is used to store alldata in the system.The data are acquired by the sensor module, and then send to the IP module.The IP module is used to process the data,and send the result data to EC the module.The EC module could parse the result data,achieve the equipment control command,and send the command to EU the module.The EU module is used to execute the command and feed back the execution result.

    The real time requirements of the software system are thatthe onetime ofdata acquisition is no more than 1 s,and the delay time of data transmission is less than 2 s.The IP module requires thateach iteration processing time should be no more than 1 s.The ECmodule sends the command to the EU module within 2 s,and requires the feedback time from the EU module to be less than 5 s.Fig.5 shows the property requirements of the software system in terms of the TLSC.

    Fig.5 Requirements in TLSC

    6.2 Generation of temporalformula

    As the run of the TLSC is a CUT sequence,the property requirements of the software system can be achieved by the state transitions in the CUT sequence.In terms of the TLSC of the controlsoftware,we can getthe property which need to be verified,and require the design model to be consistent with requirement specification.In Fig.5, when the sensor module satisfies the timing constraint t<1,the software system executes the message send, sends the acquisition data to the IP module and requires the send timing constraint x<2.IP module receives the data and executesthe message process,then sends the processed data to EC and requires the processing timing constraint y<1,the send time is resetto 0.ECmodule parsesthe data and executes the message command,then sends the command to EUand requiresthe send timing constraint u<2,the iteration time of process is resetto 0.In terms ofthe proposed transformation rules,we can getthe ACTL formula:

    In terms of the optimized formula,the above ACTL formula can be optimized as follows:

    The formula describes the liveness property of the software system and requires that the software model should hold the property specification.Thatis,after the sensoracquired the data,EC module needs to send a command data within 4 s.

    In the Fig.5,sensor,IP,EC and EU respectively access the DBmodule underdifferenttiming constraints.Thus we can getthe ACTL formula of the safety property:

    That is,at any time no more than one module can access the database DB.

    Now we extract the ACTL formula from the whole TLSC.After the system sends the message start to the sensor,all the modules start work.And after one module sends its message to the other module,sensor,IP, EC,EU all send the message store.As the message store closely keeps up with the other message,it has no extra timing constraints.For reducing the complexity of the formula,we assume that the message store occurs with the othermessage atthe same time,so thatwe ignore the effect of the message store for the formula.The ACTL formula is as follows:

    From the above formula,we can deduce the real time property formula by

    AG denotes the property must be satisfied,and AF denotes the property will occur in the future.The real time formula shows that the software system starts sensor module,and the totaltime of receiving the feedback message is no more than 9 s.

    6.3 Result analysis

    For the real time property formula,we use the probabilistic symbolic model checker(PRISM)[35]to verify the property ofthe software design model.There are two property specification languages probabilistic CTL(PCTL)and LTL in PRISM,where the main difference between PCTL and CTL lies in the path quantifier.There are two path quantifiers A and E in CTL,while PCTL only uses the general path quantifier,to assign arbitrary probability to the path formula.Thus,the path quantifier in CTL can be denoted by the equivalent PCTL formula[36].For the furtherstudying probability in TLSC,we use PCTL in PRISM to describe the realtime property formula.

    From the real time property formula in the above section,after the software system starts the sensor,all the modules start run within 1 s,and the system receives the feedback within 9 s.We use the reward-based property to denote the formula AFt<9f eedback:

    For the given state of the software model,the formula can calculate the expected time values within 9 s reword.

    We extract specification formula from the TLSC of the control software,and use modeling and analysis of real time and embedded(MARTE)systems to establish the state transition model of the control software.Then we use PRISM language to respectively describe the specification and the model.We can verify that the above PCTL formula is true.The software design model is consistent with the real time property formula extracted from TLSC. From Table 1,the initialtransformation formula can reflect the real time requirements of the control software,but it takes longertime in modelverification.The size of the improving formula is smaller than the initialformula,and itsverification time is only 25%of the originalformula.The availability and efficiency have greatly increased than the originalformula.

    Table 1 Verification time s

    7.Conclusions

    How to accurately achieve the software requirement property and precisely signify the temporallogic formula from requirementspecification are importantcontents in model check.Extracting temporal logic formula from the LSC can solve the fault in specification expression caused by human error.There are severalresearches on transforming the LSC into the temporallogic formula,but they mainly focus on the safety property and the liveness property,but no research focuses on the automatically extracting time property.

    Based on the LSC,we introduce clock and timing constraints to describe the time-sensitive LSC,and give the formaldefinition of the TLSC and the trace-based semantic of the TLSC.For the transformation from the TLSC to ACTL,we consider the effect of the path quantifier, then study the transformation from the basic rules and the combination rules respectively.In the practical application,the main limitation of the translated ACTL formulas lies in the size.For reducing the formula size,we propose an optimization method for the translated formula,which can remarkable reduce the effect of the time property for the complexity of the formula.The case study shows that our method can availably extract ACTL formulas from the TLSC,meanwhile the optimized method can improve the verification time.Therefore,our method can be used to automatically extract specification from software requirements,and verify whether the design model is consistent with requirementspecification or not.

    [1]R.Kumar,E.G.Mercer,A.Bunker.Improving translation of live sequence chartsto temporallogic.Electronic Notes in TheoreticalComputer Science,2009,250(1):137–152.

    [2]J.Klose,T.Toben,B.Westphal,et al.Check it out:on the efficient formal verification of live sequence charts.Proc.of the 18th International Conference on Computer Aided Verification,2006:219–233.

    [3]E.M.Clarke,E.A.Emerson.Design and synthesis of synchronization skeletons using branching time temporal logic. Lecture Notes in Computer Science,2008,5000:196–215.

    [4]W.Chan,R.J.Anderson,P.Beame,et al.Model checking large software specifications.IEEE Trans.on Software Engineering,1998,24(7):498–520.

    [5]D.Lo,S.Maoz.Scenario-based and value-based specification mining:bettertogether.Automated Software Engineering, 2012,19(4):423–458.

    [6]S.Maoz.Polymorphic scenario-based specification models: semantics and applications.Software and Systems Modeling, 2012,11(3):327–345.

    [7]J.Sun,J.S.Dong.Modelchecking live sequence charts.Proc. of the 10th IEEE International Conference on Engineering of Complex Computer Systems,2005:529–538.

    [8]H.F.Guo,W.Zheng,M.Subramaniam.Consistency checking for LSC specifications.Proc.of the 3rd IEEE International Symposium on Theoretical Aspects of Software Engineering,2009:119–126.

    [9]A.Roychoudhury,A.Goel,B.Sengupta.Symbolic message sequence charts.ACM Trans.on Software Engineering and Methodology,2012,21(2):11–44.

    [10]H.Dan,R.MHierons,S.Counsell.A framework forpathologies of message sequence charts.Information and Software Technology,2012,54(11):1283–1295.

    [11]W.Damm,D.Harel.LSCs:breathing life into message sequence charts.FormalMethods in System Design,2001,19(1): 45–80.

    [12]R.Marelly,D.Harel,H.Kugler.Multiple instances and symbolic variables in executable sequence charts.Proc.of the 17th Annals ACM Conference on Object-oriented Programming, Systems,Language and Applications,2002:83–100.

    [13]D.Harel,I.Segall.Synthesis from scenario-based specifications.Journal ofComputer and System Sciences,2012,78(3): 970–980.

    [14]M.Chai,B.H.Schlingloff.Monitoring systems with extended live sequence charts.Proc.of the 5th International Conference on Runtime Verification,2014:48–63.

    [15]W.R.Li,Z.J.Wang,P.C.Zhang.Formalsemantics ofuniversalmodalsequence diagram.JournalofSoftware,2011,22(4): 659–675.(in Chinese)

    [16]H.F.Guo,W.Zheng,M.Subramaniam.L2C2:logic-based LSC consistency checking.Proc.of the 11th ACM SIGPLAN Conference on Principles and Practice of Declarative Programming,2009:183–194.

    [17]H.F.Guo,M.Subramaniam.Model-based testgeneration using extended symbolic grammars.International Journal on Software Tools for Technology Transfer,2014,16(4):437–455.

    [18]P.Combes,D.Harel,H.Kugler.Modeling and verification ofa telecommunication application using live sequence charts and the play-engine tool.Software and Systems Modeling,2008, 7(2):157–175.

    [19]Y.Bontemps,P.Heymans,H.Kugler.Applying LSCs to the specification of an air traffic control system.Proc.of the 2nd International Workshop on Scenarios and State Machines: Models,Algorithms,and Tools,2003:1–7.

    [20]J.Bohn,W.Damm,J.Klose,et al.Modeling and validating train system applications using statemate and live sequence charts.Proc.of the 6th Biennial World Conference on Integrated Design and Process Technology,2002:1–9.

    [21]W.Damm,T.Toben,B.Westphal.On the expressive power of live sequence charts.Lecture Notes in Computer Science, 2007,4444:225–246.

    [22]P.C.Zhang,W.R.Li,D.S.Wan,etal.Monitoring of probabilistic timed property sequence charts.Software:Practice and Experience,2011,41(7):841–866.

    [23]B.Cohen,S.Maoz.Semantically configurable analysis of scenario-based specifications.Proc.of the 17th International Conference on Fundamental Approaches to Software Engineering,2014:185–199.

    [24]W.R.Li,P.C.Zhang.On the semantics of scenario-based specification based on timed computationaltree logic.Proc.of the 22nd Australasian Conference on Software Engineering,2013:1–10.

    [25]P.C.Zhang,B.X.Li,L.Grunske.Timed property sequence chart.Journal of Systems and Software,2010,83(3):371–390.

    [26]L.Xu,W.Chen,Y.Y.Xu,et al.Improved bounded model checking for the universal fragment of CTL.Journal of Computer Science and Technology,2009,24(1):96–109.

    [27]Y.T.Dai,H.K.Miao,J.Mei,etal.Property extraction based on LSC modelchecking.JournalofShanghaiUniversity(NaturalScience),2012,18(2):156–162.(in Chinese)

    [28]W.H.Zhang.Bounded semantics of CTL and SAT-based verification.Proc.ofthe 11th International Conference on Formal Engineering Methods,2009:286–305.

    [29]A.Zbrzezny.A new translation from ECTL*to SAT.Fundamenta Informaticae,2012,120(3):375–395.

    [30]J.J.Yang,K.L.Su,X.Y.Luo,etal.Optimization ofbounded model checking.Journal of Software,2009,20(8):2005–2014.(in Chinese)

    [31]T.Toben,B.Westphal.Concurrent LSC verification:on decomposition properties of partially ordered symbolic automata.Electronic Notes in Theoretical Computer Science, 2006,145:95–111.

    [32]H.Kugler,D.Harel,A.Pnueli,et al.Temporal logic for scenario-based specifications.Proc.of the 11th International Conference on Tools and Algorithms for the Construction and Analysis ofSystems,2005:445–460.

    [33]E.M.Clarke,I.A.Draghicescu.Expressibility results for linear-time and branching-time logics.Lecture Notes in Computer Science,1989,354:428–437.

    [34]M.Boja′nczyk.The common fragment of ACTL and LTL. Proc.of the 11th International Conference on Foundations of Software Science and Computational Structures,2008:172–185.

    [35]M.Kwiatkowska,G.Norman,D.Parker.PRISM 4.0:verification of probabilistic real-time systems.Proc.of the 23rd International Conference on Computer Aided Verification,2011: 585–591.

    [36]H.Hansson,B.Jonsson.A logic for reasoning abouttime and reliability.Formal Aspects of Computing,1994,6(5):512–535.

    Biographies

    Haiyang Xuwas born in 1981.He received his B.S. degree in mathematics from the School of Mathematical Science,Shandong Normal University in 2003,and the M.S.degree in computer application technology from the School of Information Technology,Capital Normal University,in 2006.Since 2006,he has been a faculty member with School of Science and Information,Qingdao Agriculture University.He was as a lecturer since 2008.Currently he is pursuing his Ph.D.degree at Schoolof Computer Science and Technology,Nanjing University of Aeronautics and Astronautics.He is a member of China Computer Federation(CCF).His research interests include formalmethod,modeltransformation,and modelchecking.

    E-mail:xhy@nuaa.edu.cn

    Yi Zhuangwas born in 1955.She is currently a professor and Ph.D.supervisor of computer science in School of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics.Her research interests include distributed computation,information security,and trusted computing.

    E-mail:zy16@nuaa.edu.cn

    Jingjing Guwas born in 1983.She received her Ph.D.degree from School of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics.Now she is an associate professorof School of Computer Science and Technology at Nanjing University of Aeronautics and Astronautics.Her main research fields are data mining and wireless sensornetwork.

    E-mail:gujingjing@nuaa.edu.cn

    10.1109/JSEE.2015.00093

    Manuscript received June 25,2014.

    *Corresponding author.

    This work was supported by the National Natural Science Foundation of China(61202351),the China Postdoctoral Science Foundation (2011M500124),the Fundamental Research Funds for the Nanjing University ofAeronautics and Astronautics(NS2012133),and the Funding of Jiangsu Innovation Program for Graduate Education and the Fundamental Research Funds for the Central Universities(CXLX12 0161).

    午夜福利欧美成人| 18禁黄网站禁片午夜丰满| 日韩欧美在线二视频| 91九色精品人成在线观看| 亚洲中文字幕一区二区三区有码在线看 | 97超级碰碰碰精品色视频在线观看| 久久人妻av系列| 搞女人的毛片| 欧美av亚洲av综合av国产av| 日本a在线网址| av片东京热男人的天堂| 久久精品亚洲精品国产色婷小说| 村上凉子中文字幕在线| 叶爱在线成人免费视频播放| 性欧美人与动物交配| 91九色精品人成在线观看| 97碰自拍视频| 听说在线观看完整版免费高清| 日本一区二区免费在线视频| 看免费av毛片| 韩国精品一区二区三区| 露出奶头的视频| 国产真实乱freesex| 国产av一区在线观看免费| 欧美日韩瑟瑟在线播放| 国产成人系列免费观看| 男女视频在线观看网站免费 | 熟妇人妻久久中文字幕3abv| 搡老岳熟女国产| 嫩草影院精品99| 一进一出抽搐动态| 久久久久久久久中文| 999久久久国产精品视频| 天堂动漫精品| 热99re8久久精品国产| 免费观看精品视频网站| 午夜福利高清视频| 久久久久久大精品| 久久久久久亚洲精品国产蜜桃av| 国产亚洲精品av在线| www.自偷自拍.com| 久久人妻福利社区极品人妻图片| 欧美色欧美亚洲另类二区| 波多野结衣巨乳人妻| 国产精品综合久久久久久久免费| 91成年电影在线观看| 国产真实乱freesex| 免费在线观看日本一区| 韩国精品一区二区三区| 搡老妇女老女人老熟妇| 亚洲国产精品久久男人天堂| 国产亚洲精品久久久久久毛片| 久久精品国产亚洲av香蕉五月| 99久久无色码亚洲精品果冻| 亚洲天堂国产精品一区在线| 动漫黄色视频在线观看| 亚洲精品国产精品久久久不卡| 一级作爱视频免费观看| 日日夜夜操网爽| 悠悠久久av| 久久精品影院6| 一本一本综合久久| 亚洲国产欧美网| 久久久久亚洲av毛片大全| 黑丝袜美女国产一区| 欧美色欧美亚洲另类二区| 亚洲国产日韩欧美精品在线观看 | 色尼玛亚洲综合影院| 国产精品98久久久久久宅男小说| 亚洲av美国av| 国产成人av教育| 波多野结衣巨乳人妻| 人人妻,人人澡人人爽秒播| av天堂在线播放| 少妇被粗大的猛进出69影院| 天堂动漫精品| 成在线人永久免费视频| 51午夜福利影视在线观看| 国产亚洲av嫩草精品影院| 成人手机av| 国产日本99.免费观看| 日韩大尺度精品在线看网址| 精品卡一卡二卡四卡免费| av免费在线观看网站| 久久久久久九九精品二区国产 | 久久狼人影院| 深夜精品福利| 俄罗斯特黄特色一大片| 免费搜索国产男女视频| 18禁黄网站禁片午夜丰满| 精品国内亚洲2022精品成人| 欧美成人午夜精品| 啦啦啦免费观看视频1| 国产伦人伦偷精品视频| 亚洲国产中文字幕在线视频| 日韩中文字幕欧美一区二区| 老汉色av国产亚洲站长工具| 一级作爱视频免费观看| 不卡av一区二区三区| 美女大奶头视频| 成人午夜高清在线视频 | 男女做爰动态图高潮gif福利片| 18禁美女被吸乳视频| 欧美成人免费av一区二区三区| 老司机在亚洲福利影院| 亚洲久久久国产精品| 欧美黑人巨大hd| 国产精品永久免费网站| 悠悠久久av| or卡值多少钱| 十分钟在线观看高清视频www| 国产亚洲精品综合一区在线观看 | 国产av一区二区精品久久| 午夜福利在线在线| 欧美av亚洲av综合av国产av| 亚洲激情在线av| 成人三级黄色视频| 久久精品国产清高在天天线| a级毛片a级免费在线| 亚洲国产精品成人综合色| 国内精品久久久久久久电影| 久久久久精品国产欧美久久久| 久久精品国产综合久久久| 色老头精品视频在线观看| 日韩欧美国产一区二区入口| 日韩欧美一区二区三区在线观看| 美女高潮到喷水免费观看| 欧美日韩乱码在线| 99精品久久久久人妻精品| 久久午夜综合久久蜜桃| 成人永久免费在线观看视频| 悠悠久久av| 亚洲成av片中文字幕在线观看| 久久久久九九精品影院| 一区二区三区国产精品乱码| avwww免费| a级毛片在线看网站| 男女那种视频在线观看| 久久国产乱子伦精品免费另类| 两个人视频免费观看高清| 色尼玛亚洲综合影院| 麻豆久久精品国产亚洲av| a级毛片a级免费在线| 欧美成人免费av一区二区三区| 在线观看免费视频日本深夜| 香蕉丝袜av| 午夜久久久在线观看| 精品国产亚洲在线| 久久久久久大精品| 制服人妻中文乱码| 久久国产乱子伦精品免费另类| 亚洲五月天丁香| 人人澡人人妻人| www.自偷自拍.com| 母亲3免费完整高清在线观看| 精品第一国产精品| 日韩免费av在线播放| 听说在线观看完整版免费高清| 欧美另类亚洲清纯唯美| 大型黄色视频在线免费观看| 日本 欧美在线| 亚洲欧美日韩高清在线视频| 国产又爽黄色视频| 后天国语完整版免费观看| 精品高清国产在线一区| 啦啦啦免费观看视频1| 嫁个100分男人电影在线观看| 99国产精品99久久久久| 国产高清激情床上av| 久久午夜亚洲精品久久| 韩国av一区二区三区四区| 国产精品香港三级国产av潘金莲| 久久香蕉激情| 老熟妇乱子伦视频在线观看| 成在线人永久免费视频| 夜夜躁狠狠躁天天躁| 午夜免费成人在线视频| 国产亚洲av嫩草精品影院| 久久久久免费精品人妻一区二区 | 免费在线观看黄色视频的| 国产伦在线观看视频一区| 国产精品香港三级国产av潘金莲| 午夜老司机福利片| 成人特级黄色片久久久久久久| a级毛片a级免费在线| 午夜福利成人在线免费观看| 伊人久久大香线蕉亚洲五| cao死你这个sao货| 看黄色毛片网站| 精品国产一区二区三区四区第35| 美女 人体艺术 gogo| 免费无遮挡裸体视频| 国产一区二区激情短视频| 色av中文字幕| 一区二区三区高清视频在线| 一个人观看的视频www高清免费观看 | 精品国产美女av久久久久小说| 女性生殖器流出的白浆| 亚洲片人在线观看| 制服丝袜大香蕉在线| 国产v大片淫在线免费观看| 精品人妻1区二区| 黄片小视频在线播放| 最近最新免费中文字幕在线| av片东京热男人的天堂| 午夜日韩欧美国产| 免费看a级黄色片| 亚洲精品粉嫩美女一区| 桃红色精品国产亚洲av| 国产人伦9x9x在线观看| 亚洲自偷自拍图片 自拍| 2021天堂中文幕一二区在线观 | 午夜福利成人在线免费观看| 欧美绝顶高潮抽搐喷水| 久久人人精品亚洲av| 亚洲性夜色夜夜综合| 99久久精品国产亚洲精品| 看黄色毛片网站| 国产三级在线视频| 又大又爽又粗| 老司机深夜福利视频在线观看| 岛国视频午夜一区免费看| 欧美黄色淫秽网站| 韩国精品一区二区三区| 真人一进一出gif抽搐免费| 超碰成人久久| or卡值多少钱| xxx96com| 男女做爰动态图高潮gif福利片| 热99re8久久精品国产| 久久国产精品影院| 18禁美女被吸乳视频| 啦啦啦韩国在线观看视频| 亚洲片人在线观看| 老司机午夜福利在线观看视频| 亚洲中文字幕一区二区三区有码在线看 | 免费看a级黄色片| 午夜福利视频1000在线观看| 少妇熟女aⅴ在线视频| 亚洲熟妇熟女久久| 日本一本二区三区精品| 久久婷婷人人爽人人干人人爱| 无人区码免费观看不卡| 999久久久精品免费观看国产| 狠狠狠狠99中文字幕| 亚洲av中文字字幕乱码综合 | 看黄色毛片网站| 91麻豆精品激情在线观看国产| xxxwww97欧美| 精品一区二区三区视频在线观看免费| 久久天躁狠狠躁夜夜2o2o| 久久精品国产综合久久久| 久久久久久久久久黄片| 校园春色视频在线观看| 久久久久久免费高清国产稀缺| 亚洲欧美日韩无卡精品| 亚洲午夜精品一区,二区,三区| 亚洲国产欧美日韩在线播放| 亚洲国产看品久久| 成在线人永久免费视频| 成年人黄色毛片网站| 日本三级黄在线观看| 国产亚洲av高清不卡| 久久中文看片网| 午夜免费激情av| 亚洲人成网站高清观看| 成人av一区二区三区在线看| 欧美激情高清一区二区三区| 老司机福利观看| 手机成人av网站| 久久99热这里只有精品18| 在线观看午夜福利视频| 久久热在线av| 亚洲中文字幕一区二区三区有码在线看 | 大香蕉久久成人网| 怎么达到女性高潮| 亚洲精品一区av在线观看| 亚洲五月婷婷丁香| 国产精品99久久99久久久不卡| 日韩视频一区二区在线观看| 看黄色毛片网站| 亚洲久久久国产精品| 日本在线视频免费播放| 欧美黑人精品巨大| 老司机福利观看| 人人妻人人澡欧美一区二区| 日本一区二区免费在线视频| ponron亚洲| 成人手机av| 国产精品免费视频内射| 母亲3免费完整高清在线观看| 国产成+人综合+亚洲专区| 国产黄a三级三级三级人| 丰满人妻熟妇乱又伦精品不卡| 一级a爱片免费观看的视频| 国产成人一区二区三区免费视频网站| 999久久久国产精品视频| 亚洲五月婷婷丁香| 一级a爱视频在线免费观看| 俄罗斯特黄特色一大片| 国产熟女xx| 99在线人妻在线中文字幕| 午夜久久久久精精品| 男人舔女人下体高潮全视频| 一卡2卡三卡四卡精品乱码亚洲| 亚洲真实伦在线观看| 在线观看免费午夜福利视频| 黄色 视频免费看| 国产成人影院久久av| 国产精品国产高清国产av| 欧美日韩亚洲综合一区二区三区_| 成人欧美大片| 亚洲熟妇熟女久久| 一级毛片精品| 国产三级黄色录像| 一级毛片精品| 色综合站精品国产| 看黄色毛片网站| 亚洲精品国产精品久久久不卡| 两个人看的免费小视频| 深夜精品福利| 怎么达到女性高潮| www.999成人在线观看| 久久国产精品人妻蜜桃| 婷婷六月久久综合丁香| √禁漫天堂资源中文www| 久久国产精品男人的天堂亚洲| 日韩一卡2卡3卡4卡2021年| 好男人电影高清在线观看| 久久香蕉激情| 国内少妇人妻偷人精品xxx网站 | 久久性视频一级片| 国产99白浆流出| 午夜免费激情av| 一级黄色大片毛片| 日韩大码丰满熟妇| 熟女电影av网| 亚洲成av人片免费观看| 欧美日韩黄片免| 久久精品成人免费网站| 国产精品免费视频内射| 日韩高清综合在线| 国产99白浆流出| 国产色视频综合| 亚洲电影在线观看av| 又大又爽又粗| 精品不卡国产一区二区三区| 视频在线观看一区二区三区| 黄网站色视频无遮挡免费观看| 久久精品成人免费网站| 国产亚洲精品av在线| 国产一卡二卡三卡精品| 久久精品人妻少妇| 亚洲第一青青草原| 国产精品美女特级片免费视频播放器 | 欧美丝袜亚洲另类 | 精品国产美女av久久久久小说| 日韩有码中文字幕| 白带黄色成豆腐渣| 女生性感内裤真人,穿戴方法视频| 成熟少妇高潮喷水视频| 国产成人欧美| 狠狠狠狠99中文字幕| 成人欧美大片| 久久精品国产亚洲av香蕉五月| 国产麻豆成人av免费视频| 亚洲色图av天堂| 91成年电影在线观看| 精品久久久久久久久久久久久 | 国产成人精品久久二区二区91| 亚洲精品av麻豆狂野| 日本 av在线| 精品欧美国产一区二区三| 亚洲熟女毛片儿| 国产亚洲av嫩草精品影院| 动漫黄色视频在线观看| 欧美日韩一级在线毛片| av中文乱码字幕在线| 97超级碰碰碰精品色视频在线观看| av天堂在线播放| 日韩一卡2卡3卡4卡2021年| 免费看a级黄色片| 成人国语在线视频| avwww免费| 久久伊人香网站| 日韩欧美一区二区三区在线观看| 男女那种视频在线观看| 国产欧美日韩精品亚洲av| 精品国内亚洲2022精品成人| or卡值多少钱| 天天一区二区日本电影三级| 国产精品久久久久久人妻精品电影| 女性被躁到高潮视频| 亚洲黑人精品在线| 欧美成人午夜精品| 午夜精品在线福利| 欧美+亚洲+日韩+国产| 中文字幕精品亚洲无线码一区 | 精品熟女少妇八av免费久了| 神马国产精品三级电影在线观看 | 超碰成人久久| 精品久久久久久久末码| 国产一区二区三区视频了| 国产真实乱freesex| 男人舔女人的私密视频| 亚洲一区高清亚洲精品| 午夜a级毛片| 黄色丝袜av网址大全| 99热只有精品国产| 看片在线看免费视频| a级毛片a级免费在线| 搡老熟女国产l中国老女人| 欧美日韩乱码在线| 国产精品免费视频内射| 欧美色视频一区免费| 久久久久久人人人人人| 久久久久久亚洲精品国产蜜桃av| 日本 av在线| 国产aⅴ精品一区二区三区波| 亚洲久久久国产精品| 看片在线看免费视频| av在线天堂中文字幕| 在线十欧美十亚洲十日本专区| 亚洲国产精品成人综合色| 久久国产精品影院| 麻豆成人午夜福利视频| 久久久久亚洲av毛片大全| www国产在线视频色| 中文字幕人成人乱码亚洲影| 中文在线观看免费www的网站 | 1024手机看黄色片| 男人舔奶头视频| www国产在线视频色| 草草在线视频免费看| 久久久久久久久免费视频了| 淫秽高清视频在线观看| www日本在线高清视频| 亚洲欧美一区二区三区黑人| 精品高清国产在线一区| 欧美中文综合在线视频| 丝袜在线中文字幕| a级毛片在线看网站| 天天一区二区日本电影三级| 制服丝袜大香蕉在线| 99久久99久久久精品蜜桃| 97人妻精品一区二区三区麻豆 | 国产伦人伦偷精品视频| 正在播放国产对白刺激| 男女午夜视频在线观看| 日韩有码中文字幕| 999久久久精品免费观看国产| 亚洲精华国产精华精| 少妇熟女aⅴ在线视频| 俄罗斯特黄特色一大片| 精品久久久久久久人妻蜜臀av| 国产精品一区二区三区四区久久 | 国产精品亚洲一级av第二区| 夜夜爽天天搞| 少妇熟女aⅴ在线视频| 日韩欧美免费精品| 看黄色毛片网站| 欧美另类亚洲清纯唯美| 久久精品国产亚洲av香蕉五月| 精品久久久久久久久久免费视频| 久久久精品欧美日韩精品| 色老头精品视频在线观看| 午夜福利视频1000在线观看| 人人妻,人人澡人人爽秒播| 国产亚洲欧美精品永久| 黄片小视频在线播放| 麻豆一二三区av精品| а√天堂www在线а√下载| 亚洲专区国产一区二区| 欧美日韩福利视频一区二区| 无遮挡黄片免费观看| 在线播放国产精品三级| 琪琪午夜伦伦电影理论片6080| 超碰成人久久| 久久性视频一级片| 2021天堂中文幕一二区在线观 | 国产黄a三级三级三级人| 国产成+人综合+亚洲专区| 欧美成人一区二区免费高清观看 | 中文亚洲av片在线观看爽| 国产av又大| 国产野战对白在线观看| 一本精品99久久精品77| videosex国产| 婷婷亚洲欧美| 中文字幕人妻熟女乱码| 巨乳人妻的诱惑在线观看| 国产人伦9x9x在线观看| 精品久久久久久久毛片微露脸| 亚洲av五月六月丁香网| 欧美日韩一级在线毛片| 亚洲国产看品久久| 国产99久久九九免费精品| 国产亚洲精品久久久久5区| 日本成人三级电影网站| 99久久国产精品久久久| 欧美黑人精品巨大| 久久国产亚洲av麻豆专区| 亚洲av熟女| 动漫黄色视频在线观看| 最新在线观看一区二区三区| 精品国产美女av久久久久小说| 一级毛片高清免费大全| 亚洲国产欧美一区二区综合| 大型黄色视频在线免费观看| 欧美中文综合在线视频| 久久久久久久午夜电影| 精品福利观看| 精品熟女少妇八av免费久了| 国产精品香港三级国产av潘金莲| 日日夜夜操网爽| 最近最新中文字幕大全免费视频| 丝袜在线中文字幕| 成人亚洲精品av一区二区| 亚洲精品美女久久av网站| 欧美性长视频在线观看| 国产欧美日韩一区二区精品| www日本黄色视频网| 人妻丰满熟妇av一区二区三区| 少妇裸体淫交视频免费看高清 | 中文字幕最新亚洲高清| 麻豆一二三区av精品| 亚洲精品美女久久av网站| 午夜免费鲁丝| 久久精品影院6| 啦啦啦韩国在线观看视频| 黄色视频不卡| 国产精品亚洲一级av第二区| 99riav亚洲国产免费| 国产午夜福利久久久久久| 欧美色视频一区免费| 国产精品综合久久久久久久免费| 在线观看免费午夜福利视频| 嫩草影视91久久| av片东京热男人的天堂| 美女大奶头视频| 欧美日韩亚洲国产一区二区在线观看| 久久精品夜夜夜夜夜久久蜜豆 | 亚洲精品久久国产高清桃花| 亚洲国产高清在线一区二区三 | 亚洲午夜理论影院| av在线天堂中文字幕| 无限看片的www在线观看| 18禁美女被吸乳视频| 成人特级黄色片久久久久久久| 十分钟在线观看高清视频www| 久久精品aⅴ一区二区三区四区| 欧美久久黑人一区二区| 久久精品影院6| 日韩有码中文字幕| 免费在线观看视频国产中文字幕亚洲| 久久久精品欧美日韩精品| 日日夜夜操网爽| 国产黄a三级三级三级人| 免费一级毛片在线播放高清视频| 免费电影在线观看免费观看| 啦啦啦观看免费观看视频高清| 久久久久久久午夜电影| 亚洲国产日韩欧美精品在线观看 | 日韩高清综合在线| 身体一侧抽搐| 午夜激情福利司机影院| 村上凉子中文字幕在线| 一卡2卡三卡四卡精品乱码亚洲| 精品国产美女av久久久久小说| 高潮久久久久久久久久久不卡| 女性生殖器流出的白浆| 中文字幕精品免费在线观看视频| 国产精品久久久久久人妻精品电影| 国产亚洲精品久久久久久毛片| 亚洲一卡2卡3卡4卡5卡精品中文| 韩国精品一区二区三区| 欧美中文日本在线观看视频| 日韩欧美一区视频在线观看| 欧美久久黑人一区二区| 欧美日韩中文字幕国产精品一区二区三区| 色综合婷婷激情| 国产精品自产拍在线观看55亚洲| 搞女人的毛片| 91av网站免费观看| 国产乱人伦免费视频| 99精品久久久久人妻精品| 国产精品久久久av美女十八| 九色国产91popny在线| 欧美性猛交黑人性爽| 欧美精品啪啪一区二区三区| 中亚洲国语对白在线视频| 国产爱豆传媒在线观看 | 国产国语露脸激情在线看| 此物有八面人人有两片| 久久久久国产一级毛片高清牌| 男女做爰动态图高潮gif福利片| 最新美女视频免费是黄的| av有码第一页| 国产成+人综合+亚洲专区| 亚洲五月天丁香| 国产一区二区三区视频了| 很黄的视频免费| av在线播放免费不卡| 我的亚洲天堂| 日韩视频一区二区在线观看| 曰老女人黄片| 午夜精品在线福利| 免费看a级黄色片| svipshipincom国产片| 哪里可以看免费的av片| 在线观看舔阴道视频| 中亚洲国语对白在线视频| 日韩欧美 国产精品| 少妇的丰满在线观看| 国产精品,欧美在线|