• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 591
Next 10 →

Verification of Automata-Based Programs

by Evgeny Kurbatsky - Proc. Sec. Spring Young Researchers Colloquium Software Engineering , 2008
"... Abstract—this paper describes a verification method of au-tomata based programs [1] based on symbolic model checking algorithms [2]. Author makes an attempt to develop verification method that can automate process of verification and can be useful for peoples unacquainted with model checking algorit ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—this paper describes a verification method of au-tomata based programs [1] based on symbolic model checking algorithms [2]. Author makes an attempt to develop verification method that can automate process of verification and can be useful for peoples unacquainted with model checking

Combining the Sweep-Line Method with the use of an External-memory Priority Queue ⋆

by Sami Evangelista, Lars Michael Kristensen
"... Abstract. The sweep-line method is an explicit-state model checking technique that uses a notion of progress to delete states from internal memory during state space exploration and thereby reduce peak memory usage. The sweep-line algorithm relies on the use of a priority queue where the progress va ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract. The sweep-line method is an explicit-state model checking technique that uses a notion of progress to delete states from internal memory during state space exploration and thereby reduce peak memory usage. The sweep-line algorithm relies on the use of a priority queue where the progress

Automata-based Computation of Temporal Equilibrium Models

by Pedro Cabalar, Stéphane Demri
"... Temporal Equilibrium Logic (TEL) is a formalism for temporal logic programming that generalizes the paradigm of Answer Set Programming (ASP) introducing modal temporal operators from standard Linear-time Temporal Logic (LTL). In this paper we solve some open problems that remained open for TEL like ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
like decidability, complexity assessment and computation of temporal equilibrium models for arbitrary theories. We propose a method for the latter that consists in building a Büchi automaton that accepts exactly the temporal equilibrium models of a given theory, providing an automata-based decision

Hyperdocuments as Automata: Verification of Trace-based Browsing Properties by Model Checking

by P. David Stotts, Richard Furuta, J. Cyrano Ruiz , 1997
"... As hypertext systems proliferate and as networks become more ubiquitous, an important problem is to determine how to provide hyperdocument interoperability. Instead of taking the approach of standardizing, and implementing, a large and complex set of browsing features gleaned from some "union&q ..."
Abstract - Cited by 33 (3 self) - Add to MetaCart
;union" of existing systems, we present an approach that allows each document to encode its own browsing semantics in the links of the hyperdocument. Any implementation offering the "follow link" operation can then simulate the intent of the author. The method requires a mental shift in how a hyperdocument

Model Checking of Workflow Schemas

by C. Karamanolis, D. Giannakopoulou, J. Magee, S. M. Wheater - In Proc. IEEE EDOC 2000 , 2000
"... Practical experience indicates that the definition of realworld workflow applications is a complex and error-prone process. Existing workflow management systems provide the means, in the best case, for very primitive syntactic verification, which is not enough to guarantee the overall correctness an ..."
Abstract - Cited by 26 (1 self) - Add to MetaCart
and robustness of workflow applications. The paper presents an approach for formal verification of workflow schemas (definitions). Workflow behaviour is modelled by means of an automata-based method, which facilitates exhaustive compositional reachability analysis. The workflow behaviour can then be analysed

SAT-based reachability checking for timed automata with diagonal constraints. Fundamenta Informaticae

by Andrzej Zbrzezny - Fund. Informaticae , 2005
"... Abstract. Reachability analysis for timed automata using SAT-based methods was considered in many papers, occurring to be a very efficient model checking technique. In this paper we show how to apply this method of verification to timed automata with discrete data, i.e., to standard timed automata a ..."
Abstract - Cited by 24 (12 self) - Add to MetaCart
Abstract. Reachability analysis for timed automata using SAT-based methods was considered in many papers, occurring to be a very efficient model checking technique. In this paper we show how to apply this method of verification to timed automata with discrete data, i.e., to standard timed automata

Beyond lassos: Complete SMT-based bounded model checking for timed automata

by Roland Kindermann , Tommi Junttila , Ilkka Niemelä - In Formal Techniques for Distributed Systems , 2012
"... Abstract. Timed automata (TAs) are a common formalism for modeling timed systems. Bounded model checking (BMC) is a verification method that searches for runs violating a property using a SAT or SMT solver. Previous SMT-based BMC approaches for TAs search for finite counter-examples and infinite la ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. Timed automata (TAs) are a common formalism for modeling timed systems. Bounded model checking (BMC) is a verification method that searches for runs violating a property using a SAT or SMT solver. Previous SMT-based BMC approaches for TAs search for finite counter-examples and infinite

Completeness and Complexity of Bounded Model Checking

by Edmund Clarke, Daniel Kroening, Joël Ouaknine, Ofer Strichman , 2004
"... For every finite model M and an LTL property #, there exists a number CT (the Completeness Threshold) such that if there is no counterexample to # in M of length or less, then M #. Finding this number, if it is sufficiently small, offers a practical method for making Bounded Model Checking ..."
Abstract - Cited by 40 (4 self) - Add to MetaCart
Checking complete. We describe how to compute an over-approximation to for a general LTL property using Büchi automata, following the Vardi-Wolper LTL model checking framework. Based on

IOS Press SAT-Based Reachability Checking for Timed Automata with Discrete Data∗

by Andrzej Zbrzezny
"... Abstract. Reachability analysis for timed automata using SAT-based methods was considered in many papers, occurring to be a very efficient model checking technique. In this paper we show how to apply this method of verification to timed automata with discrete data, i.e., to standard timed automata a ..."
Abstract - Add to MetaCart
Abstract. Reachability analysis for timed automata using SAT-based methods was considered in many papers, occurring to be a very efficient model checking technique. In this paper we show how to apply this method of verification to timed automata with discrete data, i.e., to standard timed automata

Abstract Regular Tree Model Checking with Nondeterministic Automata

by Lukáš Holík , 2011
"... Abstract regular tree model checking is an infinite state system verification method that is based on representing possibly infinite sets of states by tree automata. The method was originally defined over deterministic tree automata, involving expensive determinisation steps many times within a sing ..."
Abstract - Add to MetaCart
Abstract regular tree model checking is an infinite state system verification method that is based on representing possibly infinite sets of states by tree automata. The method was originally defined over deterministic tree automata, involving expensive determinisation steps many times within a
Next 10 →
Results 1 - 10 of 591
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University