Results 1  10
of
14
Compositional Reachability Analysis Using Process Algebra
 IN PROCEEDINGS OF THE SYMPOSIUM ON TESTING, ANALYSIS, AND VERIFICATION (TAV4
, 1991
"... State explosion is the primary obstacle to practical application of reachability analysis techniques for concurrent systems. State explosion can be substantially controlled by using process algebra to achieve compositional (divideandconquer) analysis. A prototype tool incorporating process algebra ..."
Abstract

Cited by 59 (3 self)
 Add to MetaCart
State explosion is the primary obstacle to practical application of reachability analysis techniques for concurrent systems. State explosion can be substantially controlled by using process algebra to achieve compositional (divideandconquer) analysis. A prototype tool incorporating process algebra is described. The promise and problems of the approach are illustrated by applying the tool to an example that incorporates the alternating bit protocol as a module.
Fair testing
 Concur ’95: Concurrency Theory, volume 962 of Lecture Notes in Computer Science
, 1995
"... In this paper we present a solution to the longstanding problem of characterising the coarsest livenesspreserving precongruence with respect to a full (TCSPinspired) process algebra. In fact, we present two distinct characterisations, which give rise to the same relation: an operational one base ..."
Abstract

Cited by 58 (0 self)
 Add to MetaCart
In this paper we present a solution to the longstanding problem of characterising the coarsest livenesspreserving precongruence with respect to a full (TCSPinspired) process algebra. In fact, we present two distinct characterisations, which give rise to the same relation: an operational one based on a De NicolaHennessylike testing modality which we call shouldtesting, and a denotational one based on a refined notion of failures. One of the distinguishing characteristics of the shouldtesting precongruence is that it abstracts from divergences in the same way as Milner’s observation congruence, and as a consequence is strictly coarser than observation congruence. In other words, shouldtesting has a builtin fairness assumption. This is in itself a property long soughtafter; it is in notable contrast to the wellknown musttesting of De Nicola and Hennessy (denotationally characterised by a combination of failures and divergences), which treats divergence as catrastrophic and hence is incompatible with observation congruence. Due to these characteristics, shouldtesting supports modular reasoning and allows to use the proof techniques of observation congruence, but also supports additional laws and techniques.
Deciding Bisimulation Equivalences for a Class of NonFiniteState Programs
, 1991
"... Traditionally, many automatic program verification techniques are applicable only to finitestate programs. In this paper we extend some of these techniques to a class of infinitestate programs that, in addition to having a finitestate control component, may read, store, and write but not perfo ..."
Abstract

Cited by 37 (9 self)
 Add to MetaCart
Traditionally, many automatic program verification techniques are applicable only to finitestate programs. In this paper we extend some of these techniques to a class of infinitestate programs that, in addition to having a finitestate control component, may read, store, and write but not perform any other computations on data. Such programs are dataindependent in the sense that their behavior does not depend on the actual data values supplied. We consider the problems of deciding strong equivalence and observation equivalence, defined by bisimulations (as in CCS), between such programs. These equivalences have major applications in verification of communication protocols. We present reductions of these problems to the problem of deciding strong equivalence and observation equivalence between finitestate programs, for which polynomial time algorithms exist. The equivalence problems on dataindependent programs are shown to be NPhard in the size of the programs. 4 1 I...
Compositional Minimization of Finite State Systems
 IN PROC. 2ND INTERNATIONAL CONFERENCE OF COMPUTERAIDED VERIFICATION
, 1991
"... In this paper we develop a compositional method for the construction of the minimal transition system that represents the semantics of a given reactive system. The point of this method is that it exploits structural properties of the reactive system in order to avoid the consideration of large inter ..."
Abstract

Cited by 36 (0 self)
 Add to MetaCart
In this paper we develop a compositional method for the construction of the minimal transition system that represents the semantics of a given reactive system. The point of this method is that it exploits structural properties of the reactive system in order to avoid the consideration of large intermediate representations. Central is the use of interface specifications here, which express constraints on the components' communication behaviour, and therefore to control the state explosion caused by the interleavings of actions of communicating parallel components. The effect of the method, which is developed for bisimulation semantics here, depends on the structure of the reactive system under consideration, in particular on the accuracy of the interface specifications. However, its correctness does not: every "successful" construction is guaranteed to yield the desired minimal transition system, independently of the correctness of the interface specifications provided by the designer.
The Use of Static Constructs in A Modal Process Logic
, 1989
"... this paper we want to demonstrate that  from a practical ..."
Abstract

Cited by 24 (12 self)
 Add to MetaCart
this paper we want to demonstrate that  from a practical
Controlling State Explosion in Reachability Analysis
, 1993
"... : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : x 1. INTRODUCTION : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 2. BACKGROUND : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 4 2.1 Dynamic Analysis of Concurrent Systems : : : : : : : : : : : : ..."
Abstract

Cited by 14 (2 self)
 Add to MetaCart
: : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : x 1. INTRODUCTION : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 2. BACKGROUND : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 4 2.1 Dynamic Analysis of Concurrent Systems : : : : : : : : : : : : : : : : 5 2.2 Static Analysis. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 5 2.2.1 Theorem Proving : : : : : : : : : : : : : : : : : : : : : : : : : 6 2.2.2 Reachability Analysis : : : : : : : : : : : : : : : : : : : : : : : 7 2.2.3 Model Checking : : : : : : : : : : : : : : : : : : : : : : : : : : 9 2.3 Process Algebra : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 11 3. COMPOSITIONAL ANALYSIS USING PROCESS ALGEBRA : : : : : : 18 3.1 Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 18 3.1.1 Reachability Analysis : : : : : : : : : : : : : : : : : : : : : : : 18 3.1.2 Process Algebra : : : : : : : : : : : : : : : : : : : : : : : : : : 19...
An Integrated Method for Effective Behaviour Analysis of Distributed Systems
 in Proc. 16th IEEE International Conference on Software Engineering (ICSE16
, 1994
"... Behaviour analysis is a valuable aid for the design and maintenance of wellbehaved distributed systems. Dataflow and reachability analyses are two orthogonal but complementary behaviour analysis techniques. Individually, each of these techniques may be inadequate for the analysis of largescale dis ..."
Abstract

Cited by 13 (7 self)
 Add to MetaCart
Behaviour analysis is a valuable aid for the design and maintenance of wellbehaved distributed systems. Dataflow and reachability analyses are two orthogonal but complementary behaviour analysis techniques. Individually, each of these techniques may be inadequate for the analysis of largescale distributed systems. On the one hand, dataflow analysis algorithms, while tractable, may not be sufficiently accurate to provide meaningful detection of errors. On the other hand, reachability analysis, while providing exhaustive analysis, may be computationally too expensive for complex systems. In this paper, we present a method which integrates a dataflow and a reachability analysis technique to provide a flexible and effective means for analysing distributed systems at preliminary and final design stages respectively. We also describe some effective measures taken to improve the adequacy of the individual analysis techniques using concepts of action dependency and context constraints. A pro...
Applications of Fair Testing
, 1996
"... In this paper we present the application of the fair testing preorder , introduced in a previous paper, to the specification and analysis of distributed systems. This preorder combines some features of the standard testing preorders, viz. the possibility to refine a specification by the resolutio ..."
Abstract

Cited by 6 (1 self)
 Add to MetaCart
In this paper we present the application of the fair testing preorder , introduced in a previous paper, to the specification and analysis of distributed systems. This preorder combines some features of the standard testing preorders, viz. the possibility to refine a specification by the resolution of nondeterminism, with a powerful feature of standard observation congruence, viz. the fair abstraction from divergences. Moreover, it is a precongruence with respect to all standard processalgebraic combinators, thus allowing for the standard algebraic proof techniques by substitution and rewriting. In this paper we will demonstrate advantages of the fair testing preorder by the application to a number of examples, including a scheduling problem, a version of the Alternating Bitprotocol, and fair communication channels. Keywords FDTapplication; verification, validation and testing; process algebras; fairness. 1 INTRODUCTION In the past decade, the specification and analysis of dis...
Contextual Local Analysis for Design of Distributed Systems
, 1995
"... Compositional Reachability Analysis is a popular technique for studying behaviour of finitestate distributed systems. The technique is applied by a repetition of local analyses, the basic steps to construct and examine the behaviour of subsystems. In most cases, behaviour of the subsystem is constra ..."
Abstract

Cited by 4 (1 self)
 Add to MetaCart
Compositional Reachability Analysis is a popular technique for studying behaviour of finitestate distributed systems. The technique is applied by a repetition of local analyses, the basic steps to construct and examine the behaviour of subsystems. In most cases, behaviour of the subsystem is constrained by its environment (called context) formed by neighbouring components. These behaviour constraints are normally not considered when using local analysis in conventional techniques of compositional reachability analysis. As a result, many execution paths derived in the local analysis may not be actually traversed by the subsystem. These paths are made impossible to traverse by the constraints. The paths are unnecessary for understanding the subsystem behaviour and their removal greatly simplify the local analysis. In this paper, we describe an elegant technique, called contextual local analysis, to include these behaviour constraints in conventional local analysis. The technique can alle...