Results 1  10
of
26
Relations in Concurrency
"... The theme of this paper is profunctors, and their centrality and ubiquity in understanding concurrent computation. Profunctors (a.k.a. distributors, or bimodules) are a generalisation of relations to categories. Here they are first presented and motivated via spans of event structures, and the seman ..."
Abstract

Cited by 263 (33 self)
 Add to MetaCart
The theme of this paper is profunctors, and their centrality and ubiquity in understanding concurrent computation. Profunctors (a.k.a. distributors, or bimodules) are a generalisation of relations to categories. Here they are first presented and motivated via spans of event structures, and the semantics of nondeterministic dataflow. Profunctors are shown to play a key role in relating models for concurrency and to support an interpretation as higherorder processes (where input and output may be processes). Two recent directions of research are described. One is concerned with a language and computational interpretation for profunctors. This addresses the duality between input and output in profunctors. The other is to investigate general spans of event structures (the spans can be viewed as special profunctors) to give causal semantics to higherorder processes. For this it is useful to generalise event structures to allow events which “persist.”
Symbolic Verification with Periodic Sets
, 1994
"... Symbolic approaches attack the state explosion problem by introducing implicit representations that allow the simultaneous manipulation of large sets of states. The most commonly used representation in this context is the Binary Decision Diagram (BDD). This paper takes the point of view that other s ..."
Abstract

Cited by 73 (6 self)
 Add to MetaCart
Symbolic approaches attack the state explosion problem by introducing implicit representations that allow the simultaneous manipulation of large sets of states. The most commonly used representation in this context is the Binary Decision Diagram (BDD). This paper takes the point of view that other structures than BDD's can be useful for representing sets of values, and that combining implicit and explicit representations can be fruitful. It introduces a representation of complex periodic sets of integer values, shows how this representation can be manipulated, and describes its application to the statespace exploration of protocols. Preliminary experimental results indicate that the method can dramatically reduce the resources required for statespace exploration.
Bounded Model Checking for the Universal Fragment of CTL
, 2002
"... Bounded Model Checking (BMC) has been recently introduced as an efficient verification method for reactive systems. BMC based on SAT methods consists in searching for a counterexample of a particular length and generating a propositional formula that is satisfiable iff such a counterexample exist ..."
Abstract

Cited by 42 (22 self)
 Add to MetaCart
Bounded Model Checking (BMC) has been recently introduced as an efficient verification method for reactive systems. BMC based on SAT methods consists in searching for a counterexample of a particular length and generating a propositional formula that is satisfiable iff such a counterexample exists. This new technique has been introduced by E. Clarke et al. for model checking of linear time temporal logic (LTL). Our paper shows how the concept of bounded model checking can be extended to ACTL (the universal fragment of CTL). The implementation of the algorithm for Elementary Net Systems is described together with the experimental results.
On the Stubborn Set Method in Reduced State Space Generation
, 1998
"... Reachability analysis is a powerful formal method for analysis of concurrent and distributed finite state systems. It suffers from the state space explosion problem, however, i.e. the state space of a system can be far too large to be completely generated. This thesis is concentrated on the applicat ..."
Abstract

Cited by 14 (4 self)
 Add to MetaCart
Reachability analysis is a powerful formal method for analysis of concurrent and distributed finite state systems. It suffers from the state space explosion problem, however, i.e. the state space of a system can be far too large to be completely generated. This thesis is concentrated on the application and theory of the stubborn set method which is one of the methods that try to relieve the state space explosion problem. A central topic in the thesis is the verification of nexttimeless LTL (linear time temporal logic) formulas. It is shown how the structure of a formula can be utilized when there is no fairness assumption. Another central topic is the basic problem how stubborn sets should be computed in order to get the best possible result w.r.t. the total time and space consumed in the state search. An algorithm for computing cardinality minimal or almost cardinality minimal (w.r.t. the number of enabled transitions) stubborn sets is presented, together with experiments that indi...
Automatic abstraction for model checking software systems with interrelated numeric constraints
 In Proceedings of the 9th ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE9
, 2001
"... Model checking techniques have not been effective in important classes of software systems characterized by large (or infinite) input domains with interrelated linear and nonlinear constraints over the input variables. Various model abstraction techniques have been proposed to address this problem. ..."
Abstract

Cited by 8 (5 self)
 Add to MetaCart
Model checking techniques have not been effective in important classes of software systems characterized by large (or infinite) input domains with interrelated linear and nonlinear constraints over the input variables. Various model abstraction techniques have been proposed to address this problem. In this paper, we wish to propose domain abstraction based on data equivalence and trajectory reduction as an alternative and complement to other abstraction techniques. Our technique applies the abstraction to the input domain (environment) instead of the model and is applicable to constraintfree and deterministic constrained data transition system. Our technique is automatable with some minor restrictions.
Abstractions and Partial Order Reductions for Checking Branching Properties of Time Petri Nets
, 2001
"... The paper deals with verification of untimed branching time properties of Time Petri Nets. The atomic variant of the geometric region method for preserving properties of CTL and ACTL is improved. Then, it is shown, for the first time, how to apply the partial order reduction method to deal with next ..."
Abstract

Cited by 8 (3 self)
 Add to MetaCart
The paper deals with verification of untimed branching time properties of Time Petri Nets. The atomic variant of the geometric region method for preserving properties of CTL and ACTL is improved. Then, it is shown, for the first time, how to apply the partial order reduction method to deal with nexttime free branching properties of Time Petri Nets. The above two results are combined offering an efficient method for model checking of ACTL X and CTL X properties of Time Petri Nets.
Relating InterAgent and IntraAgent Specifications (The Case of Live Sequence Charts
, 2005
"... The problem of relating interagent and intraagent behavioral specifications is investigated. These two views are complimentary, in that the former is closer to scenariobased user requirements whereas the latter is designoriented. We use a graphical, userfriendly and very simple language as inte ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
The problem of relating interagent and intraagent behavioral specifications is investigated. These two views are complimentary, in that the former is closer to scenariobased user requirements whereas the latter is designoriented. We use a graphical, userfriendly and very simple language as interagent specification language: Live Sequence Charts (LSC). LSC is presented and its properties are investigated: it is highly succinct, but inexpressive. There are essentially two ways to relate interagent and intraagent specifications: (i) by checking that an intraagent specification is correct with respect to some LSC specification and (ii) by automatically constructing an intraagent specification from an LSC specification. Several variants of these problems exist: closed/open systems and centralized/distributed systems. We give inefficient but optimal algorithms solving all problems, besides synthesis of open distributed systems, which we show is undecidable. All the problems considered are difficult, even for a very restricted subset of LSCs, without alternatives, interleaving, conditions
Partial Order Simulation of SDL Specifications
, 1995
"... this paper. However, the benefits of partial order simulation methods for SDL ..."
Abstract

Cited by 6 (5 self)
 Add to MetaCart
this paper. However, the benefits of partial order simulation methods for SDL
On combining the Persistent Sets Method with the Covering Steps Graph Method
, 2002
"... Concurrent systems are commonly verified after computing a state graph describing all possible behaviors. Unfortunately, this state graph is often too large to be effectively built. Partialorder techniques have been developped to avoid combinatorial explosion while preserving the properties of inte ..."
Abstract

Cited by 5 (2 self)
 Add to MetaCart
Concurrent systems are commonly verified after computing a state graph describing all possible behaviors. Unfortunately, this state graph is often too large to be effectively built. Partialorder techniques have been developped to avoid combinatorial explosion while preserving the properties of interest. This paper investigates the combination of two of such approaches, Persistent sets and Covering Steps, and proposes partial enumeration algorithms that cumulate their respective benefits.
Formal Verification of Concurrent Programs Based on Type Theory
, 1998
"... Interactive theorem proving provides a general approach to modeling and verification of both finitestate and infinitestate systems but requires significant human efforts to deal with many tedious proofs. On the other hand, modelchecking is limited to some application domain with small finitestate ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
Interactive theorem proving provides a general approach to modeling and verification of both finitestate and infinitestate systems but requires significant human efforts to deal with many tedious proofs. On the other hand, modelchecking is limited to some application domain with small finitestate space. A natural thought for this problem is to integrate these two approaches. To keep the consistency of the integration and ensure the correctness of verification, we suggest to use type theory based theorem provers (e.g. Lego) as the platform for the integration and build a modelchecker to do parts of the verification automatically. We formalise a verification system of both CCS and an imperative language in the proof development system Lego which can be used to verify both finitestate and infinitestate problems. Then a modelchecker, LegoMC, is implemented to generate Lego proof terms for finitestate problems automatically. Therefore people can use Lego to verify a general problem ...