• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,186
Next 10 →

State Explosion

by Maarten De Rijke, Stefan Schlobach, Maarten De Rijke, Stefan Schlobach, Maarten De Rijke, Stefan Schlobach, Maarten De Rijke, Stefan Schlobach, Maarten De Rijke, Stefan Schlobach , 2002
"... ◮ But Satisfiability preserving / Unsatisfiability preserving is not the same Maarten de Rijke & Stefan Schlobach 4 Reminder: Resolution for First Order Logic ◮ Let ClSet ∗ (ϕ) be the smallest set containing ClSet(ϕ) and clause under the (RES) and (FAC) rules: (RES) Cl1∪{N}∈ClSet ∗ (ϕ) Cl2∪{¬M}∈ ..."
Abstract - Add to MetaCart
◮ But Satisfiability preserving / Unsatisfiability preserving is not the same Maarten de Rijke & Stefan Schlobach 4 Reminder: Resolution for First Order Logic ◮ Let ClSet ∗ (ϕ) be the smallest set containing ClSet(ϕ) and clause under the (RES) and (FAC) rules: (RES) Cl1∪{N}∈ClSet ∗ (ϕ) Cl2∪{¬M}∈ClSet ∗ (ϕ) (Cl1∪Cl2)θ∈ClSet ∗ (ϕ) (F AC)

Partial-Order Methods for the Verification of Concurrent Systems - An Approach to the State-Explosion Problem

by Patrice Godefroid , 1995
"... State-space exploration techniques are increasingly being used for debugging and proving correct finite-state concurrent reactive systems. The reason for this success is mainly the simplicity of these techniques. Indeed, they are easy to understand, easy to implement and, last but not least, easy to ..."
Abstract - Cited by 368 (12 self) - Add to MetaCart
State-space exploration techniques are increasingly being used for debugging and proving correct finite-state concurrent reactive systems. The reason for this success is mainly the simplicity of these techniques. Indeed, they are easy to understand, easy to implement and, last but not least, easy

Trace Theory and State Explosion

by M. W. Mislove
"... Trace theory is a method for modeling concurrency in which concurrent computation is supported explicitly, rather than relying on sequential composition, nondeterminism and interleaving. The state explosion problem arises in model-checking because of the plethora of states that can arise in the inte ..."
Abstract - Add to MetaCart
Trace theory is a method for modeling concurrency in which concurrent computation is supported explicitly, rather than relying on sequential composition, nondeterminism and interleaving. The state explosion problem arises in model-checking because of the plethora of states that can arise

Fighting the State Explosion Problem in Component Protocols

by Viliam Holub, Advisor Prof, Viliam Holub
"... Title: Fighting the state explosion problem in component protocols ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Title: Fighting the state explosion problem in component protocols

Attacking Symbolic State Explosion

by Giorgio Delzanno, Jean-François Raskin, Laurent Van Begin
"... We propose a new symbolic model checking algorithm for parameterized concurrent systems modeled as (Lossy) Petri Nets, and (Lossy) Vector Addition Systems, based on the following ingredients: a rich assertional language based on the graph-based symbolic representation of upward-closed sets introduce ..."
Abstract - Cited by 16 (7 self) - Add to MetaCart
, MC99], and we compare the results with other finite and infinite-state verification tools.

Model Checking and the State Explosion Problem

by Edmund M. Clarke, William Klieber, Paolo Zuliani, et al.
"... Model checking is an automatic verification technique for concurrent systems that are finite state or have finite state abstractions. It has been used successfully to verify computer hardware, and it is beginning to be used to verify computer software as well. As the number of state variables in t ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
in the system increases, the size of the system state space grows exponentially. This is called the “state explosion problem”. Much of the research in model checking over the past 30 years has involved developing techniques for dealing with this problem. In these lecture notes, we will explain how the basic

Controlling State Explosion in Reachability Analysis

by Wei Jen Yeh , 1993
"... : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : x 1. INTRODUCTION : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 2. BACKGROUND : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 4 2.1 Dynamic Analysis of Concurrent Systems : : : : : : : : : : : : ..."
Abstract - Cited by 14 (2 self) - Add to MetaCart
: : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : x 1. INTRODUCTION : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 2. BACKGROUND : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 4 2.1 Dynamic Analysis of Concurrent Systems : : : : : : : : : : : : : : : : 5 2.2 Static Analysis. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 5 2.2.1 Theorem Proving : : : : : : : : : : : : : : : : : : : : : : : : : 6 2.2.2 Reachability Analysis : : : : : : : : : : : : : : : : : : : : : : : 7 2.2.3 Model Checking : : : : : : : : : : : : : : : : : : : : : : : : : : 9 2.3 Process Algebra : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 11 3. COMPOSITIONAL ANALYSIS USING PROCESS ALGEBRA : : : : : : 18 3.1 Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 18 3.1.1 Reachability Analysis : : : : : : : : : : : : : : : : : : : : : : : 18 3.1.2 Process Algebra : : : : : : : : : : : : : : : : : : : : : : : : : : 19...

Techniques to Tackle State Explosion in Global Predicate Detection

by Sridhar Alagar, Subbarayan Venkatesan, Ieee Computer Society - IEEE Transactions on Software Engineering , 2001
"... AbstractÐGlobal predicate detection, which is an important problem in testing and debugging distributed programs, is very hard due to the combinatorial explosion of the global state space. This paper presents several techniques to tackle the state explosion problem in detecting whether an arbitrary ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
AbstractÐGlobal predicate detection, which is an important problem in testing and debugging distributed programs, is very hard due to the combinatorial explosion of the global state space. This paper presents several techniques to tackle the state explosion problem in detecting whether an arbitrary

Progress on the State Explosion Problem in Model Checking

by Edmund Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, Helmut Veith , 2000
"... Model checking is an automatic verification technique for finite state concurrent systems. In this approach to verification, temporal logic specifications are checked by an exhaustive search of the state space of the concurrent system. Since the size of the state space grows exponentially with th ..."
Abstract - Cited by 27 (1 self) - Add to MetaCart
with the number of processes, model checking techniques based on explicit state enumeration can only handle relatively small examples. This phenomenon is commonly called the "State Explosion Problem". Over the past ten years considerable progress has been made on this problem by (1) representing

Correctness of Model-based Component Compositionwithout State Explosion

by Paul C. Attie, David H. Lorenz
"... Abstract. We present a methodology for designing component-based systemsand verifying their temporal behavior properties. Our verification method is mostly automatic, and is not susceptible to the well-known state-explosion problem,which has hitherto severely limited the practical applicability of a ..."
Abstract - Add to MetaCart
Abstract. We present a methodology for designing component-based systemsand verifying their temporal behavior properties. Our verification method is mostly automatic, and is not susceptible to the well-known state-explosion problem,which has hitherto severely limited the practical applicability
Next 10 →
Results 1 - 10 of 3,186
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University