The analysis of programs by the exhaustive inspection of reachable states in a finite state graph is a well-understood procedure It is actually implemented in several industrial tools but one of their main limitations is the size of the memory needed to exhaustively build the state graphs of the programs. For numerous properties such as Buchi acceptance (in the deterministic case) and behavioral equivalence, it is not necessary to explicitly build this graph and an exhaustive depth--first traversal is often sufficient. In order to avoid retraversing states, it is however important to store in memory some of the already visited states and randomly replace them (to keep the memory size bounded and avoid a performance falling down) In most cas...
Abstract. Well-structured transition systems (WSTS) are a broad and well-studied class of infinite-s...
Reachability analysis is an attractive technique for analysis of concurrent programs because it is s...
A variety of largely automated methods have been proposed for finite-state verification of software ...
In this paper we show that statistical properties of the transition graph of a system to be verified...
Abstract. We report on recent progress in the study of infinite transition systems for which interes...
In this paper we present a new method for computing the approximate reached state set of a finite st...
Most successful automated formal verification tools are based on a bit-level model of computation, w...
Most successful automated formal verification tools are based on a bit-level model of computation, w...
Most successful automated formal verification tools arebased on a bit-level model of computation, wh...
State space exploration of finite state machines is used to prove properties about sequential behavi...
State space exploration is often used to prove properties about sequential behavior of Finite State ...
Automatic formal verification methods for finite-state systems, also known as model-checking, succes...
Model checkers use automated state exploration in order to prove various properties such as reach-ab...
peer reviewedThis paper addresses the problem of designing memory efficient algorithms for the verif...
Modern digital systems often employ sophisticated protocols. Unfortunately, designing correct protoc...
Abstract. Well-structured transition systems (WSTS) are a broad and well-studied class of infinite-s...
Reachability analysis is an attractive technique for analysis of concurrent programs because it is s...
A variety of largely automated methods have been proposed for finite-state verification of software ...
In this paper we show that statistical properties of the transition graph of a system to be verified...
Abstract. We report on recent progress in the study of infinite transition systems for which interes...
In this paper we present a new method for computing the approximate reached state set of a finite st...
Most successful automated formal verification tools are based on a bit-level model of computation, w...
Most successful automated formal verification tools are based on a bit-level model of computation, w...
Most successful automated formal verification tools arebased on a bit-level model of computation, wh...
State space exploration of finite state machines is used to prove properties about sequential behavi...
State space exploration is often used to prove properties about sequential behavior of Finite State ...
Automatic formal verification methods for finite-state systems, also known as model-checking, succes...
Model checkers use automated state exploration in order to prove various properties such as reach-ab...
peer reviewedThis paper addresses the problem of designing memory efficient algorithms for the verif...
Modern digital systems often employ sophisticated protocols. Unfortunately, designing correct protoc...
Abstract. Well-structured transition systems (WSTS) are a broad and well-studied class of infinite-s...
Reachability analysis is an attractive technique for analysis of concurrent programs because it is s...
A variety of largely automated methods have been proposed for finite-state verification of software ...