. Assume-guarantee reasoning has long been advertised as the method for decomposing proof obligations in system verification. Refinement mappings (homomorphisms) have long been advertised as the method for solving the language-inclusion problem in practice. When confronted with large verification problems, we therefore attempted to make use of both techniques. We soon found that rather than offering instant solutions, the success of assume-guarantee reasoning depends critically on the construction of suitable abstraction modules, and the success of refinement checking depends critically on the construction of suitable witness modules. Moreover, as abstractions need to be witnessed, and witnesses abstracted, the process must be iterated. We ...
The construction of a high-assurance system requires some evidence, ideally a proof, that the system...
Abstract. We present a compositional verification technique for sys-tems that exhibit both probabili...
Circular assume-guarantee reasoning is used for the compositional verification of concurrent systems...
Finite-state verification techniques are often hampered by the state-explosion problem. One proposed...
Software systems are taking on an increasingly important role in society and are being used in criti...
Assume-guarantee reasoning enables a “divide-and-conquer” approach to the verification of large syst...
A truly secure protocol is one which never violates its security requirements, no matter how bizarre...
Finite-state verification techniques are often hampered by the stateexplosion problem. One proposed ...
Finite-state verification techniques are often hampered by the state-explosion problem. One proposed...
Finite-state verification techniques are often hampered by the state-explosion problem. One proposed...
We show how game semantics, counterexample-guided abstraction refinement, assume-guarantee reasoning...
Abstract. We show how game semantics, counterexample-guided abstraction refinement, assume-guarantee...
Abstract. A truly secure protocol is one which never violates its se-curity requirements, no matter ...
Abstract. We show how game semantics, counterexample-guided ab-straction refinement, assume-guarante...
Verifying system specifications using traditional model-checking techniques rapidly becomes infeasib...
The construction of a high-assurance system requires some evidence, ideally a proof, that the system...
Abstract. We present a compositional verification technique for sys-tems that exhibit both probabili...
Circular assume-guarantee reasoning is used for the compositional verification of concurrent systems...
Finite-state verification techniques are often hampered by the state-explosion problem. One proposed...
Software systems are taking on an increasingly important role in society and are being used in criti...
Assume-guarantee reasoning enables a “divide-and-conquer” approach to the verification of large syst...
A truly secure protocol is one which never violates its security requirements, no matter how bizarre...
Finite-state verification techniques are often hampered by the stateexplosion problem. One proposed ...
Finite-state verification techniques are often hampered by the state-explosion problem. One proposed...
Finite-state verification techniques are often hampered by the state-explosion problem. One proposed...
We show how game semantics, counterexample-guided abstraction refinement, assume-guarantee reasoning...
Abstract. We show how game semantics, counterexample-guided abstraction refinement, assume-guarantee...
Abstract. A truly secure protocol is one which never violates its se-curity requirements, no matter ...
Abstract. We show how game semantics, counterexample-guided ab-straction refinement, assume-guarante...
Verifying system specifications using traditional model-checking techniques rapidly becomes infeasib...
The construction of a high-assurance system requires some evidence, ideally a proof, that the system...
Abstract. We present a compositional verification technique for sys-tems that exhibit both probabili...
Circular assume-guarantee reasoning is used for the compositional verification of concurrent systems...