Journal ArticleWe investigate techniques for reducing the memory requirements of a model checking tool employing explicit enumeration. Two techniques are studied in depth: (1) exploiting symmetries in the model, and (2) exploiting sequential regions in the model. The first technique resulted in a significant reduction in memory requirements at the expense of an increase in run time. It is capable of finding progress violations at much lower stack depths. In addition, it is more general than two previously published methods to exploit symmetries, namely scalar sets and network invariants. The second technique comes with no time overheads and can effect significant memory usage reductions directly related to the amount of sequentiality in th...
Formal methods have an unprecedented ability to endorse the correctness of a system. In spite of tha...
Formal methods have an unprecedented ability to en-dorse the correctness of a system. In spite of th...
Modern digital systems often employ sophisticated protocols. Unfortunately, designing correct protoc...
We investigate techniques for reducing the memory requirements of a model checking tool employing ex...
Automatic formal verification methods for finite-state systems, also known as model-checking, succes...
Model checking is a successful method for checking properties on the state space of concurrent, reac...
Concurrency in data structures is crucial to the performance of multithreaded programs in shared-mem...
International audienceThis paper investigates the combined use of abstraction and probabilistic lear...
AbstractEffective model-checking of modern object-oriented software systems requires providing suppo...
Abstract—Constraints represent a key component of state-of-the-art verification tools based on compo...
Abstract—Many designs intermingle large memories with wide data paths and nontrivial control. Verify...
Model checking (Baier and Katoen in Principles of model checking, MIT Press, Cambridge, 2008; Clarke...
Model checking is a successful method for checking properties on the state space of concurrent, reac...
The increasing availability of information technology in today’s life is a challenge for users as we...
textThe main bottleneck in practical symbolic model checking is that it is restricted by the abilit...
Formal methods have an unprecedented ability to endorse the correctness of a system. In spite of tha...
Formal methods have an unprecedented ability to en-dorse the correctness of a system. In spite of th...
Modern digital systems often employ sophisticated protocols. Unfortunately, designing correct protoc...
We investigate techniques for reducing the memory requirements of a model checking tool employing ex...
Automatic formal verification methods for finite-state systems, also known as model-checking, succes...
Model checking is a successful method for checking properties on the state space of concurrent, reac...
Concurrency in data structures is crucial to the performance of multithreaded programs in shared-mem...
International audienceThis paper investigates the combined use of abstraction and probabilistic lear...
AbstractEffective model-checking of modern object-oriented software systems requires providing suppo...
Abstract—Constraints represent a key component of state-of-the-art verification tools based on compo...
Abstract—Many designs intermingle large memories with wide data paths and nontrivial control. Verify...
Model checking (Baier and Katoen in Principles of model checking, MIT Press, Cambridge, 2008; Clarke...
Model checking is a successful method for checking properties on the state space of concurrent, reac...
The increasing availability of information technology in today’s life is a challenge for users as we...
textThe main bottleneck in practical symbolic model checking is that it is restricted by the abilit...
Formal methods have an unprecedented ability to endorse the correctness of a system. In spite of tha...
Formal methods have an unprecedented ability to en-dorse the correctness of a system. In spite of th...
Modern digital systems often employ sophisticated protocols. Unfortunately, designing correct protoc...