technical reportIn explicit state (enumerative) model checking, state vectors are often represented in a compressed form in order to reduce storage needs, typically employing fingerprints, bithashes, or state signatures. When using this kind of techniques, it could happen that the compressed image of a nonvisited state s matches that of a visited state s0 6= s, thus s and potentially many of its descendants are omitted from search. If any of these omitted states was an error state, we could also have false positives. We present a new technique which reduces the number of omitted states, by requiring a slightly higher computation time, but without employing any additional memory. Our technique works for depth-first search based stat...
AbstractWe study explicit techniques for detection of safety errors, e.g., depth-first search, direc...
State space exploration is a basic solution to many verification problems, but is limited by time an...
A hash chain H for a hash function hash(.) is a sequence of hash values , where x(0) is a secret val...
. We present and analyze a probabilistic method for verification by explicit state enumeration, whic...
AbstractAlthough computationaly neglegdible in other domains, the hashing of states can become one o...
In the past few years, General Purpose Graphics Processors (GPUs) have been used to significantly sp...
technical reportIndustrial cache coherence protocol models often have too many reachable states, pre...
Abstract. The ComBack method is a memory reduction technique for explicit state space search algorit...
We present the implementation of Grover\u27s algorithm in a quantum simulator to perform a quantum s...
Bloom Filters are a technique to reduce the effects of conflicts/ interference in hash table-like st...
AbstractWe explore the use of distributed processing to enhance the performance of explicit state en...
Journal ArticleWe investigate techniques for reducing the memory requirements of a model checking to...
In this paper, we propose a novel bipartite entanglement purification protocol built upon hashing an...
Journal ArticleWe present an enumerative model-checker PV that uses a new partial order reduction al...
Modern query engines rely heavily on hash tables for query processing. Overall query performance and...
AbstractWe study explicit techniques for detection of safety errors, e.g., depth-first search, direc...
State space exploration is a basic solution to many verification problems, but is limited by time an...
A hash chain H for a hash function hash(.) is a sequence of hash values , where x(0) is a secret val...
. We present and analyze a probabilistic method for verification by explicit state enumeration, whic...
AbstractAlthough computationaly neglegdible in other domains, the hashing of states can become one o...
In the past few years, General Purpose Graphics Processors (GPUs) have been used to significantly sp...
technical reportIndustrial cache coherence protocol models often have too many reachable states, pre...
Abstract. The ComBack method is a memory reduction technique for explicit state space search algorit...
We present the implementation of Grover\u27s algorithm in a quantum simulator to perform a quantum s...
Bloom Filters are a technique to reduce the effects of conflicts/ interference in hash table-like st...
AbstractWe explore the use of distributed processing to enhance the performance of explicit state en...
Journal ArticleWe investigate techniques for reducing the memory requirements of a model checking to...
In this paper, we propose a novel bipartite entanglement purification protocol built upon hashing an...
Journal ArticleWe present an enumerative model-checker PV that uses a new partial order reduction al...
Modern query engines rely heavily on hash tables for query processing. Overall query performance and...
AbstractWe study explicit techniques for detection of safety errors, e.g., depth-first search, direc...
State space exploration is a basic solution to many verification problems, but is limited by time an...
A hash chain H for a hash function hash(.) is a sequence of hash values , where x(0) is a secret val...