technical reportMany complex concurrent protocols that cannot be formally verified due to state explosion can often be formally verified by initially creating a collection of abstractions (overapproximations), and subsequently refining the overapproximated protocol in response to spurious counterexample traces. Such an approach crucially depends on the ability to check whether a given error trace in the abstract protocol corresponds to a concrete trace in the original protocol. Unfortunately, this checking step alone can be as as hard verifying the original protocol directly without abstractions, which is infeasible. Our approach tracks the interface behavior at the interfaces erected by our abstractions, and employs a few heuristic ...
Journal ArticleThis paper presents a method to address state explosion in timed circuit verificatio...
The success of model checking is largely based on its ability to efficiently locate errors in softwa...
The success of model checking is largely based on its ability to efficiently locate errors in softwa...
technical reportModern chip multiprocessor (CMP) cache coherence protocols are extremely complex an...
textTraditional approaches for eliminating errors in concurrent and distributed programs include fo...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
technical reportIndustrial cache coherence protocol models often have too many reachable states, pre...
<p>The correctness of a cache coherence protocol is crucial to the system since a subtle bug in the ...
Verifying concurrent programs is notoriously hard due to the state explosion problem: (1) the data s...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
With the maturing of computer-aided verification technology, there is an emerging opportunity to dev...
Explicit state model checking techniques suffer from the state explosion problem [7]. Interfaces [6,...
Concurrent systems are getting more complex with the advent of multi-core processors and the support...
The current trend of multi-core and multi-processor computing is causing a paradigm shift from inher...
To increase the probability of computers communicating reliably with one another, protocol implement...
Journal ArticleThis paper presents a method to address state explosion in timed circuit verificatio...
The success of model checking is largely based on its ability to efficiently locate errors in softwa...
The success of model checking is largely based on its ability to efficiently locate errors in softwa...
technical reportModern chip multiprocessor (CMP) cache coherence protocols are extremely complex an...
textTraditional approaches for eliminating errors in concurrent and distributed programs include fo...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
technical reportIndustrial cache coherence protocol models often have too many reachable states, pre...
<p>The correctness of a cache coherence protocol is crucial to the system since a subtle bug in the ...
Verifying concurrent programs is notoriously hard due to the state explosion problem: (1) the data s...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
With the maturing of computer-aided verification technology, there is an emerging opportunity to dev...
Explicit state model checking techniques suffer from the state explosion problem [7]. Interfaces [6,...
Concurrent systems are getting more complex with the advent of multi-core processors and the support...
The current trend of multi-core and multi-processor computing is causing a paradigm shift from inher...
To increase the probability of computers communicating reliably with one another, protocol implement...
Journal ArticleThis paper presents a method to address state explosion in timed circuit verificatio...
The success of model checking is largely based on its ability to efficiently locate errors in softwa...
The success of model checking is largely based on its ability to efficiently locate errors in softwa...