We say a program is data-independent with respect to a data type X if the operations it can perform on values of type X are restricted to just equality testing, although the system may also input, store and move around (via assignment) values of type X within its variables. This property can be exploited to give procedures for the automatic verification, called model checking, of such programs independently of the instance for the type X. This thesis considers data-independent programs with arrays, which are useful for modelling memory systems such as cache protocols. The main question of interest is the following parameterised model-checking problem: whether a program satisfies its specification for all non-empty finite instances of its ty...
This paper presents our results in study of verifiaction of infinite state space systems. We deal mo...
Perhaps the most difficult aspect of designing a shared memory multiprocessor is the hardware protoc...
Abstract-State-of-the-art hardware model checkers and equivalence checkers rely upon a diversity of ...
We say a program is data-independent with respect to a data type X if the operations it can perform ...
We consider programs which are data independent with respect to two type variables X and Y, and can ...
We say a program is data-independent with respect to a data type X if the operations it can perform...
For programs whose data variables range over Boolean or finite domains, program verification is deci...
Abstract. We aim at checking safety and temporal properties over models repre-senting the behavior o...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
In recent times, satisfiability modulo theories (SMT) techniques gained increasing attention and obt...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...
Abstract. We present a technique for automatically verifying safety properties of concurrent program...
Computers have brought us inestimable convenience in recent years. We have become dependent on them ...
Model checking is an automated technique for deciding whether a computer program satisfies a tempora...
This paper presents our results in study of verifiaction of infinite state space systems. We deal mo...
Perhaps the most difficult aspect of designing a shared memory multiprocessor is the hardware protoc...
Abstract-State-of-the-art hardware model checkers and equivalence checkers rely upon a diversity of ...
We say a program is data-independent with respect to a data type X if the operations it can perform ...
We consider programs which are data independent with respect to two type variables X and Y, and can ...
We say a program is data-independent with respect to a data type X if the operations it can perform...
For programs whose data variables range over Boolean or finite domains, program verification is deci...
Abstract. We aim at checking safety and temporal properties over models repre-senting the behavior o...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
In recent times, satisfiability modulo theories (SMT) techniques gained increasing attention and obt...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...
Abstract. We present a technique for automatically verifying safety properties of concurrent program...
Computers have brought us inestimable convenience in recent years. We have become dependent on them ...
Model checking is an automated technique for deciding whether a computer program satisfies a tempora...
This paper presents our results in study of verifiaction of infinite state space systems. We deal mo...
Perhaps the most difficult aspect of designing a shared memory multiprocessor is the hardware protoc...
Abstract-State-of-the-art hardware model checkers and equivalence checkers rely upon a diversity of ...