The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compositional reachability analysis (CRA) is a promising automated technique which can be used in stages to derive the overall behaviour of a distributed program based on its architecture. CRA is particularly suitable for the analysis of programs which are subject to evolutionary change. When a program evolves, only behaviours of those subsystems affected by the change need be re-evaluated. The technique however has a limitation. The properties available for analysis are constrained by the set of actions that remain globally observable. The liveness properties of subsys...
Abstract. We present a new method for proving liveness and termination prop-erties for fair concurre...
Automatic verification of cyber-physical systems (CPS) typically involves computing the reachable se...
Modern software model checkers find safety violations: breaches where the system has entered some ba...
The software architecture of a distributed program can be represented by a hierarchical composition ...
Software verification is a so tedious process that only trivial system can be handled manually. So a...
The software architecture of a distributed system can be described as a hierarchical composition of ...
The software architecture of a distributed system can be described as a hierarchical composition of ...
Behaviour analysis of complex distributed systems has led to the search for enhanced reachability an...
The need for modularity in the behaviour analysis of concurrent systems has been answered successful...
Behaviour analysis of complex concurrent systems has led to the search for enhanced reachability ana...
Concurrent software systems are more difficult to design and analyze than sequential systems. Consid...
Modern software model checkers find safety violations: breaches where the system enters some bad sta...
Abstract. Counter systems are a well-known and powerful modeling notation for specifying infinite-st...
Counter systems are a well-known and powerful modeling notation for specifying infinite-state system...
Abstract. We present a new method for proving liveness and termination properties for fair concurren...
Abstract. We present a new method for proving liveness and termination prop-erties for fair concurre...
Automatic verification of cyber-physical systems (CPS) typically involves computing the reachable se...
Modern software model checkers find safety violations: breaches where the system has entered some ba...
The software architecture of a distributed program can be represented by a hierarchical composition ...
Software verification is a so tedious process that only trivial system can be handled manually. So a...
The software architecture of a distributed system can be described as a hierarchical composition of ...
The software architecture of a distributed system can be described as a hierarchical composition of ...
Behaviour analysis of complex distributed systems has led to the search for enhanced reachability an...
The need for modularity in the behaviour analysis of concurrent systems has been answered successful...
Behaviour analysis of complex concurrent systems has led to the search for enhanced reachability ana...
Concurrent software systems are more difficult to design and analyze than sequential systems. Consid...
Modern software model checkers find safety violations: breaches where the system enters some bad sta...
Abstract. Counter systems are a well-known and powerful modeling notation for specifying infinite-st...
Counter systems are a well-known and powerful modeling notation for specifying infinite-state system...
Abstract. We present a new method for proving liveness and termination properties for fair concurren...
Abstract. We present a new method for proving liveness and termination prop-erties for fair concurre...
Automatic verification of cyber-physical systems (CPS) typically involves computing the reachable se...
Modern software model checkers find safety violations: breaches where the system has entered some ba...