We say a program is data-independent with respect to a data type X if the operations it can perform on values of type X are restricted to just equality testing, although the system may also input, store and move around (via assignment) values of type X within its variables. This property can be exploited to give procedures for the automatic verification, called model checking, of such programs independently of the instance for the type X. This thesis considers data-independent programs with arrays, which are useful for modelling memory systems such as cache protocols. The main question of interest is the following parameterised model-checking problem: whether a program satisfies its specification for all non-empty finite instances of its ty...
Abstract-State-of-the-art hardware model checkers and equivalence checkers rely upon a diversity of ...
Concurrency libraries can facilitate the development of multi-threaded programs by providing concurr...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...
We say a program is data-independent with respect to a data type X if the operations it can perform ...
We consider programs which are data independent with respect to two type variables X and Y, and can ...
We say a program is data-independent with respect to a data type X if the operations it can perform...
For programs whose data variables range over Boolean or finite domains, program verification is deci...
Abstract. We aim at checking safety and temporal properties over models repre-senting the behavior o...
In recent times, satisfiability modulo theories (SMT) techniques gained increasing attention and obt...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
Abstract. We present a technique for automatically verifying safety properties of concurrent program...
This paper presents our results in study of verifiaction of infinite state space systems. We deal mo...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...
Computers have brought us inestimable convenience in recent years. We have become dependent on them ...
Perhaps the most difficult aspect of designing a shared memory multiprocessor is the hardware protoc...
Abstract-State-of-the-art hardware model checkers and equivalence checkers rely upon a diversity of ...
Concurrency libraries can facilitate the development of multi-threaded programs by providing concurr...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...
We say a program is data-independent with respect to a data type X if the operations it can perform ...
We consider programs which are data independent with respect to two type variables X and Y, and can ...
We say a program is data-independent with respect to a data type X if the operations it can perform...
For programs whose data variables range over Boolean or finite domains, program verification is deci...
Abstract. We aim at checking safety and temporal properties over models repre-senting the behavior o...
In recent times, satisfiability modulo theories (SMT) techniques gained increasing attention and obt...
AbstractModel checking is a proven successful technology for verifying hardware. It works, however, ...
Abstract. We present a technique for automatically verifying safety properties of concurrent program...
This paper presents our results in study of verifiaction of infinite state space systems. We deal mo...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...
Computers have brought us inestimable convenience in recent years. We have become dependent on them ...
Perhaps the most difficult aspect of designing a shared memory multiprocessor is the hardware protoc...
Abstract-State-of-the-art hardware model checkers and equivalence checkers rely upon a diversity of ...
Concurrency libraries can facilitate the development of multi-threaded programs by providing concurr...
Concurrent data structure algorithms have traditionally been designed using locks to regulate the be...