Julkaistu vain painettuna, saatavuus katso Bibid. Published only in printed form, availability see BibidDefects in hardware or software can have disastrous consequences. Traditionally, testing has been used to address this threat. While often able to expose bugs, testing can, however, not guarantee that a given system is correct, as has been demonstrated by catastrophic failures of well-tested systems in the past. Verification approaches such as model checking address this shortcoming, not only searching for flaws in a limited set of scenarios, but by trying to prove a system correct, guaranteeing the absence of defects if successful. The main part of this dissertation discusses various topics in the area of symbolic model checking of time...
We present a symbolic model checking approach that allows verifying a unit of code, e.g., a single p...
Abstract The task of checking if a computer system satisfies its timing specifications is extremelyi...
We describe finite-state programs over real-numbered time in a guarded-command language with real-v...
The design of correct computer systems is extremely difficult. However, it is also a very important ...
AbstractThe design of correct computer systems is extremely difficult. However, it is also a very im...
Abstract. Modeling time related aspects is important in many applications of verification methods. F...
Software is finding its way into an increasing range of devices (phones, medical equipment, cars...)...
Enormous progress has been achieved in the last decade in the verification of timed systems, making ...
Formal verification of hardware and software systems has long been recognized as an essential step i...
In this paper we present a fully symbolic TCTL model checking algorithm for incomplete timed systems...
Symbolic model checking is a powerful technique for checking temporal logic properties over finite o...
pre-printCorrect interaction of asynchronous protocols re- quires verification. Timed asynchronous p...
AbstractWe describe finite-state programs over real-numbered time in a guarded-command language with...
Abstract—Correct interaction of asynchronous protocols re-quires verification. Timed asynchronous pr...
Model-Driven Engineering enables to assess a system's model properties since the early phases of its...
We present a symbolic model checking approach that allows verifying a unit of code, e.g., a single p...
Abstract The task of checking if a computer system satisfies its timing specifications is extremelyi...
We describe finite-state programs over real-numbered time in a guarded-command language with real-v...
The design of correct computer systems is extremely difficult. However, it is also a very important ...
AbstractThe design of correct computer systems is extremely difficult. However, it is also a very im...
Abstract. Modeling time related aspects is important in many applications of verification methods. F...
Software is finding its way into an increasing range of devices (phones, medical equipment, cars...)...
Enormous progress has been achieved in the last decade in the verification of timed systems, making ...
Formal verification of hardware and software systems has long been recognized as an essential step i...
In this paper we present a fully symbolic TCTL model checking algorithm for incomplete timed systems...
Symbolic model checking is a powerful technique for checking temporal logic properties over finite o...
pre-printCorrect interaction of asynchronous protocols re- quires verification. Timed asynchronous p...
AbstractWe describe finite-state programs over real-numbered time in a guarded-command language with...
Abstract—Correct interaction of asynchronous protocols re-quires verification. Timed asynchronous pr...
Model-Driven Engineering enables to assess a system's model properties since the early phases of its...
We present a symbolic model checking approach that allows verifying a unit of code, e.g., a single p...
Abstract The task of checking if a computer system satisfies its timing specifications is extremelyi...
We describe finite-state programs over real-numbered time in a guarded-command language with real-v...