Automated Technology for Verification and Analysis
Citations
625 citations
Cites methods from "Automated Technology for Verificati..."
...Within the prosyd project, synthesis techniques are applied to check first whether a set of properties is realizable, and then to automatically produce digital designs of smaller units....
[...]
187 citations
Additional excerpts
...Concrete examples include the following domains: Routing problems [127]; different problems of BioInformatics, such as Protein Alignment [120], Haplotyping with Pedigrees [56], Reasoning over Biological Networks[58]; Hardware Debugging, both on Design Debugging [111], as well as on Circuit Debugging [34, 81]; Software Debugging (of C code) [66, 67]; Scheduling [124]; Planning [38, 68, 108, 129]; Course Timetabling [17, 18]; Probabilistic Reasoning [102]; Electronic Markets [112]; Credential-Based interactions as a way to minimize the disclosure of private information [12]; Enumeration of MUSes/MCSes [27, 78, 107]; Software Package Upgrades [13, 15, 16, 80, 123]; Combinatorial Auctions [60]; Quantif ied Boolean Formulas [30]....
[...]
...Software Debugging (of C code) [66, 67]; Scheduling [124]; Planning [38, 68, 108, 129]; Course Timetabling [17, 18]; Probabilistic Reasoning [102]; Electronic Markets [112]; Credential-Based interactions as a way to minimize the disclosure of private information [12]; Enumeration of MUSes/MCSes [27, 78, 107]; Software Package Upgrades [13, 15, 16, 80, 123]; Combinatorial Auctions [60]; Quantif ied Boolean Formulas [30]....
[...]
[...]
99 citations
73 citations
68 citations
Cites background from "Automated Technology for Verificati..."
...A mathematical notion of trajectories in H is summarized in [15]....
[...]
References
3,547 citations
"Automated Technology for Verificati..." refers methods in this paper
...[27] also used real variables to represent infinite state systems....
[...]
...Using symbolic representations such as BDDs [4] or IDDs [27], this approach has been used to analyse very large models....
[...]
...This is essentially Lowe’s attack [27]....
[...]
1,880 citations
"Automated Technology for Verificati..." refers background or methods in this paper
...Others may be used as preprocessing methods for reducing the complexity of models, for instance, we may use cone of influence reduction [1] or program slicing [10] for reducing the complexity of models....
[...]
...For this logic, equivalence checking of two formulas, or validity checking of a formula has been known to be decidable[2, 1]....
[...]
...A timed automaton (TA) [1][2][4][37] is an automaton with a finite set of clock variables....
[...]
...Recently it was shown that SAT can be used, in combination with unfolding [12], for coverability checking of unbounded Petri nets [1]....
[...]
...There is a growing interest in adopting formal specifications in software development [1][2], but meanwhile the trend is also constrained by the lack of effective, practical techniques for validating and verifying formal specifications [3]....
[...]
1,553 citations
"Automated Technology for Verificati..." refers background or methods in this paper
...Furthermore, the failures preorder is strictly coarser than the fair testing preorder, and the two preorders coincide for finite processes [19]....
[...]
...Such characterisations have been introduced for fair testing in [2,3,19], but they are complicated and hard to relate to traditional characterisations such as failures [10,23]....
[...]
...The process-algebraic theory of fair testing, which has been developed independently by two groups of researchers in [2, 3] and [19], provides the formal framework needed to characterise conflict-preserving refinements....
[...]
...The conflict preorder conf is closely related to the fair testing preorder [2, 19]....
[...]
...Cornell Single Sign-On (CorSSO) [19] is a distributed service for network authentication....
[...]
1,424 citations
1,357 citations
"Automated Technology for Verificati..." refers background or methods in this paper
...Web Service Analysis Tool (WSAT) [8,12] verifies LTL properties of conversations 10 T. Bultan, X. Fu, and J. Su and checks sufficient conditions for realizability and synchronizability....
[...]
...However, it is unclear how to apply the same technique in BDD [12], DBM [21] or CRD [35]....
[...]
...The spi calculus[12] is derived from the π-calculus[15]....
[...]
...This variant of the spi calculus uses recursion rather than replication as found in [12]....
[...]
...This protocol has also been used in different occasions to show the use of model checking strategies [7] and other methods [12] for improving such protocols....
[...]