Verification techniques for cache coherence protocols
F Pong, M Dubois - ACM Computing Surveys (CSUR), 1997 - dl.acm.org
In this article we present a comprehensive survey of various approaches for the verification
of cache coherence protocols based on state enumeration,(symbolic model checking, and …
of cache coherence protocols based on state enumeration,(symbolic model checking, and …
[PDF][PDF] The theory and practice of concurrency
A Roscoe - 1998 - ora.ox.ac.uk
Since CAR Hoare's text Communicating Sequential Processes was published in 1985, his
notation has been extensively used for teaching and applying concurrency theory. This book …
notation has been extensively used for teaching and applying concurrency theory. This book …
Counterexample-guided abstraction refinement for symbolic model checking
The state explosion problem remains a major hurdle in applying symbolic model checking to
large hardware designs. State space abstraction, having been essential for verifying designs …
large hardware designs. State space abstraction, having been essential for verifying designs …
Abstract interpretation of reactive systems
The advent of ever more complex reactive systems in increasingly critical areas calls for the
development of automated verification techniques. Model checking is one such technique …
development of automated verification techniques. Model checking is one such technique …
Property preserving abstractions for the verification of concurrent systems
We study property preserving transformations for reactive systems. The main idea is the use
of simulations parameterized by Galois connections (α, γ), relating the lattices of properties …
of simulations parameterized by Galois connections (α, γ), relating the lattices of properties …
Abstract interpretation based formal methods and future challenges
P Cousot - Informatics: 10 Years Back, 10 Years Ahead, 2001 - Springer
In order to contribute to the solution of the software reliability problem, tools have been
designed to analyze statically the run-time behavior of programs. Because the correctness …
designed to analyze statically the run-time behavior of programs. Because the correctness …
An integration of model checking with automated proof checking
S Rajan, N Shankar, MK Srivas - … Conference, CAV'95 Liège, Belgium, July …, 1995 - Springer
Although automated proof checking tools for general-purpose logics have been successfully
employed in the verification of digital systems, there are inherent limits to the efficient …
employed in the verification of digital systems, there are inherent limits to the efficient …
[PDF][PDF] Efficient BDD algorithms for FSM synthesis and verification
We describe a set of BDD based algorithms for efficient FSM synthesis and verification. We
establish that the core computation in both synthesis and verification is forming the image …
establish that the core computation in both synthesis and verification is forming the image …
Constraint-based deductive model checking
We show that constraint logic programming (CLP) can serve as a conceptual basis and as a
practical implementation platform for the model checking of infinite-state systems. CLP …
practical implementation platform for the model checking of infinite-state systems. CLP …
Verifying systems with replicated components in Murϕ
CN Ip, DL Dill - … Aided Verification: 8th International Conference, CAV' …, 1996 - Springer
We present an extension to the Mur ϕ verifier to verify systems with replicated identical
components. Verification is by explicit state enumeration in an abstract state space where …
components. Verification is by explicit state enumeration in an abstract state space where …