System Resource Utilization Analysis Based on Model Checking Method
نویسندگان
چکیده
Model checking method is a widely used formal method for proving whether or not a given model satisfies properties, and for producing counter examples if the model does not satisfy properties. In this paper, we show model checking methods can be used for resource utilization analysis of systems. We specify system utilization properties using temporal logic called LTL, and find a bottleneck of system performance using model checking.
منابع مشابه
Reachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملPerformance Measurement and Improvement of Healthcare Service Using Discrete Event Simulation in Bahir Dar Clinic
This paper deals with the service performance analysis and improvement using discrete event simulation has been used. The simulation of the health care has been done by arena master development 14-version software. The performance measurement for this study are patients output, service rate, service efficiency and it is directly related to waiting time of patients in each service station, work ...
متن کاملOperation of Multiple Reservoirs by utilization of Simulation Method for Analysis of System Dynamics
In this paper the operation of multiple reservoirs by the utilization of analysis method of the system dynamics is considering and this analysis method is based on the feedback and object oriented events. The goal of this research is presentation of a new method by utilization of system dynamicity technique for simulation of the reservoir. This software is a product of Ventana Company and the e...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملPathology of Human Resource Staffing System in Higher Education: Codification and Validation of a Model
Higher education system is considered to be one of the most important factors in development and progress of a society. The present research aims to conduct a pathological study of staffing system in higher education and, thereby, proceed to codify and validate a model for it. The methodology was practical and developmental. A combined sequential exploratory (heuristic) method of the modelling ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Informatica (Slovenia)
دوره 29 شماره
صفحات -
تاریخ انتشار 2005