Model Checking in Bits and Pieces
نویسنده
چکیده
The central thesis explored in this paper is that parallel model checking is easily achieved through compositional methods. This may strike the reader as being self-evident. Nevertheless, it does not appear to have been considered before. The justification comes from the following observations: (1) the efficacy of a parallel program is inversely proportional to the amount of synchronization and communication across processors, and (2) compositional methods break up the analysis into nearly-independent parts; in each part, a program component is analyzed with limited knowledge of the internal state of other components. For loosely coupled programs, therefore, one may expect compositional methods to work well, and to further benefit from parallelization.
منابع مشابه
Synthesizing Ranking Functions from Bits and Pieces
In this work, we present a novel approach based on recent advances in software model checking to synthesize ranking functions and prove termination (and non-termination) of imperative programs. Our approach incrementally refines a termination argument from an under-approximation of the terminating program state. Specifically, we learn bits of information from terminating executions, and from th...
متن کاملParity enhanced topology based spot area watermarking method for copyright protection of layered 3D triangular mesh data
A parity enhanced topology based spot area watermarking method is proposed to embed information in objects with layered 3D triangular meshes such as those reconstructed from CT or MRI data. With the integration of parity checking, it improves the robustness against unauthorized alteration of a single bit in every consecutive 8-bits of length. Watermark message is cut into several pieces and eac...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملA Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness
Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system should be modeled. Graph transformation system is a graphical formal modeling language to specify and model the system. However, modeling of large s...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010