Accelerating External Search with Bitstate Hashing

نویسندگان

  • Stefan Edelkamp
  • Shahid Jabbar
چکیده

In this paper we refine external exploration for explicit state model checking by a fusion with internal bitstate hashing. External A* provides a method to cope up with large state spaces by efficiently utilizing secondary storage devices like harddisk to maintain the open and closed lists. Duplicates are removed by a two-level refinement scheme that involves sorting a subset of the open list externally and subtracting a small subset of closed list from the open list. The bottleneck in External A* [7] is the duplicates removal phase that dominates the I/O complexity of External A*. Bitstate hashing provides a solution to faster duplicates removal by utilizing only few bits for each state. But bitstate hashing is faced with the problem of having no support for large open list and for solution reconstruction. We present a strategy to accelerate external search by using bitstate hashing for duplicates removal. Case studies with our experimental external explicit state model checker IO-HSF-SPIN illustrate the effectiveness of the proposed algorithms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Probabilistic Veri cation Using

This paper describes and analyzes a probabilistic technique to reduce the memory requirement of the table of reached states maintained in veriication by explicit state enumeration. The memory savings of the new scheme come at the price of a certain probability that the search becomes incomplete. However, this probability can be made negligibly small by using typically 40 bits of memory per stat...

متن کامل

Complementarity of Error Detection Techniques

We study explicit techniques for detection of safety errors, e.g., depth-first search, directed search, random walk, and bitstate hashing. We argue that it is not important to find the best technique, but to find a set of complementary techniques. To this end, we choose nine diverse error detection techniques and perform experiments over a large set of models. We compare speed of techniques, le...

متن کامل

An Analysis of Bitstate Hashing

The bitstate hashing, or supertrace, technique was introduced in 1987 as a method to increase the quality of verification by reachability analyses for applications that defeat analysis by traditional means because of their size. Since then, the technique has been included in many research verification tools, and was adopted in tools that are marketed commercially. It is therefore important that...

متن کامل

Incremental Hashing for Spin

This paper discusses a generalised incremental hashing scheme for explicit state model checkers. The hashing scheme has been implemented into the model checker Spin. The incremental hashing scheme works for Spin’s exhaustive and both approximate verification modes: bitstate hashing and hash compaction. An implementation has been provided for 32-bit and 64-bit architectures. We performed extensi...

متن کامل

2 A New Scheme for Memory - E cient Probabilistic Veri

In veriication by explicit state enumeration, for each reachable state of the protocol being veriied the full state descriptor is stored in a state table. Two probabilistic methods { bitstate hashing and hash compaction { have been proposed in the literature that store much fewer bits for each state but come at the price of some probability that not all reach-able states will be explored during...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005