A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient Model Checking of Safety Properties
[chapter]
2003
Lecture Notes in Computer Science
In the linear time paradigm, model checking of safety properties is simpler than the general case, because safety properties can be captured by finite automata. ...
This work discusses the theoretical and some of the practical issues related to model checking LTL properties. ...
The financial support of Helsinki Graduate School in Computer Science and Engineering, the Academy of Finland (project 47754), the Wihuri Foundation and Tekniikan Edistämissäätiö (Foundation for Technology ...
doi:10.1007/3-540-44829-2_5
fatcat:zlkczcjjdfeijoekb66ohrtpe4
Efficient Model Checking of PSL Safety Properties
2010
2010 10th International Conference on Application of Concurrency to System Design
Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties. ...
This work presents an efficient approach to model check safety properties expressed in PSL (IEEE Std 1850 Property Specification Language), an industrial property specification language. ...
ACKNOWLEDGEMENTS The financial support of Academy of Finland (projects 126860 and 128050) and Technology Industries of Finland Centennial Foundation is gratefully acknowledged. ...
doi:10.1109/acsd.2010.27
dblp:conf/acsd/LauniainenHJ10
fatcat:d2kqxxpirzdz7faxxflnc2qkdm
Efficient model checking of PSL safety properties
2011
IET Computers & Digital Techniques
Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties. ...
This work presents an efficient approach to model check safety properties expressed in PSL (IEEE Std 1850 Property Specification Language), an industrial property specification language. ...
ACKNOWLEDGEMENTS The financial support of Academy of Finland (projects 126860 and 128050) and Technology Industries of Finland Centennial Foundation is gratefully acknowledged. ...
doi:10.1049/iet-cdt.2010.0154
fatcat:cbss2w6azvhdra7b2f4zomk73i
Model Checking Reconfigurable Processor Configurations for Safety Properties
[chapter]
2003
Lecture Notes in Computer Science
This approach is shown to be useful in verifying safety properties including the synchronization of memory access by the reconfigurable array and memory access bounds checking. ...
This combination extends proof-carrying code to provide a context for model checking, but uses standard model checking technology. ...
The pieces could then be model checked efficiently and the checked properties combined to yield a proof of safety. ...
doi:10.1007/978-3-540-45234-8_104
fatcat:3khaogfgynazhpngwdzuxwjcqm
Analysing MTL properties using NuSMV model checker
2016
2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
Reliability and safety property of any hardware is an important parameter. ...
Technique such as model checking is used to efficiently bridge the gap between design and developed stage of the system with less errors and more efficiency. ...
As mentioned, the use of formal methods in the domain of safety engineering has led to the development of latest technologies available for verifying the models to note down the efficiency of the approach ...
doi:10.1109/rteict.2016.7807940
fatcat:46mpq7bw2vcuncjr2j6zd4tzfy
PIPE+Verifier - A Tool for Analyzing High Level Petri Nets
2015
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering
BMC sacrifices the completeness of traditional model checking but becomes more practical and often effective to analyze large models. ...
In this paper, we present the design, implementation, and use of PIPE+Verifier, as well as show additional improvements to make PIPE+Verifier more efficient. ...
Since BMC is most effective in checking the violation of safety properties, a formula f (S i ) representing the safety property formula f without temporal operators in state S i needs to be checked. ...
doi:10.18293/seke2015-60
dblp:conf/seke/LiuH15
fatcat:anpac22fpnbaveixy4ztf46tzm
A hybrid framework for resource verification in executable model-based embedded system development
2008
ACM SIGBED Review
In this work, we consider the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Resource-related concerns are not closely linked with current xUML model-based software development although they are critical for embedded systems. ...
for xUML models [7] • Resource bound checking based on efficient dynamic monitoring [3, 1] ObjectCheck [7] is used to validate the xUML model with respect to selected functional properties while ...
doi:10.1145/1366283.1366288
fatcat:dxfv6donxvdldczixsbsjyogb4
SAT-based unbounded symbolic model checking
2005
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Some optimization techniques are exploited, and the depth first search method is used for efficient safety-property checking. ...
1 This paper describes a SAT-based unbounded symbolic model checking algorithm. BDDs have been widely used for symbolic model checking, but the approach suffers from memory overflow. ...
The proposed algorithm takes advantage of the depth first search to make safety-property checking more efficient. ...
doi:10.1109/tcad.2004.841068
fatcat:jbdrilx27re7fm6jd4fnd2a6b4
SAT-based unbounded symbolic model checking
2003
Proceedings of the 40th conference on Design automation - DAC '03
Some optimization techniques are exploited, and the depth first search method is used for efficient safety-property checking. ...
1 This paper describes a SAT-based unbounded symbolic model checking algorithm. BDDs have been widely used for symbolic model checking, but the approach suffers from memory overflow. ...
The proposed algorithm takes advantage of the depth first search to make safety-property checking more efficient. ...
doi:10.1145/776038.776043
fatcat:bnqgi6znevdfvcr4ftg4ptctje
SAT-based unbounded symbolic model checking
2003
Proceedings of the 40th conference on Design automation - DAC '03
Some optimization techniques are exploited, and the depth first search method is used for efficient safety-property checking. ...
1 This paper describes a SAT-based unbounded symbolic model checking algorithm. BDDs have been widely used for symbolic model checking, but the approach suffers from memory overflow. ...
The proposed algorithm takes advantage of the depth first search to make safety-property checking more efficient. ...
doi:10.1145/775832.776043
dblp:conf/dac/KangP03
fatcat:bw6nyljn3fbrlm7c3q7a762yxa
A formal approach for modeling and verification of bus bridge based on Petri Net and model checking
2010
2010 3rd International Conference on Computer Science and Information Technology
The methodology presented addresses the model checking of critical properties of bus bridge including safety, liveness and fairness properties which are expressed in computation tree logics. ...
This paper describes the formal verification of the Petri Net models of bus bridge using model checking techniques. ...
CPU TIME AND MEMORY USAGE OF MODEL CHECKING Cost of Model Checking Property Cost of Model Checking Property Nodes
Run Time(s)
Memory(MB)
Safetyness(1)
7814
0.1765
25
Nodes
Run Time(s)
Memory ...
doi:10.1109/iccsit.2010.5565021
fatcat:7i3yvii26vdjdevymtlji2ehw4
A Technique for Demonstrating Safety and Correctness of Program Translators: Strategy and Case Study
2014
2014 IEEE International Symposium on Software Reliability Engineering Workshops
It uses safety case to explain the strategy precisely and also implemented several supporting tools to derive evidences efficiently. ...
A case study of a Korean nuclear power plant found the efficiency of the proposed demonstration strategy and supporting tools. ...
ACKNOWLEDGMENT This research was supported, in part, by a grant from the Korea Ministry of Science, ICT and Future Planning, under the development of the integrated framework of I&C dependability assessment ...
doi:10.1109/issrew.2014.71
dblp:conf/issre/YooCLL14
fatcat:5llqvpxhnjfbpcmf2v652lo664
Improving Saturation-based Bounded Model Checking
2016
Acta Cybernetica
In addition, constrained saturation is also introduced to improve the efficiency of bounded model checking. ...
Model checking is one of the current techniques to analyse the behaviour of systems, as part of the verification process. ...
The bounded model checking is a semi-decision procedure, therefore it can be used to ensure the following behavioural properties of the specification: • Invariant or safety: proving these properties needs ...
doi:10.14232/actacyb.22.3.2016.2
fatcat:tnbxtsuasffvffz4dpydm3hsoy
Study on Formal Modeling and Safety Verification of Train-to-Train Communication
2018
Wireless Communications and Mobile Computing
A new method, based on the LTS (labelled transition system) model checking, is proposed for verifying the safety properties in the communication procedure. ...
The LTS method is adapted to model system behaviours; analysis and safety verification are checked by means of LTSA (labelled transition system analyzer) software. ...
Acknowledgments The research work has been supported by Key Project of China Academy of Railway Sciences (1651TH5302, 1651TH6603, and 1752TH1004); the National Natural Science Foundation of China (no. ...
doi:10.1155/2018/2406968
fatcat:lwx633q45rb3fau7k3mzt23jai
Formal Analysis of a VANET Congestion Control Protocol through Probabilistic Verification
2011
2011 IEEE 73rd Vehicular Technology Conference (VTC Spring)
Specifically, we formally analyse a specific congestion control protocol for VANETs using a probabilistic model checking technique, and investigate its correctness and effectiveness. ...
Since VANETs are vital to the safety of the vehicles, the infrastructure, and the humans involved, a deep analysis of their potential behaviours is clearly required. ...
Using probabilistic model checking we evaluate the correctness and efficiency of the proposed protocol. ...
doi:10.1109/vetecs.2011.5956327
dblp:conf/vtc/KonurF11
fatcat:tozxltdlkzgvrlwqoks6m2344i
« Previous
Showing results 1 — 15 out of 175,267 results