Filters








175,267 Hits in 4.1 sec

Efficient Model Checking of Safety Properties [chapter]

Timo Latvala
2003 Lecture Notes in Computer Science  
In the linear time paradigm, model checking of safety properties is simpler than the general case, because safety properties can be captured by finite automata.  ...  This work discusses the theoretical and some of the practical issues related to model checking LTL properties.  ...  The financial support of Helsinki Graduate School in Computer Science and Engineering, the Academy of Finland (project 47754), the Wihuri Foundation and Tekniikan Edistämissäätiö (Foundation for Technology  ... 
doi:10.1007/3-540-44829-2_5 fatcat:zlkczcjjdfeijoekb66ohrtpe4

Efficient Model Checking of PSL Safety Properties

Tuomas Launiainen, Keijo Heljanko, Tommi Junttila
2010 2010 10th International Conference on Application of Concurrency to System Design  
Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties.  ...  This work presents an efficient approach to model check safety properties expressed in PSL (IEEE Std 1850 Property Specification Language), an industrial property specification language.  ...  ACKNOWLEDGEMENTS The financial support of Academy of Finland (projects 126860 and 128050) and Technology Industries of Finland Centennial Foundation is gratefully acknowledged.  ... 
doi:10.1109/acsd.2010.27 dblp:conf/acsd/LauniainenHJ10 fatcat:d2kqxxpirzdz7faxxflnc2qkdm

Efficient model checking of PSL safety properties

T. Launiainen, K. Heljanko, T. Junttila
2011 IET Computers & Digital Techniques  
Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties.  ...  This work presents an efficient approach to model check safety properties expressed in PSL (IEEE Std 1850 Property Specification Language), an industrial property specification language.  ...  ACKNOWLEDGEMENTS The financial support of Academy of Finland (projects 126860 and 128050) and Technology Industries of Finland Centennial Foundation is gratefully acknowledged.  ... 
doi:10.1049/iet-cdt.2010.0154 fatcat:cbss2w6azvhdra7b2f4zomk73i

Model Checking Reconfigurable Processor Configurations for Safety Properties [chapter]

John Cochran, Deepak Kapur, Darko Stefanovic
2003 Lecture Notes in Computer Science  
This approach is shown to be useful in verifying safety properties including the synchronization of memory access by the reconfigurable array and memory access bounds checking.  ...  This combination extends proof-carrying code to provide a context for model checking, but uses standard model checking technology.  ...  The pieces could then be model checked efficiently and the checked properties combined to yield a proof of safety.  ... 
doi:10.1007/978-3-540-45234-8_104 fatcat:3khaogfgynazhpngwdzuxwjcqm

Analysing MTL properties using NuSMV model checker

V Shreya, Manju Nanda
2016 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)  
Reliability and safety property of any hardware is an important parameter.  ...  Technique such as model checking is used to efficiently bridge the gap between design and developed stage of the system with less errors and more efficiency.  ...  As mentioned, the use of formal methods in the domain of safety engineering has led to the development of latest technologies available for verifying the models to note down the efficiency of the approach  ... 
doi:10.1109/rteict.2016.7807940 fatcat:46mpq7bw2vcuncjr2j6zd4tzfy

PIPE+Verifier - A Tool for Analyzing High Level Petri Nets

Su Liu, Xudong He
2015 Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering  
BMC sacrifices the completeness of traditional model checking but becomes more practical and often effective to analyze large models.  ...  In this paper, we present the design, implementation, and use of PIPE+Verifier, as well as show additional improvements to make PIPE+Verifier more efficient.  ...  Since BMC is most effective in checking the violation of safety properties, a formula f (S i ) representing the safety property formula f without temporal operators in state S i needs to be checked.  ... 
doi:10.18293/seke2015-60 dblp:conf/seke/LiuH15 fatcat:anpac22fpnbaveixy4ztf46tzm

A hybrid framework for resource verification in executable model-based embedded system development

Honguk Woo, Aloysius K. Mok, James C. Browne
2008 ACM SIGBED Review  
In this work, we consider the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems.  ...  Resource-related concerns are not closely linked with current xUML model-based software development although they are critical for embedded systems.  ...  for xUML models [7] • Resource bound checking based on efficient dynamic monitoring [3, 1] ObjectCheck [7] is used to validate the xUML model with respect to selected functional properties while  ... 
doi:10.1145/1366283.1366288 fatcat:dxfv6donxvdldczixsbsjyogb4

SAT-based unbounded symbolic model checking

Hyeong-Ju Kang, In-Cheol Park
2005 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Some optimization techniques are exploited, and the depth first search method is used for efficient safety-property checking.  ...  1 This paper describes a SAT-based unbounded symbolic model checking algorithm. BDDs have been widely used for symbolic model checking, but the approach suffers from memory overflow.  ...  The proposed algorithm takes advantage of the depth first search to make safety-property checking more efficient.  ... 
doi:10.1109/tcad.2004.841068 fatcat:jbdrilx27re7fm6jd4fnd2a6b4

SAT-based unbounded symbolic model checking

Hyeong-Ju Kang, In-Cheol Park
2003 Proceedings of the 40th conference on Design automation - DAC '03  
Some optimization techniques are exploited, and the depth first search method is used for efficient safety-property checking.  ...  1 This paper describes a SAT-based unbounded symbolic model checking algorithm. BDDs have been widely used for symbolic model checking, but the approach suffers from memory overflow.  ...  The proposed algorithm takes advantage of the depth first search to make safety-property checking more efficient.  ... 
doi:10.1145/776038.776043 fatcat:bnqgi6znevdfvcr4ftg4ptctje

SAT-based unbounded symbolic model checking

Hyeong-Ju Kang, In-Cheol Park
2003 Proceedings of the 40th conference on Design automation - DAC '03  
Some optimization techniques are exploited, and the depth first search method is used for efficient safety-property checking.  ...  1 This paper describes a SAT-based unbounded symbolic model checking algorithm. BDDs have been widely used for symbolic model checking, but the approach suffers from memory overflow.  ...  The proposed algorithm takes advantage of the depth first search to make safety-property checking more efficient.  ... 
doi:10.1145/775832.776043 dblp:conf/dac/KangP03 fatcat:bw6nyljn3fbrlm7c3q7a762yxa

A formal approach for modeling and verification of bus bridge based on Petri Net and model checking

Guoyin Zhang, Ming Liu, Aihong Yao
2010 2010 3rd International Conference on Computer Science and Information Technology  
The methodology presented addresses the model checking of critical properties of bus bridge including safety, liveness and fairness properties which are expressed in computation tree logics.  ...  This paper describes the formal verification of the Petri Net models of bus bridge using model checking techniques.  ...  CPU TIME AND MEMORY USAGE OF MODEL CHECKING Cost of Model Checking Property Cost of Model Checking Property Nodes Run Time(s) Memory(MB) Safetyness(1) 7814 0.1765 25 Nodes Run Time(s) Memory  ... 
doi:10.1109/iccsit.2010.5565021 fatcat:7i3yvii26vdjdevymtlji2ehw4

A Technique for Demonstrating Safety and Correctness of Program Translators: Strategy and Case Study

Junbeom Yoo, Jong-Gyun Choi, Young Jun Lee, Jang-Soo Lee
2014 2014 IEEE International Symposium on Software Reliability Engineering Workshops  
It uses safety case to explain the strategy precisely and also implemented several supporting tools to derive evidences efficiently.  ...  A case study of a Korean nuclear power plant found the efficiency of the proposed demonstration strategy and supporting tools.  ...  ACKNOWLEDGMENT This research was supported, in part, by a grant from the Korea Ministry of Science, ICT and Future Planning, under the development of the integrated framework of I&C dependability assessment  ... 
doi:10.1109/issrew.2014.71 dblp:conf/issre/YooCLL14 fatcat:5llqvpxhnjfbpcmf2v652lo664

Improving Saturation-based Bounded Model Checking

Dániel Darvas, András Vörös, Tamás Bartha
2016 Acta Cybernetica  
In addition, constrained saturation is also introduced to improve the efficiency of bounded model checking.  ...  Model checking is one of the current techniques to analyse the behaviour of systems, as part of the verification process.  ...  The bounded model checking is a semi-decision procedure, therefore it can be used to ensure the following behavioural properties of the specification: • Invariant or safety: proving these properties needs  ... 
doi:10.14232/actacyb.22.3.2016.2 fatcat:tnbxtsuasffvffz4dpydm3hsoy

Study on Formal Modeling and Safety Verification of Train-to-Train Communication

Haonan Feng
2018 Wireless Communications and Mobile Computing  
A new method, based on the LTS (labelled transition system) model checking, is proposed for verifying the safety properties in the communication procedure.  ...  The LTS method is adapted to model system behaviours; analysis and safety verification are checked by means of LTSA (labelled transition system analyzer) software.  ...  Acknowledgments The research work has been supported by Key Project of China Academy of Railway Sciences (1651TH5302, 1651TH6603, and 1752TH1004); the National Natural Science Foundation of China (no.  ... 
doi:10.1155/2018/2406968 fatcat:lwx633q45rb3fau7k3mzt23jai

Formal Analysis of a VANET Congestion Control Protocol through Probabilistic Verification

Savas Konur, Michael Fisher
2011 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring)  
Specifically, we formally analyse a specific congestion control protocol for VANETs using a probabilistic model checking technique, and investigate its correctness and effectiveness.  ...  Since VANETs are vital to the safety of the vehicles, the infrastructure, and the humans involved, a deep analysis of their potential behaviours is clearly required.  ...  Using probabilistic model checking we evaluate the correctness and efficiency of the proposed protocol.  ... 
doi:10.1109/vetecs.2011.5956327 dblp:conf/vtc/KonurF11 fatcat:tozxltdlkzgvrlwqoks6m2344i
« Previous Showing results 1 — 15 out of 175,267 results