1994
DOI: 10.1007/3-540-57887-0_95
|View full text |Cite
|
Sign up to set email alerts
|

A computer-checked verification of Milner's scheduler

Abstract: We present an equational veri cation of Milner's scheduler, which w e c hecked by computer. To our knowledge this is the rst time that the scheduler is proof-checked for a general numbern of scheduled processes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

1994
1994
2001
2001

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(24 citation statements)
references
References 6 publications
0
24
0
Order By: Relevance
“…We find descriptions along this line in verifications of the bakery protocol [GK94], Milner's scheduler [KS94], a leader election protocol [FGK97], grid protocols [BHP97], and a summing protocol [GMS97].…”
Section: Introductionmentioning
confidence: 89%
“…We find descriptions along this line in verifications of the bakery protocol [GK94], Milner's scheduler [KS94], a leader election protocol [FGK97], grid protocols [BHP97], and a summing protocol [GMS97].…”
Section: Introductionmentioning
confidence: 89%
“…This section presents a brief overview of standard techniques that are used in these verifications. For verifications in the specification language µCRL [114] that use one or more of these techniques, see [56,98,111,140,186] Expansion. A basic technique in protocol verification is expansion [47] of the merge operator.…”
Section: Verification Techniquesmentioning
confidence: 99%
“…In the context of process algebra [5] most such checks have been carried out using the language pCRL [34]. It has been encoded in the Coq system and applied to the verification of the alternating bit protocol [8, 7], Milner's scheduler [47], a bounded retransmission protocol [36] and parallel queues [48]. pCRL has also been encoded in PVS and a distributed summing protocol has been computer checked in [33] using the methodology presented in [35].…”
Section: Using Cones and Foci In Pvsmentioning
confidence: 99%
“…On a more concrete level, one finds in almost any proof -and correctness proofs of distributed systems or protocols are no exception -flaws that even may have impact on the correctness of the protocol. A typical example is the equality between an implementation and specification stated on page ll8 in [60] that was seen to be incorrect when a fully formalized proof was proof checked [47]. Using proof checkers can lead to a very strong emotion, which borders to addiction.…”
mentioning
confidence: 99%