1998
DOI: 10.1007/bfb0054187
|View full text |Cite
|
Sign up to set email alerts
|

Automated verification of Szymanski's algorithm

Abstract: Abstract. The algorithm for mutual exclusion proposed by B. Szymanski is an interesting challenge for verification methods and tools. Several full proofs have been described in the literature, but they seem to require lengthy interactive sessions with powerful theorem provers. As far as this algorithm makes use of only the most elementary facts of arithmetics, we conjectured that a simple, non-interactive proof should exist; this paper gives such a proof, describes its development and how an elementaxy tool ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2000
2000
2011
2011

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…2. Other examples are: a different formulation of Szymanski's algorithm taken from [16], a model for reference counting in virtual memory [14], and variants of the readers/writers mutual exclusion protocol. All examples are described in the appendix.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…2. Other examples are: a different formulation of Szymanski's algorithm taken from [16], a model for reference counting in virtual memory [14], and variants of the readers/writers mutual exclusion protocol. All examples are described in the appendix.…”
Section: Resultsmentioning
confidence: 99%
“…2), and Gribomont-Zenner's mutex Fig. 2 Szymanski's algorithm [21] (left), and its parameterized model (right) algorithm from [16]. Several synchronization and reference counting examples using unbounded integer counters are also considered.…”
Section: Extensions and Other Case Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…In Szymanski's algorithm for mutual exclusion [20,35], there are an arbitrary number of processes organized in a linear array, where the index of the array denotes the process ID. In the algorithm, the local state of each process i consists of a control state pc[i], ranging over the integers from 1 to 7 and of two boolean flags, w[i] and s[i].…”
Section: Szymanski's Algorithmmentioning
confidence: 99%
“…Representative works of this approach include methods based on: explicit induction [EN95], network invariants that can be viewed as implicit induction [LHR97], abstraction and approximation of network invariants [CGJ95], and other methods based on abstraction [GZ98]. Other methods include those relying on "regular model-checking" (e.g., [JN00]) that overcome some of the complexity issues by employing acceleration procedures, methods based on symmetry reduction (e.g., [GS97]), or compositional methods (e.g., ([McM99]), combining automatic abstraction with finite-instantiation due to symmetry.…”
Section: I K P( I)mentioning
confidence: 99%