1999
DOI: 10.1145/295558.295570
|View full text |Cite
|
Sign up to set email alerts
|

Checking safety properties using compositional reachability analysis

Abstract: The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compositional reachability analysis (CRA) is a promising state reduction technique which can be automated and used in stages to derive the overall behaviour of a distributed program based on its architecture. CRA is particularly suitable for the analysis of programs that are subject to evolutionary change. When a program evolves, only the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0
2

Year Published

2002
2002
2016
2016

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(54 citation statements)
references
References 45 publications
0
52
0
2
Order By: Relevance
“…It has been proved that M violates P if and only if the π state is reachable in M P err [5]. For example, state π is not reachable in Input Output Order err , so we conclude that Input Output |= Order.…”
Section: Introductionmentioning
confidence: 78%
“…It has been proved that M violates P if and only if the π state is reachable in M P err [5]. For example, state π is not reachable in Input Output Order err , so we conclude that Input Output |= Order.…”
Section: Introductionmentioning
confidence: 78%
“…Not shown in the chart is the size of the maximum state space which ranged from 2 31 -2 71 for the set of traders shown on the x-axis. The line on the left hand side in the chart plots the state space gained by using the Compositional Reachability Analysis (CRA) [1] of the LTSA model checker without applying any minimisation. The line on the right hand side shows the performance of our minimisation technique.…”
Section: Discussionmentioning
confidence: 99%
“…Additionally, we provided an algorithm for computing weakest assumptions. Update Ì using queries (5) Construct candidate DFSM from´Ë Ì µ (6) Make the conjecture (7) if is correct return else (8) Add ¾ ¦ £ that witnesses the counterexample to …”
Section: Weakest Assumptionmentioning
confidence: 99%
“…Compositional techniques have been shown particularly effective for wellstructured systems that have small interfaces between components [8,20]. Interfaces consist of all communication points through which components may influence each other's behavior.…”
Section: Introductionmentioning
confidence: 99%