1996
DOI: 10.1007/bf01211911
|View full text |Cite
|
Sign up to set email alerts
|

Compositional minimisation of finite state systems using interface specifications

Abstract: We present a method for the compositional construction of the minimal transition system that represents the semantics of a given distributed system. Our aim is to control the state explosion caused by the interleavings of actions of communicating parallel components by reduction steps that exploit global communication constraints given in terms of interface specifications. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
63
0

Year Published

2000
2000
2009
2009

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 93 publications
(63 citation statements)
references
References 13 publications
0
63
0
Order By: Relevance
“…• Round robin mutex protocol (Robin) [16] models a round robin solution to the mutual exclusion problem. N is the number of processes involved.…”
Section: Resultsmentioning
confidence: 99%
“…• Round robin mutex protocol (Robin) [16] models a round robin solution to the mutual exclusion problem. N is the number of processes involved.…”
Section: Resultsmentioning
confidence: 99%
“…The result of model checking is the same if we use the assumption or the original process. Second, while using the assumption may significantly accelerate the model checking, there is no penalty in the form of increased complexity as introduced by the intermediate state explosion problem [10,8] or by using deterministic automata [6,2,1,8]. In the worst case, the generated assumption is as large as the process itself.…”
Section: Discussionmentioning
confidence: 99%
“…This reduction technique resembles the methods for process minimization used in compositional reachability analysis [21,22,10,3], which reduce a partially composed system to an observationally equivalent process. However, our equivalence relation is different: rather than preserving the entire observational behavior of a process, we only preserve the reachability of an error.…”
Section: Introductionmentioning
confidence: 99%
“…This issue has been addressed by enhanced compositional verification approaches [19,7,37,8,9,18,26,6,16], which permit the generation of the Lts of an individual process by taking into account interface constraints (also known as environment constraints or context constraints). These constraints express the behavioural restrictions imposed on the considered process by synchronization with its neighbour processes.…”
Section: Introductionmentioning
confidence: 99%
“…This approach is supported in the framework of Csp by the Tracta tool [16]. In the second approach, the process is constrained using a specific semi-composition operator [19,18,26], which cuts the process states and transitions that cannot be reached when considering the traces of the interface as the only possible interactions between the process and its environment. This approach is supported in the framework of Lotos by the Projector [26] and Svl [12] tools of Cadp (Construction and Analysis of Distributed Processes) [13] and was used in the verification of an industrial protocol [35].…”
Section: Introductionmentioning
confidence: 99%