Computer Aided Systems Theory – EUROCAST 2007
DOI: 10.1007/978-3-540-75867-9_65
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Model Checking of Applications with Input/Output

Abstract:

QC 20170104

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Publication Types

Select...
3
1

Relationship

4
0

Authors

Journals

citations
Cited by 4 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…Finally, there is ongoing work in adding extensions to the network library, which will allow us to check applications using features such as datagrams. We also intend to explore another alternative to centralization, which consists of I/O extensions in the model checker, which transparently relay inter-process communication packets to external processes [3]. This approach model checks only a single process at a time and prevents the process inside the model checker from physically sending the same data several times.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, there is ongoing work in adding extensions to the network library, which will allow us to check applications using features such as datagrams. We also intend to explore another alternative to centralization, which consists of I/O extensions in the model checker, which transparently relay inter-process communication packets to external processes [3]. This approach model checks only a single process at a time and prevents the process inside the model checker from physically sending the same data several times.…”
Section: Discussionmentioning
confidence: 99%
“…3 For each static field, an array containing the value of that static field for each process is maintained. Arrays are transformed into arrays of arrays, with an extra dimension for distinguishing the array content between processes.…”
Section: Static Fieldsmentioning
confidence: 99%
See 1 more Smart Citation
“…After backtracking, previously observed communication data is fetched from the cache (see Figure 6). This cache is aware of backtracking operations in the model checker [2,5].…”
Section: I/o Cachementioning
confidence: 99%
“…A special I/O cache hides backtracking operations in the model checker from external processes [2,5]. Communication with external processes is physically executed on the host until backtracking occurs.…”
Section: I/o Cachementioning
confidence: 99%