2004
DOI: 10.1109/tsmca.2003.820582
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Equivalence Reduction and the Sweep-Line Method for Detecting Terminal States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2004
2004
2014
2014

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…Expression (17) is then used to calculate the slack of each token k i that enables a transition T j for marking M y . Once all slacks S j (k i ) have been calculated, the option with smallest value is chosen:…”
Section: Old Node Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Expression (17) is then used to calculate the slack of each token k i that enables a transition T j for marking M y . Once all slacks S j (k i ) have been calculated, the option with smallest value is chosen:…”
Section: Old Node Methodsmentioning
confidence: 99%
“…The old node method algorithm stored in a tree node) from which the slack calculation process begins again by means of expression (17), to determine the transition with highest priority (i.e. most urgent) to be fired for the new marking.…”
Section: Old Node Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is also possible to use the sweep-line method and the symmetry method simultaneously. This combination was investigated in [7] where it was demonstrated by means of experimental results that using the two methods simultaneously leads to better reduction than when either method is used in isolation.…”
Section: The Sweep-line Methodsmentioning
confidence: 99%
“…The theoretical foundation of the sweep-line method has been further developed in several papers [4,16,25,28,26] and the method has been implemented in the ASAP platform [35], UppAal [2], and the LoLA tool [32]. The sweep-line method has been used [17,18,22,33] for the verification of several industrialsized protocols specified using the CPN modelling language.…”
Section: Introductionmentioning
confidence: 99%