2004
DOI: 10.1007/s10009-004-0149-6
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting transition locality in automatic verification of finite-state concurrent systems

Abstract: In this paper we show that statistical properties of the transition graph of a system to be verified can be exploited to improve memory or time performances of verification algorithms.\ud We show experimentally that protocols exhibit transition locality. That is, with respect to levels of a breadth-first state space exploration, state transitions tend to be between states belonging to close levels of the transition graph. We support our claim by measuring transition locality for the set of protocols included i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(29 citation statements)
references
References 27 publications
0
29
0
Order By: Relevance
“…Moreover, the approach of system level formal verification to exploit a simulator in order to carry out formal verification has been further developed in [32,33] and applied to biological contexts. Finally, all these approaches use the explicit model checker CMurphi [34].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the approach of system level formal verification to exploit a simulator in order to carry out formal verification has been further developed in [32,33] and applied to biological contexts. Finally, all these approaches use the explicit model checker CMurphi [34].…”
Section: Related Workmentioning
confidence: 99%
“…Examples are SPIN [10] and CMurphi [2,3]. Since CMurphi has already the capability of handling finite precision (i.e., C-like) real numbers, as well as interfaces toward external functions (like the one implemented by the simulator) we decided to base our work on CMurphi.…”
Section: Ivd Selecting a Model Checkermentioning
confidence: 99%
“…We choose CMurphi [2,3] as the model checker suitable for the context of this paper. The model checker role is twofold.…”
Section: Introductionmentioning
confidence: 99%
“…This protocol has more than 3 × 10 9 states, and its verification with standard Murphi would require a huge amount of RAM memory (assuming 40 bits for each state in hash compaction, we would need 15 GB of RAM for the hash table only), as well as an unacceptable computational time. On the other hand, by using a disk version of Murphi [32], the computation lasts more than 1 week (we do not know the exact amount of time, but a projection based on the first part of the verification leads to a probable execution time of 3 weeks). However, we successfully completed the verification of this protocol with Eddy Murphi on 60 nodes in approximately 9 hours.…”
Section: Case Study: a Parallel And Distributed Model Checkermentioning
confidence: 99%