Electronic Communications of the EASST 2015
DOI: 10.14279/tuj.eceasst.72.1013
|View full text |Cite
|
Sign up to set email alerts
|

Formal Specification, Verification, and Implementation of Fault-Tolerant Systems using EventML

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The blue parts of the diagram constitute node-local instantiations of the TPC modules invoked by the nodes to handle the consensus process. As noted by Sergey et al [35], clients of core consensus protocols have not received much focus from other major verification efforts [7,30,40].…”
Section: A Replicated Logmentioning
confidence: 99%
See 2 more Smart Citations
“…The blue parts of the diagram constitute node-local instantiations of the TPC modules invoked by the nodes to handle the consensus process. As noted by Sergey et al [35], clients of core consensus protocols have not received much focus from other major verification efforts [7,30,40].…”
Section: A Replicated Logmentioning
confidence: 99%
“…EventML [30,31] is a functional language in the ML family that can be used for coding distributed protocols using high-level combinators from the Logic of Events, and verify them in the Nuprl interactive theorem prover. It is not quite clear how modular reasoning works, since one works within the model, however, the notion of a central main observer is akin to our distinguished system node.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We are not aware of works based on interactive theorem provers that verified protocols with complex thresholds as we do in this work (although doing so is of course possible). However, many works used interactive theorem provers to verify related protocols, e.g., [43,37,26,35,11,36] (the most related protocols use either n 2 or 2n 3 as the only thresholds, other protocols do not involve any thresholds). The downside of verification using interactive theorem provers is that it requires tremendous human efforts and skills.…”
Section: Related Workmentioning
confidence: 99%