2000 Canadian Conference on Electrical and Computer Engineering. Conference Proceedings. Navigating to a New Era (Cat. No.00TH8
DOI: 10.1109/ccece.2000.849658
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical interface-based non-blocking verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…In addition, it points out that, given a trace s, there does not necessarily exist a minimal nonconflicting completion. Therefore, not every nonconflicting completion semantics can be characterised by a set of minimal nonconflicting completions as suggested in (14).…”
Section: mentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, it points out that, given a trace s, there does not necessarily exist a minimal nonconflicting completion. Therefore, not every nonconflicting completion semantics can be characterised by a set of minimal nonconflicting completions as suggested in (14).…”
Section: mentioning
confidence: 99%
“…Several approaches of modelling and refinement have been proposed for discrete event systems [14,26,27], each suggesting a special way of designing systems such that they are free from conflict by construction. While giving some insight into how systems can be designed to be free from conflict, these techniques rely on interfaces provided by users and therefore cannot be applied automatically.…”
Section: Introductionmentioning
confidence: 99%
“…Structural (Leduc et al, 2000;Lee and Wong, 2002) and prioritybased (Wong et al, 2000) approaches have been suggested. These techniques give some insight how systems can be designed to be free from conflict, but they rely on design carried out by users, and therefore cannot be performed automatically.…”
Section: Introductionmentioning
confidence: 99%
“…A common way of fighting state explosion is to exploit modular system structures (Leduc et al, 2000;Wong and Wonham, 1998). Often it suffices to analyse only subsystems of a large system to establish that the entire system satisfies a property of interest (Åkesson et al, 2002;Brandin et al, 2004).…”
Section: Introductionmentioning
confidence: 99%
“…Several approaches to modular synthesis of discrete event systems have been suggested in the literature [4], [5], but so far most of them rely on structure to be provided by users and hence are hard to automate. Those that can be automated [6]- [9] either do not consider nonblocking, or are guaranteed to produce a least restrictive supervisor only under certain constraints.…”
Section: Introductionmentioning
confidence: 99%