2000
DOI: 10.1007/10720327_5
|View full text |Cite
|
Sign up to set email alerts
|

Infinite State Model Checking by Abstract Interpretation and Program Specialisation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
79
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 63 publications
(80 citation statements)
references
References 30 publications
1
79
0
Order By: Relevance
“…Our approach is closely related to other verification methods for infinite state systems based on the specialization of (constraint) logic programs [26,28,31]. However, unlike the approach proposed in [26,28] we use constraints, which give us very powerful means for dealing with infinite sets of states.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Our approach is closely related to other verification methods for infinite state systems based on the specialization of (constraint) logic programs [26,28,31]. However, unlike the approach proposed in [26,28] we use constraints, which give us very powerful means for dealing with infinite sets of states.…”
Section: Discussionmentioning
confidence: 99%
“…However, unlike the approach proposed in [26,28] we use constraints, which give us very powerful means for dealing with infinite sets of states. The specializationbased verification method presented in [31] consists of one phase only, incorporating top-down query directed specialization and bottom-up answer propagation.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, if ¬ϕ = def ∃x ∈ R (reachable(x) ∧ ∧ ¬safe(x)) holds, then we cannot conclude that ∃x ∈ Z (reachable(x) ∧ ∧ ¬safe(x)) holds. Now, as indicated in the literature (see, for instance, [17,19,29,30,31]) the verification of infinite state reactive systems can be done via program specialization and, in particular, in [19] we proposed a technique consisting of the following two steps: (Step 1) the specialization of the constraint logic program that encodes the given system, with respect to the query that encodes the property to be verified, and (Step 2) the construction of the perfect model of the specialized program.…”
Section: Introductionmentioning
confidence: 92%