1992
DOI: 10.1007/bf00121127
|View full text |Cite
|
Sign up to set email alerts
|

On-the-fly verification of finite transition systems

Abstract: The analysis of programs by the exhaustive inspection of reachable states in a finite-state graph is a well-understood procedure. It is straightforwardly applicable to many description languages and is actually implemented in several industrial tools. But one of the main limitations of today's verification tools is the size of the memory needed to exhaustively build the state graphs of the programs. For numerous properties, it is not necessary to explicitly build this graph; an exhaustive depth-first traversal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

1994
1994
2017
2017

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(15 citation statements)
references
References 25 publications
0
15
0
Order By: Relevance
“…-On-the-fly verification (see e.g., [9,8,21,31,29]) consists of enumerating the states and transitions in an order determined by a property of interest, thus enabling one to find property violations before the whole system graph has been generated. -Compositional verification (see e.g., [7, 28, 41, 44, 46, 6, 38, 16, 24, 39, 14, 11]) consists of replacing individual processes by property-preserving abstractions of limited size.…”
Section: Introductionmentioning
confidence: 99%
“…-On-the-fly verification (see e.g., [9,8,21,31,29]) consists of enumerating the states and transitions in an order determined by a property of interest, thus enabling one to find property violations before the whole system graph has been generated. -Compositional verification (see e.g., [7, 28, 41, 44, 46, 6, 38, 16, 24, 39, 14, 11]) consists of replacing individual processes by property-preserving abstractions of limited size.…”
Section: Introductionmentioning
confidence: 99%
“…Classical approaches are graph compressions and forward checking [9,10]. ✓ Other techniques construct a reduced reachability graph associated to the original, based on some properties to preserve [4,12].…”
Section: Approachmentioning
confidence: 99%
“…On-the-fly verification (e.g., [16,15,38,33,46,45]) consists in performing Lts generation and verification at the same time. This avoids to generate the entire Lts when the verification only requires a part of it.…”
Section: Introductionmentioning
confidence: 99%