1993
DOI: 10.1007/3-540-56610-4_94
|View full text |Cite
|
Sign up to set email alerts
|

Reachability analysis on distributed executions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

1995
1995
2014
2014

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 12 publications
0
19
0
Order By: Relevance
“…The following analysis shows that a minimum-sized fixed set should be used. The set CGS (c↓F ) can be built with worst-case time complexity O(|F | · |CGS (c↓F )| + |F | 3 S 2 ) using the algorithm in [DJR93], or slightly faster using the algorithm in [JMN95]. For each state g 1 in CGS (c↓F ), Garg and Waldecker's algorithm detects c↓F |= Poss Φ g1 with worst-case time complexity O(|F | 2 S).…”
Section: Lemma 1 For All Computations C All F ⊆ [1n ] and All Glmentioning
confidence: 99%
See 2 more Smart Citations
“…The following analysis shows that a minimum-sized fixed set should be used. The set CGS (c↓F ) can be built with worst-case time complexity O(|F | · |CGS (c↓F )| + |F | 3 S 2 ) using the algorithm in [DJR93], or slightly faster using the algorithm in [JMN95]. For each state g 1 in CGS (c↓F ), Garg and Waldecker's algorithm detects c↓F |= Poss Φ g1 with worst-case time complexity O(|F | 2 S).…”
Section: Lemma 1 For All Computations C All F ⊆ [1n ] and All Glmentioning
confidence: 99%
“…The algorithms in [DJR93,JMN95] for computing CGS (c) have on-line versions with the same time complexities as given above. The same is true of Garg and Waldecker's algorithm.…”
Section: On-line Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…This environment provides a mechanism of vectorial clocks [15], that are traced "on line". These traces are used as input for our algorithm of construction of the antichain lattice of an order [7,13]. When given as input a linear extension of 02ke-t, this algorithm has a time complexity of…”
Section: Routine Application Of Lemmas 8(1) and 5 []mentioning
confidence: 99%
“…Enumeration problems have received much interest over the past decades due to their applications in computer science [1,9,15,16,25]. For these problems the size of the output may be exponential in the size of the input, which in general is different from optimisation or counting problems where the size of the output is polynomially related to the size of the input.…”
Section: Introductionmentioning
confidence: 99%