2002
DOI: 10.1016/s1567-8326(02)00023-1
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic model checking of timed guarded commands using difference decision diagrams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
24
0

Year Published

2002
2002
2007
2007

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(24 citation statements)
references
References 47 publications
0
24
0
Order By: Relevance
“…To represent the state space, Uppaal can use Clock Difference Diagrams (CDDs) [LWYP98], or DBMs. Difference Decision Diagrams (DDDs) [MLAH01] are BDD-like data structures to handle boolean formulas over inequalities of the form x − y < c and x − y ≤ c, and can be used to represent and explore sets of states of a timed system. The associated tool can verify a real time system modeled as a timed guarded command program in a fully symbolic way, by performing reachability analysis and model checking of TCTL formulas using standard fixed-point iteration algorithms.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To represent the state space, Uppaal can use Clock Difference Diagrams (CDDs) [LWYP98], or DBMs. Difference Decision Diagrams (DDDs) [MLAH01] are BDD-like data structures to handle boolean formulas over inequalities of the form x − y < c and x − y ≤ c, and can be used to represent and explore sets of states of a timed system. The associated tool can verify a real time system modeled as a timed guarded command program in a fully symbolic way, by performing reachability analysis and model checking of TCTL formulas using standard fixed-point iteration algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Despite their efficiency, such techniques are basically explicit-state: a complete assignment to propositional variables is associated with a complete region, and the amount of required memory is the most limiting factor in the verification process. Recently proposed techniques, such as DDD [MLAH01], CDDs [LWYP98], and RED [Wan00], provide symbolic representations for the search space. Also in this case, however, the memory requirements can be substantial, because of the inheritance of the properties of Binary Decision Diagrams.…”
Section: Introductionmentioning
confidence: 99%
“…Several verification tools for TA have been devised and implemented so far [15,19,23,24,28,33,34,35,36,37,40]. UPPAAL [6,28] is one of the popular tool with DBM technology.…”
Section: Related Workmentioning
confidence: 99%
“…DDD is a reachability analyzer based on BDD-like data-structures for TA [23,24]. SGM [37] is a compositional safety (reachability) analyzer for TA, also based on DBM technology.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation