Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2012
DOI: 10.1007/978-3-642-31762-0_2
|View full text |Cite
|
Sign up to set email alerts
|

The COST IC0701 Verification Competition 2011

Abstract: Abstract. This paper reports on the experiences with the program verification competition held during the FoVeOOS conference in October 2011. There were 6 teams participating in this competition. We discuss the three different challenges that were posed and the solutions developed by the teams. We conclude with a discussion about the value of such competitions and lessons that can be learned from them.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
3

Relationship

5
4

Authors

Journals

citations
Cited by 26 publications
(30 citation statements)
references
References 13 publications
0
29
0
1
Order By: Relevance
“…The rest of the table is split in two parts: the first one contains data about two-step verification; the second one the same data about modular verification. The data reported includes: the amount of specification The examples include: (1) finding the maximum in an array, from the COST 2011 verification competition [6]; (2) computing maximum and sum of the elements in an array, from the VSTTE 2010 verification competition [22]; (3) the two-way sort algorithm of Section 2, from the VSTTE 2012 verification competition [16]; (4) Dikstra's Dutch national flag algorithm [13]; (5) computing the longest common prefix of two sequences, from the FM 2012 verification competition [19]; (6) a priority queue implementation, from Tinelli's verification course [32]; (7) a double-ended queue [23, Vol. 1, Sec.…”
Section: Discussionmentioning
confidence: 99%
“…The rest of the table is split in two parts: the first one contains data about two-step verification; the second one the same data about modular verification. The data reported includes: the amount of specification The examples include: (1) finding the maximum in an array, from the COST 2011 verification competition [6]; (2) computing maximum and sum of the elements in an array, from the VSTTE 2010 verification competition [22]; (3) the two-way sort algorithm of Section 2, from the VSTTE 2012 verification competition [16]; (4) Dikstra's Dutch national flag algorithm [13]; (5) computing the longest common prefix of two sequences, from the FM 2012 verification competition [19]; (6) a priority queue implementation, from Tinelli's verification course [32]; (7) a double-ended queue [23, Vol. 1, Sec.…”
Section: Discussionmentioning
confidence: 99%
“…For the Tree Deletion challenge we initially expected the iterative nature of the algorithm over a recursive data structure to be the source of difficulties. Although, judging from a similar previous challenge [5], we still think that the recursive implementation would be simpler to verify; with the help of model methods we employed the recursion on the specification level and provided an elegant solution to this challenge.…”
Section: Discussionmentioning
confidence: 99%
“…All of the authors of this paper are experienced users and have been active developers of the KeY system for several years. Moreover, all of them participated in similar events previously [5,10,15], always with the combination of Java, JML, and KeY.…”
mentioning
confidence: 99%
“…В настоящее время для экспериментов в нашей системе мы используем програм-мы из соревнования COST IC0701 [7] и 1-го соревнования верифицированного про-граммного обеспечения [11]. Отличительная особенность сравнения эффективности систем верификации состоит в том, что они сравниваются не только по произво-дительности (измеренной в (милли)секундах).…”
Section: пример поиск максимума в массивеunclassified