Proceedings of the Fifth Annual ACM Symposium on Parallel Algorithms and Architectures - SPAA '93 1993
DOI: 10.1145/165231.165233
|View full text |Cite
|
Sign up to set email alerts
|

The verification of cache coherence protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0

Year Published

1994
1994
2009
2009

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(47 citation statements)
references
References 11 publications
0
47
0
Order By: Relevance
“…Some concrete examples of verification of cache protocols can be found in [6,22]. Pong and Dubois [24] described general methods that were sound but not complete, as they were based on conservative, inexact abstractions. In [16], it was shown that the PMCP for safety over broadcast protocols [14] is decidable using the general backward reachability procedure of [1].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some concrete examples of verification of cache protocols can be found in [6,22]. Pong and Dubois [24] described general methods that were sound but not complete, as they were based on conservative, inexact abstractions. In [16], it was shown that the PMCP for safety over broadcast protocols [14] is decidable using the general backward reachability procedure of [1].…”
Section: Discussionmentioning
confidence: 99%
“…In the construction, a path x leading to global state s is represented as a tuple of the form (a, A) ∈ S × 2 S , where S is the set of local states of the given cache protocol, that reflects not merely the local states present in s but also takes into account the local transitions that were fired along x to get to s, viz., the history of s along x. The extra historical information, that our construction stores, permits us to reason about safety properties for an arbitrary number of caches in an exact fashion as opposed to the standard abstract graph construction [24] that only takes into account the set of local states present in s and is thus sound but not guaranteed complete. We establish a path correspondence between concrete computations of the original system and paths in the abstract graph which also allows us to automatically generate error traces once an erroneous 'abstract state' is detected.…”
Section: Introductionmentioning
confidence: 99%
“…The works closest to ours are the methods based on counter abstraction (e.g., [7,24,23]). In particular, verification of liveness properties under fairness is addressed in [23].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Since parameterized systems contain process types with large number of behaviorally similar processes (whose behavior follows a local finite state machine or FSM), a natural state space abstraction is to group the processes based on which state of the local FSM they reside in [23,7,24]. Thus, instead of saying "process 1 is in state s, process 2 is in state t and process 3 is in state s" -we simply say "2 processes are in state s and 1 is in state t".…”
Section: Introductionmentioning
confidence: 99%
“…Lesens and Saïdi [LS97] combine predicate abstraction with a counting abstraction to verify parameterized networks of processes. A similar 0-1-many abstraction has been studied by Pong and Dubois [PD95] and Pnueli, Xu, and Zuck [PXZ02]. The PAX system [BBLS00] captures parametric systems using the WS1S logic so that finite-state abstractions can be constructed using the MONA tool.…”
Section: Abstracting Parameterized Systemsmentioning
confidence: 97%