2015
DOI: 10.1007/978-3-662-49122-5_23
|View full text |Cite
|
Sign up to set email alerts
|

Tight Cutoffs for Guarded Protocols with Fairness

Abstract: Guarded protocols were introduced in a seminal paper by Emerson and Kahlon (2000), and describe systems of processes whose transitions are enabled or disabled depending on the existence of other processes in certain local states. We study parameterized model checking and synthesis of guarded protocols, both aiming at formal correctness arguments for systems with any number of processes. Cutoff results reduce reasoning about systems with an arbitrary number of processes to systems of a determined, fixed size. O… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
42
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 19 publications
(44 citation statements)
references
References 28 publications
2
42
0
Order By: Relevance
“…correctness for at most c processes implies correctness for any number of processes [16,25,24,7,31]. Other methods identify systems with well-structured transition relations [29,1,27].…”
Section: Arxiv:200207672v1 [Csdc] 18 Feb 2020mentioning
confidence: 99%
“…correctness for at most c processes implies correctness for any number of processes [16,25,24,7,31]. Other methods identify systems with well-structured transition relations [29,1,27].…”
Section: Arxiv:200207672v1 [Csdc] 18 Feb 2020mentioning
confidence: 99%
“…Overall, since we also have that querying the transition relation of K (C, U ) is cheap, we conclude that one can guess any lasso in K (C, U ) in time polynomial in |C| × |U |. 10 Note that not all such products are legal paths in A, since A contains a transition from ( p, q) to ( p , q ) only if A ¬φ has a transition from p to p while reading the atomic propositions that are true in q. 11 To see this, note that K (C, U ) is the destuttering of an automaton with O(|T |) many states and input alphabet of size |C|, and apply Lemma 1.…”
Section: Theorem 20 Fixmentioning
confidence: 69%
“…A similar result has been shown in a slightly more complex scenario (viz. controlled clique topologies with 2-indexed LTL\X) [10]. Proof Consider the process template depicted in Fig.…”
Section: Cutoffsmentioning
confidence: 99%
See 2 more Smart Citations