2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed 2008
DOI: 10.1109/snpd.2008.36
|View full text |Cite
|
Sign up to set email alerts
|

Tools and Techniques for Model Checking Networked Programs

Abstract:

QC 20160103

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2009
2009

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 28 publications
(64 reference statements)
0
4
0
Order By: Relevance
“…A large search frontier implies a potentially large number of physical connections. 3 After the entire state space has been explored, the number of all physical connections ever used corresponds to the number of all distinct communication traces ever generated, which is a lower bound if the entire state space of the SUT is to be explored. For a deterministic SUT, the number of physical connections corresponds to the number of logical connections.…”
Section: Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…A large search frontier implies a potentially large number of physical connections. 3 After the entire state space has been explored, the number of all physical connections ever used corresponds to the number of all distinct communication traces ever generated, which is a lower bound if the entire state space of the SUT is to be explored. For a deterministic SUT, the number of physical connections corresponds to the number of logical connections.…”
Section: Complexitymentioning
confidence: 99%
“…Backtracking may cause a repetition of previously executed operations. This requires special treatment of communication operations, as described in the introduction, and more in depth in a recent survey [3]. Peer processes may be included in the resulting system [11], [20] or modeled by a (possibly abstracted) environment process or stub [7], [10], [14].…”
Section: Related Workmentioning
confidence: 99%
“…e.g. (Artho, 2008) The BET approach was recently popularized as an automated class testing method, e.g. (Sullivan, 2004).…”
Section: Exhaustive Testingmentioning
confidence: 99%
“…Networked applications are very complex, since they exchange data and interoperate with other entities. Several techniques have been established to verify such applications with a model checker [2]. The aim of our research is to offer another technique together with a tool, which relaxes restrictions of previous approaches.…”
Section: Introductionmentioning
confidence: 99%