共查询到20条相似文献,搜索用时 15 毫秒
1.
Carl Pixley Vigyan Singhal 《International Journal on Software Tools for Technology Transfer (STTT)》1999,2(3):288-306
Current practices in the verification of commercial hardware designs (digital, synchronous, and sequential semiconductors)
are described. Recent advances in verification by the mathematical technique called model checking are described, and requirements
for the successful application of model checking in commercial design are discussed. 相似文献
2.
Safety,liveness and fairness in temporal logic 总被引:1,自引:0,他引:1
A. Prasad Sistla 《Formal Aspects of Computing》1994,6(5):495-511
In this paper we present syntactic characterization of temporal formulas that express various properties of interest in the verification of concurrent programs. Such a characterization helps us in choosing the right techniques for proving correctness with respect to these properties. The properties that we consider include safety properties, liveness properties and fairness properties. We also present algorithms for checking if a given temporal formula expresses any of these properties.This work is partly supported by NSF grant CCR-9212183. A preliminary version of this paper appeared in the Fourth ACM Symposium on Principles of Distributed Computing. 相似文献
3.
Summary. We set out a modal logic for reasoning about multilevel security of probabilistic systems. This logic contains expressions
for time, probability, and knowledge. Making use of the Halpern-Tuttle framework for reasoning about knowledge and probability,
we give a semantics for our logic and prove it is sound. We give two syntactic definitions of perfect multilevel security
and show that their semantic interpretations are equivalent to earlier, independently motivated characterizations. We also
discuss the relation between these characterizations of security and between their usefulness in security analysis. 相似文献
4.
Constraint-based deductive model checking 总被引:2,自引:0,他引:2
Giorgio Delzanno Andreas Podelski 《International Journal on Software Tools for Technology Transfer (STTT)》2001,3(3):250-270
We show that constraint logic programming (CLP) can serve as a conceptual basis and as a practical implementation platform
for the model checking of infinite-state systems. CLP programs are logical formulas (built up from constraints) that have
both a logical interpretation and an operational semantics. Our contributions are: (1) a translation of concurrent systems
(imperative programs) into CLP programs with the same operational semantics; and (2) a deductive method for verifying safety
and liveness properties of the systems which is based on the logical interpretation of the CLP programs produced by the translation.
We have implemented the method in a CLP system and verified well-known examples of infinite-state programs over integers,
using linear constraints here as opposed to Presburger arithmetic as in previous solutions.
Published online: 18 July 2001 相似文献
5.
6.
Model checking JAVA programs using JAVA PathFinder 总被引:5,自引:0,他引:5
Klaus Havelund Thomas Pressburger 《International Journal on Software Tools for Technology Transfer (STTT)》2000,2(4):366-381
This paper describes a translator called Java PathFinder (Jpf), which translates from Java to Promela, the modeling language
of the Spin model checker. Jpf translates a given Java program into a Promela model, which then can be model checked using
Spin. The Java program may contain assertions, which are translated into similar assertions in the Promela model. The Spin
model checker will then look for deadlocks and violations of any stated assertions. Jpf generates a Promela model with the
same state space characteristics as the Java program. Hence, the Java program must have a finite and tractable state space.
This work should be seen in a broader attempt to make formal methods applicable within NASA’s areas such as space, aviation,
and robotics. The work is a continuation of an effort to formally analyze, using Spin, a multi-threaded operating system for
the Deep-Space 1 space craft, and of previous work in applying existing model checkers and theorem provers to real applications. 相似文献
7.
Henrik Reif Andersen Jorn Lind-Nielsen 《International Journal on Software Tools for Technology Transfer (STTT)》1999,2(3):242-259
Partial model checking is a technique for verifying concurrent systems. It gradually reduces the verification problem to the final answer by removing concurrent components one-by-one, transforming and minimizing the specifications as it proceeds. This paper gives a survey of the theory behind partial model checking and the results obtained with it. 相似文献
8.
Verification of the randomized consensus algorithm of Aspnes and Herlihy: a case study 总被引:1,自引:0,他引:1
Summary. The Probabilistic I/O Automaton model of [31] is used as the basis for a formal presentation and proof of the randomized
consensus algorithm of Aspnes and Herlihy. The algorithm guarantees termination within expected polynomial time. The Aspnes-Herlihy
algorithm is a rather complex algorithm. Processes move through a succession of asynchronous rounds, attempting to agree at
each round. At each round, the agreement attempt involves a distributed random walk. The algorithm is hard to analyze because
of its use of nontrivial results of probability theory (specifically, random walk theory which is based on infinitely many
coin flips rather than on finitely many coin flips), because of its complex setting, including asynchrony and both nondeterministic
and probabilistic choice, and because of the interplay among several different sub-protocols. We formalize the Aspnes-Herlihy
algorithm using probabilistic I/O automata. In doing so, we decompose it formally into three subprotocols: one to carry out
the agreement attempts, one to conduct the random walks, and one to implement a shared counter needed by the random walks.
Properties of all three subprotocols are proved separately, and combined using general results about automaton composition.
It turns out that most of the work involves proving non-probabilistic properties (invariants, simulation mappings, non-probabilistic
progress properties, etc.). The probabilistic reasoning is isolated to a few small sections of the proof. The task of carrying
out this proof has led us to develop several general proof techniques for probabilistic I/O automata. These include ways to
combine expectations for different complexity measures, to compose expected complexity properties, to convert probabilistic
claims to deterministic claims, to use abstraction mappings to prove probabilistic properties, and to apply random walk theory
in a distributed computational setting. We apply all of these techniques to analyze the expected complexity of the algorithm.
Received: February 1999 / Accepted: March 2000 相似文献
9.
Interaction among autonomous agents in Multi-Agent Systems (MASs) is a key aspect for agents to coordinate with one another. Social approaches, as opposed to the mental approaches, have recently received a considerable attention in the area of agent communication. They exploit observable social commitments to develop a verifiable formal semantics through which communication protocols can be specified. Developing and implementing algorithmic model checking for social commitments have been recently addressed. However, model checking social commitments in the presence of uncertainty is yet to be investigated.In this paper, we propose a model checking technique for verifying social commitments in uncertain settings. Social commitments are specified in a modal logical language called Probabilistic Computation Tree Logic of Commitments (PCTLC). The modal logic PCTLC extends PCTL, the probabilistic extension of CTL, with modalities for commitments and their fulfillments. The proposed verification method is a reduction-based model checking technique to the model checking of PCTL. The technique is based upon a set of reduction rules that translate PCTLC formulae to PCTL formulae to take benefit of existing model checkers such as PRISM. Proofs that confirm the soundness of the reduction technique are presented. We also present rules that transform our new version of interpreted systems into models of Markov Decision Processes (MDPs) to be suitable for the PRISM tool. We implemented our approach on top of the PRISM model checker and verified some given properties for the Oblivious Transfer Protocol from the cryptography domain. Our simulation demonstrates the effectiveness of our approach in verifying and model checking social commitments in the presence of uncertainty. We believe that the proposed formal verification technique will advance the literature of social commitments in such a way that not only representing social commitments in uncertain settings is doable, but also verifying them in such settings becomes achievable. 相似文献
10.
Holger Hermanns Joost-Pieter Katoen Joachim Meyer-Kayser Markus Siegle 《International Journal on Software Tools for Technology Transfer (STTT)》2003,4(2):153-172
Markov chains are widely used in the context of the performance and reliability modeling of various systems. Model checking
of such chains with respect to a given (branching) temporal logic formula has been proposed for both discrete [34, 10] and
continuous time settings [7, 12]. In this paper, we describe a prototype model checker for discrete and continuous-time Markov
chains, the Erlangen–Twente Markov Chain Checker E⊢MC2, where properties are expressed in appropriate extensions of CTL. We illustrate the general benefits of this approach and
discuss the structure of the tool. Furthermore, we report on successful applications of the tool to some examples, highlighting
lessons learned during the development and application of E⊢MC2.
Published online: 19 November 2002
Correspondence to: Holger Hermanns 相似文献
11.
Klaus Havelund Willem Visser 《International Journal on Software Tools for Technology Transfer (STTT)》2002,4(1):8-20
This paper introduces a special section of the STTT journal containing a selection of papers that were presented at the 7th
international SPIN workshop, Stanford, 30 August – 1 September 2000. The workshop was named SPIN Model Checking and Software
Verification, with an emphasis on model checking of programs. The paper outlines the motivation for stressing software verification,
rather than only design and model verification, by presenting the work done in the Automated Software Engineering group at
NASA Ames Research Center within the last 5 years. This includes work in software model checking, testing like technologies
and static analysis.
Published online: 2 October 2002 相似文献
12.
Summary. When designing distributed systems, one is faced with the problem of verifying a refinement between two specifications, given
at different levels of abstraction. Suggested verification techniques in the literature include refinement mappings and various
forms of simulation. We present a verification method, in which refinement between two systems is proven by constructing a
transducer that inputs a computation of a concrete system and outputs a matching computation of the abstract system. The transducer
uses a FIFO queue that holds segments of the concrete computation that have not been matched yet. This allows a finite delay between
the occurrence of a concrete event and the determination of the corresponding abstract event. This delay often makes the use
of prophecy variables or backward simulation unnecessary.
An important generalization of the method is to prove refinement modulo some transformation on the observed sequences of events.
The method is adapted by replacing the FIFO queue by a component that allows the appropriate transformation on sequences of events. A particular case is partial-order refinement, i.e., refinement that preserves only a subset of the orderings between events of a system. Examples are sequential consistency
and serializability. The case of sequential consistency is illustrated on a proof of sequential consistency of a cache protocol. 相似文献
13.
Wim H. Hesselink 《Distributed Computing》1999,12(4):197-207
Summary. Progress is investigated for a shared-memory distributed system with a weak form of fault tolerance that allows processes to stop and restart functioning without notification. The concept of bounded fairness is introduced to formalize bounded delay under the assumption that each family of related processes continuously contains at least one active member. This is a generalization of wait-freedom, and also of a finitary form of weak fairness. Several useful proof rules are stated and proved. In a system with bounded fairness, a wait-free process can be constructed by forming a new process in which processes from the various families are scheduled in a round robin way. The theory is applied to prove progress within bounded delay for a linearizing concurrent data-object in shared memory. The safety properties of this algorithm have been treated elsewhere. Received: April 1998 / Accepted: March 1999 相似文献
14.
交互时态逻辑已被广泛应用于开放系统的规范描述,交互时态逻辑的模型检测技术是一个比较重要的验证方法。为了形式化描述和验证具有模糊不确定性信息的开放系统的性质,提出了一种模糊交互时态逻辑,并讨论了它的模型检测问题。首先,引入了模糊交互时态逻辑的基于路径和基于不动点的两种语义,证明了其等价性。然后,基于其等价性,给出了模糊交互时态逻辑的模型检测算法和复杂性分析。 相似文献
15.
Local model checking and protocol analysis 总被引:1,自引:1,他引:1
Xiaoqun Du Scott A. Smolka Rance Cleaveland 《International Journal on Software Tools for Technology Transfer (STTT)》1999,2(3):219-241
This paper describes a local model-checking algorithm for the alternation-free fragment of the modal mu-calculus that has
been implemented in the Concurrency Factory and discusses its application to the analysis of a real-time communications protocol.
The protocol considered is RETHER, a software-based, real-time Ethernet protocol developed at SUNY at Stony Brook. Its purpose is to provide guaranteed bandwidth
and deterministic, periodic network access to multimedia applications over commodity Ethernet hardware. Our model-checking
results show that (for a particular network configuration) RETHER makes good on its bandwidth guarantees to real-time nodes without exposing non-real-time nodes to the possibility of starvation.
Our data also indicate that, in many cases, the state-exploration overhead of the local model checker is significantly smaller
than the total amount that would result from a global analysis of the protocol. In the course of specifying and verifying
RETHER, we also identified an alternative design of the protocol that warranted further study due to its potentially smaller run-time
overhead in servicing requests for data transmission. Again, using local model checking, we showed that this alternative design
also possesses the properties of interest. This observation points out one of the often-overlooked benefits of formal verification:
by forcing designers to understand their designs rigorously and abstractly, these techniques often enable the designers to
uncover interesting design alternatives. 相似文献
16.
17.
18.
19.
KRONOS: a verification tool for real-time systems 总被引:19,自引:1,他引:19
Sergio Yovine 《International Journal on Software Tools for Technology Transfer (STTT)》1997,1(1-2):123-133
20.
Carlo Combi Giuseppe Pozzi 《The VLDB Journal The International Journal on Very Large Data Bases》2001,9(4):294-311
The granularity of given temporal information is the level of abstraction at which information is expressed. Different units of measure allow
one to represent different granularities. Indeterminacy is often present in temporal information given at different granularities:
temporal indeterminacy is related to incomplete knowledge of when the considered fact happened. Focusing on temporal databases, different granularities
and indeterminacy have to be considered in expressing valid time, i.e., the time at which the information is true in the modeled
reality. In this paper, we propose HMAP (The term is the transliteration of an ancient Greek poetical word meaning “day”.), a temporal data model extending the capability
of defining valid times with different granularity and/or with indeterminacy. In HMAP, absolute intervals are explicitly represented by their start,end, and duration: in this way, we can represent valid times as “in December 1998 for five hours”, “from July 1995, for 15 days”, “from March
1997 to October 15, 1997, between 6 and 6:30 p.m.”. HMAP is based on a three-valued logic, for managing uncertainty in temporal relationships. Formulas involving different temporal
relationships between intervals, instants, and durations can be defined, allowing one to query the database with different
granularities, not necessarily related to that of data. In this paper, we also discuss the complexity of algorithms, allowing
us to evaluate HMAP formulas, and show that the formulas can be expressed as constraint networks falling into the class of simple temporal problems,
which can be solved in polynomial time.
Received 6 August 1998 / Accepted 13 July 2000 Published online: 13 February 2001 相似文献