A Theory of Communicating Sequential Processes
Journal of the ACM (JACM)
Communicating sequential processes
Communicating sequential processes
Automatic verification of finite-state concurrent systems using temporal logic specifications
ACM Transactions on Programming Languages and Systems (TOPLAS)
Verifying a protocol using relativized bisimulation
14th International Colloquium on Automata, languages and programming
Communications of the ACM
Algebraic theory of processes
Communication and concurrency
A general-purpose algorithm for analyzing concurrent programs
Communications of the ACM
Proceedings of the Fourth Annual Symposium on Logic in computer science
Projections of the reachability graph and environment models
Proceedings of the international workshop on Automatic verification methods for finite state systems
Compositional theories based on an operational semantics of contexts
REX workshop Proceedings on Stepwise refinement of distributed systems: models, formalisms, correctness
Design and validation of computer protocols
Design and validation of computer protocols
Fundamentals of software engineering
Fundamentals of software engineering
Compositional reachability analysis using process algebra
TAV4 Proceedings of the symposium on Testing, analysis, and verification
Experiments with an improved constrained expression toolset
TAV4 Proceedings of the symposium on Testing, analysis, and verification
SIGSOFT '95 Proceedings of the 3rd ACM SIGSOFT symposium on Foundations of software engineering
An integrated method for effective behaviour analysis of distributed systems
ICSE '94 Proceedings of the 16th international conference on Software engineering
Petri Net Theory and the Modeling of Systems
Petri Net Theory and the Modeling of Systems
POPL '83 Proceedings of the 10th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Introduction To Automata Theory, Languages, And Computation
Introduction To Automata Theory, Languages, And Computation
Tractable Dataflow Analysis for Distributed Systems
IEEE Transactions on Software Engineering
Winston: A Toll for Hierarchical Design and Simulation of Concurrent Systems
Proceedings of the BCS-FACS Workshop on Specification and Verification of Concurrent Systems
Checking Equivalences Between Concurrent Systems of Finite Agents (Extended Abstract)
ICALP '92 Proceedings of the 19th International Colloquium on Automata, Languages and Programming
Compositional Minimization of Finite State Systems
CAV '90 Proceedings of the 2nd International Workshop on Computer Aided Verification
Verification in Process Algebra of the Distributed Control of Track Vehicles - A Case Study
CAV '92 Proceedings of the Fourth International Workshop on Computer Aided Verification
Analysis of communicating finite-state processes
Analysis of communicating finite-state processes
An incremental approach to reachability analysis of distributed programs
IWSSD '93 Proceedings of the 7th international workshop on Software specification and design
ACM SIGSOFT Software Engineering Notes
Distributed software architectures (tutorial)
ICSE '97 Proceedings of the 19th international conference on Software engineering
Verification of liveness properties using compositional reachability analysis
ESEC '97/FSE-5 Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering
Compositional verification of concurrent systems using Petri-net-based condensation rules
ACM Transactions on Programming Languages and Systems (TOPLAS)
Checking safety properties using compositional reachability analysis
ACM Transactions on Software Engineering and Methodology (TOSEM)
Using a coordination language to specify and analyze systems containing mobile components
ACM Transactions on Software Engineering and Methodology (TOSEM)
Behaviour Analysis of Distributed Systems Using the Tracta Approach
Automated Software Engineering
TACAS '99 Proceedings of the 5th International Conference on Tools and Algorithms for Construction and Analysis of Systems
Automated test case generation for the stress testing of multimedia systems
Software—Practice & Experience
Towards scalable compositional analysis by refactoring design models
Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering
Verified systems by composition from verified components
Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering
Workflow View Driven Cross-Organizational Interoperability in a Web Service Environment
Information Technology and Management
Flow analysis for verifying properties of concurrent software systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Component Verification with Automatically Generated Assumptions
Automated Software Engineering
Publishing and composition of atomicity-equivalent services for B2B collaboration
Proceedings of the 28th international conference on Software engineering
Spin Detection Hardware for Improved Management of Multithreaded Systems
IEEE Transactions on Parallel and Distributed Systems
ARCATS: a scalable compositional analysis tool suite
Proceedings of the 2006 ACM symposium on Applied computing
Breaking up is hard to do: an investigation of decomposition for assume-guarantee reasoning
Proceedings of the 2006 international symposium on Software testing and analysis
Automatic generation of assumptions for modular verification of software specifications
Journal of Systems and Software - Special issue: Selected papers from the 4th source code analysis and manipulation (SCAM 2004) workshop
Breaking up is hard to do: An evaluation of automated assume-guarantee reasoning
ACM Transactions on Software Engineering and Methodology (TOSEM)
Enhanced compositional safety analysis for distributed embedded systems using LTS equivalence
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Automated interface refinement for compositional verification
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
On the Observable Behaviour of Composite Components
Electronic Notes in Theoretical Computer Science (ENTCS)
Learning assumptions for compositional verification
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Safety property analysis techniques for cooperating embedded systems using LTS
SEUS'07 Proceedings of the 5th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems
Compositional reachability analysis for efficient modular verification of asynchronous designs
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Model projection: simplifying models in response to restricting the environment
Proceedings of the 33rd International Conference on Software Engineering
Compositional failure detection in structured transition systems
CIAA'11 Proceedings of the 16th international conference on Implementation and application of automata
Reverse observation equivalence between labelled state transition systems
ICTAC'04 Proceedings of the First international conference on Theoretical Aspects of Computing
Automatic synthesis of assumptions for compositional model checking
FORTE'06 Proceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Refined interfaces for compositional verification
FORTE'06 Proceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
On-the-Fly branching bisimulation minimization for compositional analysis
CIAA'06 Proceedings of the 11th international conference on Implementation and Application of Automata
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
IFM'05 Proceedings of the 5th international conference on Integrated Formal Methods
An enhanced flow analysis technique for detecting unreachability faults in concurrent systems
Information Sciences: an International Journal
SPIN'06 Proceedings of the 13th international conference on Model Checking Software
Test generation for interworking systems
Computer Communications
A compositional minimization approach for large asynchronous design verification
SPIN'12 Proceedings of the 19th international conference on Model Checking Software
Hi-index | 0.00 |
Behavior analysis of complex distributed systems has led to the search for enhanced reachability analysis techniques which support modularity and which control the state explosion problem. While modularity has been achieved, state explosion in still a problem. Indeed, this problem may even be exacerbated, as a locally minimized subsystem may contain many states and transitions forbidden by its environment or context. Context constraints, specified as interface processes, are restrictions imposed by the environment on subsystem behavior. Recent research has suggested that the state explosion problem can be effectively controlled if context constraints are incorporated in compositional reachability analysis (CRA). Although theoretically very promising, the approach has rarely been used in practice because it generally requires a more complex computational model and does not contain a mechanism to derive context constraints automatically. This article presents a technique to automate the approach while using a similar computational model to that of CRA. Context constraints are derived automatically, based on a set of sufficient conditions for these constraints to be transparently included when building reachability graphs. As a result, the global reachability graph generated using the derived constraints is shown to be observationally equivalent to that generated by CRA without the inclusion of context constraints. Constraints can also be specified explicitly by users, based on their application knowledge. Erroneous constraints which contravene transparency can be identified together with an indication of the error sources. User-specified constraints can be combined with those generated automatically. The technique is illustrated using a clients/server system and other examples.