Sciweavers

36 search results - page 4 / 8
» fmsd 2006
Sort
View
FMSD
2002
128views more  FMSD 2002»
13 years 5 months ago
Combining Software and Hardware Verification Techniques
Combining verification methods developed separately for software and hardware is motivated by the industry's need for a technology that would make formal verification of reali...
Robert P. Kurshan, Vladimir Levin, Marius Minea, D...
FMSD
1998
60views more  FMSD 1998»
13 years 5 months ago
The General Product Machine: a New Model for Symbolic FSM Traversal
Proving the equivalenceof two Finite State Machines (FSMs) has many applications to synthesis, veri cation, testing, and diagnosis. Building their product machine is a theoretical ...
Gianpiero Cabodi, Paolo Camurati, Fulvio Corno, Pa...
FMSD
1998
77views more  FMSD 1998»
13 years 5 months ago
An Analysis of Bitstate Hashing
The bitstate hashing, or supertrace, technique was introduced in 1987 as a method to increase the quality of verification by reachability analyses for applications that defeat anal...
Gerard J. Holzmann
FMSD
2006
59views more  FMSD 2006»
13 years 6 months ago
Optimistic synchronization-based state-space reduction
Reductions that aggregate fine-grained transitions into coarser transitions can significantly reduce the cost of automated verification, by reducing the size of the state space. W...
Scott D. Stoller, Ernie Cohen
FMSD
2006
103views more  FMSD 2006»
13 years 6 months ago
Cones and foci: A mechanical framework for protocol verification
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between ...
Wan Fokkink, Jun Pang, Jaco van de Pol