Sciweavers

218 search results - page 9 / 44
» Verifying Safety Properties with the TLA Proof System
Sort
View
116
Voted
ISOLA
2007
Springer
15 years 6 months ago
Proved Development of the Real-Time Properties of the IEEE 1394 Root Contention Protocol with the Event B Method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm, Dominique Cansell
HYBRID
2004
Springer
15 years 6 months ago
Incremental Search Methods for Reachability Analysis of Continuous and Hybrid Systems
Abstract. In this paper we present algorithms and tools for fast and efficient reachability analysis, applicable to continuous and hybrid systems. Most of the work on reachability ...
Amit Bhatia, Emilio Frazzoli
225
Voted
POPL
2004
ACM
16 years 29 days ago
Abstractions from proofs
stractions from Proofs Ranjit Jhala1 Kenneth L. McMillan2 1 UC San Diego 2 Cadence Berkeley Laboratories We present a technique for using infeasible program paths to automatically ...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...
95
Voted
CAV
2007
Springer
173views Hardware» more  CAV 2007»
15 years 6 months ago
Array Abstractions from Proofs
stractions from Proofs Ranjit Jhala1 Kenneth L. McMillan2 1 UC San Diego 2 Cadence Berkeley Laboratories We present a technique for using infeasible program paths to automatically ...
Ranjit Jhala, Kenneth L. McMillan
133
Voted
LICS
1993
IEEE
15 years 4 months ago
Verifying Programs with Unreliable Channels
We consider the veri cation of a particular class of in nite-state systems, namely systems consisting of nite-state processes that communicate via unbounded lossy FIFO channels. T...
Parosh Aziz Abdulla, Bengt Jonsson