DOI: 10.1007/978-3-540-75142-7_32
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Temporal Logic Predicates on Distributed Computations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…Some examples of the predicates for which the predicate detection can be solved efficiently are: conjunctive [7,20], disjunctive [7], observer-independent [21,7], linear [7], non-temporal regular [22,9] predicates and temporal [8,23,24].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some examples of the predicates for which the predicate detection can be solved efficiently are: conjunctive [7,20], disjunctive [7], observer-independent [21,7], linear [7], non-temporal regular [22,9] predicates and temporal [8,23,24].…”
Section: Related Workmentioning
confidence: 99%
“…We show in this paper that it is sufficient to unroll the d-diagram N times where N is the number of processes in the system. We note here that there has been earlier work in detection of temporal logic formulas on distributed computation, such as [7][8][9][10]. However, the earlier work was restricted to verifying the temporal logic formula on the finite computation with the interpretation of liveness predicates modified to work for finite posets.…”
Section: Introductionmentioning
confidence: 99%
“…The restrictive use of negation in [87] is relaxed in [83]. Even though the work in [83,87] is applicable to a richer fragment of temporal logic, these algorithms work with a central monitor.…”
Section: Ltl Predicate Detection Intrusiveness Typesmentioning
confidence: 99%
“…These slices are based on fragments of the logic used to express the global state predicates. These fragments include regular, co-regular, linear, relational and stable predicates (see Mittal and Garg [78], Mittal et al [79], Sen and Garg [88], Ogale and Garg [83]). Some of these solutions construct the slices offline, assuming that the whole histories are available to the slicing algorithms, while others work online, building the slice incrementally.…”
Section: Ltl Predicate Detection Intrusiveness Typesmentioning
confidence: 99%
See 1 more Smart Citation