2004
DOI: 10.1007/978-3-540-30538-5_24
|View full text |Cite
|
Sign up to set email alerts
|

Expand, Enlarge, and Check: New Algorithms for the Coverability Problem of WSTS

Abstract: Abstract. In this paper, we present a general algorithmic schema called "Expand, Enlarge and Check" from which new efficient algorithms for the coverability problem of WSTS can be constructed. We show here that our schema allows us to define forward algorithms that decide the coverability problem for several classes of systems for which the Karp and Miller procedure cannot be generalized, and for which no complete forward algorithms were known. Our results have important applications for the verification of pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
79
0
2

Year Published

2005
2005
2021
2021

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 40 publications
(82 citation statements)
references
References 14 publications
1
79
0
2
Order By: Relevance
“…In case the counterexample is spurious, we increase the parameter k and continue. This abstraction-refinement process is guaranteed to terminate, by either finding a genuine path that covers a given marking, or by proving that the target marking is not coverable for some parameter k in the abstraction [10]. We have found that k = 1 is usually sufficient to soundly abstract the state space and to prove a provenance property; this is consistent with other uses of counter abstractions in verification [23,17].…”
Section: Expand-enlarge-check and Partial Order Reductionsupporting
confidence: 73%
See 3 more Smart Citations
“…In case the counterexample is spurious, we increase the parameter k and continue. This abstraction-refinement process is guaranteed to terminate, by either finding a genuine path that covers a given marking, or by proving that the target marking is not coverable for some parameter k in the abstraction [10]. We have found that k = 1 is usually sufficient to soundly abstract the state space and to prove a provenance property; this is consistent with other uses of counter abstractions in verification [23,17].…”
Section: Expand-enlarge-check and Partial Order Reductionsupporting
confidence: 73%
“…Our second observation is that message passing programs have a lot of scope for partial-order reduction, by allowing a process to continue executing until it hits a blocking receive action. To take advantage of these features, we implemented a coverability checker that combines expand-enlarge-check (EEC) [10] with partial order reduction [11].…”
Section: Expspace Upper Boundsmentioning
confidence: 99%
See 2 more Smart Citations
“…This means that, in theory, the complexity of this problem is high, but in practice, there are quite efficient techniques (based on iterative computation of under/upper approximations) developed recently for solving this problem which have been implemented and used successfully in [GRB06b,GRB06a]. Moreover, we have proposed a notion of stratified context-bounding for which the verification is in NP, i.e., as hard as in the case without dynamic thread creation.…”
Section: Resultsmentioning
confidence: 99%