2001
DOI: 10.1007/3-540-44798-9_22
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Transition Locality in Automatic Verification

Abstract: Abstract. In this paper we present an algorithm to contrast state explosion when using Explicit State Space Exploration to verify protocols. We show experimentally that protocols exhibit transition locality. We present a verification algorithm that exploits transition locality as well as an implementation of it within the Murϕ verifier. Our algorithm is compatible with all Breadth First (BF) optimization techniques present in the Murϕ verifier and it is by no means a substitute for any of them. In fact, since … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
24
1

Year Published

2003
2003
2005
2005

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 14 publications
(26 citation statements)
references
References 17 publications
1
24
1
Order By: Relevance
“…This was done as illustrated, respectively, in [9] and [2]. The resulting verifiers are called, respectively, Cached-Murϕ and Disk-Murϕ.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…This was done as illustrated, respectively, in [9] and [2]. The resulting verifiers are called, respectively, Cached-Murϕ and Disk-Murϕ.…”
Section: Resultsmentioning
confidence: 99%
“…Our goal is to devise a serialization scheme for the RAM based state exploration algorithm presented in [9] (CBF, for Cached Breadth First visit in the following) and the disk based state exploration algorithm presented in [2] (DBF, for Disk Breadth First visit in the following). Figure 1 shows the algorithm and data structures used by a Breadth First (BF) visit.…”
Section: State Space Exploration Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations