2006
DOI: 10.1007/11846802_13
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of Programs That Use MPI One-Sided Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 8 publications
0
18
0
Order By: Relevance
“…A complete list of publications from this award are [5,6,7] which have appeared, one special issue journal paper based on [6] under review by the journal STTT, one invited journal paper based on [5] under review by the journal Parallel Computing, a special issue of selected papers from the TV06 workshop [10] being guest-edited by the PI and accepted by the ENTCS journal.…”
Section: Discussionmentioning
confidence: 99%
“…A complete list of publications from this award are [5,6,7] which have appeared, one special issue journal paper based on [6] under review by the journal STTT, one invited journal paper based on [5] under review by the journal Parallel Computing, a special issue of selected papers from the TV06 workshop [10] being guest-edited by the PI and accepted by the ENTCS journal.…”
Section: Discussionmentioning
confidence: 99%
“…Our current implementation is tested with PVFS2, which does not support locking. We have used the algorithms presented in [15] for file locks and [17] [14] for byte range locks implementations with PVFS2. For byte range locks, we determine the start and end offsets of the byte range accessed by each process using an existing function in ROMIO i.e.…”
Section: Methodsmentioning
confidence: 99%
“…The worst case used in the experiments is the whole file locks [15], when all writes by different processes become serial. Additionally, we have also used the byte range locks as implemented in [17] [14].…”
Section: Methodsmentioning
confidence: 99%
“…It is also an accurate record of one of our earliest case studies that helped us gain traction in this new and important application area of applying model checking to analyze real-world high performance computing software. A shorter version of this paper appeared in [1]. As for other tools verifying MPI programs employing one-sided communication, the Marmot tool has been extended to detect incorrect usages of MPI one-sided communication commands [42].…”
Section: Introductionmentioning
confidence: 99%