Systems and Software Verification 2001
DOI: 10.1007/978-3-662-04558-9_3
|View full text |Cite
|
Sign up to set email alerts
|

Model Checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
69
0

Year Published

2002
2002
2012
2012

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 56 publications
(69 citation statements)
references
References 0 publications
0
69
0
Order By: Relevance
“…Indeed, the system potentially formed by any model of C 1 and C 2 would not be closed as the occurence of ?e would still be under the control of the environment. Now by preventing the environment from producing !e when C 1 and C 2 are in their initial state, the reachability of the exception state pairs (4, 1) can be avoided 4 . In this section, let us now be optimistic and declare composable any C 1 and C 2 if there exists at least one environment, closing the system and preventing the reachability of bad states of C 1 and C 2 in which the reachability property cannot be guaranteed.…”
Section: Optimistic Composition Of Marked Modal Specificationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, the system potentially formed by any model of C 1 and C 2 would not be closed as the occurence of ?e would still be under the control of the environment. Now by preventing the environment from producing !e when C 1 and C 2 are in their initial state, the reachability of the exception state pairs (4, 1) can be avoided 4 . In this section, let us now be optimistic and declare composable any C 1 and C 2 if there exists at least one environment, closing the system and preventing the reachability of bad states of C 1 and C 2 in which the reachability property cannot be guaranteed.…”
Section: Optimistic Composition Of Marked Modal Specificationsmentioning
confidence: 99%
“…However, termination is in general not preserved by service composition. Although reachability properties are easy to verify in this context [4], model-checking may not be an appropriate solution. First, because it requires to construct the reachability graph of a system which may lead to a state explosion problem.…”
Section: Introductionmentioning
confidence: 99%
“…Requirements engineers can use the names of features from the feature tree and manipulate them as blocks to derive sequences from the text and present them as use cases (Cockburn, 2000), UML sequence diagrams (Cockburn, 1997) or sequential processes in the process algebra notation (Baeten and Weijland, 1990) or as property-formulas in the linear logic (Felty and Namijoshi, 2003;Berard et al, 2001). Now, let us imagine that one of our customers needs to produce anonymous cards, and another onepersonalized cards.…”
Section: Formalizing Requirements For the Systems Producing Anonymousmentioning
confidence: 99%
“…Model checking, i.e., the automated verification that (the formal model of) a system satisfies some formal behavioral property, has proved to be a revolutionary advance for the correctness of critical systems, see, e.g., [13,2].…”
Section: Introductionmentioning
confidence: 99%
“…Additional parameters, such as alphabet size and number of states, are used in [55]. Problems complete for the classes W [1], W [2] and W[P] are investigated in [55,8]. Compared to our study, these works mainly consider deterministic automata and are concerned with automata-theoretic (or language-theoretic) questions rather than verification and model-checking questions.…”
Section: Introductionmentioning
confidence: 99%