Proceedings of the 3rd India Software Engineering Conference 2010
DOI: 10.1145/1730874.1730891
|View full text |Cite
|
Sign up to set email alerts
|

Proving unreachability using bounded model checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…For the first two states, the paths that we obtained turned out to be an extension of the corresponding candidate traces. This could not be obtained by [3], [2] as they could not scale to these states due to the number of states in the model. For states 3 and 4, the paths produced were spurious.…”
Section: Experimentationmentioning
confidence: 97%
See 3 more Smart Citations
“…For the first two states, the paths that we obtained turned out to be an extension of the corresponding candidate traces. This could not be obtained by [3], [2] as they could not scale to these states due to the number of states in the model. For states 3 and 4, the paths produced were spurious.…”
Section: Experimentationmentioning
confidence: 97%
“…We have implemented our abstraction technique as a part of our Statemate analysis tool [3], [2]. For our experiments, we used a Statemate model of an ECU that controls the back door functionality of a car.…”
Section: Experimentationmentioning
confidence: 99%
See 2 more Smart Citations