2012
DOI: 10.1007/978-3-642-34281-3_9
|View full text |Cite
|
Sign up to set email alerts
|

Specification and Model Checking of the Chandy and Lamport Distributed Snapshot Algorithm in Rewriting Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Moreover, the snapshot algorithm is supposed to work while another process SYSTEM is working; SYSTEM is a model for another distributed system and the snapshot algorithm is an implementation of the observation of the current system. Contrary to the verification by theorem provers [18], our work provides an architecture for developing the snapshot algorithm using essential safety properties together with a formal proof that asserts its correctness. In this paper, we have experimented on fixed networks.…”
Section: Discussion Conclusion and Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the snapshot algorithm is supposed to work while another process SYSTEM is working; SYSTEM is a model for another distributed system and the snapshot algorithm is an implementation of the observation of the current system. Contrary to the verification by theorem provers [18], our work provides an architecture for developing the snapshot algorithm using essential safety properties together with a formal proof that asserts its correctness. In this paper, we have experimented on fixed networks.…”
Section: Discussion Conclusion and Future Workmentioning
confidence: 99%
“…Another objective is to show the power of the correctby-construction process and our recipes through the redevelopment and derivation of already existing and correct snapshot algorithms like the Chandy and Lamport algorithm [9], or the algorithm of Lai and Yang [13]. Finally, the snapshot problem is already considered as a case study for illustrating the strength of rewriting logic [18] and we think that our development may help a reader to understand the behavioral theory of snapshot algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Several variants of CLDSA, such as Spezialetti-Kearns algorithm [14] and Venkatesans incremental snapshot algorithm [15], have been proposed. In an attempt to formally analyze CLDSA, the authors in [16] have used Maude [17] to model check that CLDSA enjoys the DSR property. Maude is a language and a system supporting executable specification and declarative programming in rewriting logic.…”
Section: Introductionmentioning
confidence: 99%
“…Two model checking facilities equipped with Maude are the LTL model checker and the search command. In [16], the Maude search command is used. However, the DSR property is encoded in terms of the Maude search command and the encoding does not reflect the informal description of the property originally given in [13].…”
Section: Introductionmentioning
confidence: 99%
“…There is an existing study [4] in which Maude [5] has been used to model check that CLDSA enjoys the DSR property. Maude is a specification and programming language and system based on rewriting logic, and equipped with model checking facilities: the LTL model checker and the search command.…”
Section: Introductionmentioning
confidence: 99%