Proceedings of the 1998 IEEE/ACM International Conference on Computer-Aided Design - ICCAD '98 1998
DOI: 10.1145/288548.289055
|View full text |Cite
|
Sign up to set email alerts
|

Verification by approximate forward and backward reachability

Abstract: Approximate reachability techniques trade off accuracy for the capacity to deal with bigger desigw. In this paper, we extend the idea of approximations using overlapping projection to symbolic backward reachability. Thti is combined with a previous method of computing ouerapprom.mate forward reachable state sets using overlapping projections. The algom"thmcomputes a superset of the set of states that lie on a path from the initial state to a state that violates a specified invan.ant property. If this set h emp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2000
2000
2006
2006

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…These include cone-of-influence abstractions [38], counter-example guided abstraction refinement [40,63], and SAT-based abstraction refinement [42,107].…”
Section: Bibliographic Notesmentioning
confidence: 99%
“…These include cone-of-influence abstractions [38], counter-example guided abstraction refinement [40,63], and SAT-based abstraction refinement [42,107].…”
Section: Bibliographic Notesmentioning
confidence: 99%
“…We believe that the methods described in these papers are orthogonal to our technique and may even be combined with our article in order to achieve better performance. A recent technique proposed by Govindaraju and Dill [1998] may be a starting point in this direction, since it also tries to identify the first spurious state in an abstract counterexample. It randomly chooses a concrete state corresponding to the first spurious state and tries to construct a real counterexample starting with the image of this state under the transition relation.…”
Section: Introductionmentioning
confidence: 99%
“…We exploit approximate traversals [5] to simplify exact verification; we follow the guided search [6,7] paradigm when combining forward and backward [8,9] traversals to mutually focus and narrow their search area; we finally exploit conjunctive partitioning and cofactor based simplifications to keep BDD sizes under control. More specifically, we present what we call "inbound-path-search", i.e., a backward search approach based on partitioning and prioritized traversal.…”
Section: Introductionmentioning
confidence: 99%