2004
DOI: 10.1007/978-3-540-28644-8_18
|View full text |Cite
|
Sign up to set email alerts
|

Verification by Network Decomposition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
70
1
2

Year Published

2006
2006
2020
2020

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 63 publications
(76 citation statements)
references
References 24 publications
3
70
1
2
Order By: Relevance
“…Intuitively, dining philosophers requires us to trace indexed processes along a computation, e.g., ∀i. G (hungry i → (F eating i )), and thus to employ indexed temporal logics for specifications [7,11,12,14].…”
Section: Threshold-guarded Distributed Algorithmsmentioning
confidence: 99%
“…Intuitively, dining philosophers requires us to trace indexed processes along a computation, e.g., ∀i. G (hungry i → (F eating i )), and thus to employ indexed temporal logics for specifications [7,11,12,14].…”
Section: Threshold-guarded Distributed Algorithmsmentioning
confidence: 99%
“…As previously discussed, this work draws on and generalizes the work in [36] on pairwise rendezvous on cliques, the work in [24] on disjunctive guards on cliques, and the work in [2,16,28] on token-passing systems. There are very few published complexity lower-bounds for PMCP (notable exceptions are [30,48]), and to the best of our knowledge, our lower bounds on the sizes of cutoffs are the first proven non-trivial lower bounds for these types of systems.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Often, it is proved decidable by a reduction to model checking finitely many finite-state systems [2,16,24,28,36]. In many of these cases it is even possible to reduce the problem of whether a parameterized system satisfies a temporal specification for any number of processes to the same problem for systems with at most c processes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many approaches to this problem have been developed over the years, including the use of symbolic automata-based techniques, network invariants, predicate abstraction or system symmetry (see an excellent overview in [CTTV04]). Methods that are most closely related to our work are based on abstraction (for example, an extension of Murφ uses abstraction for replicated identical components [ID96]).…”
Section: Related Workmentioning
confidence: 99%