Lazy abstraction

TA Henzinger, R Jhala, R Majumdar… - Proceedings of the 29th …, 2002 - dl.acm.org
One approach to model checking software is based on the abstract-check-refine paradigm:
build an abstract model, then check the desired property, and if the check fails, refine the …

How to compose Presburger-accelerations: Applications to broadcast protocols

A Finkel, J Leroux - FST TCS 2002: Foundations of Software Technology …, 2002 - Springer
Finite linear systems are finite sets of linear functions whose guards are defined by
Presburger formulas, and whose the squares matrices associated generate a finite …

[PDF][PDF] Verification of flat FIFO systems

A Finkel, M Praveen - Logical Methods in Computer Science, 2020 - lmcs.episciences.org
The decidability and complexity of reachability problems and model-checking for flat counter
machines have been explored in detail. However, only few results are known for flat (lossy) …

Languages, rewriting systems, and verification of infinite-state systems

A Bouajjani - International Colloquium on Automata, Languages …, 2001 - Springer
Verification of complex systems cannot be achieved without combining several analysis
methods and techniques. A widely adopted approach consists in combining abstraction …

Forward reachability analysis of timed Petri nets

PA Abdulla, J Deneux, P Mahata, A Nylén - International Symposium on …, 2004 - Springer
We consider verification of safety properties for concurrent real-timed systems modelled as
timed Petri nets, by performing symbolic forward reachability analysis. We introduce a …

[PDF][PDF] Using Forward Reachability Analysis for Verification of Timed Petri Nets.

PA Abdulla, J Deneux, P Mahata, A Nylén - Nord. J. Comput., 2007 - user.it.uu.se
We consider verification of safety properties for concurrent real-timed systems modelled as
timed Petri nets, by performing symbolic forward reachability analysis. We introduce a …

[图书][B] Program verification by lazy abstraction

R Jhala - 2004 - Citeseer
This dissertation proposes new methods for the Safety Verification problem, which is, given
a program, an initial state 1 from which the program begins execution, and a set of error …

Polynomial time image computation with interval-definable counters systems

A Finkel, J Leroux - International SPIN Workshop on Model Checking of …, 2004 - Springer
The model checking of counters systems often reduces to the effective computation of the set
of predecessors Pre*(X′) of a Presburger-definable set X′. Because there often exists an …

Image computation in infinite state model checking

A Finkel, J Leroux - International Conference on Computer Aided …, 2004 - Springer
The model checking of a counters system S often reduces to the effective computation of the
set of predecessors \rmPre_S^*(X) of a set of integer vectors X. Because the exact …

[PDF][PDF] CSC2108-Project Report Lazy Abstraction on Software Model Checking

WS Mong - cs.toronto.edu
This paper is a survey of the BLAST, which is a software model checker for C programs
developed at Berkeley. Based on the popular abstract-check-refine paradigm, the concept of …