منابع مشابه
Rmo Description in Mur'
(d2) calls Dep Reg() which returns true if the preceding instruction is writing the same register that is read by the following instruction (strictly speaking, the same temporary location in register renaming scheme). Note that the dependence through the condition code register is checked separately, since branch instructions read the condition code register which is modified by such instructio...
متن کاملParallelizing the Mur' Veriier
With the use of state and memory reduction techniques in veri cation by explicit state enumeration, runtime becomes a major limiting factor. We describe a parallel version of the explicit state enumeration veri er Mur' for distributed memory multiprocessors and networks of workstations that is based on the message passing paradigm. In experiments with three complex cache coherence protocols, pa...
متن کاملThe Mur' Verification System
Computer Systems Laboratory Stanford University Email: [email protected] Abstract. This is a brief overview of the Mur' verification system. The Mur' description language Mur' is both a description language and a verifier for finite state concurrent systems [DDHY92]. It is appropriate for protocols and finite-state systems which can reasonably be modelled as a collection of processes that ru...
متن کامل412 Sexual Dimorphism of Mur
The sex-dependent differences in serum levels of complement components have been reported concerning C4 (1), C5 (2, 3), C6 (3), C4-binding protein (C4-bp) ~ (4), and sex-limited protein (Slp) (5) in the mouse complement system. The serum levels o f these components in adult mice are always higher in males than in females within each inbred strain and are strongly under hormonal control. With re...
متن کاملAutomated Analysis of Cryptographic Protocols Using Mur'
A methodology is presented for using a general-purpose state enumeration tool, Mur', to analyze cryptographic and security-related protocols. We illustrate the feasibility of the approach by analyzing the Needham-Schroeder protocol, nding a known bug in a few seconds of computation time, and analyzing variants of Kerberos and the faulty TMN protocol used in another comparative study. The eecien...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Hommes & migrations
سال: 2011
ISSN: 1142-852X,2262-3353
DOI: 10.4000/hommesmigrations.641