A Model Checking Example
نویسنده
چکیده
This paper presents an easy-to-understand application of formal methods—specifically, model checking. Through an example based on the popular game Sudoku, I demonstrate the power and simplicity of this technology as implemented within Simulink®—a development environment for Model-Based Design. The overarching theme to consider is an analogy of the game to real-world constraint problems. The intent is to show a transition of the technology to real-world engineering problems and how model checking can be used in a full-scale system development process. ABSTRACT. This paper presents an easy-to-understand application of formal methods— specifically, model checking. Through an example based on the popular game Sudoku, I demonstrate the power and simplicity of this technology as implemented within Simulink®—a development environment for Model-Based Design. The overarching theme to consider is an analogy of the game to real-world constraint problems.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملA Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness
Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system should be modeled. Graph transformation system is a graphical formal modeling language to specify and model the system. However, modeling of large s...
متن کاملTwo-stage DEA with Fuzzy Data
Data envelopment analysis is a nonparametric technique checking efficiency of DMUs using math programming. In conventional DEA, it has been assumed that the status of each measure is clearly known as either input or output. Kao and Hwang (2008) developed a data envelopment analysis (DEA) approach for measuring efficiency of decision processes which can be divided into two stages. The first stag...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملFormal Verification of a Three-stage Pipeline in the COSMA Environment1
The case study analyzed in the paper illustrates the example of model checking in the COSMA environment. The system itself is a three-stage pipeline consisting of mutually concurrent modules which also compete for a shared resource. System components are specified in terms of Concurrent State Machines (CSM) The paper shows verification of behavioral properties, model reduction technique, analys...
متن کاملStatistical Model Checking of a Digital Hydraulic Power Management System
This thesis extends on a Finnish case study on a Digital Hydraulic Power Management System, which is an example of a cyber-physical system. Such systems may have strict bounds on properties, which can be proven using modeling techniques and verification queries. Scaling of models to arbitrary size is under ongoing research, which this paper explores using the example of the Digital Hydraulic Po...
متن کامل