A Divide-and-Conquer Strategy for Regular Model Checking

نویسندگان

  • Bengt Jonsson
  • Ahmed Rezine
  • Mayank Saksena
چکیده

Regular model checking is being developed for algorithmic verification of several classes of infinite-state systems whose configurations can be modeled as words over a finite alphabet. Examples include parameterized systems consisting of an arbitrary number of homogeneous finite-state processes connected in a linear or ring-formed topology, and systems that operate on queues, stacks, integers, and other linear data structures. The main idea is to use regular languages as the representation of sets of configurations, and finite-state transducers to describe transition relations. In general, the verification problems considered are undecidable, so the work has consisted in developing semi-algorithms, and decidability results for restricted cases. In previous work, algorithms have been developed for computing the set of reachable states or the transitive closure of a transducer. Practical experience with these algorithms is that they often work well for simple transducers satisfying certain structural conditions. If the system under verification is modeled in terms of a set of small actions (program statements), then the transitive closure of each can be computed and used in a standard reachability analysis or fixpoint computation of a transitive closure. However, for arbitrary transducers, some divide-and-conquer strategy is needed to split a transducer into subparts whose transitive closure can be computed efficiently. In this paper, we present a systematic method for extracting subparts of a transition relation, each of whose transitive closure can be computed efficiently. This method works also in the case where the system model is not structured as a set of small actions, which, e.g., is the case when the model is the result of the transformation of a temporal logic specification, for which manual extraction is difficult. We have implemented the approach, and evaluated its performance on both safety and liveness properties of some parameterized synchronization protocols from the literature. In particular, we are able to obtain better results for proving liveness (non-starvation) properties of these protocols.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Free Vibration Analysis of Repetitive Structures using Decomposition, and Divide-Conquer Methods

This paper consists of three sections. In the first section an efficient method is used for decomposition of the canonical matrices associated with repetitive structures. to this end, cylindrical coordinate system, as well as a special numbering scheme were employed. In the second section, divide and conquer method have been used for eigensolution of these structures, where the matrices are in ...

متن کامل

Supporting Divide-and-Conquer Algorithms for Image Processing

Divide-and-conquer is an important algorithm strategy, but it is not widely used in image processing. For higher-level, symbolic operations it should often be the strategy of choice for parallel computers. It is natural for a machine with a regular interconneo tion scheme such as a mesh, mesh with broadcasting, tree, pyramid, mesh-of-trees, PRAM, or hypercube, and can be used either on a machin...

متن کامل

Kinematic Identification of Parallel Mechanisms by a Divide and Conquer Strategy

This paper presents a Divide and Conquer strategy to estimate the kinematic parameters of parallel symmetrical mechanisms. The Divide and Conquer kinematic identification is designed and performed independently for each leg of the mechanism. The estimation of the kinematic parameters is performed using the inverse calibration method. The identification poses are selected optimizing the observab...

متن کامل

Learning-Based Assume-Guarantee Verification (Tool Paper)

Despite significant advances in the development of model checking, it remains a difficult task in the hands of experts to make it scale to the size of industrial systems. A key step in achieving scalability is to “divide-and-conquer”, that is, to break up the verification of a system into smaller tasks that involve the verification of its components. Assume-guarantee reasoning [9, 11] is a wide...

متن کامل

Divide and Conquer: the Quest for Compositional Design and Analysis (Dagstuhl Seminar 12511)

On December 16 to 21, the Dagstuhl seminar Divide and Conquer: the Quest for Compositional Design and Analysis was organized. Topic was the compositionality, a central theme in computer science, but its applications, methods, techniques are scattered around many different disciplines. Therefore, this workshop brought together scientists from different disciplines, including deductive verificati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007