Parallelizing the Mur' Veriier

نویسندگان

  • Ulrich Stern
  • David L. Dill
چکیده

With the use of state and memory reduction techniques in veri cation by explicit state enumeration, runtime becomes a major limiting factor. We describe a parallel version of the explicit state enumeration veri er Mur' for distributed memory multiprocessors and networks of workstations that is based on the message passing paradigm. In experiments with three complex cache coherence protocols, parallel Mur' shows close to linear speedups, which are largely insensitive to communication latency and bandwidth. There is some slowdown with increasing communication overhead, for which a simple yet relatively accurate approximation formula is given. Techniques to reduce overhead and required bandwidth and to allow heterogeneity and dynamically changing load in the parallel machine are discussed, which we expect will allow good speedups when using conventional networks of workstations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Magnetic Disk Instead of Main Memory in the Mur' Veriier

In veriication by explicit state enumeration a randomly accessed state table is maintained. In practice, the total main memory available for this state table is a major limiting factor in veriication. We describe a version of the explicit state enumeration veriier Mur' that allows using magnetic disk instead of main memory for storing almost all of the state table. The algorithm avoids costly r...

متن کامل

Protocol Verification as a Hardware Design Aid

The role of automatic formal protocol veriica-tion in hardware design is considered. Principles are identiied that maximize the beneets of protocol veriication while minimizing the labor and computation required. A new protocol description language and veriier (both called Mur') are described , along with experiences in applying them to two industrial protocols that were developed as part of ha...

متن کامل

Eecient Finite-state Analysis for Large Security Protocols

We describe two state reduction techniques for nite-state models of security protocols. The techniques exploit certain protocol properties that we have identiied as characteristic of security protocols. We prove the soundness of the techniques by demonstrating that any violation of protocol invariants is preserved in the reduced state graph. In addition, we describe an optimization method for e...

متن کامل

Efficient Finite-State Analysis for Large Security Protocols

We describe two state reduction techniques for nite-state models of security protocols. The techniques exploit certain protocol properties that we have identiied as characteristic of security protocols. We prove the soundness of the techniques by demonstrating that any violation of protocol invariants is preserved in the reduced state graph. In addition, we describe an optimization method for e...

متن کامل

Better Veri cation Through Symmetry 1

We address the state explosion problem in automatic veriication of nite-state systems by exploiting symmetries in the system description. We make symmetries easy to detect by introducing a new data type scalarset, a nite and unordered set, to our description language. The set of operations on scalarsets are restricted so that states are guaranteed to have the same future behavior, up to permuta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997