prod 3.2: An Advanced Tool for Efficient Reachability Analysis

نویسندگان

  • Kimmo Varpaaniemi
  • Keijo Heljanko
  • Johan Lilius
چکیده

prod is a reachability analyzer for Predicate/Transition Nets. The tool incorporates several advanced reduced reachability graph generation methods. The tool also includes a CTL model checker and supports on-they veriication of LTL formulas. prod is being used in industrial projects at the Digital Systems Laboratory. 1 Intro Reachability analysis is a powerful formal way to analyze concurrent and distributed systems such as telecommunication protocols. However reach-ability analysis suuers from the state-explosion problem: the state space of the system can be far too large with respect to the time and other resources needed to inspect all states in the space. Fortunately, errors can be detected in a variety of cases without inspecting all reachable states of the system. The stubborn set method 11],,10] is one of the methods that try to relieve the state space explosion. On the other hand in on-they veriication of a property the property is veri-ed during state space generation, in contrast to the traditional approach where properties are veriied after state space generation. The Pr/T-net reachability analysis tool prod 13], developed at thements among other methods the two above mentioned methods for ee-cient reachability analysis. The aim of this article is to give a brief overview of the basic features of the tool and shortly describe some of its applications. 2 The reachability analyzer prod prod is a command-line driven tool, ie. the user interacts with the tool from a Unix-shell. Currently no graphical user-interface exists. The tool consists of 5 components:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modelling and Simulation of Quantum Teleportation and Dense Coding Using Predicate/Transition-Nets

Reachability analysis is one of the most successful methods used in design and validation of protocols for classical communication, whereas the predicate/transition-net formalism is one of the most appropriate formalisms for reachability analysis oriented modelling. Quantum teleportation and dense coding are nonclassical communication protocols widely researched in the field of quantum computin...

متن کامل

Health Monitoring of Welded Steel Pipes by Vibration Analysis

In the present work, structure health monitoring (SHM) of welded steel pipes was used to diagnosis their state via vibration based damage detection techniques. The dynamic quantities such as Frequency Response Functions (FRFs), mode shapes and modal parameters from structural vibration to detect damage were measured, set on linear averaging mode, with a maximum frequency of analysis of 3.2 kHz....

متن کامل

Maria -a Modular Reachability Analyzer

The creation of a new modular reachability analyzer is described. It is designed for easy extension to new veriication methods and graph generation algorithms and is suitable for interfacing to all kinds of speciication and description tools. The main idea is to build different task-speciic front-ends which can have input languages like SDL, Petri nets, transition systems, etc. Thus the analyze...

متن کامل

Reachability checking in complex and concurrent software systems using intelligent search methods

Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...

متن کامل

Implementing a CTL Model checker

This paper discusses the implementation of a branching time temporal logic CTL model checker for the PROD Pr/T-Net Reachability analysis tool. A new algorithm for model checking CTL is presented. This algorithm doesn't need the converse of the transition relation as the EMC algorithm does 4]. The algorithm also provides a counterexample and witness facility using one-pass reachabil-ity graph tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997