A simple method for parameterized verification of cache coherence protocols

CT Chou, PK Mannava, S Park - … Methods in Computer-Aided Design: 5th …, 2004 - Springer
We present a simple method for verifying the safety properties of cache coherence protocols
with arbitrarily many nodes. Our presentation begins with two examples. The first example …

Bloom filters in probabilistic verification

PC Dillinger, P Manolios - International Conference on Formal Methods in …, 2004 - Springer
Probabilistic techniques for verification of finite-state transition systems offer huge memory
savings over deterministic techniques. The two leading probabilistic schemes are hash …

Linear-time disk-based implicit graph search

RE Korf - Journal of the ACM (JACM), 2008 - dl.acm.org
Many search algorithms are limited by the amount of memory available. Magnetic disk
storage is over two orders of magnitude cheaper than semiconductor memory, and …

Exploiting transition locality in automatic verification of finite-state concurrent systems

G Della Penna, B Intrigila, I Melatti, E Tronci… - International Journal on …, 2004 - Springer
In this paper we show that statistical properties of the transition graph of a system to be
verified can be exploited to improve memory or time performances of verification algorithms …

Typical structural properties of state spaces

R Pelánek - International SPIN Workshop on Model Checking of …, 2004 - Springer
Explicit model checking algorithms explore the full state space of a system. We have
gathered a large collection of state spaces and performed an extensive study of their …

Explicit model checking of very large MDP using partitioning and secondary storage

A Hartmanns, H Hermanns - … on Automated Technology for Verification and …, 2015 - Springer
The applicability of model checking is hindered by the state space explosion problem in
combination with limited amounts of main memory. To extend its reach, the large available …

Scalable multi-core model checking

A Laarman - 2014 - research.utwente.nl
Our modern society relies increasingly on the sound performance of digital systems.
Guaranteeing that these systems actually behave correctly according to their specification is …

A hybrid of counterexample-based and proof-based abstraction

N Amla, KL McMillan - Formal Methods in Computer-Aided Design: 5th …, 2004 - Springer
Counterexample-and proof-based refinement are complementary approaches to iterative
abstraction. In the former case, a single abstract counterexample is eliminated by each …

” To Store or Not To Store” Reloaded: Reclaiming Memory on Demand

M Hammer, M Weber - International Workshop on Parallel and Distributed …, 2006 - Springer
Behrmann et al. posed the question whether” To Store or Not To Store”[1] states during
reachability analysis, in order to counter the effects of the well-known state space explosion …

Approximate symbolic model checking for incomplete designs

T Nopper, C Scholl - International Conference on Formal Methods in …, 2004 - Springer
We consider the problem of checking whether an incomplete design can still be extended to
a complete design satisfying a given CTL formula and whether the property is satisfied for all …