By Eric Y. T. Juan, Jeffrey J. P. Tsai (auth.)
With the quick progress of networking and high-computing strength, the call for for large-scale and intricate software program platforms has elevated dramatically. the various software program structures aid or supplant human keep an eye on of safety-critical structures corresponding to flight keep an eye on structures, house commute keep watch over platforms, airplane avionics regulate platforms, robotics, sufferer tracking structures, nuclear energy plant keep watch over platforms, etc. Failure of safety-critical platforms may possibly bring about nice mess ups and lack of human existence. for that reason, software program used for defense severe structures should still defend excessive insurance houses. as a way to agree to excessive coverage houses, a safety-critical approach frequently stocks assets among a number of at the same time energetic computing brokers and needs to meet inflexible real-time constraints. despite the fact that, concurrency and timing constraints make the improvement of a safety-critical approach even more mistakes services and laborious. The correctness of software program platforms these days relies frequently at the paintings of checking out and debugging. checking out and debugging contain the method of de tecting, finding, reading, separating, and correcting suspected faults utilizing the runtime info of a method. in spite of the fact that, trying out and debugging aren't enough to end up the correctness of a safety-critical procedure. by contrast, static research is supported through formalisms to specify the procedure accurately. Formal verification equipment are then utilized to end up the logical correctness of the procedure with appreciate to the specification. Formal verifica tion offers us better self belief that safety-critical platforms meet the specified coverage houses in an effort to stay away from disastrous consequences.
Read or Download Compositional Verification of Concurrent and Real-Time Systems PDF
Similar international books
Recent Advances in Constraints: 14th Annual ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2009, Barcelona, Spain, June 15-17, 2009, Revised Selected Papers
This publication constitutes the completely refereed post-proceedings of the 14th Annual ERCIM foreign Workshop on Constraint fixing and Constraint common sense Programming, CSCLP 2009, held in Barcelona, Spain, in June 2009. The nine revised complete papers provided have been rigorously reviewed and chosen for inclusion during this post-proceedings.
This e-book constitutes the completely refereed post-conference lawsuits of the overseas convention on relied on platforms, INTRUST 2010, held in Beijing, China, in December 2010. The 23 revised complete papers have been rigorously reviewd and chosen from sixty six submissions for inclusion within the publication. The papers are prepared in seven topical sections on implementation know-how, safety research, cryptographic elements, cellular relied on structures, safety, attestation, and software program safety.
This e-book constitutes the refereed lawsuits of the sixth overseas convention on try out and Proofs, faucet 2012, held in Prague, Czech Republic, in May/June 2012, as a part of the instruments 2012 Federated meetings. The nine revised complete papers awarded including 2 invited papers, four brief papers and one educational have been conscientiously reviewed and chosen from 29 submissions.
IAU Colloquium No. seventy one had its instant origins in a small collecting of individuals . within the optical and UV examine of flare stars which happened in the course of the 1979 Montreal common meeting. We well-known primary swap was once happening within the research of those gadgets. Space-borne tools (especially lUE and Einstein) and a brand new genera tion of ground-based gear have been having a profound influence at the variety of investigations it was once attainable to make.
Additional info for Compositional Verification of Concurrent and Real-Time Systems
S X (asynchronously receiving actions); and MI: X S is a set of transitions such that V (s, m s , s') E T: i) ms is a non-empty multiset of ~ and ii) ms(~#) :::; 1. • In MLTSs, a transition is labeled with a multiset of actions. A multiset consists of countable objects. This means that an action can have multiple instances in a transition label. We use synchronous communication and/or asynchronous communication as the primitive means of communication between processes. Synchronously communicating actions (~#) in MLTSs are used to specify unbuffered mode of synchronous communication which is usually referred to 20 COMPOSITIONAL VERIFICATION OF CONCURRENT AND RTS as handshaking or rendezvous communication.
2. • We will present a new synonym (IOTFD equivalence) for compositional verification. t. " 2. Paths, Traces, and 10-Traces This section defines paths, traces, and IO-traces. IO-traces will be used to define IOT-failures and lOT-divergences, while traces will be used in stablefailures and divergences . We first define prefixes and suffixes of strings. A string is a sequence of symbols. 3 (Strings (Sequences), Prefixes, Suffixes) • The empty string is denoted by E. • The set of all strings over a fixed alphabet ~ is denoted by ~*.
5 to deal with the case in which IOTG G has AS-loops. 11 gives an example of Algorithm 2.