Partial order methods for the verification of concurrent systems
Autoři
Parametry
Více o knize
This monograph is a revised version of the author's Ph. D. thesis, submitted to the University of Liège, Belgium, with Pierre Wolper as thesis advisor. The general pattern of this work, is to turn logical and semantic ideas into exploitable algorithms. Thus, it perfectly fits the modern trend, viewing verification as a computer-aided activity, and as algorithmic as possible, not as a paper and pencil one, dealing exclusively with semantic and logical issues. Patrice Godefroid uses state-space exploration as the key technique, which, as such or elaborated into model checking, is attracting growing attention for the verification of concurrent systems. For most realistic examples, the methods presented provide a significant reduction of memory and time requirements for protocol verification.
Nákup knihy
Partial order methods for the verification of concurrent systems, Patrice Godefroid
- Jazyk
- Rok vydání
- 1996
Doručení
Platební metody
2021 2022 2023
Navrhnout úpravu
- Titul
- Partial order methods for the verification of concurrent systems
- Jazyk
- anglicky
- Autoři
- Patrice Godefroid
- Vydavatel
- Springer
- Rok vydání
- 1996
- ISBN10
- 3540607617
- ISBN13
- 9783540607618
- Série
- Lecture notes in computer science
- Kategorie
- Počítače, IT, programování
- Anotace
- This monograph is a revised version of the author's Ph. D. thesis, submitted to the University of Liège, Belgium, with Pierre Wolper as thesis advisor. The general pattern of this work, is to turn logical and semantic ideas into exploitable algorithms. Thus, it perfectly fits the modern trend, viewing verification as a computer-aided activity, and as algorithmic as possible, not as a paper and pencil one, dealing exclusively with semantic and logical issues. Patrice Godefroid uses state-space exploration as the key technique, which, as such or elaborated into model checking, is attracting growing attention for the verification of concurrent systems. For most realistic examples, the methods presented provide a significant reduction of memory and time requirements for protocol verification.