메뉴 건너뛰기




Volumn 34, Issue 1, 2004, Pages 23-37

Exploiting Equivalence Reduction and the Sweep-Line Method for Detecting Terminal States

Author keywords

Colored Petri nets; Deadlock analysis algorithms; Equivalence reduction; Reduction techniques for state space exploration; Sweep line method

Indexed keywords

ALGORITHMS; COMPUTER AIDED ANALYSIS; COMPUTER SYSTEM RECOVERY; COMPUTER TERMINALS; HEALTH CARE; INTERNET; NETWORK PROTOCOLS; PETRI NETS; TELECOMMUNICATION;

EID: 0742307439     PISSN: 10834427     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCA.2003.820582     Document Type: Article
Times cited : (16)

References (47)
  • 4
    • 0024645936 scopus 로고
    • Petri nets: Properties, analysis and application
    • Apr.
    • T. Murata, "Petri nets: Properties, analysis and application," Proc. IEEE, vol. 77, pp. 541-580, Apr. 1989.
    • (1989) Proc. IEEE , vol.77 , pp. 541-580
    • Murata, T.1
  • 6
    • 0025207743 scopus 로고
    • Algorithms for automated protocol validation
    • G. Holzmann, "Algorithms for automated protocol validation," AT&T Tech. J., vol. 69, no. 2, pp. 32-44, 1990.
    • (1990) AT&T Tech. J. , vol.69 , Issue.2 , pp. 32-44
    • Holzmann, G.1
  • 9
    • 0000974483 scopus 로고    scopus 로고
    • The state explosion problem
    • New York: Springer-Verlag, Lecture Notes in Computer Science
    • A. Valmari, "The state explosion problem," in Lectures on Petri Nets I: Basic Models. New York: Springer-Verlag, 1998, vol. 1491, Lecture Notes in Computer Science, pp. 429-528.
    • (1998) Lectures on Petri Nets I: Basic Models , vol.1491 , pp. 429-528
    • Valmari, A.1
  • 10
    • 84863922302 scopus 로고    scopus 로고
    • Symmetry reductions in model checking
    • Lecture Notes in Computer Science
    • E. Clarke, E. Emerson, S. Jha, and A. Sistla, "Symmetry reductions in model checking," in Proc. CAV, vol. 1427, Lecture Notes in Computer Science, 1998, pp. 147-159.
    • (1998) Proc. CAV , vol.1427 , pp. 147-159
    • Clarke, E.1    Emerson, E.2    Jha, S.3    Sistla, A.4
  • 11
    • 0030212139 scopus 로고    scopus 로고
    • Exploiting symmetries in temporal logic model checking
    • Aug
    • E. Clarke, R. Enders, T. Filkorn, and S. Jha, "Exploiting symmetries in temporal logic model checking," Formal Meth. Syst. Design, vol. 9, pp. 77-104, Aug 1996.
    • (1996) Formal Meth. Syst. Design , vol.9 , pp. 77-104
    • Clarke, E.1    Enders, R.2    Filkorn, T.3    Jha, S.4
  • 12
    • 0030211668 scopus 로고    scopus 로고
    • Better verification through symmetry
    • Aug.
    • C. Ip and D. Dill, "Better verification through symmetry," Formal Methods Syst. Design, vol. 9, pp. 41-75, Aug. 1996.
    • (1996) Formal Methods Syst. Design , vol.9 , pp. 41-75
    • Ip, C.1    Dill, D.2
  • 14
    • 0030215698 scopus 로고    scopus 로고
    • Condensed state spaces for symmetrical coloured Petri nets
    • Aug.
    • K. Jensen, "Condensed state spaces for symmetrical coloured Petri nets," Formal Meth. Syst. Design, vol. 9, pp. 7-40, Aug. 1996.
    • (1996) Formal Meth. Syst. Design , vol.9 , pp. 7-40
    • Jensen, K.1
  • 15
    • 0003871155 scopus 로고    scopus 로고
    • New York: Springer-Verlag, Monographs in Theoretical Computer Science
    • _, Coloured Petri Nets. Volume 2, Analysis Methods. New York: Springer-Verlag, 1997, Monographs in Theoretical Computer Science.
    • (1997) Coloured Petri Nets. Volume 2, Analysis Methods , vol.2
  • 16
    • 0022769976 scopus 로고
    • Graph based algorithms for boolean function manipulation
    • Aug.
    • R. Bryant, "Graph based algorithms for boolean function manipulation," IEEE Trans. Comput., vol. C-35, pp. 677-691, Aug. 1986.
    • (1986) IEEE Trans. Comput. , vol.C-35 , pp. 677-691
    • Bryant, R.1
  • 18
    • 84957664461 scopus 로고    scopus 로고
    • Compositionality in state space verification methods
    • LNCS
    • A. Valmari, "Compositionality in state space verification methods," in Proc. ICATPN, vol. 1091, LNCS, 1996, pp. 29-56.
    • (1996) Proc. ICATPN , vol.1091 , pp. 29-56
    • Valmari, A.1
  • 19
    • 0036644552 scopus 로고    scopus 로고
    • Efficient computation and representation of large reachability sets for composed automata
    • P. Buchholz and P. Kemper, "Efficient computation and representation of large reachability sets for composed automata," Discr. Event Dyn. Syst.: Theory Appl. vol. 12, pp. 265-286, 2002.
    • (2002) Discr. Event Dyn. Syst.: Theory Appl , vol.12 , pp. 265-286
    • Buchholz, P.1    Kemper, P.2
  • 20
    • 0036851091 scopus 로고    scopus 로고
    • Hierarchial reachability graph generation for Petri nets
    • _, "Hierarchial reachability graph generation for Petri nets," Formal Meth. System Des., vol. 21, pp. 281-315, 2002.
    • (2002) Formal Meth. System Des. , vol.21 , pp. 281-315
  • 21
    • 85016851732 scopus 로고
    • A stubborn attack on state explosion
    • Lecture Notes in Computer Science
    • A. Valmari, "A stubborn attack on state explosion," in Proc. CAV, vol. 531, Lecture Notes in Computer Science, 1990, pp. 156-165.
    • (1990) Proc. CAV , vol.531 , pp. 156-165
    • Valmari, A.1
  • 22
    • 85010991128 scopus 로고
    • All from one, one for all: On model checking using representatives
    • Lecture Notes in Computer Science
    • D. Peled, "All from one, one for all: On model checking using representatives," in Proc. CAV, vol. 697, Lecture Notes in Computer Science, 1993, pp. 409-423.
    • (1993) Proc. CAV , vol.697 , pp. 409-423
    • Peled, D.1
  • 23
    • 84957826706 scopus 로고
    • Partial order methods for temporal verification
    • Lecture Notes in Computer Science
    • P. Wolper and P. Godefroid, "Partial order methods for temporal verification," in Proc. CONCUR, vol. 715, Lecture Notes in Computer Science, 1993.
    • (1993) Proc. CONCUR , vol.715
    • Wolper, P.1    Godefroid, P.2
  • 24
    • 0032209123 scopus 로고    scopus 로고
    • An analysis of bitstate hashing
    • G. Holzmann, "An analysis of bitstate hashing," Formal Meth. Syst. Design, vol. 13, pp. 289-307, 1998.
    • (1998) Formal Meth. Syst. Design , vol.13 , pp. 289-307
    • Holzmann, G.1
  • 25
    • 0023960738 scopus 로고
    • An improved protocol reachability analysis technique
    • _, "An improved protocol reachability analysis technique," Soft. Practice, Exper., vol. 18, no. 2, pp. 137-161, 1988.
    • (1988) Soft. Practice, Exper. , vol.18 , Issue.2 , pp. 137-161
  • 26
    • 35048872486 scopus 로고
    • Improved probabilistic verification by hash compaction
    • New York: Springer-Verlag
    • U. Stern and D. Dill, "Improved probabilistic verification by hash compaction," in Correct Hardware Design and Verification Methods. New York: Springer-Verlag, 1995, vol. 987, pp. 206-224.
    • (1995) Correct Hardware Design and Verification Methods , vol.987 , pp. 206-224
    • Stern, U.1    Dill, D.2
  • 27
    • 84947920821 scopus 로고
    • Reliable hashing without collision detection
    • Lecture Notes in Computer Science
    • P. Wolper and D. Leroy, "Reliable hashing without collision detection," in Proc. CAV, vol. 697, Lecture Notes in Computer Science, 1993, pp. 59-70.
    • (1993) Proc. CAV , vol.697 , pp. 59-70
    • Wolper, P.1    Leroy, D.2
  • 28
    • 0010583179 scopus 로고
    • Bounded-memory algorithms for verification on-the-fly
    • Lecture Notes in Computer Science
    • C. Jard and T. Jeron, "Bounded-memory algorithms for verification on-the-fly," in Proc. CAV, vol. 575, Lecture Notes in Computer Science, 1991.
    • (1991) Proc. CAV , vol.575
    • Jard, C.1    Jeron, T.2
  • 30
    • 84903134392 scopus 로고    scopus 로고
    • A sweep-line method for state space exploration
    • Lecture Notes in Computer Science
    • S. Christensen, L. Kristensen, and T. Mailund, "A sweep-line method for state space exploration," in Proc. TACAS, vol. 2031, Lecture Notes in Computer Science, 2001, pp. 450-464.
    • (2001) Proc. TACAS , vol.2031 , pp. 450-464
    • Christensen, S.1    Kristensen, L.2    Mailund, T.3
  • 31
    • 84937395593 scopus 로고    scopus 로고
    • A generalized sweep-line method for safety properties
    • Lecture Notes in Computer Science
    • L. Kristensen and T. Mailund, "A generalized sweep-line method for safety properties," in Proc. FME, vol. 2391, Lecture Notes in Computer Science, 2002, pp. 549-567.
    • (2002) Proc. FME , vol.2391 , pp. 549-567
    • Kristensen, L.1    Mailund, T.2
  • 32
    • 3242677397 scopus 로고    scopus 로고
    • Combining partial order and symmetry reduction
    • Lecture Notes in Computer Science
    • E. Emerson, S. Jha, and D. Peled, "Combining partial order and symmetry reduction," in Proc. TACAS, vol. 1217, Lecture Notes in Computer Science, 1997, pp. 35-49.
    • (1997) Proc. TACAS , vol.1217 , pp. 35-49
    • Emerson, E.1    Jha, S.2    Peled, D.3
  • 33
    • 21344486863 scopus 로고
    • Symbolic, symmetry, and stubborn set searches
    • M. Tiusanen, "Symbolic, symmetry, and stubborn set searches," Lecture Notes Comput. Sci., vol. 815, pp. 511-530, 1994.
    • (1994) Lecture Notes Comput. Sci. , vol.815 , pp. 511-530
    • Tiusanen, M.1
  • 34
    • 84969373621 scopus 로고
    • On combining the stubborn set method with the sleep set method
    • New York: Springer-Verlag
    • K. Varpaaniemi, "On combining the stubborn set method with the sleep set method," in Lecture Notes Comput. Science. New York: Springer-Verlag, 1994, vol. 815, pp. 548-567.
    • (1994) Lecture Notes Comput. Science , vol.815 , pp. 548-567
    • Varpaaniemi, K.1
  • 35
    • 0002164191 scopus 로고
    • Stubborn sets of coloured Petri nets
    • A. Valmari, "Stubborn sets of coloured Petri nets," in Proc. ICATPN, 1991, pp. 102-121.
    • (1991) Proc. ICATPN , pp. 102-121
    • Valmari, A.1
  • 36
    • 34249914362 scopus 로고    scopus 로고
    • A compositional sweep-line state space exploration method
    • Lecture Notes in Computer Science
    • L. Kristensen and T. Mailund, "A compositional sweep-line state space exploration method," in Proc. FORTE, vol. 2529, Lecture Notes in Computer Science, 2002, pp. 327-343.
    • (2002) Proc. FORTE , vol.2529 , pp. 327-343
    • Kristensen, L.1    Mailund, T.2
  • 37
    • 84879077597 scopus 로고    scopus 로고
    • Verification of a revised wap wireless transaction protocol
    • LNCS
    • S. Gordon, L. Kristensen, and J. Billington, "Verification of a revised wap wireless transaction protocol," in Proc. ICATPN, vol. 2360, LNCS, 2002, pp. 182-202.
    • (2002) Proc. ICATPN , vol.2360 , pp. 182-202
    • Gordon, S.1    Kristensen, L.2    Billington, J.3
  • 38
    • 84958952277 scopus 로고    scopus 로고
    • Analysis of Bang and Olufsen's BeoLink audio/video system using coloured Petri nets
    • LNCS
    • S. Christensen and J. Jørgensen, "Analysis of Bang and Olufsen's BeoLink audio/video system using coloured Petri nets," in Proc. ICATPN, vol. 1248, LNCS, 1997, pp. 387-406.
    • (1997) Proc. ICATPN , vol.1248 , pp. 387-406
    • Christensen, S.1    Jørgensen, J.2
  • 42
    • 23044532653 scopus 로고    scopus 로고
    • Analysing infinite-state systems by combining equivalence reduction and the sweep-line method
    • LNCS
    • T. Mailund, "Analysing infinite-state systems by combining equivalence reduction and the sweep-line method," in Proc. ICATPN, vol. 2360, LNCS, 2002, pp. 314-333.
    • (2002) Proc. ICATPN , vol.2360 , pp. 314-333
    • Mailund, T.1
  • 44
    • 0742267471 scopus 로고    scopus 로고
    • Ph.D. dissertation, School Elect. Inform. Eng., Inst. Telecommun. Res. Comput. Syst. Eng. Centre, Univ. South Australia, Mawson Lakes, Australia
    • S. Gordon, "Verification of the WAP transaction layer using coloured Petri nets," Ph.D. dissertation, School Elect. Inform. Eng., Inst. Telecommun. Res. Comput. Syst. Eng. Centre, Univ. South Australia, Mawson Lakes, Australia, 2001.
    • (2001) Verification of the WAP Transaction Layer Using Coloured Petri Nets
    • Gordon, S.1
  • 47
    • 23044532063 scopus 로고    scopus 로고
    • A formal and executable specification of the internet open trading protocol
    • Lecture Notes in Computer Science
    • C. Ouyang, L. Kristensen, and J. Billington, "A formal and executable specification of the internet open trading protocol," in Proc. EC-Web, vol. 2455, Lecture Notes in Computer Science, 2002, pp. 377-387.
    • (2002) Proc. EC-Web , vol.2455 , pp. 377-387
    • Ouyang, C.1    Kristensen, L.2    Billington, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.