Compositional Verification of Concurrent and Real-Time Systems [electronic resource] /

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety­ critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de­ tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica­ tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.

Saved in:
Bibliographic Details
Main Authors: Juan, Eric Y. T. author., Tsai, Jeffrey J. P. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Boston, MA : Springer US : Imprint: Springer, 2002
Subjects:Computer science., Microprocessors., Special purpose computers., Software engineering., Computers., Mechanical engineering., Computer Science., Software Engineering/Programming and Operating Systems., Computing Methodologies., Processor Architectures., Special Purpose and Application-Based Systems., Mechanical Engineering.,
Online Access:http://dx.doi.org/10.1007/978-1-4615-1009-3
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:198324
record_format koha
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Microprocessors.
Special purpose computers.
Software engineering.
Computers.
Mechanical engineering.
Computer Science.
Software Engineering/Programming and Operating Systems.
Computing Methodologies.
Processor Architectures.
Special Purpose and Application-Based Systems.
Mechanical Engineering.
Computer science.
Microprocessors.
Special purpose computers.
Software engineering.
Computers.
Mechanical engineering.
Computer Science.
Software Engineering/Programming and Operating Systems.
Computing Methodologies.
Processor Architectures.
Special Purpose and Application-Based Systems.
Mechanical Engineering.
spellingShingle Computer science.
Microprocessors.
Special purpose computers.
Software engineering.
Computers.
Mechanical engineering.
Computer Science.
Software Engineering/Programming and Operating Systems.
Computing Methodologies.
Processor Architectures.
Special Purpose and Application-Based Systems.
Mechanical Engineering.
Computer science.
Microprocessors.
Special purpose computers.
Software engineering.
Computers.
Mechanical engineering.
Computer Science.
Software Engineering/Programming and Operating Systems.
Computing Methodologies.
Processor Architectures.
Special Purpose and Application-Based Systems.
Mechanical Engineering.
Juan, Eric Y. T. author.
Tsai, Jeffrey J. P. author.
SpringerLink (Online service)
Compositional Verification of Concurrent and Real-Time Systems [electronic resource] /
description With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety­ critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de­ tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica­ tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.
format Texto
topic_facet Computer science.
Microprocessors.
Special purpose computers.
Software engineering.
Computers.
Mechanical engineering.
Computer Science.
Software Engineering/Programming and Operating Systems.
Computing Methodologies.
Processor Architectures.
Special Purpose and Application-Based Systems.
Mechanical Engineering.
author Juan, Eric Y. T. author.
Tsai, Jeffrey J. P. author.
SpringerLink (Online service)
author_facet Juan, Eric Y. T. author.
Tsai, Jeffrey J. P. author.
SpringerLink (Online service)
author_sort Juan, Eric Y. T. author.
title Compositional Verification of Concurrent and Real-Time Systems [electronic resource] /
title_short Compositional Verification of Concurrent and Real-Time Systems [electronic resource] /
title_full Compositional Verification of Concurrent and Real-Time Systems [electronic resource] /
title_fullStr Compositional Verification of Concurrent and Real-Time Systems [electronic resource] /
title_full_unstemmed Compositional Verification of Concurrent and Real-Time Systems [electronic resource] /
title_sort compositional verification of concurrent and real-time systems [electronic resource] /
publisher Boston, MA : Springer US : Imprint: Springer,
publishDate 2002
url http://dx.doi.org/10.1007/978-1-4615-1009-3
work_keys_str_mv AT juanericytauthor compositionalverificationofconcurrentandrealtimesystemselectronicresource
AT tsaijeffreyjpauthor compositionalverificationofconcurrentandrealtimesystemselectronicresource
AT springerlinkonlineservice compositionalverificationofconcurrentandrealtimesystemselectronicresource
_version_ 1756267138655453184
spelling KOHA-OAI-TEST:1983242018-07-30T23:25:01ZCompositional Verification of Concurrent and Real-Time Systems [electronic resource] / Juan, Eric Y. T. author. Tsai, Jeffrey J. P. author. SpringerLink (Online service) textBoston, MA : Springer US : Imprint: Springer,2002.engWith the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety­ critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de­ tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica­ tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.1. Introduction -- 1. Background -- 2. State Explosion -- 3. Compositional Verification -- 4. A Compositional Verification Methodology -- 5. Reduction Methods for Real-Time Systems -- 2. Verification Techniques for Concurrent Systems -- 1. Techniques for Efficient Analysis of Concurrent Systems -- 2. Compositional-Verification Techniques -- 3. Petri-Net Based Techniques for Real-Time Systems -- 3. Multiset Labeled Transition Systems -- 1. The Model -- 2. Communication Diagrams -- 3. Function “Parallel Composition” (?) of MLTSs -- 4. Function “Hiding Invisible Actions (Hide)” of MLTSs -- 5. Parallel Operation of MLTSs -- 4. Compositional Verification Using MLTS -- 1. Equivalences, Synonyms, and Congruences -- 2. Paths, Traces, and IO-Traces -- 3. IOT-Failures-Divergence (IOTFD) Equivalence -- 4. IOTFD-Equivalence Reduction -- 5. Algorithms and Proofs -- 5. Composotional Verification Using Petri Nets -- 1. The Models -- 2. Function “Parallel Composition” -- 3. Synonymous Reduction -- 4. Compositional Verification of Condensed MLTSs -- 5. Condensation Theories for State-Based Systems -- 6. Condensation Rules for IOT-State/IOT-Failure Equivalences -- 7. Firing Dependence Theories and Rules for MLTS*s -- 8. Compositional Verification of Sub-Marking Reachability -- 9. Definitions, Algorithms, and Proofs -- 6. Tools and Experiments -- 1. Alternating Bit Protocol (ABP) -- 2. Tools -- 3. Performance Evaluation -- 7. Delay Time Petri Nets and Net Reduction -- 1. Time Petri Nets -- 2. Delay Time Petri Nets (DTPNs) -- 3. Reduction Rules for DTPNs -- 4. Class Graphs of DTPNs -- 5. Efficiency Consideration and Experimental Results -- References.With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety­ critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de­ tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica­ tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.Computer science.Microprocessors.Special purpose computers.Software engineering.Computers.Mechanical engineering.Computer Science.Software Engineering/Programming and Operating Systems.Computing Methodologies.Processor Architectures.Special Purpose and Application-Based Systems.Mechanical Engineering.Springer eBookshttp://dx.doi.org/10.1007/978-1-4615-1009-3URN:ISBN:9781461510093