Better Veri cation Through Symmetry
暂无分享,去创建一个
[1] Gary L. Peterson,et al. Myths About the Mutual Exclusion Problem , 1981, Inf. Process. Lett..
[2] K. Mani Chandy,et al. Parallel program design - a foundation , 1988 .
[3] Alan J. Hu,et al. Protocol verification as a hardware design aid , 1992, Proceedings 1992 IEEE International Conference on Computer Design: VLSI in Computers & Processors.
[4] Anoop Gupta,et al. The directory-based cache coherence protocol for the DASH multiprocessor , 1990, ISCA '90.
[5] Gerard J. Holzmann,et al. Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching , 1987, IEEE Transactions on Software Engineering.
[6] Michael L. Scott,et al. Algorithms for scalable synchronization on shared-memory multiprocessors , 1991, TOCS.
[7] David L. Dill,et al. Efficient verification of symmetric concurrent systems , 1993, Proceedings of 1993 IEEE International Conference on Computer Design ICCD'93.
[8] Daniel Brand,et al. Towards Analyzing and Synthesizing Protocols , 1980, IEEE Trans. Commun..
[9] Somesh Jha,et al. Exploiting symmetry in temporal logic model checking , 1993, Formal Methods Syst. Des..
[10] Anoop Gupta,et al. The Stanford Dash multiprocessor , 1992, Computer.
[11] A. Prasad Sistla,et al. Symmetry and model checking , 1993, Formal Methods Syst. Des..
[12] Robert K. Brayton,et al. Implicit state enumeration of finite state machines using BDD's , 1990, 1990 IEEE International Conference on Computer-Aided Design. Digest of Technical Papers.
[13] H. B. Mittal,et al. A Fast Backtrack Algorithm for Graph Isomorphism , 1988, Inf. Process. Lett..
[14] P. H. Starke,et al. Reachability analysis of Petri nets using symmetries , 1991 .
[15] Peter Huber,et al. Towards reachability trees for high-level Petri nets , 1985, European Workshop on Applications and Theory in Petri Nets.
[16] Carl Ebeling. GeminiII: a second generation layout validation program , 1988, [1988] IEEE International Conference on Computer-Aided Design (ICCAD-89) Digest of Technical Papers.