Scalable multi-core model checking

Our modern society relies increasingly on the sound performance of digital systems. Guaranteeing that these systems actually behave correctly according to their specification is not a trivial task, yet it is essential for mission-critical systems like auto-pilots, (nuclear) power-plant controllers and your car’s ABS. The highest degree of certainty about a system’s correctness can be obtained via mathematical proof, a tedious manual process of formally describing and analyzing the system’s behavior. Especially the latter step is tedious and requires the creativity of a mathematician to demonstrate that certain properties are preserved under the strict mathematical rule system. With the invention of “model checking”, this part of this process became automated, by letting a computer exhaustively explore the behavior of the system. However, the size of the systems that can be “model checked” is severely limited by the available computational resources. This is caused by the so-called state explosion; a consequence of the fact that a machine can only perform small, mechanized computations and does not exhibit the creativity to make generalizing (thinking) steps. Therefore, the goal of the current thesis is to enable the full use of computational power of modern multi-core computers for model checking. The parallel model checking procedures that we present, utilize all available processor cores and obtain a speedup proportional to the number of cores, i.e. they are “scalable”. The current thesis achieves efficient parallelization of a broad set of model checking problems in three steps, each described in one part of the thesis: First, we adapt lockless hash tables for multi-core, explicit-state reachability, the underlying search method that realizes the exhaustive exploration of the system’s behavior. With a concurrent tree data structure we realize state compression, and reduce memory requirements significantly. Incremental updates to this tree further ensure similar performance and scalability as the lockless hash table, while the combination with a compact hash table realizes small compressed sizes of around 4 bytes per state, even when storing more than 10 billion states. Empirical evidence shows that the compression rates most often lie within 110% of this optimal. Second, we devise parallel nested depth-first search algorithms to support model checking of LTL properties in linear time. Building on the multi-core reachability, we let worker threads progress semi-independently through the search space. This swarm-based technique leverages low communication costs through the use of optimistic, yet possibly redundant work scheduling. It could therefore become more important in future multi-core systems, where communication costs rise with the increasing steepness of memory hierarchies. Experiments on current hardware already demonstrate little redundancy and good scalability. Third, to support verification of real-time systems as well, we extend multi-core reachability and LTL checking to the domain of timed automata. We develop a lockless multimap to record time-abstracted states, and also present algorithms that deal with coarse subsumption abstraction for the verification of LTL for solving larger problem instances. The scalability, memory compression and performance are all maintained in the timed setting, and experiments therefore show great gains with respect to the state-of-the-art timed model checker UPPAAL. The above techniques were all implemented in the model checking toolset LTSmin, which is language-independent, allowing a direct comparison to other model checkers. We present an experimental comparison with the state-of-the-art explicit-state model checkers SPIN and DiVinE. Both implement multi-core algorithms, while DiVinE also heavily focuses on distributed verification. These experiments show that our proposed techniques offer significant improvements in terms of scalability, absolute performance and memory usage. Current trends and future predictions tell us that the available processing cores increase exponentially over time (Moore’s Law). Hence, our results may stand to gain from this trend. Whether our proposed methods will withstand the ravages of time is to be seen, but so far the speedup of our algorithms has kept up with the 3-fold increase in cores that we have witnessed during this 4-year project.

[1]  Gerard J. Holzmann,et al.  The Model Checker SPIN , 1997, IEEE Trans. Software Eng..

[2]  de A. Bruin,et al.  Service-oriented discovery of knowledge : foundations, implementations and applications , 2010 .

[3]  Sriram K. Rajamani,et al.  The SLAM project: debugging system software via static analysis , 2002, POPL '02.

[4]  Assaf Schuster,et al.  Distributed Symbolic Model Checking for μ-Calculus , 2005, Formal Methods Syst. Des..

[5]  Alfons Laarman,et al.  Improved on-the-Fly Livelock Detection , 2013, NASA Formal Methods.

[6]  Panagiotis Manolios,et al.  Bloom Filters in Probabilistic Verification , 2004, FMCAD.

[7]  Thomas Bäck,et al.  Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .

[8]  D. Costa Formal models for component connectors , 2010 .

[9]  Hans Zantema,et al.  Resolution and Binary Decision Diagrams Cannot Simulate Each Other Polynomially , 2001, Ershov Memorial Conference.

[10]  Mjm Marcel Roeloffzen Kinetic data structures in the black-box model , 2013 .

[11]  Sami Evangelista,et al.  Multi-threaded Explicit State Space Exploration with State Reconstruction , 2013, ATVA.

[12]  Damiano Bolzoni,et al.  Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .

[13]  Alfons Laarman,et al.  Guard-based partial-order reduction , 2013, International Journal on Software Tools for Technology Transfer.

[14]  Jan Tretmans,et al.  Testing Concurrent Systems: A Formal Approach , 1999, CONCUR.

[15]  Johan Bengtsson,et al.  Clocks, DBMS and States in Timed Systems , 2002 .

[16]  J. van den Bos,et al.  Gathering evidence: Model-driven software engineering in automated digital forensics , 2014 .

[17]  Petr Rockai,et al.  Distributed LTL Model Checking with Hash Compaction , 2013, PASM/PDMC.

[18]  B. J. Arnoldus,et al.  An illumination of the template enigma : software code generation with templates , 2011 .

[19]  Samuel Williams,et al.  Roofline: an insightful visual performance model for multicore architectures , 2009, CACM.

[20]  Philippe Schnoebelen,et al.  Well-structured transition systems everywhere! , 2001, Theor. Comput. Sci..

[21]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[22]  Gerard J. Holzmann,et al.  Coverage Preserving Reduction Strategies for Reachability Analysis , 1992, PSTV.

[23]  W. Kuijper Compositional Synthesis of Safety Controllers , 2012 .

[24]  Siert Wieringa,et al.  Asynchronous Multi-core Incremental SAT Solving , 2013, TACAS.

[25]  Sander Vermolen,et al.  Software Language Evolution , 2008, 2008 15th Working Conference on Reverse Engineering.

[26]  Michael B. Monagan,et al.  Parallel sparse polynomial multiplication using heaps , 2009, ISSAC '09.

[27]  Bas Basten,et al.  Ambiguity Detection for Programming Language Grammars , 2011 .

[28]  Ncwm Niels Braspenning Model-based integration and testing of high-tech multi-disciplinary systems , 2008 .

[29]  Joseph Sifakis,et al.  Specification and verification of concurrent systems in CESAR , 1982, Symposium on Programming.

[30]  Timo Latvala,et al.  Coping With Strong Fairness , 2000, Fundam. Informaticae.

[31]  Lubos Brim,et al.  Parallel breadth-first search LTL model-checking , 2003, 18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings..

[32]  Cynthia Kop Higher Order Termination: Automatable Techniques for Proving Termination of Higher-Order Term Rewriting Systems , 2012 .

[33]  Luca de Alfaro,et al.  Linear and Branching Metrics for Quantitative Transition Systems , 2004, ICALP.

[34]  Sriram K. Rajamani,et al.  The SLAM Toolkit , 2001, CAV.

[35]  Chin-Laung Lei,et al.  Modalities for Model Checking: Branching Time Logic Strikes Back , 1987, Sci. Comput. Program..

[36]  Gerard J. Holzmann Algorithms for automated protocol verification , 1990, AT&T Technical Journal.

[37]  R.S.S. O'Connor,et al.  Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .

[38]  Gerard J. Holzmann,et al.  Model-Driven Software Verification , 2004, SPIN.

[39]  Thomas Wahl,et al.  Dynamic Symmetry Reduction , 2005, TACAS.

[40]  Sami Evangelista,et al.  Parallel Nested Depth-First Searches for LTL Model Checking , 2011, ATVA.

[41]  Jan Friso Groote,et al.  Verification of networks of timed automata using mCRL2 , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[42]  H. Hansen Coalgebraic Modelling : Applications in Automata theory and Modal logic , 2009 .

[43]  Marieke Huisman,et al.  Resource Protection Using Atomics - Patterns and Verification , 2014, APLAS.

[44]  Alejandro Duran,et al.  The Design of OpenMP Tasks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[45]  D. E. Nadales Agut,et al.  A Compositional Interchange Format for Hybrid Systems: Design and Implementation , 2012 .

[46]  Elwin Pater,et al.  Partial Order Reduction for PINS , 2011 .

[47]  Miguel E. Andrés,et al.  Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.

[48]  Marcel Verhoef,et al.  Modeling and validating distributed embedded real-time control systems , 2009 .

[49]  Magiel Bruntink,et al.  Renovation of idiomatic crosscutting concerns in embedded systems , 2005 .

[50]  Zef Hemel Methods and Techniques for the Design and Implementation of Domain-Specific Languages , 2012 .

[51]  Parosh Aziz Abdulla,et al.  General decidability theorems for infinite-state systems , 1996, Proceedings 11th Annual IEEE Symposium on Logic in Computer Science.

[52]  Lubos Brim,et al.  DiVinE: Parallel Distributed Model Checker , 2010, 2010 Ninth International Workshop on Parallel and Distributed Methods in Verification, and Second International Workshop on High Performance Computational Systems Biology.

[53]  Matthew B. Dwyer,et al.  Parallel Randomized State-Space Search , 2007, 29th International Conference on Software Engineering (ICSE'07).

[54]  E. Clarke,et al.  Symbolic model checking using SAT procedures instead of BDDs , 1999, Proceedings 1999 Design Automation Conference (Cat. No. 99CH36361).

[55]  Glenford J. Myers,et al.  Art of Software Testing , 1979 .

[56]  Stefan Schwoon,et al.  Comparison of Algorithms for Checking Emptiness on Büchi Automata , 2009, MEMICS.

[57]  Guangyuan Li Checking Timed Büchi Automata Emptiness Using LU-Abstractions , 2009, FORMATS.

[58]  Alfons Laarman,et al.  Multi-core Emptiness Checking of Timed Büchi Automata Using Inclusion Abstraction , 2013, CAV.

[59]  Radek Pelánek,et al.  Distributed Explicit Fair Cycle Detection , 2003 .

[60]  Gerd Behrmann,et al.  Distributed reachability analysis in timed automata , 2005, International Journal on Software Tools for Technology Transfer.

[61]  A Parallel Compact Hash Table , 2011, MEMICS.

[62]  Ivan S. Zapreev Model checking Markov chains : techniques and tools , 2008 .

[63]  Dhp Dirk Gerrits Pushing and pulling : computing push plans for disk-shaped robots, and dynamic labelings for moving points , 2013 .

[64]  Kim G. Larsen,et al.  opaal: A Lattice Model Checker , 2011, NASA Formal Methods.

[65]  Jan Havlíček Untimed LTL Model Checking of Timed Automata , 2013 .

[66]  Jan A. Bergstra,et al.  Real time process algebra , 1991, Formal Aspects of Computing.

[67]  Frédéric Gava,et al.  Performance Evaluations of a BSP Algorithm for State Space Construction of Security Protocols , 2012, 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing.

[68]  Jaco Geldenhuys,et al.  Tarjan's Algorithm Makes On-the-Fly LTL Verification More Efficient , 2004, TACAS.

[69]  Armin Biere,et al.  Bounded model checking , 2003, Adv. Comput..

[70]  Gerard J. Holzmann A Stack-Slicing Algorithm for Multi-Core Model Checking , 2008, Electron. Notes Theor. Comput. Sci..

[71]  Edmund M. Clarke,et al.  Symbolic Model Checking: 10^20 States and Beyond , 1990, Inf. Comput..

[72]  Ilkka Niemelä,et al.  Strategies for Solving SAT in Grids by Randomized Search , 2008, AISC/MKM/Calculemus.

[73]  Matthias Kuntz,et al.  Distributed Markovian Bisimulation Reduction aimed at CSL Model Checking , 2008, Electron. Notes Theor. Comput. Sci..

[74]  Gaurav Singh,et al.  Industrial Strength Distributed Explicit State Model Checking , 2010, 2010 Ninth International Workshop on Parallel and Distributed Methods in Verification, and Second International Workshop on High Performance Computational Systems Biology.

[75]  Javier Esparza,et al.  A Note on On-the-Fly Verification Algorithms , 2005, TACAS.

[76]  Rajeev Alur,et al.  Timed Automata , 1999, CAV.

[77]  EM Elena Bortnik,et al.  Formal methods in support of SMC design , 2008 .

[78]  Yu Yang,et al.  Hierarchical cache coherence protocol verification one level at a time through assume guarantee , 2007, 2007 IEEE International High Level Design Validation and Test Workshop.

[79]  Donald E. Knuth,et al.  Ordered Hash Tables , 1974, Comput. J..

[80]  Paul Gastin,et al.  Minimization of Counterexamples in SPIN , 2004, SPIN.

[81]  Marco Pistore,et al.  NuSMV 2: An OpenSource Tool for Symbolic Model Checking , 2002, CAV.

[82]  Marc de Jonge,et al.  The SpinJa Model Checker , 2010, SPIN.

[83]  Jan Kuper,et al.  C?aSH: Structural Descriptions of Synchronous Hardware Using Haskell , 2010, 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools.

[84]  Jaco Geldenhuys,et al.  Cheap and Small Counterexamples , 2008, 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods.

[85]  Nancy G. Leveson,et al.  An investigation of the Therac-25 accidents , 1993, Computer.

[86]  Jeremy M. R. Martin,et al.  Parallel algorithms for dead-lock and livelock analysis of concurrent systems , 2000 .

[87]  Saul A. Kripke,et al.  Semantical Considerations on Modal Logic , 2012 .

[88]  Wojciech Penczek,et al.  Stuttering-Insensitive Automata for On-the-fly Detection of Livelock Properties , 2002, Electron. Notes Theor. Comput. Sci..

[89]  Haskell B. Curry,et al.  Combinatory Logic, Volume I , 1959 .

[90]  Wolter Pieters,et al.  La volonté machinale: understanding the electronic voting controversy , 2008 .

[91]  Seyyed Hamed Hashemi,et al.  Studies on verification of wireless sensor networks and abstraction learning for system inference , 2008 .

[92]  Igor Konnov,et al.  Using Adaptive Symmetry Reduction for LTL Model Checking , 2010 .

[93]  Tobias Nipkow,et al.  A Fully Verified Executable LTL Model Checker , 2013, CAV.

[94]  Lubos Brim,et al.  Parallel Partial Order Reduction with Topological Sort Proviso , 2010, 2010 8th IEEE International Conference on Software Engineering and Formal Methods.

[95]  M. J. de Mol,et al.  Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .

[96]  Andreas Podelski,et al.  Terminator: Beyond Safety , 2006, CAV.

[97]  Simona Orzan,et al.  Distributed Analysis with mu CRL: A Compendium of Case Studies , 2007, TACAS.

[98]  Jianhua Zhao,et al.  A Partial Order Reduction Technique for Parallel Timed Automaton Model Checking , 2008, ISoLA.

[99]  Gavin Lowe,et al.  Concurrent Depth-First Search Algorithms , 2014, TACAS.

[100]  D. Graaf,et al.  Mining semi-structured data, theoretical and experimental aspects of pattern evaluation , 2008 .

[101]  Vladimír Štill State space compression for the DiVinE model checker , 2013 .

[102]  E. Allen Emerson,et al.  Model Checking and the Mu-calculus , 1996, Descriptive Complexity and Finite Models.

[103]  Dragan Bosnacki,et al.  The Design of a Multicore Extension of the SPIN Model Checker , 2007, IEEE Transactions on Software Engineering.

[104]  Jaco Geldenhuys,et al.  A Nearly Memory-Optimal Data Structure for Sets and Mappings , 2003, SPIN.

[105]  Patricia Bouyer,et al.  Forward Analysis of Updatable Timed Automata , 2004, Formal Methods Syst. Des..

[106]  Edmund M. Clarke,et al.  Design and Synthesis of Synchronization Skeletons Using Branching-Time Temporal Logic , 1981, Logic of Programs.

[107]  Rodrigo Saad,et al.  Parallel Model Checking for Multiprocessor Architecture , 2011 .

[108]  Alfons Laarman,et al.  Multi-core Nested Depth-First Search , 2011, ATVA.

[109]  Jan Friso Groote,et al.  A linear translation from CTL* to the first-order modal μ -calculus , 2011, Theor. Comput. Sci..

[110]  Pascal Durr,et al.  Resource-based Verification for Robust Composition of Aspects , 2008 .

[111]  Gregor von Bochmann,et al.  Finite State Description of Communication Protocols , 1978, Comput. Networks.

[112]  Michael Weber An embeddable virtual machine for state space generation , 2010, International Journal on Software Tools for Technology Transfer.

[113]  Lubos Brim,et al.  DiVinE 3.0 - An Explicit-State Model Checker for Multithreaded C & C++ Programs , 2013, CAV.

[114]  Gerard J. Holzmann,et al.  State-space caching revisited , 1995, Formal Methods Syst. Des..

[115]  Wang Yi,et al.  Partial Order Reductions for Timed Systems , 1998, CONCUR.

[116]  J. K. Berendsen,et al.  Abstraction, prices and probability in model checking timed automata , 2010 .

[117]  M. D. Berg,et al.  Optimal Geometric Data Structures , 2007 .

[118]  Jaco van de Pol,et al.  Improved Distributed Algorithms for SCC Decomposition , 2008, PDMC@CAV.

[119]  Ali Mesbah,et al.  Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .

[120]  Lubos Brim,et al.  ProbDiVinE-MC: Multi-core LTL Model Checker for Probabilistic Systems , 2008, 2008 Fifth International Conference on Quantitative Evaluation of Systems.

[121]  Enrico Tronci,et al.  Exploiting Transition Locality in the Disk Based Mur phi Verifier , 2002, FMCAD.

[122]  Matthias Kuntz,et al.  Architectural dependability evaluation with Arcade , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[123]  Jja Jeroen Keiren,et al.  Advanced reduction techniques for model checking , 2013 .

[124]  Anton Wijs,et al.  Hierarchical Adaptive State Space Caching Based on Level Sampling , 2009, TACAS.

[125]  Clerry,et al.  Compact Hash Tables Using Bidirectional Linear Probing , 1984, IEEE Trans. Computers.

[126]  Yehoshua Bar-Hillel,et al.  The Intrinsic Computational Difficulty of Functions , 1969 .

[127]  Stephen A. Cook,et al.  Deterministic CFL's are accepted simultaneously in polynomial time and log squared space , 1979, STOC.

[128]  Ronald L. Rivest,et al.  Introduction to Algorithms, third edition , 2009 .

[129]  Gürcan Gülesir,et al.  Evolvable Behavior Specifications Using Context-Sensitive Wildcards , 2008 .

[130]  Werner Heijstek,et al.  Architecture design in global and model-centric software development , 2012 .

[131]  Scw Bas Ploeger,et al.  Improved verification methods for concurrent systems , 2009 .

[132]  Mihaela Sighireanu,et al.  Efficient on-the-fly model-checking for regular alternation-free mu-calculus , 2003, Sci. Comput. Program..

[133]  Lubos Brim,et al.  From Distributed Memory Cycle Detection to Parallel LTL Model Checking , 2005, FMICS.

[134]  Fpm Frank Stappers Bridging formal models : an engineering perspective , 2012 .

[135]  van Mf Marcel Amstel,et al.  Assessing and improving the quality of model transformations , 2012 .

[136]  Judi Maria Tirza Romijn,et al.  Analysing Industrial Protocols with Formal Methods , 1999 .

[137]  Kim G. Larsen,et al.  Static Guard Analysis in Timed Automata Verification , 2003, TACAS.

[138]  Pierre Wolper,et al.  Reliable Hashing without Collosion Detection , 1993, CAV.

[139]  Aaron R. Bradley,et al.  SAT-Based Model Checking without Unrolling , 2011, VMCAI.

[140]  Jasen Markovski,et al.  Real and stochastic time in process algebras for performance evaluation , 2008 .

[141]  Hasan Sözer,et al.  Architecting Fault-Tolerant Software Systems , 2009 .

[142]  David R. O'Hallaron,et al.  Parallel breadth-first BDD construction , 1997, PPOPP '97.

[143]  Gerard J. Holzmann,et al.  An improvement in formal verification , 1994, FORTE.

[144]  Doron A. Peled,et al.  An efficient verification method for parallel and distributed programs , 1988, REX Workshop.

[145]  Alfons Laarman,et al.  Multi-core Reachability for Timed Automata , 2012, FORMATS.

[146]  Gerard J. Holzmann,et al.  State Compression in SPIN: Recursive Indexing and Compression Training Runs , 2002 .

[147]  Marcin Czenko,et al.  TuLiP : reshaping trust management , 2009 .

[148]  Somayeh Malakuti Khah Olun Abadi Event composition model: achieving naturalness in runtime enforcement , 2011 .

[149]  Edsger W. Dijkstra,et al.  Guarded commands, nondeterminacy and formal derivation of programs , 1975, Commun. ACM.

[150]  Farhad Arbab,et al.  Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[151]  Lubos Brim,et al.  Distributed Verification: Exploring the Power of Raw Computing Power , 2006, FMICS/PDMC.

[152]  Gerard J. Holzmann,et al.  Software Model Checking , 1999, FORTE.

[153]  F. I. van der Berg Model checking LLVM IR using LTSmin : using relaxed memory model semantics , 2013 .

[154]  Bernard Berthomieu,et al.  A General Lock-Free Algorithm for Parallel State Space Construction , 2010, 2010 Ninth International Workshop on Parallel and Distributed Methods in Verification, and Second International Workshop on High Performance Computational Systems Biology.

[155]  Alfons Laarman,et al.  Multi-Core LTSmin: Marrying Modularity and Scalability , 2011, NASA Formal Methods.

[156]  Kim G. Larsen,et al.  A Tutorial on Uppaal , 2004, SFM.

[157]  John Businge,et al.  Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins , 2013, 2013 17th European Conference on Software Maintenance and Reengineering.

[158]  Emmanuele Zambon,et al.  Towards optimal IT availability planning: methods and tools , 2011 .

[159]  Mariëlle Stoelinga,et al.  A Semantic Framework for Test Coverage , 2006, ATVA.

[160]  A. Prasad Sistla,et al.  Symmetry and model checking , 1993, Formal Methods Syst. Des..

[161]  K. Tsirogiannis,et al.  Analysis of flow and visibility on triangulated terrains , 2011 .

[162]  Nicolae Goga,et al.  Founding FireWire bridges through Promela prototyping , 2003, Proceedings International Parallel and Distributed Processing Symposium.

[163]  Boudewijn R. Haverkort,et al.  Distributed disk-based algorithms for model checking very large Markov chains , 2006, Formal Methods Syst. Des..

[164]  Lennart C. L. Kats,et al.  Building Blocks for Language Workbenches , 2011 .

[165]  Kenneth L. McMillan,et al.  Using Unfoldings to Avoid the State Explosion Problem in the Verification of Asynchronous Circuits , 1992, CAV.

[166]  Toni Mancini,et al.  System Level Formal Verification via Model Checking Driven Simulation , 2013, CAV.

[167]  Anton Wijs Towards Informed Swarm Verification , 2011, NASA Formal Methods.

[168]  David L. Dill,et al.  Timing Assumptions and Verification of Finite-State Concurrent Systems , 1989, Automatic Verification Methods for Finite State Systems.

[169]  Dragan Bosnacki,et al.  A Nested Depth First Search Algorithm for Model Checking with Symmetry Reduction , 2002, FORTE.

[170]  M. S. Greiler,et al.  Test Suite Comprehension for Modular and Dynamic Systems , 2013 .

[171]  Soumya Edamana Mana,et al.  Split-Ordered Lists : Lock-Free Extensible Hash Tables , 2011 .

[172]  Jaco van de Pol,et al.  Bridging the Gap between Enumerative and Symbolic Model Checkers , 2009 .

[173]  Sándor Juhász,et al.  Recalibrating Fine-Grained Locking in Parallel Bucket Hash Tables , 2012, Facing the Multicore-Challenge.

[174]  Alfons Laarman,et al.  Improved Multi-Core Nested Depth-First Search , 2012, ATVA.

[175]  Robert E. Tarjan,et al.  Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..

[176]  Alfons Laarman,et al.  SpinS: Extending LTSmin with Promela through SpinJa , 2013, Electron. Notes Theor. Comput. Sci..

[177]  Maged M. Michael,et al.  High performance dynamic lock-free hash tables and list-based sets , 2002, SPAA '02.

[178]  Wang Yi,et al.  Uppaal in a nutshell , 1997, International Journal on Software Tools for Technology Transfer.

[179]  Edmund M. Clarke,et al.  Counterexample-Guided Abstraction Refinement , 2000, CAV.

[180]  Mark Timmer,et al.  Efficient modelling, generation and analysis of Markov automata , 2013 .

[181]  Wang Yi,et al.  UPPAAL - Now, Next, and Future , 2000, MOVEP.

[182]  Dragan Bosnacki,et al.  Discrete-Time Promela and Spin , 1998, FTRTFT.

[183]  Z Zvezdan Protic,et al.  Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .

[184]  C.P.T. deGouw,et al.  Combining Monitoring with Run-Time Assertion Checking , 2013 .

[185]  Theo C. Ruys,et al.  MoonWalker: Verification of .NET Programs , 2009, TACAS.

[186]  Mark Timmer SCOOP: A Tool for SymboliC Optimisations of Probabilistic Processes , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.

[187]  John A. N. Lee International biographical dictionary of computer pioneers , 1995 .

[188]  Hubert Comon-Lundh,et al.  Timed Automata and the Theory of Real Numbers , 1999, CONCUR.

[189]  Stephen D. Crocker,et al.  Verification of Concurrent Systems: Function and Timing , 1982, PSTV.

[190]  Pierre Wolper,et al.  An Automata-Theoretic Approach to Automatic Program Verification (Preliminary Report) , 1986, LICS.

[191]  Jun Sun,et al.  PAT 3: An Extensible Architecture for Building Multi-domain Model Checkers , 2011, 2011 IEEE 22nd International Symposium on Software Reliability Engineering.

[192]  Wang Yi,et al.  Efficient verification of real-time systems: compact data structure and state-space reduction , 1997, Proceedings Real-Time Systems Symposium.

[193]  Stephen A. Cook,et al.  Hardware complexity and parallel computation , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).

[194]  José Proença,et al.  Synchronous Coordination of Distributed Components , 2011 .

[195]  Wang Yi,et al.  Developing UPPAAL over 15 years , 2011, Softw. Pract. Exp..

[196]  Antti Valmari,et al.  On-the-Fly Verification with Stubborn Sets , 1993, CAV.

[197]  Kenneth L. McMillan,et al.  Symbolic model checking: an approach to the state explosion problem , 1992 .

[198]  Peter Sanders,et al.  Cache-, Hash- and Space-Efficient Bloom Filters , 2007, WEA.

[199]  B. Lijnse,et al.  TOP to the rescue. Task-oriented programming for incident response applications , 2005 .

[200]  Marius Adrian Marin,et al.  An Integrated System to Manage Crosscutting Concerns in Source Code , 2008 .

[201]  Tri Minh Ngo Qualitative and quantitative information flow analysis for multi-thread programs , 2014 .

[202]  Hilary Putnam,et al.  A Computing Procedure for Quantification Theory , 1960, JACM.

[203]  Peter Sanders Lastverteilungsalgorithmen für parallele Tiefensuche , 1997 .

[204]  Kab Kevin Verbeek Algorithms for cartographic visualization , 2012 .

[205]  A. L. de Groot,et al.  Practical Automaton proofs in PVS , 2000 .

[206]  U. Stern,et al.  Using Magnatic Disk Instead of Main Memory in the Murphi Verifier , 1998, CAV.

[207]  Theo C. Ruys,et al.  Incremental Hashing for Spin , 2008, SPIN.

[208]  Flavio Lerda,et al.  Distributed-Memory Model Checking with SPIN , 1999, SPIN.

[209]  Christian Krause,et al.  Reconfigurable Component Connectors , 2011 .

[210]  R. Bakhshi Gossiping Models : Formal Analysis of Epidemic Protocols , 2011 .

[211]  G. D. Hutcheson The Economic Implications of Moore’s Law , 2009 .

[212]  Nguyen Chi Dat Multi-Core Model Checking , 2011 .

[213]  Ganesh Gopalakrishnan,et al.  An Efficient Partial Order Reduction Algorithm with an Alternative Proviso Implementation , 2002, Formal Methods Syst. Des..

[214]  Dragan Bosnacki,et al.  GPUexplore: Many-Core On-the-Fly State Space Exploration Using GPUs , 2014, TACAS.

[215]  van Mj Muck Weerdenburg,et al.  Efficient rewriting techniques , 2009 .

[216]  Igor V. Konnov,et al.  Model Checking GARP Protocol using Spin and VRS , 2010 .

[217]  Sebastiaan Gijsbert Marinus Cornelissen,et al.  Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .

[218]  Alessandro Armando,et al.  Bounded model checking of software using SMT solvers instead of SAT solvers , 2006, International Journal on Software Tools for Technology Transfer.

[219]  Howard Barringer,et al.  Effective State Exploration for Model Checking on a Shared Memory Architecture , 2002, PDMC@CONCUR.

[220]  L. Lensink,et al.  Applying formal methods in software development , 2013 .

[221]  Somesh Jha,et al.  Exploiting Symmetry In Temporal Logic Model Checking , 1993, CAV.

[222]  Antti Valmari,et al.  Stubborn sets for reduced state space generation , 1991, Applications and Theory of Petri Nets.

[223]  Cesare Tinelli,et al.  Solving SAT and SAT Modulo Theories: From an abstract Davis--Putnam--Logemann--Loveland procedure to DPLL(T) , 2006, JACM.

[224]  C. J. Boogerd,et al.  Focusing Automatic Code Inspections , 2010 .

[225]  Gerard J. Holzmann,et al.  Design and validation of computer protocols , 1991 .

[226]  Radu Mateescu,et al.  CADP 2006: A Toolbox for the Construction and Analysis of Distributed Processes , 2007, CAV.

[227]  Frits W. Vaandrager,et al.  Distributing Timed Model Checking - How the Search Order Matters , 2000, CAV.

[228]  Wang Yi,et al.  UPPAAL Implementation Secrets , 2002, FTRTFT.

[229]  Lubos Brim,et al.  Platform Dependent Verification: On Engineering Verification Tools for 21st Century , 2011, PDMC.

[230]  Edmund M. Clarke,et al.  The Birth of Model Checking , 2008, 25 Years of Model Checking.

[231]  A. Rodriguez Yakushev,et al.  Towards Getting Generic Programming Ready for Prime Time , 2009 .

[232]  J. Kwisthout,et al.  The Computational Complexity of Probabilistic Networks , 2009 .

[233]  Timothy L. Harris,et al.  Non-blocking Hashtables with Open Addressing , 2005, DISC.

[234]  Jaco van de Pol,et al.  Modelling biological pathway dynamics with Timed Automata , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).

[235]  Allen S. Nakagawa Post-implementation considerations , 1994 .

[236]  Hui Gao,et al.  Almost wait-free resizable hashtables , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[237]  Hugo Jonker,et al.  Security matters : privacy in voting and fairness in digital exchange , 2009 .

[238]  Arend Rensink,et al.  Distributed Graph-Based State Space Generation , 2010, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[239]  Joël Ouaknine,et al.  Abstraction and Counterexample-Guided Refinement in Model Checking of Hybrid Systems , 2003, Int. J. Found. Comput. Sci..

[240]  Lubos Brim,et al.  A Time-Optimal On-the-Fly Parallel Algorithm for Model Checking of Weak LTL Properties , 2009, ICFEM.

[241]  Erik P. de Vink,et al.  An Overview of the mCRL2 Toolset and Its Recent Advances , 2013, TACAS.

[242]  Jaco van de Pol,et al.  A Database Approach to Distributed State-Space Generation , 2008, J. Log. Comput..

[243]  Damian Sulewski,et al.  Large scale parallel state space search utilizing graphics processing units and solid state disks , 2012 .

[244]  Jaco van de Pol,et al.  State Space Reduction by Proving Confluence , 2002, CAV.

[245]  Walter J. Savitch,et al.  Relationships Between Nondeterministic and Deterministic Tape Complexities , 1970, J. Comput. Syst. Sci..

[246]  Ofer Strichman,et al.  SAT Based Abstraction-Refinement Using ILP and Machine Learning Techniques , 2002, CAV.

[247]  Cor-Paul Bezemer,et al.  Performance Optimization of Multi-Tenant Software Systems , 2014 .

[248]  Hui Gao,et al.  Lock-free dynamic hash tables with open addressing , 2003, Distributed Computing.

[249]  Ronald Middelkoop,et al.  Capturing and exploiting abstract views of states in OO verification , 2011 .

[250]  Sami Evangelista,et al.  Solving the ignoring problem for partial order reduction , 2010, International Journal on Software Tools for Technology Transfer.

[251]  Dina Hadžiosmanović,et al.  The process matters: cyber security in industrial control systems , 2014 .

[252]  Michael L. Scott,et al.  Algorithms for scalable synchronization on shared-memory multiprocessors , 1991, TOCS.

[253]  Stavros Tripakis,et al.  On-the-fly symbolic model checking for real-time systems , 1997, Proceedings Real-Time Systems Symposium.

[254]  Albert L. Zobrist,et al.  A New Hashing Method with Application for Game Playing , 1990 .

[255]  Rupert Macey-Dare Economic Consequences of Moore's Law , 2013 .

[256]  William A. Howard,et al.  The formulae-as-types notion of construction , 1969 .

[257]  C. A. R. Hoare,et al.  A Calculus of Durations , 1991, Inf. Process. Lett..

[258]  Christel Baier,et al.  Principles of model checking , 2008 .

[259]  Bernard Chazelle,et al.  The Bloomier filter: an efficient data structure for static support lookup tables , 2004, SODA '04.

[260]  Peter W. O'Hearn,et al.  Local Reasoning about Programs that Alter Data Structures , 2001, CSL.

[261]  Olav Bolland,et al.  To store or not to store , 2007 .

[262]  J. W. Backus The History of FORTRAN I, II and III , 1979, IEEE Ann. Hist. Comput..

[263]  Silvano Dal-Zilio,et al.  Mixed Shared-Distributed Hash Tables Approaches for Parallel State Space Construction , 2011, 2011 10th International Symposium on Parallel and Distributed Computing.

[264]  Siert Wieringa,et al.  Concurrent Clause Strengthening , 2013, SAT.

[265]  Alfons Laarman,et al.  Variations on Multi-Core Nested Depth-First Search , 2011, PDMC.

[266]  Alfons Laarman,et al.  Multi-Core BDD Operations for Symbolic Reachability , 2013, Electron. Notes Theor. Comput. Sci..

[267]  Ganesh Gopalakrishnan,et al.  Random Walk Based Heuristic Algorithms for Distributed Memory Model Checking , 2003, PDMC@CAV.

[268]  RH Rudolf Mak,et al.  Design and performance analysis of data-independent stream processing systems , 2008 .

[269]  David L. Dill,et al.  Better verification through symmetry , 1996, Formal Methods Syst. Des..

[270]  Lubos Brim,et al.  DiVinE 2.0: High-Performance Model Checking , 2009, 2009 International Workshop on High Performance Computational Systems Biology.

[271]  Ronald Burgman,et al.  Partial-order reduction based on probe sets , 2012 .

[272]  Howard Barringer,et al.  CTL* model checking on a shared-memory architecture , 2006, Formal Methods Syst. Des..

[273]  Lionel Mamane,et al.  Interactive mathematical documents: creation and presentation , 2004 .

[274]  Patrice Godefroid,et al.  Automated Whitebox Fuzz Testing , 2008, NDSS.

[275]  Vipin Kumar,et al.  Superlinear Speedup in Parallel State-Space Search , 1988, FSTTCS.

[276]  Carst Tankink Documentation and formal mathematics : web technology meets theorem proving , 2013 .

[277]  Arthur I. Baars,et al.  Embedded Compilers , 2009 .

[278]  Stephanie Kemper,et al.  Modelling and analysis of real-time coordination patterns , 2011 .

[279]  Adriaan Middelkoop,et al.  Inference of Program Properties with Attribute Grammars, Revisited , 2012 .

[280]  Frank Piessens,et al.  The VeriFast program verifier , 2008 .

[281]  Stavros Tripakis,et al.  Checking Timed Büchi Automata Emptiness Efficiently , 2005, Formal Methods Syst. Des..

[282]  Lubos Brim,et al.  Distributed Partial Order Reduction of State Spaces , 2005, Electron. Notes Theor. Comput. Sci..

[283]  Augusto Sampaio,et al.  A process algebraic framework for specification and validation of real-time systems , 2010, Formal Aspects of Computing.

[284]  Radek Pelánek,et al.  BEEM: Benchmarks for Explicit Model Checkers , 2007, SPIN.

[285]  Taolue Chen Clocks, Dice and Processes , 2009 .

[286]  Simona Orzan,et al.  A distributed algorithm for strong bisimulation reduction of state spaces , 2002, PDMC@CONCUR.

[287]  Antti Valmari,et al.  A stubborn attack on state explosion , 1990, Formal Methods Syst. Des..

[288]  Lu Luo Software Testing Techniques , 2001 .

[289]  Gheorghe Paun Spiking Neural P Systems: A Tutorial , 2007, Bull. EATCS.

[290]  Harmen Kastenberg Graph-based software specification and verification , 2008 .

[291]  Sami Evangelista,et al.  Memory Efficient State Space Storage in Explicit Software Model Checking , 2005, SPIN.

[292]  Frédéric Gava,et al.  A BSP Algorithm for On-the-Fly Checking CTL* Formulas on Security Protocols , 2012, PDCAT.

[293]  Rajeev Alur,et al.  A Theory of Timed Automata , 1994, Theor. Comput. Sci..

[294]  Jaco van de Pol,et al.  Confluence Reduction for Probabilistic Systems , 2011, TACAS.

[295]  Gerard J. Holzmann,et al.  Parallelizing the Spin Model Checker , 2012, SPIN.

[296]  M. G. van der Horst,et al.  Scalable block processing algorithms , 2008 .

[297]  Witold Litwin,et al.  Linear Hashing: A new Algorithm for Files and Tables Addressing , 1980, ICOD.

[298]  Maurice Herlihy,et al.  Hopscotch Hashing , 2008, DISC.

[299]  Ichiro Hasuo,et al.  Tracing Anonymity with Coalgebras , 2008 .

[300]  Jun Sun,et al.  Scalable Multi-core Model Checking Fairness Enhanced Systems , 2009, ICFEM.

[301]  Eduardo Zambon,et al.  Abstract Graph Transformation - Theory and Practice , 2013 .

[302]  Lubos Brim,et al.  Scalable shared memory LTL model checking , 2010, International Journal on Software Tools for Technology Transfer.

[303]  Víctor A. Braberman,et al.  Dealing with practical limitations of distributed timed model checking for timed automata , 2006, Formal Methods Syst. Des..

[304]  Saeed Sedghi,et al.  Towards Provably Secure Efficiently Searchable Encryption , 2012 .

[305]  Gerard J. Holzmann,et al.  The SPIN Model Checker , 2003 .

[306]  Ofer Strichman,et al.  SAT-based counterexample-guided abstraction refinement , 2004, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[307]  Yanjing Wang,et al.  Epistemic Modelling and Protocol Dynamics , 2010 .

[308]  Hendrik Michaël van der Bijl,et al.  On changing models in model-based testing , 2011 .

[309]  C. Ramchandani,et al.  Analysis of asynchronous concurrent systems by timed petri nets , 1974 .

[310]  Kevin Leyton-Brown,et al.  SATzilla: Portfolio-based Algorithm Selection for SAT , 2008, J. Artif. Intell. Res..

[311]  Joseph Sifakis,et al.  Specification and Verification of Conurrent Systems in Cesar , 2008, 25 Years of Model Checking.

[312]  Ljp Luc Engelen From napkin sketches to reliable software , 2012 .

[313]  Mari Antonius Cornelis Dekker,et al.  Flexible Access Control for Dynamic Collaborative Environments , 2009 .

[314]  Marieke Huisman,et al.  The VerCors project: setting up basecamp , 2012, PLPV '12.

[315]  Mohammad Mahdi Jaghoori,et al.  Time At Your Service: Schedulability Analysis of Real-Time and Distributed Services , 2010 .

[316]  Dragan Bosnacki,et al.  Integrating Real Time into Spin: A Prototype Implementation , 1998, FORTE.

[317]  Maurice Herlihy,et al.  The art of multiprocessor programming , 2020, PODC '06.

[318]  Pierre Wolper,et al.  Memory-efficient algorithms for the verification of temporal properties , 1990, Formal Methods Syst. Des..

[319]  Mariëlle Stoelinga,et al.  Dynamic Fault Tree Analysis Using Input/Output Interactive Markov Chains , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[320]  J. Ian Munro,et al.  Robin hood hashing , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[321]  Gerard J. Holzmann An analysis of bitstate hashing , 1995 .

[322]  Peter W. O'Hearn,et al.  BI as an assertion language for mutable data structures , 2001, POPL '01.

[323]  Karina R. Olmos Joffré Strategies for Context Sensitive Program Transformation , 2009 .

[324]  Peter H. Schmitt,et al.  Improving Non-Progress Cycle Checks , 2009, SPIN.

[325]  Christel Baier,et al.  Model-Checking Algorithms for Continuous-Time Markov Chains , 2002, IEEE Trans. Software Eng..

[326]  Tim K. Cocx,et al.  Algorithmic tools for data-oriented law enforcement , 2009 .

[327]  Ben Shneiderman,et al.  Syntactic/semantic interactions in programmer behavior: A model and experimental results , 1979, International Journal of Computer & Information Sciences.

[328]  Steven van der Vegt A Concurrent Bidirectional Linear Probing Algorithm Towards a Concurrent Compact Hash Table , 2011 .

[329]  Jaco Geldenhuys,et al.  Runtime Efficient State Compaction in SPIN , 1999, SPIN.

[330]  Antti Valmari,et al.  Stubborn set methods for process algebras , 1997, Partial Order Methods in Verification.

[331]  Sofia Cassel,et al.  Graph-Based Algorithms for Boolean Function Manipulation , 2012 .

[332]  Sander van der Burg,et al.  A Reference Architecture for Distributed Software Deployment , 2013 .

[333]  Robert Brijder,et al.  Models of natural computation : gene assembly and membrane systems , 2008 .

[334]  Trajce Dimkov,et al.  Alignment of organizational security policies: Theory and Practice , 2012 .

[335]  M Muhammad Atif,et al.  Formal modeling and verification of distributed failure detectors , 2011 .

[336]  Georgeta Igna,et al.  Performance analysis of real-time task systems using timed automata , 2013 .

[337]  van den,et al.  Composition and synchronization of real-time components upon one processor , 2013 .

[338]  van Pja Paul Tilburg From computability to executability : a process-theoretic view on automata theory , 2011 .

[339]  Gerard J. Holzmann Pan - A Protocol Specification Analyzer , 2002 .

[340]  Frédéric Gava,et al.  A BSP Algorithm for On-the-fly Checking LTL Formulas on Security Protocols , 2012, ISPDC.

[341]  C. A. R. HOARE,et al.  An axiomatic basis for computer programming , 1969, CACM.

[342]  Daniel Kroening,et al.  Partial Orders for Efficient Bounded Model Checking of Concurrent Software , 2013, CAV.

[343]  Marius Minea,et al.  Partial Order Reduction for Model Checking of Timed Automata , 1999, CONCUR.

[344]  Nicholas Pippenger Pebbling with an Auxiliary Pushdown , 1981, J. Comput. Syst. Sci..

[345]  A. Morali,et al.  IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .

[346]  S. Georgievska Probability and Hiding in Concurrent Processes ( thesis abstract ) , 2011 .

[347]  J. Endrullis Termination and Productivity , 2010 .

[348]  Mohammed G. Khatib MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .

[349]  Patrick Cousot,et al.  Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.

[350]  Doron A. Peled,et al.  Static Partial Order Reduction , 1998, TACAS.

[351]  Moshe Y. Vardi Branching vs. Linear Time: Final Showdown , 2001, TACAS.

[352]  David L. Dill,et al.  Parallelizing the Murϕ Verifier , 2001, Formal Methods Syst. Des..

[353]  Jean-Michel Couvreur,et al.  On-the-Fly Verification of Linear Temporal Logic , 1999, World Congress on Formal Methods.

[354]  John H. Reif,et al.  Depth-First Search is Inherently Sequential , 1985, Inf. Process. Lett..

[355]  Lacramioara Astefanoaei,et al.  An executable theory of multi-agent systems refinement , 2011 .

[356]  van Mpwj Michiel Osch Automated model-based testing of hybrid systems , 2009 .

[357]  Stefan Blom,et al.  Compressed and Distributed File Formats for Labeled Transition Systems , 2003, PDMC@CAV.

[358]  Lubos Brim,et al.  Designing fast LTL model checking algorithms for many-core GPUs , 2012, J. Parallel Distributed Comput..

[359]  Frédéric Herbreteau,et al.  Efficient On-the-Fly Emptiness Check for Timed Büchi Automata , 2010, ATVA.

[360]  Stavros Tripakis,et al.  Checking timed Büchi automata emptiness on simulation graphs , 2009, TOCL.

[361]  Eric Eide,et al.  Volatiles are miscompiled, and what to do about it , 2008, EMSOFT '08.

[362]  Lubos Brim,et al.  Distributed LTL Model Checking Based on Negative Cycle Detection , 2001, FSTTCS.

[363]  Stefan Edelkamp,et al.  Exploiting the Computational Power of the Graphics Card: Optimal State Space Planning on the GPU , 2011, ICAPS.

[364]  Daniel Kroening,et al.  A Survey of Automated Techniques for Formal Software Verification , 2008, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[365]  Stavros Tripakis,et al.  Model Checking of Real-Time Reachability Properties Using Abstractions , 1998, TACAS.

[366]  George C. Necula Proof-Carrying Code. Design and Implementation , 2002 .

[367]  Joseph Sifakis,et al.  Model checking , 1996, Handbook of Automated Reasoning.

[368]  Martin R. Neuhäußer,et al.  Model checking nondeterministic and randomly timed systems , 2010 .

[369]  Martin Bravenboer,et al.  Exercises in Free Syntax. Syntax Definition, Parsing, and Assimilation of Language Conglomerates , 2003 .

[370]  Armin Biere,et al.  Symbolic Model Checking without BDDs , 1999, TACAS.

[371]  Radu Mateescu,et al.  Large-scale Distributed Verification Using CADP: Beyond Clusters to Grids , 2013, Electron. Notes Theor. Comput. Sci..

[372]  Alfons Laarman,et al.  Boosting multi-core reachability performance with shared hash tables , 2010, Formal Methods in Computer Aided Design.

[373]  Lubos Brim,et al.  Computing Strongly Connected Components in Parallel on CUDA , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.

[374]  Flavio D. Garcia Formal and Computational Cryptography: Protocols, Hashes and Commitments , 2008 .

[375]  Ileana Buhan,et al.  Cryptographic keys from noisy data, theory and applications , 2008 .

[376]  Howard Barringer,et al.  Memory efficient state storage in Spin , 1996, The Spin Verification System.

[377]  Gerard J. Holzmann,et al.  A minimized automaton representation of reachable states , 1999, International Journal on Software Tools for Technology Transfer.

[378]  Panagiotis Manolios,et al.  Fast, All-Purpose State Storage , 2009, SPIN.

[379]  Michael Weber,et al.  "To Store or Not To Store" Reloaded: Reclaiming Memory on Demand , 2006, FMICS/PDMC.

[380]  Tingting Han,et al.  Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.

[381]  Marta Z. Kwiatkowska,et al.  PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.

[382]  Fred Kröger,et al.  Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.

[383]  Alfons Laarman,et al.  Multi-core and/or Symbolic Model Checking , 2012, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[384]  Jens R. Calamé,et al.  Testing reactive systems with data: enumerative methods and constraint solving , 2008 .

[385]  Geoff Sutcliffe The TPTP Problem Library and Associated Infrastructure , 2009, Journal of Automated Reasoning.

[386]  Tom van Dijk,et al.  The parallelization of binary decision diagram operations for model checking , 2012 .

[387]  Dragan Bosnacki,et al.  Partial-order reduction for general state exploring algorithms , 2006, International Journal on Software Tools for Technology Transfer.

[388]  David A. Bader,et al.  Scalable Graph Exploration on Multicore Processors , 2010, 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis.

[389]  Kathi Fisler,et al.  Is There a Best Symbolic Cycle-Detection Algorithm? , 2001, TACAS.

[390]  Gerhard de Koning Gans,et al.  Outsmarting smart cards , 2013 .

[391]  Mihalis Yannakakis,et al.  On nested depth first search , 1996, The Spin Verification System.

[392]  Jaco van de Pol,et al.  Efficient Instantiation of Parameterised Boolean Equation Systems to Parity Games , 2012, GRAPHITE.

[393]  J.-C. Gregoire State space compression in Spin with GETSs , 1996 .

[394]  Alex Groce,et al.  Tackling Large Verification Problems with the Swarm Tool , 2008, SPIN.

[395]  Kim G. Larsen,et al.  Lower and Upper Bounds in Zone Based Abstractions of Timed Automata , 2004, TACAS.

[396]  E Elena Mumford,et al.  Drawing graphs for cartographic applications , 2008 .

[397]  Petr Rockai,et al.  Shared Hash Tables in Parallel Model Checking , 2008, Electron. Notes Theor. Comput. Sci..

[398]  Jaco van de Pol,et al.  Symbolic Reachability for Process Algebras with Recursive Data Types , 2008, ICTAC.

[399]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[400]  U Uzma Khadim,et al.  Process algebras for hybrid systems : comparison and development , 2008 .

[401]  Tom Staijen,et al.  Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .

[402]  Somesh Jha,et al.  Combining Partial Order and Symmetry Reductions , 1997, TACAS.

[403]  M. T. de Berg,et al.  Algorithms for Fat Objects: Decompositions and Applications , 2004 .

[404]  Lubos Brim,et al.  DiVinE - A Tool for Distributed Verification , 2006, CAV.

[405]  Alfons Laarman,et al.  Parallel Recursive State Compression for Free , 2011, SPIN.

[406]  Dirk Beyer,et al.  Explicit-State Software Model Checking Based on CEGAR and Interpolation , 2013, FASE.

[407]  Ian Foster,et al.  Designing and building parallel programs , 1994 .

[408]  Adrianus Johannus Paulus Jeckmans Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .

[409]  John C. Mitchell,et al.  Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[410]  Hossein Rahmani,et al.  Analysis of protein-protein interaction networks by means of annotated graph mining algorithms , 2012 .