|
![]() |
|||
|
||||
OverviewWith the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences. Full Product DetailsAuthor: Eric Y.T. Juan , Jeffrey J.P. TsaiPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of the original 1st ed. 2002 Volume: 676 Dimensions: Width: 15.50cm , Height: 1.10cm , Length: 23.50cm Weight: 0.343kg ISBN: 9781461353492ISBN 10: 1461353491 Pages: 196 Publication Date: 26 October 2012 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents1. Introduction.- 1. Background.- 2. State Explosion.- 3. Compositional Verification.- 4. A Compositional Verification Methodology.- 5. Reduction Methods for Real-Time Systems.- 2. Verification Techniques for Concurrent Systems.- 1. Techniques for Efficient Analysis of Concurrent Systems.- 2. Compositional-Verification Techniques.- 3. Petri-Net Based Techniques for Real-Time Systems.- 3. Multiset Labeled Transition Systems.- 1. The Model.- 2. Communication Diagrams.- 3. Function “Parallel Composition” (?) of MLTSs.- 4. Function “Hiding Invisible Actions (Hide)” of MLTSs.- 5. Parallel Operation of MLTSs.- 4. Compositional Verification Using MLTS.- 1. Equivalences, Synonyms, and Congruences.- 2. Paths, Traces, and IO-Traces.- 3. IOT-Failures-Divergence (IOTFD) Equivalence.- 4. IOTFD-Equivalence Reduction.- 5. Algorithms and Proofs.- 5. Composotional Verification Using Petri Nets.- 1. The Models.- 2. Function “Parallel Composition”.- 3. Synonymous Reduction.- 4. Compositional Verification of Condensed MLTSs.- 5. Condensation Theories for State-Based Systems.- 6. Condensation Rules for IOT-State/IOT-Failure Equivalences.- 7. Firing Dependence Theories and Rules for MLTS*s.- 8. Compositional Verification of Sub-Marking Reachability.- 9. Definitions, Algorithms, and Proofs.- 6. Tools and Experiments.- 1. Alternating Bit Protocol (ABP).- 2. Tools.- 3. Performance Evaluation.- 7. Delay Time Petri Nets and Net Reduction.- 1. Time Petri Nets.- 2. Delay Time Petri Nets (DTPNs).- 3. Reduction Rules for DTPNs.- 4. Class Graphs of DTPNs.- 5. Efficiency Consideration and Experimental Results.- References.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |