Swarm Verification Techniques Public Deposited

http://ir.library.oregonstate.edu/concern/defaults/xk81jm48q

To the best of our knowledge, one or more authors of this paper were federal employees when contributing to this work. ©2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. This is the publisher’s final pdf. The published article is copyrighted by IEEE Computer Society and can be found at:  http://www.computer.org/portal/web/publications.

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • The range of verification problems that can be solved with logic model checking tools has increased significantly in the last few decades. This increase in capability is based on algorithmic advances and new theoretical insights, but it has also benefitted from the steady increase in processing speeds and main memory sizes on standard computers. The steady increase in processing speeds, though, ended when chip-makers started redirecting their efforts to the development of multicore systems. For the near-term future, we can anticipate the appearance of systems with large numbers of CPU cores, but without matching increases in clock-speeds. We will describe a model checking strategy that can allow us to leverage this trend and that allows us to tackle significantly larger problem sizes than before.
Resource Type
DOI
Date Available
Date Issued
Citation
  • Holzmann, G. J., Joshi, R., & Groce, A. (2011). Swarm verification techniques. IEEE Transactions on Software Engineering, 37(6) 845-857. doi: 10.1109/TSE.2010.110.
Series
Keyword
Rights Statement
Funding Statement (additional comments about funding)
Publisher
Peer Reviewed
Language
Replaces
Additional Information
  • description.provenance : Submitted by Deborah Campbell (deborah.campbell@oregonstate.edu) on 2012-12-12T23:38:40Z No. of bitstreams: 1 GroceAlexElectricalEngineeringComputerScienceSwarmVerificationTechniques.pdf: 1535846 bytes, checksum: 887146bc52d21879676b43b309c63814 (MD5)
  • description.provenance : Approved for entry into archive by Deborah Campbell(deborah.campbell@oregonstate.edu) on 2012-12-12T23:40:07Z (GMT) No. of bitstreams: 1 GroceAlexElectricalEngineeringComputerScienceSwarmVerificationTechniques.pdf: 1535846 bytes, checksum: 887146bc52d21879676b43b309c63814 (MD5)
  • description.provenance : Made available in DSpace on 2012-12-12T23:40:07Z (GMT). No. of bitstreams: 1 GroceAlexElectricalEngineeringComputerScienceSwarmVerificationTechniques.pdf: 1535846 bytes, checksum: 887146bc52d21879676b43b309c63814 (MD5) Previous issue date: 2010-12-10

Relationships

Parents:

This work has no parents.

Last modified

Downloadable Content

Download PDF

Items