skip to main content
Skip header Section
Temporal verification of reactive systems: safetyOctober 1995
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-94459-3
Published:01 October 1995
Pages:
532
Skip Bibliometrics Section
Reflects downloads up to 27 Dec 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Bayarmagnai E, Mohammadi F and Prébet R Algebraic Tools for Computing Polynomial Loop Invariants Proceedings of the 2024 International Symposium on Symbolic and Algebraic Computation, (371-381)
  2. ACM
    Su Y, Yang Q and Ci Y Predicting Lemmas in Generalization of IC3 Proceedings of the 61st ACM/IEEE Design Automation Conference, (1-6)
  3. Catta D, Leneutre J, Malvone V and Murano A Obstruction Alternating-time Temporal Logic: A Strategic Logic to Reason about Dynamic Models Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, (271-280)
  4. ACM
    Brizzio M Resolving Goal-Conflicts and Scaling Synthesis through Mode-Based Decomposition Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, (207-211)
  5. ACM
    Brizzio M, Cordy M, Papadakis M, Sánchez C, Aguirre N and Degiovanni R Automated Repair of Unrealisable LTL Specifications Guided by Model Counting Proceedings of the Genetic and Evolutionary Computation Conference, (1499-1507)
  6. ACM
    Lee J, Kim S and Bae K Bounded Model Checking of PLC ST Programs using Rewriting Modulo SMT Proceedings of the 8th ACM SIGPLAN International Workshop on Formal Techniques for Safety-Critical Systems, (56-67)
  7. ACM
    Bonakdarpour B, Fraigniaud P, Rajsbaum S, Rosenblueth D and Travers C (2022). Decentralized Asynchronous Crash-resilient Runtime Verification, Journal of the ACM, 69:5, (1-31), Online publication date: 31-Oct-2022.
  8. ACM
    O'Connor L and Wickström O Quickstrom: property-based acceptance testing with LTL specifications Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (1025-1038)
  9. Lyu Z, Xu X and Hong Y (2022). Small-gain theorem for safety verification of interconnected systems, Automatica (Journal of IFAC), 139:C, Online publication date: 1-May-2022.
  10. ACM
    Schultz W, Dardik I and Tripakis S Formal verification of a distributed dynamic reconfiguration protocol Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs, (143-152)
  11. ACM
    Asadi A, Chatterjee K, Fu H, Goharshady A and Mahdavi M Polynomial reachability witnesses via Stellensätze Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, (772-787)
  12. Finkbeiner B, Hahn C, Stenger M and Tentrup L (2020). Efficient monitoring of hyperproperties using prefix trees, International Journal on Software Tools for Technology Transfer (STTT), 22:6, (729-740), Online publication date: 1-Dec-2020.
  13. ACM
    Glabbeek R and Höfner P (2019). Progress, Justness, and Fairness, ACM Computing Surveys, 52:4, (1-38), Online publication date: 31-Jul-2020.
  14. ACM
    Chatterjee K, Fu H, Goharshady A and Goharshady E Polynomial invariant generation for non-deterministic recursive programs Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, (672-687)
  15. Leucker M, Sánchez C, Scheffel T, Schmitz M and Schramm A (2020). Runtime verification of real-time event streams under non-synchronized arrival, Software Quality Journal, 28:2, (745-787), Online publication date: 1-Jun-2020.
  16. ACM
    Mascle C, Neider D, Schwenger M, Tabuada P, Weinert A and Zimmermann M From LTL to rLTL monitoring Proceedings of the 23rd International Conference on Hybrid Systems: Computation and Control, (1-12)
  17. Jones C Reasoning About Shared-Variable Concurrency: Interactions Between Research Threads Formal Methods. FM 2019 International Workshops, (54-72)
  18. ACM
    Beek M, Damiani F, Lienhardt M, Mazzanti F and Paolini L Static Analysis of Featured Transition Systems Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A, (39-51)
  19. Artale A, Mazzullo A and Ozaki A Do you need infinite time? Proceedings of the 28th International Joint Conference on Artificial Intelligence, (1516-1522)
  20. ACM
    Ferrère T, Maler O, Ničković D and Pnueli A (2019). From Real-time Logic to Timed Automata, Journal of the ACM, 66:3, (1-31), Online publication date: 30-Jun-2019.
  21. ACM
    Eljadiri L, Assayad I and Zakari A Generic Verification of Safety Properties For SystemC Programs Using Incomplete Interactions Proceedings of the 2nd International Conference on Smart Digital Environment, (166-171)
  22. ACM
    Degiovanni R, Molina F, Regis G and Aguirre N A genetic algorithm for goal-conflict identification Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (520-531)
  23. Roşu G (2018). Finite-trace linear temporal logic, Formal Methods in System Design, 53:1, (138-163), Online publication date: 1-Aug-2018.
  24. ACM
    Ferrère T, Henzinger T and Saraç N A Theory of Register Monitors Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, (394-403)
  25. Pill I and Wotawa F (2018). Automated generation of (F)LTL oracles for testing and debugging, Journal of Systems and Software, 139:C, (124-141), Online publication date: 1-May-2018.
  26. ACM
    Leucker M, Sánchez C, Scheffel T, Schmitz M and Schramm A TeSSLa Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (1925-1933)
  27. ACM
    Regis G, Degiovanni R, D'Ippolito N and Aguirre N CLTSA: labelled transition system analyser with counting fluent support Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (979-983)
  28. Monica D, Gigante N, Montanari A, Sala P and Sciavicco G Bounded timed propositional temporal logic with past captures timeline-based planning with bounded constraints Proceedings of the 26th International Joint Conference on Artificial Intelligence, (1008-1014)
  29. Sánchez A and Sánchez C (2017). Parametrized verification diagrams, Annals of Mathematics and Artificial Intelligence, 80:3-4, (249-282), Online publication date: 1-Aug-2017.
  30. Brett N, Siddique U and Bonakdarpour B Rewriting-Based Runtime Verification for Alternation-Free HyperLTL Proceedings, Part II, of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 10206, (77-93)
  31. Courant N and Urban C Precise Widening Operators for Proving Termination by Abstract Interpretation Proceedings, Part I, of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 10205, (136-152)
  32. ACM
    Joshi Y, Tchamgoue G and Fischmeister S Runtime verification of LTL on lossy traces Proceedings of the Symposium on Applied Computing, (1379-1386)
  33. Su W and Abrial J (2017). Aircraft landing gear system, International Journal on Software Tools for Technology Transfer (STTT), 19:2, (141-166), Online publication date: 1-Apr-2017.
  34. Bertello M, Gigante N, Montanari A and Reynolds M Leviathan Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (950-956)
  35. Bozzelli L and Sánchez C (2016). Foundations of Boolean stream runtime verification, Theoretical Computer Science, 631:C, (118-138), Online publication date: 6-Jun-2016.
  36. Essen C, Jobstmann B, Parker D and Varshneya R (2016). Synthesizing efficient systems in probabilistic environments, Acta Informatica, 53:4, (425-457), Online publication date: 1-Jun-2016.
  37. Schellhorn G, Travkin O and Wehrheim H Towards a Thread-Local Proof Technique for Starvation Freedom Proceedings of the 12th International Conference on Integrated Formal Methods - Volume 9681, (193-209)
  38. ACM
    Bauch P, Havel V and Barnat J (2016). Control Explicit--Data Symbolic Model Checking, ACM Transactions on Software Engineering and Methodology, 25:2, (1-48), Online publication date: 16-May-2016.
  39. Bensalem S, Bozga M, Legay A, Nguyen T, Sifakis J and Yan R (2016). Component-based verification using incremental design and invariants, Software and Systems Modeling (SoSyM), 15:2, (427-451), Online publication date: 1-May-2016.
  40. Namjoshi K and Trefler R Parameterized Compositional Model Checking Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 9636, (589-606)
  41. Attie P (2016). Synthesis of large dynamic concurrent programs from dynamic specifications, Formal Methods in System Design, 48:1-2, (94-147), Online publication date: 1-Apr-2016.
  42. Bourke T, Glabbeek R and Höfner P (2016). Mechanizing a Process Algebra for Network Protocols, Journal of Automated Reasoning, 56:3, (309-341), Online publication date: 1-Mar-2016.
  43. ACM
    Hague M, Lin A and Ong C (2015). Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach, ACM SIGPLAN Notices, 50:10, (1-19), Online publication date: 18-Dec-2015.
  44. Rebiha R, Moura A and Matringe N (2015). Generating invariants for non-linear loops by linear algebraic methods, Formal Aspects of Computing, 27:5-6, (805-829), Online publication date: 1-Nov-2015.
  45. ACM
    Hague M, Lin A and Ong C Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (1-19)
  46. Regis G, Degiovanni R, D'Ippolito N and Aguirre N Specifying event-based systems with a counting fluent temporal logic Proceedings of the 37th International Conference on Software Engineering - Volume 1, (733-743)
  47. Harrenstein P, Turrini P and Wooldridge M Electric Boolean Games Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (655-663)
  48. ACM
    Alberti F and Monniaux D Polyhedra to the rescue of array interpolants Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1745-1750)
  49. Mammar A and Frappier M (2015). Proof-based verification approaches for dynamic properties: application to the information system domain, Formal Aspects of Computing, 27:2, (335-374), Online publication date: 1-Mar-2015.
  50. Cook B, Khlaaf H and Piterman N Faster Temporal Reasoning for Infinite-State Programs Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design, (75-82)
  51. ACM
    Dimitrova R and Majumdar R Deductive control synthesis for alternating-time logics Proceedings of the 14th International Conference on Embedded Software, (1-10)
  52. Vissani I, Pombo C, Ţu ţU I and Fiadeiro J A Full Operational Semantics for Asynchronous Relational Networks Revised Selected Papers of the 22nd International Workshop on Recent Trends in Algebraic Development Techniques - Volume 9463, (131-150)
  53. Kupriyanov A and Finkbeiner B Causal Termination of Multi-threaded Programs Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, (814-830)
  54. Sánchez A and Sánchez C LEAP Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, (620-627)
  55. ACM
    Degiovanni R, Alrajeh D, Aguirre N and Uchitel S Automated goal operationalisation based on interpolation and SAT solving Proceedings of the 36th International Conference on Software Engineering, (129-139)
  56. BjØrner D and Havelund K 40 Years of Formal Methods Proceedings of the 19th International Symposium on FM 2014: Formal Methods - Volume 8442, (42-61)
  57. Masellis R and Su J Runtime Enforcement of First-Order LTL Properties on Data-Aware Business Processes Proceedings of the 11th International Conference on Service-Oriented Computing - Volume 8274, (54-68)
  58. ACM
    Barkati K and Jouvelot P (2013). Synchronous programming in audio processing, ACM Computing Surveys, 46:2, (1-35), Online publication date: 1-Nov-2013.
  59. Bodik R and Jobstmann B (2013). Algorithmic program synthesis, International Journal on Software Tools for Technology Transfer (STTT), 15:5-6, (397-411), Online publication date: 1-Oct-2013.
  60. Yordanov B, Wintersteiger C, Hamadi Y, Phillips A and Kugler H Functional Analysis of Large-Scale DNA Strand Displacement Circuits Proceedings of the 19th International Conference on DNA Computing and Molecular Programming - Volume 8141, (189-203)
  61. Kupriyanov A and Finkbeiner B Causality-Based verification of multi-threaded programs Proceedings of the 24th international conference on Concurrency Theory, (257-272)
  62. Donzé A, Ferrère T and Maler O Efficient Robust Monitoring for STL Proceedings of the 25th International Conference on Computer Aided Verification - Volume 8044, (264-279)
  63. ACM
    Chowdhury O, Gampe A, Niu J, von Ronne J, Bennatt J, Datta A, Jia L and Winsborough W Privacy promises that can be kept Proceedings of the 18th ACM symposium on Access control models and technologies, (3-14)
  64. ACM
    Tumova J, Hall G, Karaman S, Frazzoli E and Rus D Least-violating control strategy synthesis with safety rules Proceedings of the 16th international conference on Hybrid systems: computation and control, (1-10)
  65. Cook B, See A and Zuleger F Ramsey vs. lexicographic termination proving Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, (47-61)
  66. ACM
    Suenaga K, Sekine H and Hasuo I (2013). Hyperstream processing systems, ACM SIGPLAN Notices, 48:1, (417-430), Online publication date: 23-Jan-2013.
  67. ACM
    Suenaga K, Sekine H and Hasuo I Hyperstream processing systems Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (417-430)
  68. Datta A, Derek A, Mitchell J and Pavlovic D (2013). Secure Protocol Composition, Electronic Notes in Theoretical Computer Science (ENTCS), 83, (201-226), Online publication date: 1-Jan-2013.
  69. Wan Y, Xu Z and Mei M A formal method for testing reactive system from symbolic model Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence, (612-625)
  70. Sánchez C and Samborski-Forlese J How to translate efficiently extensions of temporal logics into alternating automata Proceedings of the 9th international conference on Theoretical Aspects of Computing, (30-45)
  71. Regis G, Ricci N, Aguirre N and Maibaum T Specifying and verifying declarative fluent temporal logic properties of workflows Proceedings of the 15th Brazilian conference on Formal Methods: foundations and applications, (147-162)
  72. Sanchez A, Sankaranarayanan S, Sánchez C and Chang B Invariant generation for parametrized systems using self-reflection Proceedings of the 19th international conference on Static Analysis, (146-163)
  73. ACM
    Grebenshchikov S, Lopes N, Popeea C and Rybalchenko A (2012). Synthesizing software verifiers from proof rules, ACM SIGPLAN Notices, 47:6, (405-416), Online publication date: 6-Aug-2012.
  74. Zutshi A, Sankaranarayanan S and Tiwari A Timed relational abstractions for sampled data control systems Proceedings of the 24th international conference on Computer Aided Verification, (343-361)
  75. Armando A and Ranise S (2012). Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving, Journal of Computer Security, 20:4, (309-352), Online publication date: 1-Jul-2012.
  76. Direct generation of invariants for reactive models Proceedings of the Tenth ACM/IEEE International Conference on Formal Methods and Models for Codesign, (119-130)
  77. Héam P, Hugot V and Kouchnarenko O From linear temporal logic properties to rewrite propositions Proceedings of the 6th international joint conference on Automated Reasoning, (316-331)
  78. Hoder K and Bjørner N Generalized property directed reachability Proceedings of the 15th international conference on Theory and Applications of Satisfiability Testing, (157-171)
  79. Bradley A Understanding IC3 Proceedings of the 15th international conference on Theory and Applications of Satisfiability Testing, (1-14)
  80. ACM
    Grebenshchikov S, Lopes N, Popeea C and Rybalchenko A Synthesizing software verifiers from proof rules Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation, (405-416)
  81. ACM
    Wu M and Yang Z Generating invariants of hybrid systems via sums-of-squares of polynomials with rational coefficients Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation, (104-111)
  82. von Essen C and Jobstmann B Synthesizing efficient controllers Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation, (428-444)
  83. Datta A, Blocki J, Christin N, DeYoung H, Garg D, Jia L, Kaynar D and Sinha A Understanding and protecting privacy Proceedings of the 7th international conference on Information Systems Security, (1-27)
  84. Bradley A, Somenzi F, Hassan Z and Zhang Y An incremental approach to model checking progress properties Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (144-153)
  85. Somenzi F and Bradley A IC3 Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (3-8)
  86. ACM
    Garg D, Jia L and Datta A Policy auditing over incomplete logs Proceedings of the 18th ACM conference on Computer and communications security, (151-162)
  87. Leucker M Teaching runtime verification Proceedings of the Second international conference on Runtime verification, (34-48)
  88. ACM
    Bauer A, Leucker M and Schallhart C (2011). Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, 20:4, (1-64), Online publication date: 1-Sep-2011.
  89. Westergaard M Better algorithms for analyzing and enacting declarative workflow languages using LTL Proceedings of the 9th international conference on Business process management, (83-98)
  90. Rocha C and Meseguer J Proving safety properties of rewrite theories Proceedings of the 4th international conference on Algebra and coalgebra in computer science, (314-328)
  91. Sánchez A and Sánchez C A theory of skiplists with applications to the verification of concurrent datatypes Proceedings of the Third international conference on NASA Formal methods, (343-358)
  92. Kahsai T, Ge Y and Tinelli C Instantiation-based invariant discovery Proceedings of the Third international conference on NASA Formal methods, (192-206)
  93. Bauer A and Leucker M The theory and practice of SALT Proceedings of the Third international conference on NASA Formal methods, (13-40)
  94. Colón M and Sankaranarayanan S Generalizing the template polyhedral domain Proceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software, (176-195)
  95. ACM
    Gupta A, Popeea C and Rybalchenko A Predicate abstraction and refinement for verifying multi-threaded programs Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (331-344)
  96. ACM
    Gupta A, Popeea C and Rybalchenko A (2011). Predicate abstraction and refinement for verifying multi-threaded programs, ACM SIGPLAN Notices, 46:1, (331-344), Online publication date: 26-Jan-2011.
  97. Lopes N and Rybalchenko A Distributed and predictable software model checking Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation, (340-355)
  98. Bradley A SAT-based model checking without unrolling Proceedings of the 12th international conference on Verification, model checking, and abstract interpretation, (70-87)
  99. Rybakov V Inference rules in multi-agents' temporal logics Transactions on computational collective intelligence IV, (160-176)
  100. Rybakov V (2010). Modelling of Chance Discovery in variations of Linear Temporal Logic implementing agents' interaction, International Journal of Advanced Intelligence Paradigms, 2:2/3, (198-219), Online publication date: 1-Dec-2010.
  101. ACM
    Adler R, Schaefer I, Trapp M and Poetzsch-Heffter A (2011). Component-based modeling and verification of dynamic adaptation in safety-critical embedded systems, ACM Transactions on Embedded Computing Systems, 10:2, (1-39), Online publication date: 1-Dec-2010.
  102. Timm N and Wehrheim H On symmetries and spotlights Proceedings of the 12th international conference on Formal engineering methods and software engineering, (534-548)
  103. Sánchez A and Sánchez C Decision procedures for the temporal verification of concurrent lists Proceedings of the 12th international conference on Formal engineering methods and software engineering, (74-89)
  104. Bosse T, Hoogendoorn M, Klein M and Treur J A three-dimensional abstraction framework to compare multi-agent system models Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI, (306-319)
  105. ACM
    DeYoung H, Garg D, Jia L, Kaynar D and Datta A Experiences in the logical specification of the HIPAA and GLBA privacy laws Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, (73-82)
  106. Gupta A, Popeea C and Rybalchenko A Non-monotonic refinement of control abstraction for concurrent programs Proceedings of the 8th international conference on Automated technology for verification and analysis, (188-202)
  107. Clarkson M and Schneider F (2010). Hyperproperties, Journal of Computer Security, 18:6, (1157-1210), Online publication date: 21-Sep-2010.
  108. Heizmann M, Jones N and Podelski A Size-change termination and transition invariants Proceedings of the 17th international conference on Static analysis, (22-50)
  109. Babenyshev S and Rybakov V A framework to compute inference rules valid in agents' temporal logics Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (230-239)
  110. Babenyshev S and Rybakov V Reasoning and inference rules in basic linear temporal logic BLTL Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II, (224-233)
  111. Ničković D and Piterman N From MTL to deterministic timed automata Proceedings of the 8th international conference on Formal modeling and analysis of timed systems, (152-167)
  112. Bauer A and Haslum P LTL Goal Specifications Revisited Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (881-886)
  113. Sofronie-Stokkermans V Hierarchical reasoning for the verification of parametric systems Proceedings of the 5th international conference on Automated Reasoning, (171-187)
  114. Rybakov V and Babenyshev S Multi-agent logic with distances based on linear temporal frames Proceedings of the 10th international conference on Artifical intelligence and soft computing: Part II, (337-344)
  115. ACM
    Namjoshi K and Trefler R (2010). On the completeness of compositional reasoning methods, ACM Transactions on Computational Logic, 11:3, (1-22), Online publication date: 1-May-2010.
  116. ACM
    Sankaranarayanan S Automatic invariant generation for hybrid systems using ideal fixed points Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, (221-230)
  117. ACM
    Maler O Amir Pnueli and the dawn of hybrid systems Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, (293-295)
  118. Bäumler S, Balser M, Nafz F, Reif W and Schellhorn G (2010). Interactive verification of concurrent systems using symbolic execution, AI Communications, 23:2-3, (285-307), Online publication date: 1-Apr-2010.
  119. ACM
    Ben-Ari M (2010). A primer on model checking, ACM Inroads, 1:1, (40-47), Online publication date: 1-Mar-2010.
  120. ACM
    Schlich B (2010). Model checking of software for microcontrollers, ACM Transactions on Embedded Computing Systems, 9:4, (1-27), Online publication date: 1-Mar-2010.
  121. Sacha K (2010). Verification and implementation of software for dependable controllers, International Journal of Critical Computer-Based Systems, 1:1/2/3, (238-254), Online publication date: 1-Feb-2010.
  122. Alur R and Chaudhuri S Temporal reasoning for procedural programs Proceedings of the 11th international conference on Verification, Model Checking, and Abstract Interpretation, (45-60)
  123. Sánchez C and Leucker M Regular linear temporal logic with past Proceedings of the 11th international conference on Verification, Model Checking, and Abstract Interpretation, (295-311)
  124. Manna Z and Pnueli A Temporal verification of reactive systems Time for verification, (279-361)
  125. ACM
    Jeannet B, Loginov A, Reps T and Sagiv M (2010). A relational approach to interprocedural shape analysis, ACM Transactions on Programming Languages and Systems, 32:2, (1-52), Online publication date: 1-Jan-2010.
  126. Ostroff J, Torshizi F, Huang H and Schoeller B (2009). Beyond contracts for concurrency, Formal Aspects of Computing, 21:4, (319-346), Online publication date: 1-Aug-2009.
  127. Nienaltowski P, Meyer B and Ostroff J (2009). Contracts for concurrency, Formal Aspects of Computing, 21:4, (305-318), Online publication date: 1-Aug-2009.
  128. Tsay Y, Chen Y, Tsai M, Wu K, Chan W, Luo C and Chang J (2009). Tool support for learning Büchi automata and linear temporal logic, Formal Aspects of Computing, 21:3, (259-275), Online publication date: 1-May-2009.
  129. Padberg J, Ehrig H and Orejas F (2009). Towards Component Verification in the Generic Component Framework, Electronic Notes in Theoretical Computer Science (ENTCS), 203:7, (37-53), Online publication date: 1-Apr-2009.
  130. ACM
    Hierons R, Bogdanov K, Bowen J, Cleaveland R, Derrick J, Dick J, Gheorghe M, Harman M, Kapoor K, Krause P, Lüttgen G, Simons A, Vilkomir S, Woodward M and Zedan H (2009). Using formal specifications to support testing, ACM Computing Surveys, 41:2, (1-76), Online publication date: 1-Feb-2009.
  131. ACM
    Ganty P, Majumdar R and Rybalchenko A (2009). Verifying liveness for asynchronous programs, ACM SIGPLAN Notices, 44:1, (102-113), Online publication date: 21-Jan-2009.
  132. ACM
    Ganty P, Majumdar R and Rybalchenko A Verifying liveness for asynchronous programs Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (102-113)
  133. ACM
    Artikis A, Sergot M and Pitt J (2009). Specifying norm-governed computational societies, ACM Transactions on Computational Logic, 10:1, (1-42), Online publication date: 1-Jan-2009.
  134. Staats M, Deng W, Rajan A, Heimdahl M and Woodham K ReqsCov Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, (499-500)
  135. ACM
    Panda S, Roy A, Chakrabarti P and Kumar R (2008). Simulation-based verification using Temporally Attributed Boolean Logic, ACM Transactions on Design Automation of Electronic Systems, 13:4, (1-52), Online publication date: 1-Sep-2008.
  136. Rebiha R, Matringe N and Vieira Moura A Endomorphisms for Non-trivial Non-linear Loop Invariant Generation Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (425-439)
  137. Makowsky J (2008). From Hilbert's program to a logic tool box, Annals of Mathematics and Artificial Intelligence, 53:1-4, (225-250), Online publication date: 1-Aug-2008.
  138. Bradley A and Manna Z (2008). Property-directed incremental invariant generation, Formal Aspects of Computing, 20:4-5, (379-405), Online publication date: 1-Jul-2008.
  139. Slanina M, Sipma H and Manna Z (2008). Deductive verification of alternating systems, Formal Aspects of Computing, 20:4-5, (507-560), Online publication date: 1-Jul-2008.
  140. Babenyshev S and Rybakov V Decidability of Hybrid Logic with Local Common Knowledge Based on Linear Temporal Logic LTL Proceedings of the 4th conference on Computability in Europe: Logic and Theory of Algorithms, (32-41)
  141. Specification and Verification of LambdaRAM- A Wide-area Distributed Cache for High Performance Computing Proceedings of the Sixth ACM/IEEE International Conference on Formal Methods and Models for Co-Design, (187-198)
  142. Tsay Y, Chen Y, Tsai M, Chan W and Luo C GOAL extended Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems, (346-350)
  143. Pnueli A and Sa'ar Y All you need is compassion Proceedings of the 9th international conference on Verification, model checking, and abstract interpretation, (233-247)
  144. Maler O, Nickovic D and Pnueli A Checking temporal properties of discrete, timed and continuous behaviors Pillars of computer science, (475-505)
  145. Hesselink W (2008). Universal extensions to simulate specifications, Information and Computation, 206:1, (108-128), Online publication date: 1-Jan-2008.
  146. Chirichiello A and Salaün G (2007). Encoding process algebraic descriptions of web services into BPEL, Web Intelligence and Agent Systems, 5:4, (419-434), Online publication date: 1-Dec-2007.
  147. Fisman D On the characterization of until as a fixed point under clocked semantics Proceedings of the 3rd international Haifa verification conference on Hardware and software: verification and testing, (19-33)
  148. Nickovic D and Maler O AMT Proceedings of the 5th international conference on Formal modeling and analysis of timed systems, (304-319)
  149. Leucker M and Sánchez C Regular linear temporal logic Proceedings of the 4th international conference on Theoretical aspects of computing, (291-305)
  150. Chen Y, Xia B, Yang L, Zhan N and Zhou C Discovering non-linear ranking functions by solving semi-algebraic systems Proceedings of the 4th international conference on Theoretical aspects of computing, (34-49)
  151. Ghilardi S, Nicolini E, Ranise S and Zucchelli D Noetherianity and Combination Problems Proceedings of the 6th international symposium on Frontiers of Combining Systems, (206-220)
  152. Ouranos I, Stefaneas P and Frangos P (2007). An Algebraic Framework for Modeling of Mobile Systems, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:9, (1986-1999), Online publication date: 1-Sep-2007.
  153. Ghilardi S, Nicolini E, Ranise S and Zucchelli D Combination Methods for Satisfiability and Model-Checking of Infinite-State Systems Proceedings of the 21st international conference on Automated Deduction: Automated Deduction, (362-378)
  154. Metzler B Decomposing integrated specifications for verification Proceedings of the 6th international conference on Integrated formal methods, (459-479)
  155. Aguirre N, Regis G and Maibaum T Verifying temporal properties of community designs Proceedings of the 6th international conference on Integrated formal methods, (1-20)
  156. Falcone Y, Fernandez J, Mounier L and Richier J A compositional testing framework driven by partial specifications Proceedings of the 19th IFIP TC6/WG6.1 international conference, and 7th international conference on Testing of Software and Communicating Systems, (107-122)
  157. ACM
    Beyer D, Henzinger T, Majumdar R and Rybalchenko A Path invariants Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (300-309)
  158. ACM
    Beyer D, Henzinger T, Majumdar R and Rybalchenko A (2007). Path invariants, ACM SIGPLAN Notices, 42:6, (300-309), Online publication date: 10-Jun-2007.
  159. Poizat P and Salaün G Adaptation of open component-based systems Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems, (141-156)
  160. Schafer W and Wehrheim H The Challenges of Building Advanced Mechatronic Systems 2007 Future of Software Engineering, (72-84)
  161. Guerin F and Vasconcelos W Component-based standardisation of agent communication Proceedings of the 5th international conference on Declarative agent languages and technologies V, (227-244)
  162. ACM
    Podelski A and Rybalchenko A (2007). Transition predicate abstraction and fair termination, ACM Transactions on Programming Languages and Systems, 29:3, (15-es), Online publication date: 1-May-2007.
  163. Bosse T, Jonker C and Treur J (2007). On the use of organisation modelling techniques to address biological organisation, Multiagent and Grid Systems, 3:2, (199-223), Online publication date: 1-Apr-2007.
  164. Datta A, Derek A, Mitchell J and Roy A (2007). Protocol Composition Logic (PCL), Electronic Notes in Theoretical Computer Science (ENTCS), 172, (311-358), Online publication date: 1-Apr-2007.
  165. Tsay Y, Chen Y, Tsai M, Wu K and Chan W GOAL Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (466-471)
  166. Beyer D, Henzinger T, Majumdar R and Rybalchenko A Invariant synthesis for combined theories Proceedings of the 8th international conference on Verification, model checking, and abstract interpretation, (378-394)
  167. Chen Y, Xia B, Yang L and Zhan N Generating polynomial invariants with DISCOVERER and QEPCAD Formal methods and hybrid real-time systems, (67-82)
  168. Bosse T, Jonker C, Meij L, Sharpanskykh A and Treur J Specification and Verification of Dynamics in Cognitive Agent Models Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology, (247-254)
  169. Bradley A and Manna Z Verification constraint problems with strengthening Proceedings of the Third international conference on Theoretical Aspects of Computing, (35-49)
  170. Slanina M, Sipma H and Manna Z Proving ATL* properties of infinite-state systems Proceedings of the Third international conference on Theoretical Aspects of Computing, (242-256)
  171. ACM
    Gulavani B, Henzinger T, Kannan Y, Nori A and Rajamani S SYNERGY Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering, (117-127)
  172. Bauer A, Leucker M and Streit J SALT—structured assertion language for temporal logic Proceedings of the 8th international conference on Formal Methods and Software Engineering, (757-775)
  173. ACM
    Janvier R, Lakhnech Y and Périn M (2006). Certifying cryptographic protocols by abstract model-checking and proof concretization, ACM SIGBED Review, 3:4, (37-57), Online publication date: 1-Oct-2006.
  174. Maler O, Nickovic D and Pnueli A From MITL to timed automata Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems, (274-289)
  175. Moses Y and Shimony B A new proof of the GHS minimum spanning tree algorithm Proceedings of the 20th international conference on Distributed Computing, (120-135)
  176. ACM
    Whalen M, Rajan A, Heimdahl M and Miller S Coverage metrics for requirements-based testing Proceedings of the 2006 international symposium on Software testing and analysis, (25-36)
  177. Winwood S, Klein G and Chakravarty M On the automated synthesis of proof-carrying temporal reference monitors Proceedings of the 16th international conference on Logic-based program synthesis and transformation, (111-126)
  178. Balaban I, Pnueli A and Zuck L Invisible safety of distributed protocols Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II, (528-539)
  179. ACM
    Cook B, Podelski A and Rybalchenko A Termination proofs for systems code Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and Implementation, (415-426)
  180. ACM
    Cook B, Podelski A and Rybalchenko A (2006). Termination proofs for systems code, ACM SIGPLAN Notices, 41:6, (415-426), Online publication date: 11-Jun-2006.
  181. Rybakov V Linear temporal logic with until and before on integer numbers, deciding algorithms Proceedings of the First international computer science conference on Theory and Applications, (322-333)
  182. Brückner I, Metzler B and Wehrheim H (2006). Optimizing slicing of formal specifications by deductive verification, Nordic Journal of Computing, 13:1, (22-45), Online publication date: 1-Jun-2006.
  183. Bradley A, Manna Z and Sipma H What's decidable about arrays? Proceedings of the 7th international conference on Verification, Model Checking, and Abstract Interpretation, (427-442)
  184. Kesten Y, Pnueli A, Raviv L and Shahar E (2006). Model Checking with Strong Fairness, Formal Methods in System Design, 28:1, (57-84), Online publication date: 1-Jan-2006.
  185. Yamane S Deductive probabilistic verification methods of safety, liveness and nonzenoness for distributed real-time systems Proceedings of the Second international conference on Embedded Software and Systems, (332-345)
  186. Finkbeiner B, Sankaranarayanan S and Sipma H (2005). Collecting Statistics Over Runtime Executions, Formal Methods in System Design, 27:3, (253-274), Online publication date: 1-Nov-2005.
  187. Babot F, Bertran M and Climent A A static communication elimination algorithm for distributed system verification Proceedings of the 7th international conference on Formal Methods and Software Engineering, (375-389)
  188. Pandav S, Slind K and Gopalakrishnan G Counterexample guided invariant discovery for parameterized cache coherence verification Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods, (317-331)
  189. Sánchez C, Sipma H, Subramonian V, Gill C and Manna Z Thread allocation protocols for distributed real-time and embedded systems Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, (159-173)
  190. Maler O, Nickovic D and Pnueli A Real time temporal logic Proceedings of the Third international conference on Formal Modeling and Analysis of Timed Systems, (2-16)
  191. Hameurlain N Formalizing compatibility and substitutability of rolebased interactions components in multi-agent systems Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications, (153-162)
  192. Gebremichael B and Vaandrager F Specifying Urgency in Timed I/O Automata Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods, (64-74)
  193. Cook B, Podelski A and Rybalchenko A Abstraction refinement for termination Proceedings of the 12th international conference on Static Analysis, (87-101)
  194. Balaban I, Fang Y, Pnueli A and Zuck L IIV Proceedings of the 17th international conference on Computer Aided Verification, (408-412)
  195. d'Amorim M and Roşu G Efficient monitoring of ω-languages Proceedings of the 17th international conference on Computer Aided Verification, (364-378)
  196. Arons T, Elster E, Fix L, Mador-Haim S, Mishaeli M, Shalev J, Singerman E, Tiemeyer A, Vardi M and Zuck L Formal verification of backward compatibility of microcode Proceedings of the 17th international conference on Computer Aided Verification, (185-198)
  197. Kaivola R Formal verification of pentium ® 4 components with symbolic simulation and inductive invariants Proceedings of the 17th international conference on Computer Aided Verification, (170-184)
  198. ACM
    d'Amorim M and Havelund K (2005). Event-based runtime verification of java programs, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  199. Fisher M Implementing temporal logics Proceedings of the 6th international conference on Computational Logic in Multi-Agent Systems, (129-142)
  200. ACM
    Deutsch A, Marcus M, Sui L, Vianu V and Zhou D A verifier for interactive, data-driven web applications Proceedings of the 2005 ACM SIGMOD international conference on Management of data, (539-550)
  201. Rodriguez S, Hilaire V and Koukam A Formal specification of holonic multi-agent systems framework Proceedings of the 5th international conference on Computational Science - Volume Part III, (719-726)
  202. ACM
    d'Amorim M and Havelund K Event-based runtime verification of java programs Proceedings of the third international workshop on Dynamic analysis, (1-7)
  203. Datta A, Derek A, Mitchell J and Pavlovic D (2005). A derivation system and compositional logic for security protocols, Journal of Computer Security, 13:3, (423-482), Online publication date: 1-May-2005.
  204. Roşu G and Havelund K (2005). Rewriting-Based Techniques for Runtime Verification, Automated Software Engineering, 12:2, (151-197), Online publication date: 1-Apr-2005.
  205. ACM
    Sohr K, Drouineaud M and Ahn G Formal specification of role-based security policies for clinical information systems Proceedings of the 2005 ACM symposium on Applied computing, (332-339)
  206. Fisher M, Gabbay D and Vila L (2005). Handbook of Temporal Reasoning in Artificial Intelligence, 10.5555/2974992, Online publication date: 1-Mar-2005.
  207. Sankaranarayanan S, Sipma H and Manna Z Scalable analysis of linear systems using mathematical programming Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (25-41)
  208. ACM
    Podelski A and Rybalchenko A (2005). Transition predicate abstraction and fair termination, ACM SIGPLAN Notices, 40:1, (132-144), Online publication date: 12-Jan-2005.
  209. ACM
    Podelski A and Rybalchenko A Transition predicate abstraction and fair termination Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (132-144)
  210. Hameurlain N and Sibertin-Blanc C Specification of role-based interactions components in multi-agent systems Software Engineering for Multi-Agent Systems III, (180-197)
  211. ACM
    Hesselink W (2005). Eternity variables to prove simulation of specifications, ACM Transactions on Computational Logic, 6:1, (175-201), Online publication date: 1-Jan-2005.
  212. Freiling F and Santen T On the composition of compositional reasoning Proceedings of the 2004 international conference on Architecting Systems with Trustworthy Components, (137-151)
  213. Sirjani M, Movaghar A, Shali A and de Boer F (2004). Modeling and Verification of Reactive Systems using Rebeca, Fundamenta Informaticae, 63:4, (385-410), Online publication date: 1-Dec-2004.
  214. Singh A and Bandyopadhyay A (2004). Verifying mutual exclusion and liveness properties with split preconditions, Journal of Computer Science and Technology, 19:6, (795-802), Online publication date: 1-Dec-2004.
  215. ACM
    Dingel J and Liang H (2004). Automating comprehensive safety analysis of concurrent programs using verisoft and TXL, ACM SIGSOFT Software Engineering Notes, 29:6, (13-22), Online publication date: 1-Nov-2004.
  216. ACM
    Dingel J and Liang H Automating comprehensive safety analysis of concurrent programs using verisoft and TXL Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, (13-22)
  217. Woźna B and Lomuscio A A logic for knowledge, correctness, and real time Proceedings of the 5th international conference on Computational Logic in Multi-Agent Systems, (1-15)
  218. Hilaire V, Simonin O, Koukam A and Ferber J A formal approach to design and reuse agent and multiagent models Proceedings of the 5th international conference on Agent-Oriented Software Engineering, (142-157)
  219. ACM
    Deutsch A, Sui L and Vianu V Specification and verification of data-driven web services Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (71-82)
  220. Sirjani M, Movaghar A, Shali A and de Boer F (2004). Modeling and Verification of Reactive Systems using Rebeca, Fundamenta Informaticae, 63:4, (385-410), Online publication date: 1-Jun-2004.
  221. Sen K, Vardhan A, Agha G and Rosu G Efficient Decentralized Monitoring of Safety in Distributed Systems Proceedings of the 26th International Conference on Software Engineering, (418-427)
  222. Tabuada P, Pappas G and Lima P (2004). Compositional Abstractions of Hybrid Control Systems, Discrete Event Dynamic Systems, 14:2, (203-238), Online publication date: 1-Apr-2004.
  223. Yamane S Deductive Verification of Probabilistic Real-Time Systems Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7, (622-627)
  224. Havelund K and Roşu G (2004). An Overview of the Runtime Verification Tool Java PathExplorer, Formal Methods in System Design, 24:2, (189-215), Online publication date: 1-Mar-2004.
  225. Finkbeiner B and Sipma H (2004). Checking Finite Traces Using Alternating Automata, Formal Methods in System Design, 24:2, (101-127), Online publication date: 1-Mar-2004.
  226. Brazier F, Cornelissen F, Gustavsson R, Jonker C, Lindeberg O, Polak B and Treur J (2004). Compositional Verification of a Multi-Agent System for One-to-Many Negotiation, Applied Intelligence, 20:2, (95-117), Online publication date: 1-Mar-2004.
  227. Rossi C, Enciso M and De Guzmán I (2004). Formalization of UML state machines using temporal logic, Software and Systems Modeling (SoSyM), 3:1, (31-54), Online publication date: 1-Mar-2004.
  228. ACM
    Sankaranarayanan S, Sipma H and Manna Z Non-linear loop invariant generation using Gröbner bases Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (318-329)
  229. Schätz B Mastering the complexity of reactive systems Formal methods for embedded distributed systems, (215-258)
  230. ACM
    Sankaranarayanan S, Sipma H and Manna Z (2004). Non-linear loop invariant generation using Gröbner bases, ACM SIGPLAN Notices, 39:1, (318-329), Online publication date: 1-Jan-2004.
  231. Rueß H and de Moura L Simulation and verification I Proceedings of the 35th conference on Winter simulation: driving innovation, (888-896)
  232. ACM
    Datta A, Derek A, Mitchell J and Pavlovic D Secure protocol composition Proceedings of the 2003 ACM workshop on Formal methods in security engineering, (11-23)
  233. ACM
    Sen K, Rosu G and Agha G (2003). Runtime safety analysis of multithreaded programs, ACM SIGSOFT Software Engineering Notes, 28:5, (337-346), Online publication date: 1-Sep-2003.
  234. ACM
    Jeffords R and Heitmeyer C (2003). A strategy for efficiently verifying requirements, ACM SIGSOFT Software Engineering Notes, 28:5, (28-37), Online publication date: 1-Sep-2003.
  235. ACM
    Sen K, Rosu G and Agha G Runtime safety analysis of multithreaded programs Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (337-346)
  236. ACM
    Jeffords R and Heitmeyer C A strategy for efficiently verifying requirements Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering, (28-37)
  237. Cornelissen F, Jonker C and Treur J (2003). Compositional verification of knowledge-based task models and problem-solving methods, Knowledge and Information Systems, 5:3, (337-367), Online publication date: 1-Sep-2003.
  238. Wang F, Hwang G and Yu F TCTL inevitability analysis of dense-time systems Proceedings of the 8th international conference on Implementation and application of automata, (176-186)
  239. ACM
    Zambonelli F, Jennings N and Wooldridge M (2003). Developing multiagent systems, ACM Transactions on Software Engineering and Methodology, 12:3, (317-370), Online publication date: 1-Jul-2003.
  240. Eisner C, Fisman D, Havlicek J, McIsaac A and Van Campenhout D The definition of a temporal clock operator Proceedings of the 30th international conference on Automata, languages and programming, (857-870)
  241. Dingel J Computer-assisted assume/guarantee reasoning with VeriSoft Proceedings of the 25th International Conference on Software Engineering, (138-148)
  242. Yahav E, Reps T, Sagiv M and Wilhelm R Verifying temporal heap properties specified via evolution logic Proceedings of the 12th European conference on Programming, (204-222)
  243. Aguirre N and Maibaum T A logical basis for the specification of reconfigurable component-based systems Proceedings of the 6th international conference on Fundamental approaches to software engineering, (37-51)
  244. Maier P Compositional circular assume-guarantee rules cannot be sound and complete Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software, (343-357)
  245. Arons T, Pnueli A and Zuck L Parameterized verification by probabilistic abstraction Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software, (87-102)
  246. Wolter F and Zakharyaschev M Qualitative spatiotemporal representation and reasoning Exploring artificial intelligence in the new millennium, (175-215)
  247. ACM
    Leviathan R and Pnueli A Validating software pipelining optimizations Proceedings of the 2002 international conference on Compilers, architecture, and synthesis for embedded systems, (280-287)
  248. ACM
    Schreiner W (2002). A java toolkit for teaching distributed algorithms, ACM SIGCSE Bulletin, 34:3, (111-115), Online publication date: 1-Sep-2002.
  249. ACM
    Wooldridge M, Fisher M, Huget M and Parsons S Model checking multi-agent systems with MABLE Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2, (952-959)
  250. ACM
    Guerin F and Pitt J Proving properties of open agent systems Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2, (557-558)
  251. ACM
    Schreiner W A java toolkit for teaching distributed algorithms Proceedings of the 7th annual conference on Innovation and technology in computer science education, (111-115)
  252. Montanari A, Policriti A and Slanina M (2002). Alternative Translation Techniques for Propositional and First-Order Modal Logics, Journal of Automated Reasoning, 28:4, (397-415), Online publication date: 1-May-2002.
  253. Andrade H and Sanders B An Approach to Compositional Model Checking Proceedings of the 16th International Parallel and Distributed Processing Symposium
  254. Ogata K and Futatsugi K Modeling and Verification of Distributed Real-Time Systems Based on CafeOBJ Proceedings of the 16th IEEE international conference on Automated software engineering
  255. Iyer S and Ramesh S (2001). Apportioning, IEEE Transactions on Software Engineering, 27:11, (1037-1056), Online publication date: 1-Nov-2001.
  256. Romijn J (2001). A Timed Verification of the IEEE 1394 Leader Election Protocol, Formal Methods in System Design, 19:2, (165-194), Online publication date: 1-Sep-2001.
  257. Pinsky S and Zieglar E Noninterference Equations for Nondeterministic Systems Proceedings of the 14th IEEE workshop on Computer Security Foundations
  258. Kapur D and Winter V On the construction of a domain language for a class of reactive systems High integrity software, (169-196)
  259. ACM
    Attie P and Emerson E (2001). Synthesis of concurrent programs for an atomic read/write model of computation, ACM Transactions on Programming Languages and Systems, 23:2, (187-242), Online publication date: 1-Mar-2001.
  260. Ireland A and Stark J (2001). Proof planning for strategy development, Annals of Mathematics and Artificial Intelligence, 29:1-4, (65-97), Online publication date: 10-Jan-2001.
  261. Clarke E and Schlingloff B Model checking Handbook of automated reasoning, (1635-1790)
  262. ACM
    Fisher M, Dixon C and Peim M (2001). Clausal temporal resolution, ACM Transactions on Computational Logic, 2:1, (12-56), Online publication date: 1-Jan-2001.
  263. Bjørner N, Browne A, Colón M, Finkbeiner B, Manna Z, Sipma H and Uribe T (2000). Verifying Temporal Properties of Reactive Systems, Formal Methods in System Design, 16:3, (227-270), Online publication date: 1-Jun-2000.
  264. Wooldridge M (2000). Semantic Issues in the Verification of Agent Communication Languages, Autonomous Agents and Multi-Agent Systems, 3:1, (9-31), Online publication date: 1-Mar-2000.
  265. Sipma H, Uribe T and Manna Z (1999). Deductive Model Checking, Formal Methods in System Design, 15:1, (49-74), Online publication date: 1-Jul-1999.
  266. Bensalem S and Lakhnech Y (1999). Automatic Generation of Invariants, Formal Methods in System Design, 15:1, (75-92), Online publication date: 1-Jul-1999.
  267. ACM
    Jamison W and Lea D (1999). Scripting distributed agents, ACM SIGAPP Applied Computing Review, 7:1, (18-22), Online publication date: 1-Apr-1999.
  268. Bjørner D and Cuéllar J (1999). Software engineering education, Annals of Software Engineering, 6:1-4, (365-409), Online publication date: 1-Apr-1999.
  269. ACM
    Nezu N and Lu H Modeling deflection networks Proceedings of the 1999 ACM symposium on Applied computing, (66-73)
  270. Abdulla P and Jonsson B On the Existence of Network Invariants for Verifying Parameterized Systems Correct System Design, Recent Insight and Advances, (to Hans Langmaack on the occasion of his retirement from his professorship at the University of Kiel), (180-197)
  271. ACM
    Jeffords R and Heitmeyer C (1998). Automatic generation of state invariants from requirements specifications, ACM SIGSOFT Software Engineering Notes, 23:6, (56-69), Online publication date: 1-Nov-1998.
  272. ACM
    Jeffords R and Heitmeyer C Automatic generation of state invariants from requirements specifications Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering, (56-69)
  273. Avrunin G, Corbett J and Dillon L (1998). Analyzing Partially-Implemented Real-Time Systems, IEEE Transactions on Software Engineering, 24:8, (602-614), Online publication date: 1-Aug-1998.
  274. ACM
    Avrunin G, Corbett J and Dillon L Analyzing partially-implemented real-time systems Proceedings of the 19th international conference on Software engineering, (228-238)
  275. Zuck L and McMillan K Invisible Invariants Are Neither From Reactive Systems to Cyber-Physical Systems, (57-72)
Contributors
  • Stanford University
  • Weizmann Institute of Science Israel

Reviews

Andreas Ramses Heckler

A reactive system is a nonterminating system of concurrent processes. Their activities may sometimes require some coordination (such as in a producer-consumer relationship), and this task may be fulfilled by the processes involved or by additional controlling processes. The linear time approach models reactive systems as sets of infinite state sequences called computations. A state is modeled as an assignment for the relevant variables in the program. The mathematical model of a reactive system, according to the linear-time approach, answers questions such as “What states may be reached by the system at execution time__?__” “In which order may the reachable states arise, that is, what are possible computations__?__” and “Is it possible that something is first consumed by a process and then produced by another__?__” The model does not allow explicit reasoning about parallel activities, because they are considered as interleaved. An elegant means of describing models according to the linear time approach is temporal logic (TL), which allows abstract descriptions (specifications) of sets of infinite state sequences. Such a description abstracts from implementation details (such as concrete processes) their explicit coordination and their realization by means of assignments, loops, cooperation statements, communication via channels, and so on. In order to define these details (that is, to implement a reactive system), one can use the Simple Programming Language (SPL). The connection between TL and SPL is provided by the computational model for SPL. Each program in SPL is associated with a fair transition system, and fair transition systems describe computations (sets of infinite state sequences). A program <__?__Pub Fmt italic>P<__?__Pub Fmt /italic> has a property expressed by a temporal formula &fgr; (“<__?__Pub Fmt italic>P<__?__Pub Fmt /italic> is correct with respect to &fgr;”) if every computation of <__?__Pub Fmt italic>P<__?__Pub Fmt /italic> is specified by the formula &fgr;. Verification is the process of formally proving the correctness of a given program <__?__Pub Fmt italic>P<__?__Pub Fmt /italic> with respect to a given temporal formula &fgr;. Temporal verification not only relates to the temporal logic TL, but also indicates that the underlying first-order logic and the problem of verifying programs with respect to first-order formulas are not the book's main issues (though they are not completely ignored). The notion of “safety” relates to a classification of <__?__Pub Fmt nolinebreak>temporal<__?__Pub Fmt /nolinebreak> formulas (and temporal properties) that distinguishes “safety formulas/properties” from “progress formulas/properties” and subdivides the latter into “reactivity, response, persistence, obligation” and “guarantee formulas/properties.” Informally speaking, a safety formula specifies that nothing bad ever happens, whereas a progress formula specifies that something good eventually happens. The main interest is the verification of arbitrary SPL programs with respect to safety formulas. This book is the second in a sequence of three volumes organized as follows. Volume 1, <__?__Pub Fmt italic>The temporal logic of reactive and concurrent systems: specifications<__?__Pub Fmt /italic>, studies in great detail the computational model, the system description language, the language of temporal logic, and its use for specifying system properties. Volume 2, the book under review, presents verification techniques for proving safety properties. I refer to this volume as the safety book. Volume 3, <__?__Pub Fmt italic>Temporal verification of reactive systems: progress<__?__Pub Fmt /italic>, presents verification techniques for proving progress properties. The safety book is organized as follows. Chapter 0 introduces fair transition systems, SPL, and TL.<__?__Pub Fmt eos-space>C<__?__Pub Caret1>hapters 1 through 3 present a deductive approach for proving arbitrary SPL programs correct with respect to special kinds of safety formulas. Each of sections 2.6, 3.6, and 4.10 also provides an algorithmic approach for proving finite-state programs (programs <__?__Pub Fmt italic>P<__?__Pub Fmt /italic> whose system variables assume only finitely many values in all computations of <__?__Pub Fmt italic>P<__?__Pub Fmt /italic>) correct with respect to special kinds of safety formulas and general safety formulas respectively. Chapter 5 extends this algorithmic approach to the verification of finite-state programs with respect to arbitrary temporal formulas. The book is intended for people who are interested in the formal verification of reactive systems and its theoretical foundations. The book is not a guide for implementing verification tools. The reader should have some familiarity with programming, programming languages, basic concurrency concepts, first-order logic, and the notions of validity and provability by deductive systems. However, no knowledge of TL, SPL, and fair transition systems is needed, since these topics are introduced in chapter 0. Even though the book is the second of three volumes, it is indeed “largely self-contained and can be studied or taught independently of the first volume.” The presentation is clear and concise. Many concepts are first developed for a simple case and then extended for the general (and hence more difficult) case. All concepts, and even minor definitions, are illustrated by examples. Moreover, many figures are provided to assist the reader in understanding. The end of each chapter features exercises and bibliographic remarks.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations