Changeset 51 for biblio/biblio.bib
- Timestamp:
- Mar 7, 2012, 11:42:59 AM (13 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
biblio/biblio.bib
r45 r51 448 448 bibsource = {DBLP, http://dblp.uni-trier.de}, 449 449 crossref = {DBLP:conf/cav/2002}, 450 ee = {http://link.springer.de/link/service/series/0558/bibs/2404/24040137.htm} 450 ee = {http://link.springer.de/link/service/series/0558/bibs/2404/24040137.htm}, 451 keywords = {Abstraction} 451 452 } 452 453 … … 1330 1331 year = {2007}, 1331 1332 note = {accepted}, 1333 keywords = {Abstraction, CEGAR, CTL}, 1332 1334 owner = {cecile}, 1333 1335 timestamp = {2007.03.27} … … 1481 1483 pages = {1686-1691}, 1482 1484 file = {:Composition/Speeding up MC by exploiting Explicit09.PDF:PDF}, 1485 keywords = {Composition , model checking}, 1483 1486 owner = {cecile}, 1484 1487 timestamp = {2009.04.30} … … 1788 1791 } 1789 1792 1793 @INPROCEEDINGS{6128043, 1794 author = {Yuzhang Feng and Veeramani, A. and Kanagasabai, R. and Seungmin Rho}, 1795 title = {Automatic Service Composition via Model Checking}, 1796 booktitle = {Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific}, 1797 year = {2011}, 1798 pages = {477 -482}, 1799 month = {dec.}, 1800 abstract = {Web service composition is the process of constructing a set of Web 1801 services which, when invoked with some user input in a particular 1802 order, can produce the output to the user's requirements. This paper 1803 proposes a novel model checking based approach for automated service 1804 composition. Modeling services as a set of interleaved processes 1805 in a class of process algebra, we formulate service composition as 1806 model checking asserted on a specific type of property on the model. 1807 We show that, under this formulation, correct composition workflows 1808 can be constructed from the counter-examples provided by model checking. 1809 With a case study on online hotel booking services, we demonstrate 1810 that the proposed approach can support directed a cyclic composition 1811 graphs and the generated composition graphs are automatically verified.}, 1812 doi = {10.1109/APSCC.2011.54}, 1813 file = {:/users/outil/verif/biblio/Composition/AutomaticServiceCompositionViaModelChecking2011.pdf:PDF}, 1814 keywords = {Web service composition;automated service composition;directed acyclic 1815 composition graph;interleaved process;model checking;online hotel 1816 booking services;process algebra;user requirements;Web services;directed 1817 graphs;formal verification;hotel industry;process algebra;}, 1818 owner = {cecile}, 1819 timestamp = {2012.03.07} 1820 } 1821 1790 1822 @ARTICLE{DBLP:journals/tcad/FeySBD08, 1791 1823 author = {G{\"o}rschwin Fey and Stefan Staber and Roderick Bloem and Rolf Drechsler}, … … 2202 2234 } 2203 2235 2236 @INCOLLECTION{springerlink:10.1007/978-3-540-68073-4_4, 2237 author = {Li, Juncao and Sun, Xiuli and Xie, Fei and Song, Xiaoyu}, 2238 title = {Component-Based Abstraction and Refinement}, 2239 booktitle = {High Confidence Software Reuse in Large Systems}, 2240 publisher = {Springer Berlin / Heidelberg}, 2241 year = {2008}, 2242 editor = {Mei, Hong}, 2243 volume = {5030}, 2244 series = {Lecture Notes in Computer Science}, 2245 pages = {39-51}, 2246 note = {10.1007/978-3}, 2247 affiliation = {Portland State University Dept. of Computer Science Portland OR 97207}, 2248 file = {:/users/outil/verif/biblio/Composition/Compponent-Based AbstractionRefinement2008.pdf:PDF}, 2249 isbn = {978-3-540-68062-8}, 2250 keyword = {Computer Science}, 2251 keywords = {Composition, Abstraction, Refinement, verified component, Hardware/software 2252 coverification}, 2253 url = {http://dx.doi.org/10.1007/978-3-540-68073-4_4} 2254 } 2255 2204 2256 @INPROCEEDINGS{lin91implicit, 2205 2257 author = {B.~Lin and A.R.~Newton}, … … 2226 2278 address = {Hingham, MA, USA}, 2227 2279 publisher = {Kluwer Academic Publisher} 2280 } 2281 2282 @INCOLLECTION{springerlink:10.1007/978-3-642-16901-4_15, 2283 author = {Lomuscio, Alessio and Strulo, Ben and Walker, Nigel and Wu, Peng}, 2284 title = {Assume-Guarantee Reasoning with Local Specifications}, 2285 booktitle = {Formal Methods and Software Engineering}, 2286 publisher = {Springer Berlin / Heidelberg}, 2287 year = {2010}, 2288 editor = {Dong, Jin and Zhu, Huibiao}, 2289 volume = {6447}, 2290 series = {Lecture Notes in Computer Science}, 2291 pages = {204-219}, 2292 note = {10.1007/978-3-642-16901-4_15}, 2293 abstract = {We investigate assume-guarantee reasoning for global specifications 2294 consisting of conjunctions of local specifications. We present a 2295 sound and complete assume-guarantee rule that permits reasoning about 2296 individual modules for local specifications and draws conclusions 2297 on global specifications. We illustrate our approach with an example 2298 from the field of network congestion control, where different agents 2299 are responsible for controlling packet flow across a shared infrastructure. 2300 In this context, we derive an assume-guarantee rule for system stability, 2301 and show that this rule is valuable to reason about any number of 2302 agents, any initial flow configuration, and any topology of bounded 2303 degree.}, 2304 affiliation = {Department of Computing, Imperial College London, UK}, 2305 file = {:/users/outil/verif/biblio/Composition/AGRwithLocalSpecification2010.pdf:PDF}, 2306 isbn = {978-3-642-16900-7}, 2307 keyword = {Computer Science}, 2308 keywords = {Compositional reasoning, composition}, 2309 owner = {cecile}, 2310 timestamp = {2012.03.07}, 2311 url = {http://dx.doi.org/10.1007/978-3-642-16901-4_15} 2228 2312 } 2229 2313 … … 2448 2532 pages = {2-14}, 2449 2533 number = {1}, 2450 bibsource = {DBLP, http://dblp.uni-trier.de} 2534 bibsource = {DBLP, http://dblp.uni-trier.de}, 2535 keywords = {Abstraction} 2451 2536 } 2452 2537 … … 2559 2644 publisher = {Springer-Verlag}, 2560 2645 url = {http://www.csl.sri.com/papers/cade92-pvs/} 2646 } 2647 2648 @INCOLLECTION{springerlink:10.1007/3-540-63166-6_5, 2649 author = {Pardo, Abelardo and Hachtel, Gary}, 2650 title = {Automatic abstraction techniques for propositional $\mu$-calculus 2651 model checking}, 2652 booktitle = {Computer Aided Verification}, 2653 publisher = {Springer Berlin / Heidelberg}, 2654 year = {1997}, 2655 editor = {Grumberg, Orna}, 2656 volume = {1254}, 2657 series = {Lecture Notes in Computer Science}, 2658 pages = {12-23}, 2659 note = {10.1007/3-540-63166-6_5}, 2660 abstract = {An abstraction/refinement paradigm for the full propositional $\mu$-calculus 2661 is presented. No distinction is made between universal or existential 2662 fragments. Necessary conditions for conservative verification are 2663 provided, along with a fully automatic symbolic model checking abstraction 2664 algorithm. The algorithm begins with conservative verification of 2665 an initial abstraction. If the conclusion is negative, it derives 2666 a ldquogoal setrdquo of states which require further resolution. 2667 It then successively refines, with respect to this goal set, the 2668 approximations made in the subformulas, until the given formula is 2669 verified or computational resources are exhausted.}, 2670 affiliation = {University of Colorado ECEN Campus Box 425 80309 Boulder CO USA ECEN 2671 Campus Box 425 80309 Boulder CO USA}, 2672 file = {:/users/outil/verif/biblio/Cegar/CAV97_Automatic_Abstraction_Tech_for_Propositional_uCalc_MC.ps:PostScript}, 2673 isbn = {978-3-540-63166-8}, 2674 keywords = {Computer Science, Abstraction, model checking, mu-calculus, refinement}, 2675 owner = {cecile}, 2676 timestamp = {2012.03.07}, 2677 url = {http://dx.doi.org/10.1007/3-540-63166-6_5} 2678 } 2679 2680 @INPROCEEDINGS{Pardo:1998:ICM:277044.277171, 2681 author = {Pardo, Abelardo and Hachtel, Gary D.}, 2682 title = {Incremental CTL model checking using BDD subsetting}, 2683 booktitle = {Proceedings of the 35th annual Design Automation Conference}, 2684 year = {1998}, 2685 series = {DAC '98}, 2686 pages = {457--462}, 2687 address = {New York, NY, USA}, 2688 publisher = {ACM}, 2689 abstract = {An automatic abstraction/refinement algorithm for symbolic CTL model 2690 checking is presented. Conservative model checking is thus done for 2691 the full CTL language-no restriction is made to the universal or 2692 existen tial fragments. The algorithm begins with conserv ativ everification 2693 of an initial abstraction. If the conclusion is negativ e,it deriv 2694 es a ¿goal set¿ of states which require further resolution. It then 2695 successiv ely refines, with respect to this goal set, the appro ximations 2696 made in the sub-formulas, until the giv en form ula is v erified 2697 or computational resources are exhausted. This method applies uniformly 2698 to the abstractions based in over-appro ximation as well as under-approximations 2699 of the model. Both the refinement and the abstraction procedures 2700 are based in BDD-subsetting. Note that refinement procedures which 2701 are based on error traces, are limited to over-appro ximation on 2702 the universal fragment (or for language con tainment), whereas the 2703 goal set method is applicable to all consisten t appro ximations, 2704 and for all CTL formulas.}, 2705 acmid = {277171}, 2706 doi = {10.1145/277044.277171}, 2707 file = {:/users/outil/verif/biblio/Cegar/DAC98_Incremental CTL Model Checking Using BDD Subsetting.pdf:PDF}, 2708 isbn = {0-89791-964-5}, 2709 keywords = {CTL, model checking, Abstraction}, 2710 location = {San Francisco, California, United States}, 2711 numpages = {6}, 2712 url = {http://doi.acm.org/10.1145/277044.277171} 2561 2713 } 2562 2714 … … 2874 3026 publisher = {IEEE Computer Society}, 2875 3027 doi = {http://dx.doi.org/10.1109/LICS.2006.5}, 3028 keywords = {Abstraction, 3-valued}, 2876 3029 owner = {cecile}, 2877 3030 timestamp = {2007.01.14} … … 2935 3088 owner = {cecile}, 2936 3089 timestamp = {2006.02.09} 3090 } 3091 3092 @INPROCEEDINGS{Tripakis201, 3093 author = {Tripakis, Stavros and Andrade, Hugo and Ghosal, Arkadeb and Limaye, 3094 Rhishikesh and Ravindran, Kaushik and Wang, Guoqiang and Yang, Guang 3095 and Kormerup, Jacob and Wong, Ian}, 3096 title = {Correct and non-defensive glue design using abstract models}, 3097 booktitle = {Proceedings of the seventh IEEE/ACM/IFIP international conference 3098 on Hardware/software codesign and system synthesis}, 3099 year = {2011}, 3100 series = {CODES+ISSS '11}, 3101 pages = {59--68}, 3102 address = {New York, NY, USA}, 3103 publisher = {ACM}, 3104 abstract = { Current hardware design practice often relies on integration of components, 3105 some of which may be IP or legacy blocks. While integration eases 3106 design by allowing modularization and component reuse, it is still 3107 done in a mostly ad hoc manner. Designers work with descriptions 3108 of components that are either informal or incomplete (e.g., documents 3109 in English, structural but non-behavioral specifications in IP-XACT) 3110 or too low-level (e.g., HDL code), and have little to no automatic 3111 support for stitching the components together. Providing such support 3112 is the glue design problem. 3113 3114 This paper addresses this problem using a model-based approach. The 3115 key idea is to use high-level models, such as dataflow graphs, that 3116 enable efficient automated analysis. The analysis can be used to 3117 derive performance properties of the system (e.g., component compatibility, 3118 throughput, etc.), optimize resource usage (e.g., buffer sizes), 3119 and even synthesize low-level code (e.g., control logic). However, 3120 these models are only abstractions of the real system, and often 3121 omit critical information. As a result, the analysis outcomes may 3122 be defensive (e.g., buffers that are too big) or even incorrect (e.g., 3123 buffers that are too small). The paper examines these situations 3124 and proposes a correct and non-defensive design methodology that 3125 employs the right models to explore accurate performance and resource 3126 trade-offs. }, 3127 acmid = {2039382}, 3128 doi = {http://doi.acm.org/10.1145/2039370.2039382}, 3129 isbn = {978-1-4503-0715-4}, 3130 keywords = {abstraction, data flow, glue design, non-defensiveness, composition}, 3131 location = {Taipei, Taiwan}, 3132 numpages = {10}, 3133 owner = {cecile}, 3134 timestamp = {2012.03.07}, 3135 url = {http://doi.acm.org/10.1145/2039370.2039382} 2937 3136 } 2938 3137 … … 3029 3228 } 3030 3229 3230 @ARTICLE{5374376, 3231 author = {Hao Zheng and Haiqiong Yao and Yoneda, T.}, 3232 title = {Modular Model Checking of Large Asynchronous Designs with Efficient 3233 Abstraction Refinement}, 3234 journal = {Computers, IEEE Transactions on}, 3235 year = {2010}, 3236 volume = {59}, 3237 pages = {561 -573}, 3238 number = {4}, 3239 month = {april }, 3240 abstract = {Divide-and-conquer is essential to address state explosion in model 3241 checking. Verifying each individual component in a system, in isolation, 3242 efficiently requires an appropriate context, which traditionally 3243 is obtained by hand. This paper presents an efficient modular model 3244 checking approach for asynchronous design verification. It is equipped 3245 with a novel abstraction refinement method that can refine a component 3246 abstraction to be accurate enough for successful verification. It 3247 is fully automated, and eliminates the need of finding an accurate 3248 context when verifying each individual component, although such a 3249 context is still highly desirable. This method is also enhanced with 3250 additional state space reduction techniques. The experiments on several 3251 nontrivial asynchronous designs show that this method efficiently 3252 removes impossible behaviors from each component including ones violating 3253 correctness requirements.}, 3254 doi = {10.1109/TC.2009.187}, 3255 file = {:/users/outil/verif/biblio/Composition/ModularMCLargeAsynchronousDesignwithAR2010.pdf:PDF}, 3256 issn = {0018-9340}, 3257 keywords = {abstraction refinement;abstraction refinement method;large asynchronous 3258 designs;modular model checking;state explosion;state space reduction 3259 techniques;formal verification;state-space methods; composition}, 3260 owner = {cecile}, 3261 review = {Verification of a whole system by verifying each components. When 3262 verifying each components individually assumptions has to be made 3263 on the environnment ot avoid false counter-examples. Use component 3264 abstraction to over-approximated the environment. This abastraction 3265 must be refined to obtain only the behavior allowed at the interface. 3266 They propose : 3267 3268 <ul> 3269 3270 <li> to identify and remove unsynchronized behavior. 3271 3272 <li> to extend the refinement to more than two components itemize 3273 3274 3275 </ul> 3276 3277 3278 Main contribution : Local synchronization detection method for component 3279 based on parallel composition and an AR methof for modular MC. 3280 3281 <br> 3282 3283 Circuit class : Asynchronous</td>}, 3284 timestamp = {2012.03.07} 3285 } 3286 3031 3287 @PROCEEDINGS{DBLP:conf/fmcad/2002, 3032 3288 title = {Formal Methods in Computer-Aided Design, 4th International Conference,
Note: See TracChangeset
for help on using the changeset viewer.