Loading…

Simulation-verification: biting at the state explosion problem

Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on software engineering 2001-07, Vol.27 (7), p.599-617
Main Authors: Stuart, D.A., Brockmeyer, M., Mok, A.K., Jahanian, F.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3
cites cdi_FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3
container_end_page 617
container_issue 7
container_start_page 599
container_title IEEE transactions on software engineering
container_volume 27
creator Stuart, D.A.
Brockmeyer, M.
Mok, A.K.
Jahanian, F.
description Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification provides guarantees over the entire set of computation paths of a system, but is, in general, very expensive due to the state-space explosion problem. We introduce a new technique: simulation-verification combines the best of both worlds by synthesizing an intermediate analysis method. This method uses simulation to limit the generation of a computation graph to that set of computations consistent with the simulation. This limited computation graph, called a simulation-verification graph, can be one or more orders of magnitude smaller than the full computation graph. A tool, XSVT, is described which implements simulation-verification graphs. Three paradigms for using the new technique are proposed. The paper illustrates the application of the proposed technique via an example of a robot controller for a manufacturing assembly line.
doi_str_mv 10.1109/32.935853
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_28477121</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>935853</ieee_id><sourcerecordid>28477121</sourcerecordid><originalsourceid>FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3</originalsourceid><addsrcrecordid>eNqF0DtPwzAQB3APIFEKAytTJhBDit8PBiRU8ZIqMQCzZSdnMEqaEruofHsCqRhhOp3up7vTH6EjgmeEYHPO6MwwoQXbQROMjS6F0GYP7af0hjEWSokJunyM7bpxOXbL8gP6GGL101wUPua4fClcLvIrFCm7DAVsVk2XhnGx6jvfQHuAdoNrEhxu6xQ931w_ze_KxcPt_fxqUVaM41x6zzymtOaGk0rIoFgth1-UktoDB1YZLCkozJgGwZ3QvMZAcTB1EMrzwKbodNw73H1fQ8q2jamCpnFL6NbJGsKlUNqIQZ78KanmShFK_ofScC4NG-DZCKu-S6mHYFd9bF3_aQm230FbRu0Y9GCPRxsB4Ndth1955XlN</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>26944693</pqid></control><display><type>article</type><title>Simulation-verification: biting at the state explosion problem</title><source>ABI/INFORM Global</source><source>IEEE Xplore (Online service)</source><creator>Stuart, D.A. ; Brockmeyer, M. ; Mok, A.K. ; Jahanian, F.</creator><creatorcontrib>Stuart, D.A. ; Brockmeyer, M. ; Mok, A.K. ; Jahanian, F.</creatorcontrib><description>Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification provides guarantees over the entire set of computation paths of a system, but is, in general, very expensive due to the state-space explosion problem. We introduce a new technique: simulation-verification combines the best of both worlds by synthesizing an intermediate analysis method. This method uses simulation to limit the generation of a computation graph to that set of computations consistent with the simulation. This limited computation graph, called a simulation-verification graph, can be one or more orders of magnitude smaller than the full computation graph. A tool, XSVT, is described which implements simulation-verification graphs. Three paradigms for using the new technique are proposed. The paper illustrates the application of the proposed technique via an example of a robot controller for a manufacturing assembly line.</description><identifier>ISSN: 0098-5589</identifier><identifier>DOI: 10.1109/32.935853</identifier><identifier>CODEN: IESEDJ</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Computation ; Computational modeling ; Computer simulation ; Context modeling ; Costs ; Explosions ; Graphs ; Program verification (computers) ; Pulp manufacturing ; Real time systems ; Robot control ; Robotic assembly ; Robots ; Specification languages ; Specifications</subject><ispartof>IEEE transactions on software engineering, 2001-07, Vol.27 (7), p.599-617</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3</citedby><cites>FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/935853$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,36061,54796</link.rule.ids></links><search><creatorcontrib>Stuart, D.A.</creatorcontrib><creatorcontrib>Brockmeyer, M.</creatorcontrib><creatorcontrib>Mok, A.K.</creatorcontrib><creatorcontrib>Jahanian, F.</creatorcontrib><title>Simulation-verification: biting at the state explosion problem</title><title>IEEE transactions on software engineering</title><addtitle>TSE</addtitle><description>Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification provides guarantees over the entire set of computation paths of a system, but is, in general, very expensive due to the state-space explosion problem. We introduce a new technique: simulation-verification combines the best of both worlds by synthesizing an intermediate analysis method. This method uses simulation to limit the generation of a computation graph to that set of computations consistent with the simulation. This limited computation graph, called a simulation-verification graph, can be one or more orders of magnitude smaller than the full computation graph. A tool, XSVT, is described which implements simulation-verification graphs. Three paradigms for using the new technique are proposed. The paper illustrates the application of the proposed technique via an example of a robot controller for a manufacturing assembly line.</description><subject>Analytical models</subject><subject>Computation</subject><subject>Computational modeling</subject><subject>Computer simulation</subject><subject>Context modeling</subject><subject>Costs</subject><subject>Explosions</subject><subject>Graphs</subject><subject>Program verification (computers)</subject><subject>Pulp manufacturing</subject><subject>Real time systems</subject><subject>Robot control</subject><subject>Robotic assembly</subject><subject>Robots</subject><subject>Specification languages</subject><subject>Specifications</subject><issn>0098-5589</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2001</creationdate><recordtype>article</recordtype><recordid>eNqF0DtPwzAQB3APIFEKAytTJhBDit8PBiRU8ZIqMQCzZSdnMEqaEruofHsCqRhhOp3up7vTH6EjgmeEYHPO6MwwoQXbQROMjS6F0GYP7af0hjEWSokJunyM7bpxOXbL8gP6GGL101wUPua4fClcLvIrFCm7DAVsVk2XhnGx6jvfQHuAdoNrEhxu6xQ931w_ze_KxcPt_fxqUVaM41x6zzymtOaGk0rIoFgth1-UktoDB1YZLCkozJgGwZ3QvMZAcTB1EMrzwKbodNw73H1fQ8q2jamCpnFL6NbJGsKlUNqIQZ78KanmShFK_ofScC4NG-DZCKu-S6mHYFd9bF3_aQm230FbRu0Y9GCPRxsB4Ndth1955XlN</recordid><startdate>20010701</startdate><enddate>20010701</enddate><creator>Stuart, D.A.</creator><creator>Brockmeyer, M.</creator><creator>Mok, A.K.</creator><creator>Jahanian, F.</creator><general>IEEE</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20010701</creationdate><title>Simulation-verification: biting at the state explosion problem</title><author>Stuart, D.A. ; Brockmeyer, M. ; Mok, A.K. ; Jahanian, F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Analytical models</topic><topic>Computation</topic><topic>Computational modeling</topic><topic>Computer simulation</topic><topic>Context modeling</topic><topic>Costs</topic><topic>Explosions</topic><topic>Graphs</topic><topic>Program verification (computers)</topic><topic>Pulp manufacturing</topic><topic>Real time systems</topic><topic>Robot control</topic><topic>Robotic assembly</topic><topic>Robots</topic><topic>Specification languages</topic><topic>Specifications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Stuart, D.A.</creatorcontrib><creatorcontrib>Brockmeyer, M.</creatorcontrib><creatorcontrib>Mok, A.K.</creatorcontrib><creatorcontrib>Jahanian, F.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on software engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Stuart, D.A.</au><au>Brockmeyer, M.</au><au>Mok, A.K.</au><au>Jahanian, F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Simulation-verification: biting at the state explosion problem</atitle><jtitle>IEEE transactions on software engineering</jtitle><stitle>TSE</stitle><date>2001-07-01</date><risdate>2001</risdate><volume>27</volume><issue>7</issue><spage>599</spage><epage>617</epage><pages>599-617</pages><issn>0098-5589</issn><coden>IESEDJ</coden><abstract>Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification provides guarantees over the entire set of computation paths of a system, but is, in general, very expensive due to the state-space explosion problem. We introduce a new technique: simulation-verification combines the best of both worlds by synthesizing an intermediate analysis method. This method uses simulation to limit the generation of a computation graph to that set of computations consistent with the simulation. This limited computation graph, called a simulation-verification graph, can be one or more orders of magnitude smaller than the full computation graph. A tool, XSVT, is described which implements simulation-verification graphs. Three paradigms for using the new technique are proposed. The paper illustrates the application of the proposed technique via an example of a robot controller for a manufacturing assembly line.</abstract><pub>IEEE</pub><doi>10.1109/32.935853</doi><tpages>19</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0098-5589
ispartof IEEE transactions on software engineering, 2001-07, Vol.27 (7), p.599-617
issn 0098-5589
language eng
recordid cdi_proquest_miscellaneous_28477121
source ABI/INFORM Global; IEEE Xplore (Online service)
subjects Analytical models
Computation
Computational modeling
Computer simulation
Context modeling
Costs
Explosions
Graphs
Program verification (computers)
Pulp manufacturing
Real time systems
Robot control
Robotic assembly
Robots
Specification languages
Specifications
title Simulation-verification: biting at the state explosion problem
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T07%3A04%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Simulation-verification:%20biting%20at%20the%20state%20explosion%20problem&rft.jtitle=IEEE%20transactions%20on%20software%20engineering&rft.au=Stuart,%20D.A.&rft.date=2001-07-01&rft.volume=27&rft.issue=7&rft.spage=599&rft.epage=617&rft.pages=599-617&rft.issn=0098-5589&rft.coden=IESEDJ&rft_id=info:doi/10.1109/32.935853&rft_dat=%3Cproquest_cross%3E28477121%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=26944693&rft_id=info:pmid/&rft_ieee_id=935853&rfr_iscdi=true