Loading…
Simulation-verification: biting at the state explosion problem
Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification...
Saved in:
Published in: | IEEE transactions on software engineering 2001-07, Vol.27 (7), p.599-617 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3 |
---|---|
cites | cdi_FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3 |
container_end_page | 617 |
container_issue | 7 |
container_start_page | 599 |
container_title | IEEE transactions on software engineering |
container_volume | 27 |
creator | Stuart, D.A. Brockmeyer, M. Mok, A.K. Jahanian, F. |
description | Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification provides guarantees over the entire set of computation paths of a system, but is, in general, very expensive due to the state-space explosion problem. We introduce a new technique: simulation-verification combines the best of both worlds by synthesizing an intermediate analysis method. This method uses simulation to limit the generation of a computation graph to that set of computations consistent with the simulation. This limited computation graph, called a simulation-verification graph, can be one or more orders of magnitude smaller than the full computation graph. A tool, XSVT, is described which implements simulation-verification graphs. Three paradigms for using the new technique are proposed. The paper illustrates the application of the proposed technique via an example of a robot controller for a manufacturing assembly line. |
doi_str_mv | 10.1109/32.935853 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_28477121</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>935853</ieee_id><sourcerecordid>28477121</sourcerecordid><originalsourceid>FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3</originalsourceid><addsrcrecordid>eNqF0DtPwzAQB3APIFEKAytTJhBDit8PBiRU8ZIqMQCzZSdnMEqaEruofHsCqRhhOp3up7vTH6EjgmeEYHPO6MwwoQXbQROMjS6F0GYP7af0hjEWSokJunyM7bpxOXbL8gP6GGL101wUPua4fClcLvIrFCm7DAVsVk2XhnGx6jvfQHuAdoNrEhxu6xQ931w_ze_KxcPt_fxqUVaM41x6zzymtOaGk0rIoFgth1-UktoDB1YZLCkozJgGwZ3QvMZAcTB1EMrzwKbodNw73H1fQ8q2jamCpnFL6NbJGsKlUNqIQZ78KanmShFK_ofScC4NG-DZCKu-S6mHYFd9bF3_aQm230FbRu0Y9GCPRxsB4Ndth1955XlN</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>26944693</pqid></control><display><type>article</type><title>Simulation-verification: biting at the state explosion problem</title><source>ABI/INFORM Global</source><source>IEEE Xplore (Online service)</source><creator>Stuart, D.A. ; Brockmeyer, M. ; Mok, A.K. ; Jahanian, F.</creator><creatorcontrib>Stuart, D.A. ; Brockmeyer, M. ; Mok, A.K. ; Jahanian, F.</creatorcontrib><description>Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification provides guarantees over the entire set of computation paths of a system, but is, in general, very expensive due to the state-space explosion problem. We introduce a new technique: simulation-verification combines the best of both worlds by synthesizing an intermediate analysis method. This method uses simulation to limit the generation of a computation graph to that set of computations consistent with the simulation. This limited computation graph, called a simulation-verification graph, can be one or more orders of magnitude smaller than the full computation graph. A tool, XSVT, is described which implements simulation-verification graphs. Three paradigms for using the new technique are proposed. The paper illustrates the application of the proposed technique via an example of a robot controller for a manufacturing assembly line.</description><identifier>ISSN: 0098-5589</identifier><identifier>DOI: 10.1109/32.935853</identifier><identifier>CODEN: IESEDJ</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Computation ; Computational modeling ; Computer simulation ; Context modeling ; Costs ; Explosions ; Graphs ; Program verification (computers) ; Pulp manufacturing ; Real time systems ; Robot control ; Robotic assembly ; Robots ; Specification languages ; Specifications</subject><ispartof>IEEE transactions on software engineering, 2001-07, Vol.27 (7), p.599-617</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3</citedby><cites>FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/935853$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,36061,54796</link.rule.ids></links><search><creatorcontrib>Stuart, D.A.</creatorcontrib><creatorcontrib>Brockmeyer, M.</creatorcontrib><creatorcontrib>Mok, A.K.</creatorcontrib><creatorcontrib>Jahanian, F.</creatorcontrib><title>Simulation-verification: biting at the state explosion problem</title><title>IEEE transactions on software engineering</title><addtitle>TSE</addtitle><description>Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification provides guarantees over the entire set of computation paths of a system, but is, in general, very expensive due to the state-space explosion problem. We introduce a new technique: simulation-verification combines the best of both worlds by synthesizing an intermediate analysis method. This method uses simulation to limit the generation of a computation graph to that set of computations consistent with the simulation. This limited computation graph, called a simulation-verification graph, can be one or more orders of magnitude smaller than the full computation graph. A tool, XSVT, is described which implements simulation-verification graphs. Three paradigms for using the new technique are proposed. The paper illustrates the application of the proposed technique via an example of a robot controller for a manufacturing assembly line.</description><subject>Analytical models</subject><subject>Computation</subject><subject>Computational modeling</subject><subject>Computer simulation</subject><subject>Context modeling</subject><subject>Costs</subject><subject>Explosions</subject><subject>Graphs</subject><subject>Program verification (computers)</subject><subject>Pulp manufacturing</subject><subject>Real time systems</subject><subject>Robot control</subject><subject>Robotic assembly</subject><subject>Robots</subject><subject>Specification languages</subject><subject>Specifications</subject><issn>0098-5589</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2001</creationdate><recordtype>article</recordtype><recordid>eNqF0DtPwzAQB3APIFEKAytTJhBDit8PBiRU8ZIqMQCzZSdnMEqaEruofHsCqRhhOp3up7vTH6EjgmeEYHPO6MwwoQXbQROMjS6F0GYP7af0hjEWSokJunyM7bpxOXbL8gP6GGL101wUPua4fClcLvIrFCm7DAVsVk2XhnGx6jvfQHuAdoNrEhxu6xQ931w_ze_KxcPt_fxqUVaM41x6zzymtOaGk0rIoFgth1-UktoDB1YZLCkozJgGwZ3QvMZAcTB1EMrzwKbodNw73H1fQ8q2jamCpnFL6NbJGsKlUNqIQZ78KanmShFK_ofScC4NG-DZCKu-S6mHYFd9bF3_aQm230FbRu0Y9GCPRxsB4Ndth1955XlN</recordid><startdate>20010701</startdate><enddate>20010701</enddate><creator>Stuart, D.A.</creator><creator>Brockmeyer, M.</creator><creator>Mok, A.K.</creator><creator>Jahanian, F.</creator><general>IEEE</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20010701</creationdate><title>Simulation-verification: biting at the state explosion problem</title><author>Stuart, D.A. ; Brockmeyer, M. ; Mok, A.K. ; Jahanian, F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Analytical models</topic><topic>Computation</topic><topic>Computational modeling</topic><topic>Computer simulation</topic><topic>Context modeling</topic><topic>Costs</topic><topic>Explosions</topic><topic>Graphs</topic><topic>Program verification (computers)</topic><topic>Pulp manufacturing</topic><topic>Real time systems</topic><topic>Robot control</topic><topic>Robotic assembly</topic><topic>Robots</topic><topic>Specification languages</topic><topic>Specifications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Stuart, D.A.</creatorcontrib><creatorcontrib>Brockmeyer, M.</creatorcontrib><creatorcontrib>Mok, A.K.</creatorcontrib><creatorcontrib>Jahanian, F.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on software engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Stuart, D.A.</au><au>Brockmeyer, M.</au><au>Mok, A.K.</au><au>Jahanian, F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Simulation-verification: biting at the state explosion problem</atitle><jtitle>IEEE transactions on software engineering</jtitle><stitle>TSE</stitle><date>2001-07-01</date><risdate>2001</risdate><volume>27</volume><issue>7</issue><spage>599</spage><epage>617</epage><pages>599-617</pages><issn>0098-5589</issn><coden>IESEDJ</coden><abstract>Simulation and verification are two conventional techniques for the analysis of specifications of real-time systems. While simulation is relatively inexpensive in terms of execution time, it only validates the behavior of a system for one particular computation path. On the other hand, verification provides guarantees over the entire set of computation paths of a system, but is, in general, very expensive due to the state-space explosion problem. We introduce a new technique: simulation-verification combines the best of both worlds by synthesizing an intermediate analysis method. This method uses simulation to limit the generation of a computation graph to that set of computations consistent with the simulation. This limited computation graph, called a simulation-verification graph, can be one or more orders of magnitude smaller than the full computation graph. A tool, XSVT, is described which implements simulation-verification graphs. Three paradigms for using the new technique are proposed. The paper illustrates the application of the proposed technique via an example of a robot controller for a manufacturing assembly line.</abstract><pub>IEEE</pub><doi>10.1109/32.935853</doi><tpages>19</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0098-5589 |
ispartof | IEEE transactions on software engineering, 2001-07, Vol.27 (7), p.599-617 |
issn | 0098-5589 |
language | eng |
recordid | cdi_proquest_miscellaneous_28477121 |
source | ABI/INFORM Global; IEEE Xplore (Online service) |
subjects | Analytical models Computation Computational modeling Computer simulation Context modeling Costs Explosions Graphs Program verification (computers) Pulp manufacturing Real time systems Robot control Robotic assembly Robots Specification languages Specifications |
title | Simulation-verification: biting at the state explosion problem |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T07%3A04%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Simulation-verification:%20biting%20at%20the%20state%20explosion%20problem&rft.jtitle=IEEE%20transactions%20on%20software%20engineering&rft.au=Stuart,%20D.A.&rft.date=2001-07-01&rft.volume=27&rft.issue=7&rft.spage=599&rft.epage=617&rft.pages=599-617&rft.issn=0098-5589&rft.coden=IESEDJ&rft_id=info:doi/10.1109/32.935853&rft_dat=%3Cproquest_cross%3E28477121%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c340t-bb3b022d4941c56f73d65897768be4e3c9062e70338e54a584d0e20f9df57b4f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=26944693&rft_id=info:pmid/&rft_ieee_id=935853&rfr_iscdi=true |