Please use this identifier to cite or link to this item:
https://doi.org/10.1007/978-3-642-31424-7_43
DC Field | Value | |
---|---|---|
dc.title | A complete method for symmetry reduction in safety verification | |
dc.contributor.author | Chu, D.-H. | |
dc.contributor.author | Jaffar, J. | |
dc.date.accessioned | 2013-07-04T07:54:35Z | |
dc.date.available | 2013-07-04T07:54:35Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Chu, D.-H.,Jaffar, J. (2012). A complete method for symmetry reduction in safety verification. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7358 LNCS : 616-633. ScholarBank@NUS Repository. <a href="https://doi.org/10.1007/978-3-642-31424-7_43" target="_blank">https://doi.org/10.1007/978-3-642-31424-7_43</a> | |
dc.identifier.isbn | 9783642314230 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40008 | |
dc.description.abstract | Symmetry reduction is a well-investigated technique to counter the state space explosion problem for reasoning about a concurrent system of similar processes. Here we present a general method for its application, restricted to verification of safety properties, but without any prior knowledge about global symmetry. We start by using a notion of weak symmetry which allows for more reduction than in previous notions of symmetry. This notion is relative to the target safety property. The key idea is to perform symmetric transformations on state interpolation, a concept which has been used widely for pruning in SMTand CEGAR. Our method naturally favors "quite symmetric" systems: more similarity among the processes leads to greater pruning of the tree. The main result is that the method is complete wrt. weak symmetry: it only considers states which are not weakly symmetric to an already encountered state. © 2012 Springer-Verlag. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-642-31424-7_43 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1007/978-3-642-31424-7_43 | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 7358 LNCS | |
dc.description.page | 616-633 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.