Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
FDR3 — A Modern Refinement Checker for CSP - MaRDI portal

FDR3 — A Modern Refinement Checker for CSP

From MaRDI portal
Publication:5498738

DOI10.1007/978-3-642-54862-8_13zbMath1392.68300OpenAlexW1882160752MaRDI QIDQ5498738

A. W. Roscoe, Thomas Gibson-Robinson, Philip Armstrong, Alexandre Boulgakov

Publication date: 10 February 2015

Published in: Tools and Algorithms for the Construction and Analysis of Systems (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-54862-8_13




Related Items

Sound reasoning in \textit{tock}-CSPTesting using CSP Models: Time, Inputs, and OutputsTracking CSP computationsProcess Algebra and Model CheckingBehavioural Models for FMI Co-simulationsRigorous development of component-based systems using component metadata and patternsTemporal reasoning through automatic translation of tock-CSP into timed automataRefinement-Based Verification of Communicating Unstructured CodeUnnamed ItemTranslating between models of concurrencyEfficient verification of concurrent systems using local-analysis-based approximations and SAT solvingRevisiting sequential composition in process calculiChecking opacity and durable opacity with FDRAutomatic generation of verified concurrent hardware using VHDLSimulation relations and applications in formal methodsCorrect and efficient antichain algorithms for refinement checkingCompositional and local livelock analysis for CSPThe symbiosis of concurrency and verification: teaching and case studiesThe Automatic Detection of Token Structures and Invariants Using SAT CheckingReducing complex CSP models to traces via priorityComputing maximal weak and other bisimulationsEnsuring liveness properties of distributed systems: open problemsView abstraction for systems with component identitiesMitigating Multi-target Attacks in Hash-Based SignaturesThe expressiveness of CSP with priorityDiscovering and correcting a deadlock in a channel implementationInteractive verification of architectural design patterns in FACTumCompositional Assume-Guarantee Reasoning of Control Law Diagrams Using UTPCompositional verification of asynchronous concurrent systems using CADP


Uses Software