期刊文献+

具有过去时态算子的计算树逻辑模型检测 被引量:2

Model Checking of Computation Tree Logic with Past Temporal Operators
下载PDF
导出
摘要 在计算树逻辑(CTL)中引入过去时态算子,得到了表达力更强的属性规约语言CTLP,给出了CTLP的模型检测算法及其固定点刻画。该算法的复杂性和CTL一样。固定点刻画使得CTLP的符号模型检测过程能够实现,从而有效克服了模型检测中的状态爆炸问题。 This paper introduces the past temporal operators into computation tree logic(CTL), and obtains a new specification language CTLP which is more expressive than CTL. CTLP model checking algorithm is proposed and its time complexity is the same as CTL. The fixpoint representation of CTLP is presented which makes CTLP model checking symbolic. The symbolic algorithm can overcome the state explosion problem efficiently in model checking.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第22期98-100,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60573046)
关键词 计算树逻辑 模型检测 二叉判定图 computation tree logic(CTL) model checking binary decision diagram(BDD)
  • 相关文献

参考文献7

  • 1Clarke E M,Grumberg O,Peled D A.Model Checking[M].Cambridge,MA:The MIT Press,1999.
  • 2林惠民,张文辉.模型检测:理论、方法与应用[J].电子学报,2002,30(12A):1907-1912. 被引量:163
  • 3Ben-Ari M,Manna Z,Pnueli A.The Temporal Logic of Branching Time[J].Acta Informatica,1983,20(1):207-226.
  • 4Aho A V,Hopcroft J E,Ullman J D.The Design and Analysis of Computer Algorithms[M].[S.l.]:Addison Wesley,1974.
  • 5Burch J,Clarke E,MaMillan K,et al.Symbolic Model Checking:1020 States and Beyond[C]//Proc.of IEEE Symposium on Logic in Computer Science.1990.
  • 6Bryant R E.Graph-based Algorithms for Boolean Function Manipulation[C]//Proc.of the 27th ACM/IEEE Design Automation Conference.1986.
  • 7McMillan K L.Symbolic Model Checking[M].[S.l.]:Kluwer Academic Publishers,1993.

共引文献162

同被引文献8

  • 1Li Xiaoou,Medina J M,Chapa S V.Applying Petri Nets in Active Database Systems[J].IEEE Transactions on Systems,Man,and Cybernetics,2007,37(4):482-493.
  • 2Zhang Nan,Ryan M,Guelev D P.Synthesising Verified Access Control Systems Through Model Checking[J].Journal of Computer Security,2008,16(1):1-61.
  • 3Huth M R A,Ryan M D.Binary Decision Diagramms[M] //Logic in Computer Science:Modelling and Reasoning About Systems.[S.l.] :Cambridge University Press,2004.
  • 4Zhang Nan,Ryan M,Schobbens P,et al.AcPeg[Z].(2006-01-01).http://www.cs.bham.ac.uk/~mdr/research/projects/05-Access Control/acpeg.
  • 5I F AKYILDIZ,W SU,Y SANKARASUBRAMANIAM. A Survey on sensor networks[J]. IEEE Commianications Magazine, 2002,40 (8) :102-114.
  • 6LI XIAOOU, MEDINA J M, CHAPA S V. Applying petri nets in active database systems[J]. IEEE Transactions on Systems, Man and Cybernetics, 2007,37 (4) : 482-493.
  • 7张秋余,乔赞,袁占亭.基于偏好和M-Flooding的网格资源发现[J].计算机工程,2010,36(14):40-42. 被引量:2
  • 8李健,唐文忠,宋长福.角色访问控制技术在管理信息系统中的应用[J].北京航空航天大学学报,2003,29(6):534-538. 被引量:13

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部