Abstract
A technique for the specification and verification of real-time, distributed systems is proposed. It provides a unified representation for both internal design and externally observable behavior and an automated procedure for deriving the external behavior associated with a design. The approach is applicable to both hardware and software, and can handle systems in which timing, concurrency, indeterminacy, and ongoing behavior are important considerations.
Although the approach contains elements of switching theory and automata theory, it diverges from other models with the definition of a constraint as an incompatibility among successive states. The proposed verification technique centers around an algorithm (incorporating the resolution principle and coded in LISP) that takes as input an acceptor for a set of design constraints and generates as output an acceptor for the set of prime constraints. A description of external behavior is obtained from this acceptor by pruning out all constraints involving hidden variables. It is anticipated that from this description it will be possible to verify properties relating to consistency, equivalence, deadlock, computer security, and fault tolerance.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Campbell, R.H. and A.N. Habermann, "The Specification of Process Synchronization by Path Expressions", Lecture Notes in Computer Science, Vol. 16, Springer-Verlag, 1974, pp. 90–102.
Dijkstra, E.W., A Discipline of Programming, Prentice-Hall, Englewood Cliffs, N.J., 1976.
Floyd, R.W., "Assigning Meanings to Programs", Mathematical Aspects of Computer Science, Vol. 19, Schwartz, J.T., ed., American Mathematical Society, Providence, R.I., 1967, pp. 19–32.
Furtek, F.C., "Constraints and Compromise", Foundations of Secure Computation, (DeMillo, R.A., D.P. Dobkin, A.K. Jones, R.J. Lipton, ed.), Academic Press, 1978, pp. 189–204.
Furtek, F.C., A Validation Technique for Computer Security Based on the Theory of Constraints, ESD-TR-78-182, Electronic Systems Division, AFSC, Hanscom AFB, MA, December 1978.
Furtek, F.C., "Doing Without Values", Ninth International Symposium on Multiple-Valued Logic, Bath, England, 1979, pp. 114–120.
Furtek, F.C., "The Theory of Constraints", In Preparation.
Greif, I., "A Language for Formal Problem Specification", Commun. Assoc. Comput. Mach., Vol. 20, No. 12, December 1977, pp. 931–935.
Hoare, C.A.R., "An Axiomatic Basis of Computer Programming", Commun. Assoc. Comput. Mach., Vol. 12, October 1969, pp. 576–580.
Holt, A.W., et al., Final Report of the Information System Theory Project, RADC-TR-68-305, Rome Air Development Center, Griffis AFB, NY, September 1968.
Holt, A.W. and F.C. Commoner, Events and Conditions, Applied Data Research, Inc., New York, 1970.
Hopcroft, J.E. and J.D. Ullman, Formal Languages and Their Relation to Automata, Addison-Wesley, Reading, MA, 1969.
Knuth, D.E., Letter in SIGACT News, Vol. 9, No. 1, Jan.–March 1977, pp. 8–9.
Lautenbach, K. and H. Wedde, "Generating Control Mechanisms by Restrictions", Lecture Notes in Computer Science, Vol. 45, Springer-Verlag, 1976, pp. 416–422.
Luckham, D., "The Resolution Principle in Theorem-Proving", Machine Intelligence 1, (Collins, N.L. and D. Michie, ed.), American Elsevier, N.Y., 1967, pp. 47–61.
Lynch, N.A. and M.J. Fischer, On Describing the Behavior and Implementation of Distributed Systems, Technical Report GIT-ICS-79/03, School of Information and Computer Science, Georgia Institute of Technology, May 1979.
Maggiolo-Schettini, A., H. Wedde, and J. Winkowski, "Modeling a Solution for a Control Problem in Distributed Systems by Restrictions", Lecture Notes in Computer Science, Vol. 70, Springer-Verlag, 1979, pp. 226–248.
Manna, Z. and R. Waldinger, "The Logic of Computer Programming", IEEE Transactions on Software Engineering, Vol. SE-4, No. 3, May 1978, pp. 199–229.
McCluskey, E.J., "Minimization of Boolean Functions", Bell System Tech. J., Vol. 35, No. 5, November 1956, pp. 1417–1444.
Millen, J.K., "Constraints and Multilevel Security", Foundations of Secure Computation, (R.A. DeMillo, D.P. Dobkin, A.K. Jones, R.J. Lipton, ed.), Academic Press, 1978, pp. 205–222.
Millen, J.K., Causal System Security, ESD-TR-78-171, Electronic Systems Division, AFSC, Hanscom AFB, MA, October 1978.
Parnas, D.L., "A Technique for Module Specification with Examples", Commun. Assoc. Comput. Mach., Vol. 15, No. 5, May 1972, pp. 330–336.
Petri, C.A., Communication with Automata, Supplement 1 to RADC-TR-65-377, Vol. 1, Rome Air Development Center, Griffiss AFB, New York, 1966. [Originally published in German: Kommunikation mit Automaten, Schriften des Rheinisch-Westfalischen Institutes fur Instrumentelle Mathematik an der Universitat Bonn, Hft. 2, Bonn, 1962.]
Pnueli, A., "The Temporal Logic of Programs", 19th Ann. Symp. on Found. of Comput. Sci., Providence, R.I., November 1977, pp. 46–57.
Pnueli, A., "The Temporal Semantics of Programs", Lecture Notes in Computer Science, Vol. 70, Springer-Verlag, 1979, pp. 1–20.
Pratt, V.R., "Semantical Considerations on Floyd-Hoare Logic", Proc. 17th Ann. IEEE Symp. Found. of Comp. Sci., 1976, pp. 109–121.
Pratt, V.R., "Process Logic: Preliminary Report", Conf. Record of 6th Ann. Symp. on Prin. of Prog. Lang., San Antonio, Texas, January 1979, pp. 93–99.
Robinson, J.A., "A Machine-Oriented Logic Based on the Resolution Principle", J. Assoc. Comput. Mach., Vol. 12, 1965, pp. 23–41.
Robinson, L. and K.N. Levitt, "Proof Techniques for Hierarchically Structured Programs", Commun. Assoc. Comput. Mach., Vol. 20, No. 4, April 1977, pp. 271–283.
Scott, D., "Mathematical Concepts in Programming Language Semantics", SJCC 72, AFIPS Press, 1972, pp. 225–234.
Shields, M.W., "Adequate Path Expressions", Lecture Notes in Computer Science, Vol. 70, Springer-Verlag, 1979, pp. 249–265.
Tison, P., "Generalization of Consensus Theory and Application to the Minimization of Boolean Functions", IEEE Trans. Computers, Vol. EC-16, No. 4, August 1967, pp. 446–456.
Wedde, H. and J. Winkowski, "Determining Processes by Violations", Lecture Notes in Computer Science, Vol. 53, Springer-Verlag, 1977, pp. 549–559.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1980 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Furtek, F.C. (1980). Specification and verification of real-time, distributed systems using the theory of constraints. In: Bibel, W., Kowalski, R. (eds) 5th Conference on Automated Deduction Les Arcs, France, July 8–11, 1980. CADE 1980. Lecture Notes in Computer Science, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-10009-1_10
Download citation
DOI: https://doi.org/10.1007/3-540-10009-1_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-10009-6
Online ISBN: 978-3-540-38140-2
eBook Packages: Springer Book Archive