V. Shkarupylo, I. Blinov, A. Chemeris, V. Dusheba, J. Alsayaydeh, A. Oliinyk
{"title":"Iterative Approach to TLC Model Checker Application","authors":"V. Shkarupylo, I. Blinov, A. Chemeris, V. Dusheba, J. Alsayaydeh, A. Oliinyk","doi":"10.1109/KhPIWeek53812.2021.9570055","DOIUrl":null,"url":null,"abstract":"Proven model checking technique, i.e., the model checker applied to the formal specification created on the basis of the Temporal Logic of Actions has been considered. Two implementations of named technique have been investigated: model checking by way of exhaustive breadth-first search through the state space and by way of depth-first search. As a case study, the safety-critical domain scenario has been considered. To this end, domain-specific block-diagram has been used as an input data. It has been demonstrated that, depending on the complexity of block-diagram, the outcome of given technique implementation varies significantly - in terms of related time costs. With respect to named case study, an iterative approach to model checking technique application has been proposed - based on both breadth-first and depth-first search techniques combination.","PeriodicalId":365896,"journal":{"name":"2021 IEEE 2nd KhPI Week on Advanced Technology (KhPIWeek)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 2nd KhPI Week on Advanced Technology (KhPIWeek)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KhPIWeek53812.2021.9570055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Proven model checking technique, i.e., the model checker applied to the formal specification created on the basis of the Temporal Logic of Actions has been considered. Two implementations of named technique have been investigated: model checking by way of exhaustive breadth-first search through the state space and by way of depth-first search. As a case study, the safety-critical domain scenario has been considered. To this end, domain-specific block-diagram has been used as an input data. It has been demonstrated that, depending on the complexity of block-diagram, the outcome of given technique implementation varies significantly - in terms of related time costs. With respect to named case study, an iterative approach to model checking technique application has been proposed - based on both breadth-first and depth-first search techniques combination.