IO efficient detection method of large-scale system loop

A large-scale, loop technology, applied in fault hardware testing methods, error detection/correction, detection of faulty computer hardware, etc., can solve problems such as memory algorithms are not very practical, reduce memory jitter and reduce complexity Effect

Pending Publication Date: 2017-01-18
CHENGDU KEHONGDA TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So far, there are many methods for memory algorithms, such as partial order reduction, symmetric reduction, abstraction extraction, combination extraction, symbolic model detection, symbolic path tracing, automata theory, and boundary model detection, etc. However, due to memory In the large-scale system verification, the memory algorithm is not very practical

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IO efficient detection method of large-scale system loop

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to facilitate those skilled in the art to understand the technical content of the present invention, the content of the present invention will be further explained below in conjunction with the accompanying drawings.

[0034] like figure 1 Shown is the scheme flow chart of the present invention, the technical scheme of the present invention is: a kind of IO high-efficiency detection large-scale system loop method, comprising:

[0035] S1. Establish a DACC framework and traverse all acceptable state sets. For each acceptable state, first use the SFA algorithm to find the acceptable state contained in the ASCC, and then use FACA to find the acceptable loop of the ASCC. Accepting states have been traversed, and all acceptable cycles have been found.

[0036] S2. Use the external breadth-first algorithm BFS by calling enumerateBFS(), and then use the algorithm EPH to form MPHF; according to the DACC framework established in step S1, DACC finds all acceptable state...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IO efficient detection method of a large-scale system loop. A general frame is constructed to search all counter examples; for each acceptable state, DACC firstly searches the acceptable state contained in ASCC, and then, all acceptable loops of the ASCC are found. The IO efficient detection method has the advantages that a great quantity of useless paths can be prevented from being searched, and the useless paths cannot reach the acceptable loops. In order to further lower I / O complexity and improve the manifestation of the method disclosed by the invention, the invention puts forward a technology for calculating two state intersections and a dynamic path management technology. The poorest I / O complexity in the intersection calculation technology is linear, and therefore, the manifestation of an algorithm for searching ASCCs can be improved. The dynamic path management technology can be used for reducing a memory thrashing phenomenon during searching so as to improve the manifestation of algorithms for finding all acceptable state algorithms.

Description

technical field [0001] The invention relates to the field of model detection, in particular to a technology for efficiently detecting large-scale loops with an LTL model. Background technique [0002] Model checking algorithm is a good method for formal verification of hardware and software. It can automatically detect whether the state of the system is satisfied and can detect counterexamples. Model checking is widely used in formal methods of hardware. But this method faces the problem of state space explosion, because the method will face insufficient memory when using large-scale systems. [0003] In practice, there are mainly two ways of model checking: [0004] In-memory algorithms and out-of-memory algorithms; in order to solve the state explosion problem, in-memory algorithms are mainly aimed at reducing the size and performance of the system. So far, there are many methods for memory algorithms, such as partial order reduction, symmetric reduction, abstraction ext...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/22G06F11/36
CPCG06F11/2273G06F11/3608
Inventor 吴立军
Owner CHENGDU KEHONGDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products