Formal verification of a lazy concurrent list-based set algorithm

被引:0
作者
Colvin, Robert [1 ]
Groves, Lindsay
Luchangco, Victor
Moir, Mark
机构
[1] Univ Queensland, Sch Informat Technol & Elect Engn, ARC Ctr Complex Syst, St Lucia, Qld 4067, Australia
[2] Univ Victoria, Sch Math Stat & Comp Sci, Wellington, New Zealand
[3] Sun Microsyst Labs, Burlington, MA 01803 USA
来源
COMPUTER AIDED VERIFICATION, PROCEEDINGS | 2006年 / 4144卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We describe a formal verification of a recent concurrent list-based set algorithm due to Heller et al. The algorithm is optimistic: the add and remove operations traverse the list without locking, and lock only the nodes affected by the operation; the contains operation uses no locks and is wait-free. These properties make the algorithm challenging to prove correct, much more so than simple coarse-grained locking algorithms. We have proved that the algorithm is linearisable using simulation between input/output automata modelling the behaviour of an abstract set and the implementation. The automata and simulation proof obligations are specified and verified using PVS.
引用
收藏
页码:475 / 488
页数:14
相关论文
共 50 条
[21]   Soft-input soft-output list-based decoding algorithm [J].
Martin, PA ;
Taylor, DP ;
Fossorier, MPC .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :339-339
[22]   An efficient list-based task scheduling algorithm for heterogeneous distributed computing environment [J].
Madhura, Rajarethinam ;
Uthariaraj, Vaidyanathan Rhymend ;
Elizabeth, Benjamin Lydia .
SOFTWARE-PRACTICE & EXPERIENCE, 2023, 53 (02) :390-412
[23]   An Intelligent Priority Decision Making Algorithm for Competitive Operators in List-based Scheduling [J].
Lee, Jun-yong ;
Kim, Sunil .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (01) :81-86
[24]   A list-based simulated annealing algorithm with crossover operator for the traveling salesman problem [J].
İlhan İlhan ;
Gazi Gökmen .
Neural Computing and Applications, 2022, 34 :7627-7652
[25]   Soft-input soft-output list-based decoding algorithm [J].
Martin, PA ;
Taylor, DP ;
Fossorier, MPC .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2004, 52 (02) :252-262
[26]   A Linked List-Based Algorithm for Blob Detection on Embedded Vision-Based Sensors [J].
Acevedo-Avila, Ricardo ;
Gonzalez-Mendoza, Miguel ;
Garcia-Garcia, Andres .
SENSORS, 2016, 16 (06)
[27]   A list-based virtual machine for COBOL [J].
Tamm, B ;
Taveter, K .
SOFTWARE-PRACTICE & EXPERIENCE, 1996, 26 (12) :1347-1371
[28]   Refinement verification of the lazy caching algorithm [J].
Hesselink, Wim H. .
ACTA INFORMATICA, 2006, 43 (03) :195-222
[29]   Refinement verification of the lazy caching algorithm [J].
Wim H. Hesselink .
Acta Informatica, 2006, 43 :195-222
[30]   Lazy Sequentialization for the Safety Verification of Unbounded Concurrent Programs [J].
Nguyen, Truc L. ;
Fischer, Bernd ;
La Torre, Salvatore ;
Parlato, Gennaro .
AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, ATVA 2016, 2016, 9938 :174-191