Specification Enforcing Refinement for Convertibility Verification

P. Roop, A. Girault, R. Sinha, Gregor Gössler
{"title":"Specification Enforcing Refinement for Convertibility Verification","authors":"P. Roop, A. Girault, R. Sinha, Gregor Gössler","doi":"10.1109/ACSD.2009.25","DOIUrl":null,"url":null,"abstract":"Protocol conversion deals with the automatic synthesis of anadditional component, often referred to as an adaptor or aconverter, to bridge mismatches between interactingcomponents, often referred to as protocols. A formalsolution, called convertibility verification, has been recentlyproposed, which produces such a converter, so that the parallelcomposition of the protocols and the converter also satisfies somedesired specification. A converter is responsible for bridgingdifferent kinds of mismatches such as control, data,and clock mismatches. Mismatches are usually removed by theconverter by disabling undesirable paths in the protocolcomposition (similar to controllers in supervisory control ofDiscrete Event Systems (DES)).We generalize this convertibility verification problem by using anew refinement called specification enforcing refinement (SER)between a protocol composition and a desired specification. Theexistence of such a refinement is shown to be a necessary andsufficient condition for the existence of a suitable converter. Wealso synthesize automatically the converter if a SER refinementrelation exists. The proposed converter is capable of the usualdisabling actions to remove undesirable paths in the protocolcomposition. In addition, the converter can perform forcing actions when disabling alone fails to find a converter to satisfythe desired specification. Forcing allows the generation of controlinputs in one protocol that are not provided by the otherprotocol. Forcing induces state-based hiding, an operationnot achievable using DES control theory.","PeriodicalId":307821,"journal":{"name":"2009 Ninth International Conference on Application of Concurrency to System Design","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Ninth International Conference on Application of Concurrency to System Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACSD.2009.25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Protocol conversion deals with the automatic synthesis of anadditional component, often referred to as an adaptor or aconverter, to bridge mismatches between interactingcomponents, often referred to as protocols. A formalsolution, called convertibility verification, has been recentlyproposed, which produces such a converter, so that the parallelcomposition of the protocols and the converter also satisfies somedesired specification. A converter is responsible for bridgingdifferent kinds of mismatches such as control, data,and clock mismatches. Mismatches are usually removed by theconverter by disabling undesirable paths in the protocolcomposition (similar to controllers in supervisory control ofDiscrete Event Systems (DES)).We generalize this convertibility verification problem by using anew refinement called specification enforcing refinement (SER)between a protocol composition and a desired specification. Theexistence of such a refinement is shown to be a necessary andsufficient condition for the existence of a suitable converter. Wealso synthesize automatically the converter if a SER refinementrelation exists. The proposed converter is capable of the usualdisabling actions to remove undesirable paths in the protocolcomposition. In addition, the converter can perform forcing actions when disabling alone fails to find a converter to satisfythe desired specification. Forcing allows the generation of controlinputs in one protocol that are not provided by the otherprotocol. Forcing induces state-based hiding, an operationnot achievable using DES control theory.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
规范强制可兑换性验证的细化
协议转换处理附加组件(通常称为适配器或转换器)的自动合成,以桥接交互组件(通常称为协议)之间的不匹配。最近提出了一种称为可转换性验证的形式解决方案,它产生了这样一个转换器,从而使协议和转换器的并行组合也满足某些期望的规范。转换器负责桥接不同类型的不匹配,如控制、数据和时钟不匹配。不匹配通常由转换器通过在协议组合中禁用不需要的路径来消除(类似于离散事件系统(DES)的监督控制中的控制器)。我们通过在协议组合和期望的规范之间使用称为规范强制改进(SER)的新改进来推广这种可转换性验证问题。这种细化的存在是合适转炉存在的充分必要条件。如果存在SER细化关系,我们也会自动合成转换器。建议的转换器能够执行通常的禁用操作来删除协议组合中不需要的路径。此外,当单独禁用无法找到满足所需规格的转换器时,转换器可以执行强制操作。强制允许在一个协议中生成另一个协议不提供的控件。强迫诱导基于状态的隐藏,这是使用DES控制理论无法实现的操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Examining Important Corner Cases: Verification of Interacting Architectural Components in System Designs Teak: A Token-Flow Implementation for the Balsa Language From Concurrent Multi-clock Programs to Deterministic Asynchronous Implementations Checking pi-Calculus Structural Congruence is Graph Isomorphism Complete Scheduling Synchronous Elastic Designs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1