Abstract
taDOM* protocols are designed to provide lock-based approach to handle multiple access to XML databases. The notion of taDOM+ protocol is formalized and generalized and a formal model of taDOM+ lock manager that is parameterized in the number of transactions and in the size of database is represented. An important class of safety properties of taDOM+ lock managers were proven to be checked by examining just a small number of finite-state instances of the parameterized model. Our results were applied to prove a generalized mutual exclusion property, known as repeatable-read, of taDOM2+ and taDOM3+ lock managers by model-checking.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alpern, B., Schneider, F.B.: Defining Liveness. Inf. Process. Lett. 21, 181–185 (1985)
Apt, K.R., Kozen, D.C.: Limits for automatic verification of finite-state concurrent systems. Inform. Process. Lett. 22, 307–309 (1986)
Attie, P.C., Emerson, E.A.: Synthesis of concurrent systems with many similar processes. ACM T. Progr. Lang. Sys., 51–115 (1998)
Clarke, E.M., Enders, R., Filkorn, T., Jha, S.: Exploiting symmetry in temporal logic model checking. Form. Method. Syst. Des. 9, 77–104 (1996)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2001)
Creese, S.J.: Data Independent Induction: CSP Model Checking of Arbitrary Sized Networks. Ph.D. thesis, Oxford University (2001)
Emerson, E.A., Kahlon, V.: Reducing model checking of the many to the few. In: McAllester, D. (ed.) Automated Deduction - CADE-17. LNCS, vol. 1831, pp. 236–254. Springer, Heidelberg (2000)
Emerson, E. A., Kahlon, V.: Model checking guarded protocols. In: Proc. LICS 2003, Ottawa, pp. 361–370 (2003)
Emerson, E.A., Kahlon, V.: Exact and efficient verification of parameterized cache coherence protocols. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 247–262. Springer, Heidelberg (2003)
Emerson, E.A., Kahlon, V.: Parameterized model checking of ring-based message passing systems. In: Marcinkowski, J., Tarlecki, A. (eds.) CSL 2004. LNCS, vol. 3210, pp. 325–339. Springer, Heidelberg (2004)
Emerson, E.A., Namjoshi, K.S.: Reasoning about rings. In: Proc. POPL 1995, San Francisco, pp. 85–94 (1995)
Emerson, E.A., Sistla, A.P.: Symmetry and model checking. Form. Method. Syst. Des. 9, 105–131 (1996)
German, S.M., Sistla, A.P.: Reasoning about systems with many processes. J. ACM 39, 675–735 (1992)
Haustein, M., Härder, T.: Optimizing concurrent XML processing. Internal report, Kaiserslautern University of Technology (2005), http://wwwlgis.informatik.uni-kl.de/archiv/wwwdvs.informatik.uni-kl.de/pubs/papers/HH05.Int-Report.pdf
Haustein, M., Härder, T.: An efficient infrastructure for native transactional XML processing. Data Knowl. Eng. 61, 500–523 (2007)
Henzinger, T.A., Qadeer, S., Rajamani, S.K.: Verifying sequential consistency on shared-memory multiprocessor systems. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol. 1633, pp. 301–315. Springer, Heidelberg (1999)
Ip, N., Dill, D.: Better verification through symmetry. Form. Method. Syst. Des. 9, 41–75 (1996)
Ip, N., Dill, D.: Verifying systems with replicated components in Murϕ. Form. Method. Syst. Des. 14, 273–310 (1999)
Kurshan, R.P., McMillan, K.: A structural induction theorem for processes. Inf. Comp. 117, 1–11 (1995)
Lazić, R.S.: A Semantic Study of Data Independence with Applications to Model Checking. Ph.D. thesis. Oxford University (2001)
Li, J., Suzuki, I., Yamashita, M.: A new structural induction theorem for rings of temporal Petri nets. IEEE T. Software Eng. 20, 115–126 (1994)
Lesens, D., Halbwachs, N., Raymond, P.: Automatic verification of parameterized networks of processes. Theor. Comput. Sci. 256, 113–144 (2001)
Lubachevsky, B.D.: An approach to automating the verifcation of compact parallel coordination programs I. Acta Inform. 21, 125–169 (1984)
Pyssysalo, T.: An Induction Theorem for Ring Protocols of Processes Described with Predicate/Transition Nets. Research Reports, Helsinki University of Technology A37 (1996)
Ramakrishnan, R., Gehrke, J.: Database Management Systems, 3rd edn. McGraw Hill, New York (2002)
Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice Hall, Englewood Cliffs (1997)
World Wide Web Consortium, http://www.w3c.org/
Wolper, P., Lovinfosse, V.: Verifying properties of large sets of processes with network invariants. In: Sifakis, J. (ed.) Automatic Verification Methods for Finite State Systems. LNCS, vol. 407, pp. 68–80. Springer, Heidelberg (1990)
Appendix, http://www.tol.oulu.fi/~santti/papers/tadom_appendix.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Siirtola, A., Valenta, M. (2008). Verifying Parameterized taDOM+ Lock Managers. In: Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds) SOFSEM 2008: Theory and Practice of Computer Science. SOFSEM 2008. Lecture Notes in Computer Science, vol 4910. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77566-9_40
Download citation
DOI: https://doi.org/10.1007/978-3-540-77566-9_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77565-2
Online ISBN: 978-3-540-77566-9
eBook Packages: Computer ScienceComputer Science (R0)