[The VFSM validator] exhaustively exercises possible execution scenarios of a … as deadlock … [It constructs] the global state graph of the network … . The VFSM validator employs the supertrace algorithm … [Holzmann, G.J., Design and Validation of Computer Protocols, 1991] … [In 1993] we validated three VFSM applications that had … applications that escaped detection during simulation and teting. … The VFSM validator has since been used by … been used on a wide scale in an … extremely compact representation of control behavior.
Google-1
Google-2
Copyright clearance needed for quotation.