研究者業績

山本 光晴

ヤマモト ミツハル  (Mitsuharu Yamamoto)

基本情報

所属
千葉大学 大学院理学研究院数学・情報数理学研究部門情報数理講座 教授
学位
博士(理学)(東京大学)

J-GLOBAL ID
200901038903211330
researchmap会員ID
1000222032

論文

 55
  • Cyrille Artho, Kazuaki Banzai, Quentin Gros, Guillaume Rousset, Lei Ma, Takashi Kitamura, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto
    Software Testing, Verification and Reliability 30(7-8) 2020年11月  査読有り
  • Cyrille Artho, Quentin Gros, Guillaume Rousset, Kazuaki Banzai, Lei Ma, Takashi Kitamura, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto
    2017 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST) 288-298 2017年  査読有り
    Apache ZooKeeper is a distributed data storage that is highly concurrent and asynchronous due to network communication; testing such a system is very challenging. Our solution using the tool "Modbat" generates test cases for concurrent client sessions, and processes results from synchronous and asynchronous callbacks. We use an embedded model checker to compute the test oracle for non-deterministic outcomes; the oracle model evolves dynamically with each new test step. Our work has detected multiple previously unknown defects in ZooKeeper. Finally, a thorough coverage evaluation of the core classes show how code and branch coverage strongly relate to feature coverage in the model, and hence modeling effort.
  • Mitsuharu Yamamoto, Shogo Sekine, Saki Matsumoto
    PROCEEDINGS OF THE 6TH ACM SIGPLAN CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS, CPP'17 66-78 2017年  査読有り
    Karp-Miller tree construction on Petri nets is a classical well-known algorithm to construct the minimal coverability set via forward analysis. It enables us to construct decision procedures for several problems such as coverability and (place) boundedness. This paper formalizes Karp-Miller tree construction on Petri nets, and its correctness with respect to coverability using COQ and Ss REFLECT. Instead of showing soundness and completeness for trees directly, we prove these properties for transition systems derived from Petri nets, and then relate them with trees so we can make use of well-established libraries and also avoid making proofs complicated. Termination of the tree construction is guaranteed by defining it as a COQ function with a well-foundedness proof. Although the termination proof for Karp-Miller tree is usually made with classical reasoning, we avoided it so the whole formalization can be done in an axiom-free way with respect the default COQ theory. This work will provide us with a basis for further formalization of several optimized algorithms, some of which are known to be error prone, and also a template for Karp-Miller style algorithms on extended variants of Petri nets.
  • Alexander Kohan, Mitsuharu Yamamoto, Cyrille Artho
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) 7(2) 98-104 2016年  査読有り
    Many text mining tools cannot be applied directly to documents available on web pages. There are tools for fetching and preprocessing of textual data, but combining them in one working tool chain can be time consuming. The preprocessing task is even more labor-intensive if documents are located on multiple remote sources with different storage formats. In this paper we propose the simplification of data preparation process for cases when data come from wide range of web resources. We developed an open-sourced tool, called Kayur, that greatly minimizes time and effort required for routine data preprocessing steps, allowing to quickly proceed to the main task of data analysis. The datasets generated by the tool are ready to be loaded into a data mining workbench, such as WEKA or Carrot2, to perform classification, feature prediction, and other data mining tasks.
  • Alexander Kohan, Mitsuharu Yamamoto, Cyrille Artho, Yoriyuki Yamagata, Lei Ma, Masami Hagiya, Yoshinori Tanabe
    ACM SIGSOFT Software Engineering Notes 41(6) 1-5 2016年  査読有り
  • Ken'ichi Kuga, Manabu Hagiwara, Mitsuharu Yamamoto
    Intelligent Computer Mathematics 9791 18-27 2016年  査読有り
    Bing's shrinking method is a key technique for constructing homeomorphisms between topological manifolds in geometric topology. Applications of this method include the generalized Schoenflies theorem, the double suspension theorem for homology spheres, and the 4-dimensional Poincare conjecture. Homeomorphisms obtained in this method are sometimes counter-intuitive and may even be pathological. This makes Bing's shrinking method a good target of formalization by proof assistants. We report our formalization of this method in Coq/Ssreflect.
  • Yoriyuki Yamagata, Cyrille Artho, Masami Hagiya, Jun Inoue, Lei Ma, Yoshinori Tanabe, Mitsuharu Yamamoto
    RUNTIME VERIFICATION, (RV 2016) 10012 386-403 2016年  査読有り
    Most existing specification languages for runtime verification describe the properties of the entire system in a top-down manner, and lack constructs to describe concurrency in the specification directly. CSPE is a runtime-monitoring framework based on Hoare's Communicating Sequential Processes (CSP) that captures concurrency in the specification directly. In this paper, we define the syntax of CSPE and its formal semantics. In comparison to quantified event automata (QEA), as an example, CSPE describes a specification for a concurrent system in a bottom-up manner, whereas QEA lends itself to a top-down manner. We also present an implementation of CSPE, which supports full CSPE without optimization. When comparing its performance to that of QEA, our implementation of CSPE requires slightly more than twice the time required by QEA; we consider this overhead to be acceptable. Finally, we introduce a tool named stracematch, which is developed using CSPE. It monitors system calls in (Mac) OS X and verifies the usage of file descriptors by a monitored process.
  • Alexander Kohan, Mitsuharu Yamamoto, Cyrille Artho
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) 98-104 2016年  査読有り
    Many text mining tools cannot be applied directly to documents available on web pages. There are tools for fetching and preprocessing of textual data, but combining them in one working tool chain can be time consuming. The preprocessing task is even more labor-intensive if documents are located on multiple remote sources with different storage formats. In this paper we propose the simplification of data preparation process for cases when data come from wide range of web resources. We developed an open-sourced tool, called Kayur, that greatly minimizes time and effort required for routine data preprocessing steps, allowing to quickly proceed to the main task of data analysis. The datasets generated by the tool are ready to be loaded into a data mining workbench, such as WEKA or Carrot2, to perform classification, feature prediction, and other data mining tasks.
  • Lei Ma, Cyrille Artho, Cheng Zhang, Hiroyuki Sato, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto
    2015 IEEE/ACM 8TH INTERNATIONAL WORKSHOP ON SEARCH-BASED SOFTWARE TESTING (SBST) 48-51 2015年  査読有り
    GRT (Guided Random Testing) is an automatic test generation tool for Java code, which leverages static and dynamic program analysis to guide run-time test generation. In this paper, we summarize competition results and experiences of GRT in participating in SBST 2015, where GRT ranked first with a score of 203.73 points over 63 Java classes from 10 packages of 9 open-source software projects.
  • Nazim Sebih, Masami Hagiya, Franz Weitl, Mitsuharu Yamamoto, Cyrille Artho, Yoshinori Tanabe
    International Journal of Networking and Computing 5(2) 373-402 2015年  査読有り
  • Franz Weitl, Nazim Sebih, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Yoriyuki Yamagata, Mitsuharu Yamamoto
    DEPENDABLE SOFTWARE ENGINEERING: THEORIES, TOOLS, AND APPLICATIONS, SETTA 2015 9409 120-134 2015年  査読有り
    This paper examines the cost of testing network applications using the User Datagram Protocol (UDP). Such applications must deal with packet loss, duplication, and reordering. Ideally, a UDP application should be tested against all possible outcomes of unreliable UDP transmissions. Their number, however, grows at least exponentially in the number of transmitted packets. To estimate the cost of the exhaustive testing of UDP applications, we determine the number of UDP transmission outcomes analytically. Based on this combinatorial analysis, we derive a sound, complete, and optimal algorithm for generating outcomes of unreliable UDP transmissions. The algorithm is implemented in the net-iocache extension of the software model checker Java Pathfinder (JPF). Experimental results confirm the consistency of the implementation with the analytical results. In addition, we found that JPF's state matching reduces the explored state space significantly and ensures the practicability of the approach despite of its exponential complexity.
  • Watcharin Leungwattanakit, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto, Koichi Takahashi
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 40(5) 483-501 2014年5月  査読有り
    Distributed systems are complex, being usually composed of several subsystems running in parallel. Concurrent execution and inter-process communication in these systems are prone to errors that are difficult to detect by traditional testing, which does not cover every possible program execution. Unlike testing, model checking can detect such faults in a concurrent system by exploring every possible state of the system. However, most model-checking techniques require that a system be described in a modeling language. Although this simplifies verification, faults may be introduced in the implementation. Recently, some model checkers verify program code at runtime but tend to be limited to stand-alone programs. This paper proposes cache-based model checking, which relaxes this limitation to some extent by verifying one process at a time and running other processes in another execution environment. This approach has been implemented as an extension of Java PathFinder, a Java model checker. It is a scalable and promising technique to handle distributed systems. To support a larger class of distributed systems, a checkpointing tool is also integrated into the verification system. Experimental results on various distributed systems show the capability and scalability of cache-based model checking.
  • Cyrille Artho, Masami Hagiya, Watcharin Leungwattanakit, Eric Platon, Richard Potter, Kuniyasu Suzaki, Yoshinori Tanabe, Franz Weitl, Mitsuharu Yamamoto
    2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) 5(2) 144-150 2014年  査読有り
    The program monitoring and control mechanisms of virtualization tools are becoming increasingly standardized and advanced. Together with checkpointing, these can be used for general program analysis tools. We explore this idea with an architecture we call Checkpoint-based Fault Injection (CFI), and two concrete implementations using different existing virtualization tools: DMTCP and SBUML. The implementations show interesting trade-offs in versatility and performance as well as the generality of the architecture.
  • Nazim Sebih, Franz Weitl, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto
    2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) 96-105 2014年  査読有り
    We extend exhaustive verification of networked applications to applications using the User Datagram Protocol (UDP). UDP maximizes performance by omitting flow control and connection handling. High-performance services often offer a UDP mode in which they handle connections internally for optimal throughput. However, because UDP is unreliable (packets are subject to loss, duplication, and reordering), verification of UDP-based applications becomes an issue. Even though unreliable behavior occurs only rarely during testing, it often appears in a production environment due to a larger number of concurrent network accesses. Our tool systematically tests UDP-based applications by producing packet loss, duplication, and reordering for each packet. It is built on top of net-iocache for the Java PathFinder model checker. We have evaluated the performance of our tool in a multi-threaded client/server application and detected incorrectly handled packet duplicates in a file transfer client.
  • Cyrille Artho, Masami Hagiya, Watcharin Leungwattanakit, Eric Platon, Richard Potter, Kuniyasu Suzaki, Yoshinori Tanabe, Franz Weitl, Mitsuharu Yamamoto
    2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) 144-150 2014年  査読有り
    The program monitoring and control mechanisms of virtualization tools are becoming increasingly standardized and advanced. Together with checkpointing, these can be used for general program analysis tools. We explore this idea with an architecture we call Checkpoint-based Fault Injection (CFI), and two concrete implementations using different existing virtualization tools: DMTCP and SBUML. The implementations show interesting trade-offs in versatility and performance as well as the generality of the architecture.
  • 小尾 良介, 萩原 学, 山本 光晴
    第37回情報理論とその応用シンポジウム 494-499 2014年  
  • Cyrille Artho, Masami Hagiya, Richard Potter, Yoshinori Tanabe, Franz Weitl, Mitsuharu Yamamoto
    2013 28th IEEE/ACM International Conference on Automated Software Engineering, ASE 2013 - Proceedings 169-179 2013年  査読有り
    Many modern software systems are implemented as client/server architectures, where a server handles multiple clients concurrently. Testing does not cover the outcomes of all possible thread and communication schedules reliably. Software model checking, on the other hand, covers all possible outcomes but is often limited to subsets of commonly used protocols and libraries. Earlier work in cache-based software model checking handles implementations using socket-based TCP/IP networking, with one thread per client connection using blocking input/output. Recently, servers using non-blocking, selector-based input/output have become prevalent. This paper describes our work extending the Java PathFinder extension net-iocache to such software, and the application of our tool to modern server software. © 2013 IEEE.
  • Cyrille Valentin Artho, Armin Biere, Masami Hagiya, Eric Platon, Martina Seidl, Yoshinori Tanabe, Mitsuharu Yamamoto
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8244 112-128 2013年  査読有り
    Model-based testing derives test executions from an abstract model that describes the system behavior. However, existing approaches are not tailored to event-driven or input/output-driven systems. In particular, there is a need to support non-blocking I/O operations, or operations throwing exceptions when communication is disrupted. Our new tool "Modbat" is specialized for testing systems where these issues are common. Modbat uses extended finite-state machines to model system behavior. Unlike most existing tools, Modbat offers a domain-specific language that supports state machines and exceptions as first-class constructs. Our model notation also handles non-determinism in the system under test, and supports alternative continuations of test cases depending on the outcome of non-deterministic operations. These features allow us to model a number of interesting libraries succinctly. Our experiments show the flexibility of Modbat and how language support for model features benefits their correct use. © 2013 Springer International Publishing Switzerland.
  • 須田 啓司, 山本 光晴
    日本ソフトウェア科学会第29回大会 萌芽セッション 2012年  
  • Watcharin Leungwattanakit, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto
    2011 26th IEEE/ACM International Conference on Automated Software Engineering, ASE 2011, Proceedings 103-112 2011年  査読有り
    Verification of distributed software systems by model checking is not a straightforward task due to inter-process communication. Many software model checkers only explore the state space of a single multi-threaded process. Recent work proposes a technique that applies a cache to capture communication between the main process and its peers, and allows the model checker to complete state-space exploration. Although previous work handles non-deterministic output in the main process, any peer program is required to produce deterministic output. This paper introduces a process checkpointing tool. The combination of caching and process checkpointing makes it possible to handle non-determinism on both sides of communication. Peer states are saved as checkpoints and restored when the model checker backtracks and produces a request not available in the cache. We also introduce the concept of strategies to control the creation of checkpoints and the overhead caused by the checkpointing tool. © 2011 IEEE.
  • 斎藤 綱四朗, 山本 光晴
    日本ソフトウェア科学会第27回大会 学生セッション 2010年  
  • Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe, Eric Platon, Mitsuharu Yamamoto
    The Workshop on Dependability of Network Software Applications 2010年  
  • Cyrille Artho, Masami Hagiya, Watcharin Leungwattanakit, Yoshinori Tanabe, Mitsuharu Yamamoto
    DISTRIBUTED, PARALLEL AND BIOLOGICALLY INSPIRED SYSTEMS 329 90-+ 2010年  査読有り
    Concurrent software is difficult to verify. Because the thread schedule is not controlled by the application, testing may miss defects that occur under specific thread schedules. This problem gave rise to software model checking, where the outcome of all possible thread schedules is analyzed. Among existing software model checkers for multi-threaded programs, Java Path Finder for Java bytecode is probably the most flexible one. We argue that compared to C programs, the virtual machine architecture of Java, combined with the absence of direct low-level memory access, lends itself to software model checking using a virtual machine approach. C model checkers, on the other hand, often use a stateless approach, where it is harder to avoid redundancy in the analysis. Because of this, we found it beneficial to prototype a concurrent algorithm in Java, and use the richer feature set of a Java model checker, before moving our implementation to C. As the thread models are nearly identical, such a transition does not incur high development cost. Our case studies confirm the potential of our approach.
  • Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto
    2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS 447-458 2009年  査読有り
    Many applications are concurrent and communicate over a network. The non-determinism in the thread and communication schedules makes it desirable to model check such systems. However, a simple state space exploration scheme is not applicable, as backtracking results in repeated communication operations. A cache-based approach solves this problem by hiding redundant communication operations from the environment. In this work, we propose a change from a linear-time to a branching-time cache, allowing us to relax restrictions in previous work regarding communication traces that differ between schedules. We successfully applied the new algorithm to real-life programs where a previous solution is not applicable.
  • Watcharin Leungwattanakit, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto
    2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME 409-+ 2009年  査読有り
    Model checking finds failures in software by exploring every possible execution schedule. Until recently it has been mainly applied to stand-alone applications. This paper presents the I/O-cache, an extension for a Java model checker to support networked programs. It contains a cache module, which captures data streams between a target process and its peer processes. This demonstration also shows how we found a defect in a WebDAV client with a model checker and our extension.
  • Watcharin Leungwattanakit, Cyrille Artho, Masami Hagiya, Yoshinori Tanabe, Mitsuharu Yamamoto
    First NASA Formal Methods Symposium 106-110 2009年  査読有り
  • Mitsuharu Yamamoto, Yoshinori Tanabe, Koichi Takahashi, Masami Hagiya
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS 4171 518-+ 2008年  
  • 田辺 良則, 高橋 孝一, 山本 光晴, 佐藤 貴洋, 萩谷 昌己
    コンピュータソフトウェア 22(3) 154-166 2005年7月  査読有り
  • Y Tanabe, K Takahashi, M Yamamoto, A Tozawa, M Hagiya
    AUTOMATED REASONING WITH ANALYTIC TABLEAUX AND RELATED METHODS 3702 277-291 2005年  査読有り
    The satisfiability checking problem is known to be decidable for a variety of modal/temporal logics such as the modal mu-calculus, but effective implementation has not necessarily been developed for all such logics. In this paper, we propose a decision procedure using the tableau method for the alternation-free two-way modal mu-calculus. Although the size of the tableau set maintained in the method might be large for complex formulas, the set and the operations on it can be expressed using BDD and therefore we can implement the method in an effective way.
  • 山本 光晴, 萩谷昌己
    日本ソフトウェア科学会第22回大会講演論文集 2005年  
  • 中川 孔人, ポッター リチャード, 山本 光晴, 萩谷 昌己, 加藤 和彦
    第2回ディペンダブルソフトウェアワークショップDSW2005論文集 13-21 2005年  
  • Yoshihito Nakagawa, Richard Potter, Mitsuharu Yamamoto, Masami Hagiya, Kazuhiko Kato
    Workshop on Dependable Software - Tools and Methods - 215-220 2005年  査読有り
  • 田辺 良則, 高橋 孝一, 山本 光晴, 佐藤 貴洋, 戸沢 晶彦, 萩谷 昌己
    第7回プログラミングおよびプログラミング言語ワークショップ(PPL2005)講演論文集 5-16 2005年  査読有り
  • Yoshinori Tanabe, Koichi Takahashi, Mitsuharu Yamamoto, Takahiro Sato, Masami Hagiya
    Computer Software 22(3) 154-166 2005年  査読有り
    Deciding satisfiability plays an important role in abstraction methods used for formal verification such as model checking. In their previous work, the authors developed a decision procedure for judging satisfiability of two-way CTL formulas and applied it to the analysis of concurrent systems such as cellular automata. In this paper we provide its correctness proof and report its efficient implementation, which achieves performance sufficient for practical application owing to the use of BDD, while naive implementations would require large space and time. © 2005, Japan Society for Software Science and Technology. All rights reserved.
  • O Sato, R Potter, M Yamamoto, M Hagiya
    SOFTWARE SECURITY - THEORIES AND SYSTEMS 3233 281-295 2004年  査読有り
    We have developed SBUML (Scrapbook for UML), an extension of UML (User-Mode Linux), by adding checkpointing functionality to UML. In this paper, we first describe the design and implementation of SBUML, and then propose a new snapshot programming environment, which is realized by the SBUML programming interfaces. The intended applications of SBUML include intrusion detection and sandboxing for network security, and software model checking for verifying multi-threaded programs. In particular, using snapshot programming, one can enumerate state spaces of programs actually running under Linux.
  • 山本 光晴, 萩谷 昌己
    日本ソフトウェア科学会第21回大会講演論文集 21 60-60 2004年  
    我々は従来研究において、時相論理による抽象化を用いて1次元セル・オートマトンの解析を行う方法を提案した。抽象化においては、逆様相を持つ時相論理である2方向計算木論理と、その充足可能性判定が重要な役割を果たしている。本発表では、この手法を2次元以上のセル・オートマトンの解析に拡張するため、格子状の様相を持つ時相論理による抽象化を導入し、その充足可能性判定について述べる。本手法で導入する充足可能性判定においては、格子状の様相が持つ合流的性質と、実際の問題に典型的に現れるセルの属性の繰り返し構造を表現するために、Presburger式を利用する。
  • M Hagiya, K Takahashi, M Yamamoto, T Sato
    FUNCTIONAL AND LOGIC PROGRAMMING 2998 7-21 2004年  招待有り
    We have been studying abstractions of linked structures, in which cells are connected by pointers, using temporal logic. This paper presents some our results for these abstractions. The system to be verified is a transition system on a graph. The shape of the graph does not change as a result of the transition, but the label assigned to each cell (node) changes according to rewrite rules. The labels of cells are changed synchronously or asynchronously. We abstract such systems using abstract cells and abstract graphs. Abstract cells are characterized by a set of temporal formulas, and different abstractions can be tried by changing the set of formulas. Some examples of analysis are also described.
  • 萩谷 昌己, 高橋 孝一, 山本 光晴, 佐藤 貴洋
    日本ソフトウェア科学会第20回大会講演論文集 2003年  
  • Mitsuharu Yamamoto, Jean-Marie Cottin, Masami Hagiya
    Formal Techniques in Real-Time and Fault Tolerant Systems LNCS 2469 165-183 2002年9月  査読有り
  • 山本 光晴, ジャン-マリ コタン, 萩谷 昌己
    第38回 情報処理学会 プログラミング研究会 2002年  
  • Masami Hagiya, Mitsuharu Yamamoto, Jean-Marie Cottin
    Rewriting in Proof and Computation, International Workshop 34-41 2001年  
  • 萩谷 昌己, 山本 光晴, ジャン-マリ コタン
    日本ソフトウェア科学会第18回大会講演論文集 2001年  
  • 山本 光晴, 萩谷 昌己
    日本ソフトウェア科学会第18回大会講演論文集 2001年  
  • 山本 光晴, 高橋 孝一, 萩谷 昌己, 西崎 真也, 玉井 哲雄
    コンピュータソフトウェア別冊, ソフトウェア発展 18 92-108 2001年  査読有り
  • Mitsuharu Yamamoto, Koichi Takahashi, Masami Hagiya, Shin-Ya Nishizaki, Tetsuo Tamai
    Computer Software 18 92-108 2000年  
  • Mitsuharu Yamamoto, Masami Hagiya
    International Workshop on Principles of Software Evolution 17-21 1999年  査読有り
  • 山本 光晴, 高橋 孝一, 萩谷 昌己
    日本ソフトウェア科学会第16回大会論文集 337-344 1999年  
  • 山本 光晴, 萩谷 昌己
    日本ソフトウェア科学会第15回大会論文集 405-408 1998年  
  • M Yamamoto, K Takahashi, M Hagiya, S Nishizaki, T Tamai
    THEOREM PROVING IN HIGHER ORDER LOGICS 1479 479-496 1998年  査読有り
    This paper describes a formalization of a class of fixed-point problems on graphs and its applications. This class captures several well known graph theoretical problems such as those of shortest path type and for data flow analysis. An abstract solution algorithm of the fixed-point problem is formalized and its correctness is proved using a theorem proving system. Moreover, the validity of the A* algorithm, considered as a specialized version of the abstract algorithm, is proved by extending the proof of the latter. The insights we obtained through these formalizations are described. We also discuss the extension of this approach to the verification of model checking algorithms.
  • 萩谷 昌己, 山本 光晴, 高橋 孝一, 西崎 真也, 玉井 哲雄
    日本ソフトウェア科学会第14回大会論文集 593-596 1997年  

MISC

 1

書籍等出版物

 1
  • 萩谷 昌己, 山本 光晴 (担当:共著, 範囲:全6章のうち、第2章・第6章の全てと、第4章の一部を担当)
    共立出版 2009年 (ISBN: 9784320121829)

講演・口頭発表等

 12

Works(作品等)

 3

共同研究・競争的資金等の研究課題

 19