Thoughtful brute-force attack of the RERS 2012 and 2013 Challenges

Jan Cornelis van de Pol, T.C. Ruys, Steven te Brinke

    Research output: Contribution to journalArticleAcademicpeer-review

    10 Citations (Scopus)

    Abstract

    The Rigorous Examination of Reactive Systems (RERS) Challenges provide a forum for experimental evaluation based on specifically synthesized benchmark suites. In this paper we report on our ‘brute force attack’ of the RERS 2012 and 2013 Challenges. We connected the RERS problems to two state-of-the-art explicit-state model checkers: LTSMIN and SPIN. Apart from an effective compression of the state vector, we did not analyse the source code of the problems. Our brute force approach was successful: it won both editions of the RERS Challenge.
    Original languageUndefined
    Pages (from-to)481-491
    Number of pages10
    JournalInternational journal on software tools for technology transfer
    Volume16
    Issue number5
    DOIs
    Publication statusPublished - Oct 2014

    Keywords

    • IR-93301
    • EWI-24922
    • METIS-309563

    Cite this