07.01.2013 Views

Lecture Notes in Computer Science 3472

Lecture Notes in Computer Science 3472

Lecture Notes in Computer Science 3472

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

98 Angelo Gargant<strong>in</strong>i<br />

A complete formal proof of correctness for the Wp method is given <strong>in</strong> the<br />

paper that <strong>in</strong>troduced the Wp method [FvBK + 91].<br />

Example. The mach<strong>in</strong>e <strong>in</strong> Fig. 4.1 has the follow<strong>in</strong>g state cover set Q = {ε, b,<br />

bb}.<br />

Dur<strong>in</strong>g the first phase we generate the follow<strong>in</strong>g test sequences:<br />

state to test 1 2 3<br />

Q ε b bb<br />

r.Q.W ra rb rba rbb rbba rbbb<br />

output 0 1 11 11 110 110<br />

Dur<strong>in</strong>g the second phase, we first compute the identification sets.<br />

W1 = {a,b} all the sequences <strong>in</strong> W are needed to identify s1<br />

W2 = {a} dist<strong>in</strong>guishes the state s2 from all other states<br />

W3 = {b} dist<strong>in</strong>guishes the state s3 from all other states<br />

R = P − Q ={ a, ba, bba, bbb}<br />

R a ba bba bbb<br />

start state 1 2 3 1 1<br />

r.R.Wi raa rab rbaa rbbab rbbba rbbbb<br />

output 00 01 111 1100 1100 1101<br />

end state 1 2 2 1 1 2<br />

The total length of the check<strong>in</strong>g sequence is 44 (note that Wp method yields<br />

a smaller test suite than the W method).<br />

The output fault <strong>in</strong> mach<strong>in</strong>e MI 1 of Figure 4.2 is detected dur<strong>in</strong>g the first<br />

phase aga<strong>in</strong> by the <strong>in</strong>put sequence rbbb. Some transfer faults <strong>in</strong> mach<strong>in</strong>e MI 2 are<br />

detected dur<strong>in</strong>g the first phase, while others, like the transfer fault from state s3<br />

with <strong>in</strong>put a is detected only by the <strong>in</strong>put sequences rbbab dur<strong>in</strong>g phase 2.<br />

4.4.3 UIO Methods<br />

If a Wi set conta<strong>in</strong>s only one sequence, this sequence is called state signature<br />

[YL91] or unique <strong>in</strong>put/output (UIO) sequence [SD88] , that is unique for the<br />

state si. UIO sequences are extensively studied <strong>in</strong> Chapter 3 for state verification.<br />

Remember that apply<strong>in</strong>g a UIO sequence we can dist<strong>in</strong>guish state si from any<br />

other state, because the output produced apply<strong>in</strong>g a UIO sequence is specific<br />

to si. In this way a UIO sequence can determ<strong>in</strong>e the state of a mach<strong>in</strong>e before<br />

its application. A UIO sequence has the opposite role of a hom<strong>in</strong>g sequence or<br />

a synchroniz<strong>in</strong>g sequence, presented <strong>in</strong> Chapter 1: it identifies the first state <strong>in</strong><br />

the sequence <strong>in</strong>stead of the last one. Note that not every state of a FSM has<br />

UIOs and algorithms to check if a state has a UIO sequence and to derive UIOs<br />

provided that they exist, can be found <strong>in</strong> Chapter 3. If an UIO sequence exists<br />

for every state si, then UIOs can be used to identify each state <strong>in</strong> the mach<strong>in</strong>e; <strong>in</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!