remmex
------

Copyright (C) 2010-2013 Université de Liège

This package contains a model-checking tool for safety-property verification of programs executed on processors implementing the TSO or PSO memory model.

For more information, see http://www.montefiore.ulg.ac.be/~linden

The package uses the brics automaton package of Anders Moeller (amoeller@cs.au.dk), see http://www.brics.dk/automaton/ for more information.

Contents:
remmex-jar     -> jar (contains a jar, examples, test cases for these examples as well as a script launching all test cases)

--------------
IMPORTANT NOTE
--------------
The tool has exclusively been tested on Linux. It "should" also execute correctly on other systems, but without guarantee. For the output printing, make sure that the tool "dot" is executable in the current location.


--------------
IMPORTANT NOTE
--------------
All variables are handled internally as an array, even if it is not an array. Internally, all arrays are flattened. Two remarks on the output printing:
1. The printed control graphs of the processes omit all index accessors to a variable (if array or not).
2. The printed state spaces writes the index of the internal representation of each access to a variable. For example, the store operation to the variable x[1][1] of the array x[5][5] writing the value "0" has the label "store(x(6),0)".


Alexander Linden
linden@montefiore.ulg.ac.be
