2nd Exam. First Name: Second Name: Matriculation Number: Degree Programme (please mark): CS Bachelor CS Master CS Lehramt SSE Master Other:

Size: px
Start display at page:

Download "2nd Exam. First Name: Second Name: Matriculation Number: Degree Programme (please mark): CS Bachelor CS Master CS Lehramt SSE Master Other:"

Transcription

1 2 Concurrency Theory WS 2013/2014 Chair for Software Modeling and Verification Rheinisch-Westfälische Technische Hochschule Aachen Prof. Dr. Ir. Joost-Pieter Katoen apl. Prof. Dr. Thomas Noll S. Chakraorty, B. Kaminski, H. Wu Concurrency Theory WS 2013/2014 2nd Exam First Name: Second Name: Degree Programme (please mark): CS Bachelor CS Master CS Lehramt SSE Master Other: General Information: Mark every sheet with your matriculation numer. Check that your copy of the exam consists of 12 sheets (24 pages). Duration of exam: 120 minutes. No helping materials (e.g. ooks, notes, slides) are permitted. Give your solution on the respective sheet. Also use the ackside if necessary. If you need more paper, ask the assistants. Write with lue or lack ink; do not use a pencil or red ink. Make sure all electronic devices are switched off and are nowhere near you. Any attempt at deception leads to failure for this exam, even if it is detected only later. Σ Points Task 1 16 Task 2 27 Task 3 22 Task 4 21 Task 5 23 Task 6 11 Σ 120 Points otained

2 Task 1 (Modeling with Value Passing CCS) (11+5 Points) In this task, you are requested to model a technique called Triple-Modular Redundancy (TMR) with error detection for fault tolerance in distriuted systems in value-passing CCS. The overview of the system is provided in following diagram. In TMR, to increase the reliaility three copies of system (called components) are used. Three input value copies are sent to each component y using a splitter (S) respectively; the voter then accepts the results from each of the component and outputs the majority value. In our case, one component consists of a module (M i ) and a detector (D i ) (1 i 3). A functional module normally will get and pass the same value to D i (via mo i ) as from what it gets, ut if a fault occurs, differing values will e passed. The detector will first record the value and pass the value to voter (via do i ), then later compare this value with the feedack value from the voter (via vo i ) to determine a fault situation. Here, we assume the set V al of input values is given y V al = {0, 1}, and only one of the three modular can e faulty and the splitter, voter and detectors work always errorless. Additional information: In the diagram, the action name in ( ) means it is an internal synchronization action, otherwise it is a external action. M1 (mi1) fault1 detect1 (do1) (vo1) in M2 D2 V out S (mi3) (mi2) (vo2) fault2 detect2 (do3) (vo3) (mo3) M3 (mo1) (mo2) D1 D3 (do2) fault3 detect3 (a) Model this system using value-passing CCS! You should reuse the component definition (with index) when it is possile. 2

3 3

4 () Now we add a new operator called hide with respect to an action set H in CCS language, which is defined y following SOS rule: a (hide P P 1 ) (a H H) hide H P a hide H P a (hide P P 2 ) (a H H) hide H P τ hide H P Informally speaking, this operator can turn all the actions in H into τ. Let Cycler 1 = fault 1.detect 1.Cycler 1 and let T MR e your modelled system. Argue why your system satisfies the verification condition that hide {in, out, fault 2, detect 2, fault 3, detect 3 } T MR Cycler 1 which states that if a fault occurs in M 1, D 1 should always detect this fault. 4

5 5

6 Task 2 (Laeled Transition Systems) ( Points) (a) Consider the following CCS process definition: A = ( (B C) + D ) \ {com} B = a.com.b +.nil C = D + E D = com.d E =.C Derive all legal outgoing transitions A α A y giving their derivation tree! (act) a.com.b a com.b a (sum1) a.com.b +.nil com.b (call) B a com.b (par1) B C a com.b C (sum1) (B C) + D a com.b C ( ) a (res) (B C) + D \ {com} (com C) \ {com} (call) A a (com.b C) \ {com} (act).nil nil (sum2) a.com.b +.nil com.b (call) B com.b (par1) B C com.b C (sum1) (B C) + D com.b C ( ) (res) (B C) + D \ {com} (com C) \ {com} (call) A (com.b C) \ {com} (act).c C (call) E C (sum2) D + E C (call) C C (par2) B C B C (sum1) (B C) + D B C ( ) (res) (B C) + D \ {com} (B C) \ {com} (call) A (B C) \ {com} 6

7 7

8 () Reconsider the CCS process definition from Task 2 (a): A = ( (B C) + D ) \ {com} B = a.com.b +.nil C = D + E D = com.d E =.C Draw LTS(A) and lael the nodes with the corresponding CCS processes! A a a (com.b C) \ {com} (B C) \ {com} (nil C) \ {com} τ (B D) \ {com} (nil D) \ {com} a τ (com.b D) \ {com} 8

9 (c) Give the trace language Tr ( (B D) \ {com} ) of process (B D) \ {com}! Pref ( (aτ) ) = ( a(τa) + (aτ) ( + ε) ) 9

10 Task 3 (HML and Bisimulation) (15+7 Points) Given are the following three CCS processes: A =.B + a.c + a.d.c D = a.d.e + a.f +.G + a.i J = a.l +.K + a.m B = a.a + a.d.c E =.H + c.d.e K = a.o + a.n C =.A + c.d.c F =.D + c.d.f L = d.m G = a.d.e + a.h H =.G + a.d.f + a.e I = c.d.e +.D M =.J + c.n N = d.m O = a.l + a.m (a) Draw the LTSs for A, D, and J respectively. Prove or disprove A D, A J and D J. For proving or disproving that two processes are strongly isimilar, you can use the game characterization of isimilarity. For disproving you may provide an HML formula which is satisfied y one process ut not y the other. 10

11 11

12 () Express the property that actions a and occur in alternation in HML+Recursion! Note that this does not imply that a and are strictly followed y each other (i.e. etween any two occurrences of a a occurs and vice versa, ut etween an a and a the other symols c and d may occur). Check whether process A satisfies the property or not! 12

13 13

14 Task 4 (Preservation of Strong Bisimilarity) (6+15 Points) (a) Let synhide L ( ), where L is a set of actions, e a unary CCS operator with the following semantics: (synhide) P α P β L: P β.p synhide L (P ) α synhide L (P ) Prove or disprove: synhide L ( ) preserves strong isimilarity, i.e. for any two strongly isimilar processes S T it holds that synhide L (S) synhide L (T ). synhide L ( ) does not preserve strong isimilarity. For that, consider the two (clearly isimilar) processes nil.nil and.nil. Applying synhide {} ( ) to oth processes yields on one hand the process synhide {} (nil.nil) which can make a transition to synhide {} (nil nil) and on the other hand the process synhide {} (.nil) which cannot mimic this transition. Hence the two processes synhide {} (nil.nil) and synhide {} (.nil) are not isimilar and thus synhide L ( ) does not preserve isimilarity. 14

15 15

16 () Let e a inary CCS operator with the following semantics: (dag1) P (dag2) P α Q α Q P Q α Q α P Q α P Q α P (dag3) P α P Q α Q P Q α P Q Prove or disprove: preserves strong isimilarity, i.e. for any two strongly isimilar processes S T and any other process R it holds that S R is strongly isimilar to T R (and you may omit in your proof the analogous case for R S is strongly isimilar to R T ). Let S T e two strongly isimilar processes. We define a new relation B = { (U R, V R) R Prc, S T } and prove that B is a strong isimulation on S R and T R for any process R: = S T [ ] S α S = T : T α T S T [ ] T α T = S : S α S S T (Def.) α Case 1: R : = = [ S R [ T R [ S R [ T R = S R B T R α Case 2: R R : [ = S R = [ S R [ T R [ T R = S R B T R ] α S = T : T R α T S T ] α T = S : S R α S S T ] α S = T : T R α T S B T ] α T = S : S R α S S B T ] α S R = T : T R α T R S T ] α T R = S : S R α S R S T ] α S = T : T R α T S R B T R ] α T = S : S R α S S R B R T (dag2 rule) ( B) (dag3 rule) (Def. B) 16

17 17

18 Task 5 (From Modified CCS to Petri Nets) (8+8+7 Points) In the lecture, we have introduce an occurrence net (Petri net) semantics for CCS processes. Now we modify the parallel composition operation to a new operator ( A ) w.r.t to an action set A. Informally speaking, this operator requests a forced synchronization on an action etween two processes if the action elongs to the set A. The formal SOS rules for this operator are as follows: (Syn) P a P Q a Q P A Q a P A Q a A a P P a A (Par 1 ) P A Q a P A Q a Q Q a A (Par 2 ) (a A) P A Q a P A Q (a) Give the occurrence net semantics for the process P! P = x.a.p + y.a.q Q = z.a.q 18

19 19

20 () Formally define the occurrence net semantics for the operator A and give the occurrence net semantics for P {a} Q ased on your definition! Note that, since the occurrence net is infinite, you should stop as soon as some part in the occurrence net repeats. 20

21 21

22 (c) Compute the McMillan prefix of the resulting occurrence net from (). 22

23 23

24 Task 6 (Petri net Acceptale Languages) (11 Points) Let Σ e a finite alphaet and let N = (P, T, F, M 0, λ) e a laelled Petri net in which all transitions in T are laelled y a laeling function λ: T Σ. Then the trace language Tr(N) of N is defined as the following set: { w = λ(a 1 ) λ(a k ) M 0 a 1 M1 a 1 a k Mk is a complete sequential run of N A language L Σ is called Petri net recognizale, if there exists a laelled Petri net N such that Tr(N) = L. Provide an exact description of the language that is recognized y the following Petri net! Your description shall not make any reference ack to the Petri net itself! }. c a a { w1 c w 2 w1, w 2 {a, }, w 1 w 2 a = w 1 w 2, w 1 a w 2, w 1 w 2 a } 24

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

Overview. 1 Lecture 1: Introduction. 2 Lecture 2: Message Sequence Charts. Joost-Pieter Katoen Theoretical Foundations of the UML 1/32

Overview. 1 Lecture 1: Introduction. 2 Lecture 2: Message Sequence Charts. Joost-Pieter Katoen Theoretical Foundations of the UML 1/32 Overview 1 Lecture 1: Introduction 2 Lecture 2: Message Sequence Charts Joost-Pieter Katoen Theoretical Foundations of the UML 1/32 Theoretical Foundations of the UML Lecture 1: Introduction Joost-Pieter

More information

Semantics and Verification

Semantics and Verification Semantics and Verification Lecture 2 informal introduction to CCS syntax of CCS semantics of CCS 1 / 12 Sequential Fragment Parallelism and Renaming CCS Basics (Sequential Fragment) Nil (or 0) process

More information

Branching Bisimilarity with Explicit Divergence

Branching Bisimilarity with Explicit Divergence Branching Bisimilarity with Explicit Divergence Ro van Glaeek National ICT Australia, Sydney, Australia School of Computer Science and Engineering, University of New South Wales, Sydney, Australia Bas

More information

Exam Theoretical Foundations of UML WS 2012/13

Exam Theoretical Foundations of UML WS 2012/13 2 Prof. Dr. Ir. Joost-Pieter Ktoen Flk Sher, Srin von Styp Exm Theoreticl Foundtions of UML WS 2012/13 First Nme: Second Nme: Mtricultion Numer: Degree Progrmme (plese mrk): CS Mster SSE Mster Other: Σ

More information

Fault Tolerance. Dealing with Faults

Fault Tolerance. Dealing with Faults Fault Tolerance Real-time computing systems must be fault-tolerant: they must be able to continue operating despite the failure of a limited subset of their hardware or software. They must also allow graceful

More information

Finite Automata and Regular Languages (part II)

Finite Automata and Regular Languages (part II) Finite Automata and Regular Languages (part II) Prof. Dan A. Simovici UMB 1 / 25 Outline 1 Nondeterministic Automata 2 / 25 Definition A nondeterministic finite automaton (ndfa) is a quintuple M = (A,

More information

Communication and Concurrency: CCS

Communication and Concurrency: CCS Communication and Concurrency: CCS R. Milner, A Calculus of Communicating Systems, 1980 cours SSDE Master 1 Why calculi? Prove properties on programs and languages Principle: tiny syntax, small semantics,

More information

Trace Refinement of π-calculus Processes

Trace Refinement of π-calculus Processes Trace Refinement of pi-calculus Processes Trace Refinement of π-calculus Processes Manuel Gieseking manuel.gieseking@informatik.uni-oldenburg.de) Correct System Design, Carl von Ossietzky University of

More information

Finding Complex Solutions of Quadratic Equations

Finding Complex Solutions of Quadratic Equations y - y - - - x x Locker LESSON.3 Finding Complex Solutions of Quadratic Equations Texas Math Standards The student is expected to: A..F Solve quadratic and square root equations. Mathematical Processes

More information

SUFFIX TREE. SYNONYMS Compact suffix trie

SUFFIX TREE. SYNONYMS Compact suffix trie SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix

More information

Automata, Logic and Games: Theory and Application

Automata, Logic and Games: Theory and Application Automata, Logic and Games: Theory and Application 2 Parity Games, Tree Automata, and S2S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong S2S 14-19 June

More information

Vertical Implementation

Vertical Implementation Information and Computation 70, 95 33 (00) doi:0.006/inco.00.967, availale online at http://www.idealirary.com on Vertical Implementation Arend Rensink Faculty of Informatics, University of Twente, Postus

More information

A Note on Scope and Infinite Behaviour in CCS-like Calculi p.1/32

A Note on Scope and Infinite Behaviour in CCS-like Calculi p.1/32 A Note on Scope and Infinite Behaviour in CCS-like Calculi GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Joint work with Pablo Giambiagi and Frank Valencia A

More information

Semantic Equivalences and the. Verification of Infinite-State Systems 1 c 2004 Richard Mayr

Semantic Equivalences and the. Verification of Infinite-State Systems 1 c 2004 Richard Mayr Semantic Equivalences and the Verification of Infinite-State Systems Richard Mayr Department of Computer Science Albert-Ludwigs-University Freiburg Germany Verification of Infinite-State Systems 1 c 2004

More information

Topics in Concurrency

Topics in Concurrency Topics in Concurrency Lecture 3 Jonathan Hayman 18 October 2016 Towards a more basic language Aim: removal of variables to reveal symmetry of input and output Transitions for value-passing carry labels

More information

Communication and Concurrency: CCS. R. Milner, A Calculus of Communicating Systems, 1980

Communication and Concurrency: CCS. R. Milner, A Calculus of Communicating Systems, 1980 Communication and Concurrency: CCS R. Milner, A Calculus of Communicating Systems, 1980 Why calculi? Prove properties on programs and languages Principle: tiny syntax, small semantics, to be handled on

More information

Structure Preserving Bisimilarity,

Structure Preserving Bisimilarity, Structure Preserving Bisimilarity, Supporting an Operational Petri Net Semantics of CCSP Rob van Glabbeek NICTA, Sydney, Australia University of New South Wales, Sydney, Australia September 2015 Milner:

More information

Combinational Techniques for Reliability Modeling

Combinational Techniques for Reliability Modeling Combinational Techniques for Reliability Modeling Prof. Naga Kandasamy, ECE Department Drexel University, Philadelphia, PA 19104. January 24, 2009 The following material is derived from these text books.

More information

Program Analysis. Lecture 5. Rayna Dimitrova WS 2016/2017

Program Analysis. Lecture 5. Rayna Dimitrova WS 2016/2017 Program Analysis Lecture 5 Rayna Dimitrova WS 2016/2017 2/21 Recap: Constant propagation analysis Goal: For each program point, determine whether a variale has a constant value whenever an execution reaches

More information

Complex Systems Design & Distributed Calculus and Coordination

Complex Systems Design & Distributed Calculus and Coordination Complex Systems Design & Distributed Calculus and Coordination Concurrency and Process Algebras: Theory and Practice Francesco Tiezzi University of Camerino francesco.tiezzi@unicam.it A.A. 2014/2015 F.

More information

A Weak Bisimulation for Weighted Automata

A Weak Bisimulation for Weighted Automata Weak Bisimulation for Weighted utomata Peter Kemper College of William and Mary Weighted utomata and Semirings here focus on commutative & idempotent semirings Weak Bisimulation Composition operators Congruence

More information

Decidable Subsets of CCS

Decidable Subsets of CCS Decidable Subsets of CCS based on the paper with the same title by Christensen, Hirshfeld and Moller from 1994 Sven Dziadek Abstract Process algebra is a very interesting framework for describing and analyzing

More information

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam Symmetry and Quantum Information Feruary 6, 018 Representation theory of S(), density operators, purification Lecture 7 Michael Walter, niversity of Amsterdam Last week, we learned the asic concepts of

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 08 - Petri nets basics 1 Object Formalization of the basic concepts of

More information

CONNECTOR ALGEBRAS FOR C/E AND P/T NETS INTERACTIONS

CONNECTOR ALGEBRAS FOR C/E AND P/T NETS INTERACTIONS Logical Methods in Computer Science Vol. 9(3:6)203, pp. 65 www.lmcs-online.org Sumitted Apr. 5, 202 Pulished Sep. 7, 203 CONNECTOR ALGEBRAS FOR C/E AND P/T NETS INTERACTIONS ROBERTO BRUNI a, HERNÁN MELGRATTI,

More information

CpE358/CS381. Switching Theory and Logical Design. Class 16

CpE358/CS381. Switching Theory and Logical Design. Class 16 CpE358/CS38 Switching Theory and Logical Design Class 6 CpE358/CS38 Summer- 24 Copyright 24-585 Today Fundamental concepts of digital systems (Mano Chapter ) inary codes, number systems, and arithmetic

More information

A Brief Introduction to Model Checking

A Brief Introduction to Model Checking A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:

More information

Building a befer mousetrap. Transi-on Graphs. L = { abba } Building a befer mousetrap. L = { abba } L = { abba } 2/16/15

Building a befer mousetrap. Transi-on Graphs. L = { abba } Building a befer mousetrap. L = { abba } L = { abba } 2/16/15 Building a efer mousetrap Let s uild an FA that only accepts the string aa from Σ = { a } Models of Computa-on Lecture #5 (a?er quiz) Chapter 6 Building a efer mousetrap Let s uild an FA that only accepts

More information

Local state refinement on Elementary Net Systems: an approach based on morphisms

Local state refinement on Elementary Net Systems: an approach based on morphisms Local state refinement on Elementary Net Systems: an approach based on morphisms Luca Bernardinello, Elisabetta Mangioni, and Lucia Pomello Dipartimento di Informatica Sistemistica e Comunicazione, Università

More information

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford Probabilistic Model Checking Michaelmas Term 2011 Dr. Dave Parker Department of Computer Science University of Oxford Overview Temporal logic Non-probabilistic temporal logic CTL Probabilistic temporal

More information

Reliable Computing I

Reliable Computing I Instructor: Mehdi Tahoori Reliable Computing I Lecture 5: Reliability Evaluation INSTITUTE OF COMPUTER ENGINEERING (ITEC) CHAIR FOR DEPENDABLE NANO COMPUTING (CDNC) National Research Center of the Helmholtz

More information

Temporal Logic. Stavros Tripakis University of California, Berkeley. We have designed a system. We want to check that it is correct.

Temporal Logic. Stavros Tripakis University of California, Berkeley. We have designed a system. We want to check that it is correct. EE 244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2016 Temporal logic Stavros Tripakis University of California, Berkeley Stavros Tripakis (UC Berkeley) EE 244, Fall 2016

More information

Final Exam /614 Bug Catching: Automated Program Verification Matt Fredrikson André Platzer. December 17, 2017

Final Exam /614 Bug Catching: Automated Program Verification Matt Fredrikson André Platzer. December 17, 2017 Final Exam 15-414/614 Bug Catching: Automated Program Verification Matt Fredrikson André Platzer December 17, 2017 Name: Andrew ID: André Platzer aplatzer Instructions This exam is closed-book with one

More information

Trustworthy, Useful Languages for. Probabilistic Modeling and Inference

Trustworthy, Useful Languages for. Probabilistic Modeling and Inference Trustworthy, Useful Languages for Probabilistic Modeling and Inference Neil Toronto Dissertation Defense Brigham Young University 2014/06/11 Master s Research: Super-Resolution Toronto et al. Super-Resolution

More information

Characterizing Fault-Tolerant Systems by Means of Simulation Relations

Characterizing Fault-Tolerant Systems by Means of Simulation Relations Characterizing Fault-Tolerant Systems by Means of Simulation Relations TECHNICAL REPORT Ramiro Demasi 1, Pablo F. Castro 2,3, Thomas S.E. Maibaum 1, and Nazareno Aguirre 2,3 1 Department of Computing and

More information

CCS: Syntax & Semantics (Final Version)

CCS: Syntax & Semantics (Final Version) CCS: & Semantics (Final Version) Prof. Susan Older 14 September 2017 (CIS 400/632) CCS & Semantics 14 September 2017 1 / 10 Relevant Syntactic Sets: A Recap from Last Time We have the following countably

More information

Plan for Today and Beginning Next week (Lexical Analysis)

Plan for Today and Beginning Next week (Lexical Analysis) Plan for Today and Beginning Next week (Lexical Analysis) Regular Expressions Finite State Machines DFAs: Deterministic Finite Automata Complications NFAs: Non Deterministic Finite State Automata From

More information

Models of Concurrency

Models of Concurrency Models of Concurrency GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Thanks to Frank Valencia Models of Concurrency p.1/57 Concurrency is Everywhere Concurrent

More information

Formal Techniques for Software Engineering: CCS: A Calculus for Communicating Systems

Formal Techniques for Software Engineering: CCS: A Calculus for Communicating Systems Formal Techniques for Software Engineering: CCS: A Calculus for Communicating Systems Rocco De Nicola IMT Institute for Advanced Studies, Lucca rocco.denicola@imtlucca.it June 2013 Lesson 10 R. De Nicola

More information

Finite-State Model Checking

Finite-State Model Checking EECS 219C: Computer-Aided Verification Intro. to Model Checking: Models and Properties Sanjit A. Seshia EECS, UC Berkeley Finite-State Model Checking G(p X q) Temporal logic q p FSM Model Checker Yes,

More information

Inequalities. Inequalities. Curriculum Ready.

Inequalities. Inequalities. Curriculum Ready. Curriculum Ready www.mathletics.com Copyright 009 3P Learning. All rights reserved. First edition printed 009 in Australia. A catalogue record for this ook is availale from 3P Learning Ltd. ISBN 978--986-60-4

More information

CSE Theory of Computing: Homework 3 Regexes and DFA/NFAs

CSE Theory of Computing: Homework 3 Regexes and DFA/NFAs CSE 34151 Theory of Computing: Homework 3 Regexes and DFA/NFAs Version 1: Fe. 6, 2018 Instructions Unless otherwise specified, all prolems from the ook are from Version 3. When a prolem in the International

More information

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Midterm Examination CLOSED BOOK

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Midterm Examination CLOSED BOOK Department of Electrical and Computer Engineering University of Wisconsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 203-204 Midterm Examination CLOSED OOK Kewal K. Saluja Date:

More information

Reversal of regular languages and state complexity

Reversal of regular languages and state complexity Reversal of regular languages and state complexity Juraj Šeej Institute of Computer Science, Faculty of Science, P. J. Šafárik University Jesenná 5, 04001 Košice, Slovakia juraj.seej@gmail.com Astract.

More information

TTA and PALS: Formally Verified Design Patterns for Distributed Cyber-Physical

TTA and PALS: Formally Verified Design Patterns for Distributed Cyber-Physical TTA and PALS: Formally Verified Design Patterns for Distributed Cyber-Physical DASC 2011, Oct/19 CoMMiCS Wilfried Steiner wilfried.steiner@tttech.com TTTech Computertechnik AG John Rushby rushby@csl.sri.com

More information

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs CS 42 Lecture 3 Automating lexical analysis 29 August 2 Lecturer: Andrew Myers A lexer generator converts a lexical specification consisting of a list of regular expressions and corresponding actions into

More information

A Simplified Approach for Testing Real-Time Systems Based on Action Refinement

A Simplified Approach for Testing Real-Time Systems Based on Action Refinement A Simplified Approach for Testing Real-Time Systems Based on Action Refinement Saddek Bensalem, Moez Krichen, Lotfi Majdoub, Riadh Robbana, Stavros Tripakis Verimag Laboratory, Centre Equation 2, avenue

More information

High Performance Computing

High Performance Computing Master Degree Program in Computer Science and Networking, 2014-15 High Performance Computing 2 nd appello February 11, 2015 Write your name, surname, student identification number (numero di matricola),

More information

Recent results on Timed Systems

Recent results on Timed Systems Recent results on Timed Systems Time Petri Nets and Timed Automata Béatrice Bérard LAMSADE Université Paris-Dauphine & CNRS berard@lamsade.dauphine.fr Based on joint work with F. Cassez, S. Haddad, D.

More information

From High-Level Component-Based Models to Distributed Implementations

From High-Level Component-Based Models to Distributed Implementations From High-Level Component-Based Models to Distributed Implementations Borzoo Bonakdarpour Marius Bozga Mohamad Jaber Jean Quilbeuf Joseph Sifakis VERIMAG, Centre Équation, 2 avenue de Vignate, 38610, Gières,

More information

M = (Q,Σ,δ,q 0,F) Σ is the alphabet over which the transitions are defined.

M = (Q,Σ,δ,q 0,F) Σ is the alphabet over which the transitions are defined. LECTURE 23 10.1 Formal Definition of a DFA Definition 10.1 A Deterministic Finite Automaton (DFA) M, is a five-tuple: where M = (Q,Σ,δ, 0,F) Q is a finite set of states. It is important that the set of

More information

Efficient Computation of Program Equivalence for Confluent Concurrent Constraint Programming

Efficient Computation of Program Equivalence for Confluent Concurrent Constraint Programming Efficient Computation of Program Equivalence for Confluent Concurrent Constraint Programming Luis F. Pino INRIA/DGA and LIX École Polytechnique 91128 Palaiseau, France luis.pino@lix.polytechnique.fr Filippo

More information

Some techniques and results in deciding bisimilarity

Some techniques and results in deciding bisimilarity Some techniques and results in deciding bisimilarity Petr Jančar Dept of Computer Science Technical University Ostrava (FEI VŠB-TU) Czech Republic www.cs.vsb.cz/jancar Talk at the Verification Seminar,

More information

Lecture 4 Event Systems

Lecture 4 Event Systems Lecture 4 Event Systems This lecture is based on work done with Mark Bickford. Marktoberdorf Summer School, 2003 Formal Methods One of the major research challenges faced by computer science is providing

More information

CS 420, Spring 2018 Homework 4 Solutions. 1. Use the Pumping Lemma to show that the following languages are not regular: (a) {0 2n 10 n n 0};

CS 420, Spring 2018 Homework 4 Solutions. 1. Use the Pumping Lemma to show that the following languages are not regular: (a) {0 2n 10 n n 0}; CS 420, Spring 2018 Homework 4 Solutions 1. Use the Pumping Lemma to show that the following languages are not regular: (a) {0 2n 10 n n 0}; Solution: Given p 1, choose s = 0 2p 10 p. Then, s is in the

More information

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models 4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe

More information

Math Analysis CP WS 4.X- Section Review A

Math Analysis CP WS 4.X- Section Review A Math Analysis CP WS 4.X- Section 4.-4.4 Review Complete each question without the use of a graphing calculator.. Compare the meaning of the words: roots, zeros and factors.. Determine whether - is a root

More information

LING/C SC/PSYC 438/538. Lecture 17 Sandiway Fong

LING/C SC/PSYC 438/538. Lecture 17 Sandiway Fong LING/C SC/PSYC 438/538 Lecture 7 Sandiway Fong Today's Topic Review of ungraded homework Closure properties of FSA Practice! Homework out on Thursday From last time Ungraded Homework 6 apply the set-of-states

More information

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Midterm Examination CLOSED BOOK

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Midterm Examination CLOSED BOOK Department of Electrical and Computer Engineering University of Wisconsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 2014-2015 Midterm Examination CLOSED BOOK Kewal K. Saluja

More information

Reliability of Technical Systems

Reliability of Technical Systems Reliability of Technical Systems Main Topics 1. Short Introduction, Reliability Parameters: Failure Rate, Failure Probability, etc. 2. Some Important Reliability Distributions 3. Component Reliability

More information

Introduction to Temporal Logic. The purpose of temporal logics is to specify properties of dynamic systems. These can be either

Introduction to Temporal Logic. The purpose of temporal logics is to specify properties of dynamic systems. These can be either Introduction to Temporal Logic The purpose of temporal logics is to specify properties of dynamic systems. These can be either Desired properites. Often liveness properties like In every infinite run action

More information

Communicating and Mobile Systems

Communicating and Mobile Systems Communicating and Mobile Systems Overview:! Programming Model! Interactive Behavior! Labeled Transition System! Bisimulation! The π-calculus! Data Structures and λ-calculus encoding in the π-calculus References:!

More information

Midterm 1. Your Exam Room: Name of Person Sitting on Your Left: Name of Person Sitting on Your Right: Name of Person Sitting in Front of You:

Midterm 1. Your Exam Room: Name of Person Sitting on Your Left: Name of Person Sitting on Your Right: Name of Person Sitting in Front of You: CS70 Discrete Mathematics and Probability Theory, Fall 2018 Midterm 1 8:00-10:00pm, 24 September Your First Name: SIGN Your Name: Your Last Name: Your Exam Room: Name of Person Sitting on Your Left: Name

More information

Model Checking I. What are LTL and CTL? dack. and. dreq. and. q0bar

Model Checking I. What are LTL and CTL? dack. and. dreq. and. q0bar Model Checking I What are LTL and CTL? q0 or and dack dreq q0bar and 1 View circuit as a transition system (dreq, q0, dack) (dreq, q0, dack ) q0 = dreq and dack = dreq & (q0 + ( q0 & dack)) q0 or and D

More information

Topics in Concurrency

Topics in Concurrency Topics in Concurrency Lecture 3 Jonathan Hayman 18 February 2015 Recap: Syntax of CCS Expressions: Arithmetic a and Boolean b Processes: p ::= nil nil process (τ p) silent/internal action (α!a p) output

More information

Dependable Computer Systems

Dependable Computer Systems Dependable Computer Systems Part 3: Fault-Tolerance and Modelling Contents Reliability: Basic Mathematical Model Example Failure Rate Functions Probabilistic Structural-Based Modeling: Part 1 Maintenance

More information

Fachgebiet Leistungselektronik und Elektrische Antriebstechnik. Test Examination: Mechatronics and Electrical Drives

Fachgebiet Leistungselektronik und Elektrische Antriebstechnik. Test Examination: Mechatronics and Electrical Drives Prof. Dr. Ing. Joachim Böcker Test Examination: Mechatronics and Electrical Drives 8.1.214 First Name: Student number: Last Name: Course of Study: Exercise: 1 2 3 Total (Points) (2) (2) (2) (6) Duration:

More information

Labeled Transition Systems

Labeled Transition Systems Labeled Transition Systems Lecture #1 of Probabilistic Models for Concurrency Joost-Pieter Katoen Lehrstuhl II: Programmiersprachen u. Softwarevalidierung E-mail: katoen@cs.rwth-aachen.de March 12, 2005

More information

10. The GNFA method is used to show that

10. The GNFA method is used to show that CSE 355 Midterm Examination 27 February 27 Last Name Sample ASU ID First Name(s) Ima Exam # Sample Regrading of Midterms If you believe that your grade has not been recorded correctly, return the entire

More information

Theoretical Foundations of the UML

Theoretical Foundations of the UML Theoretical Foundations of the UML Lecture 17+18: A Logic for MSCs Joost-Pieter Katoen Lehrstuhl für Informatik 2 Software Modeling and Verification Group moves.rwth-aachen.de/teaching/ws-1718/fuml/ 5.

More information

Distributed Timed Automata with Independently Evolving Clocks

Distributed Timed Automata with Independently Evolving Clocks Distriuted Timed Automata with Independently Evolving Clocks S. Akshay,3, Benedikt Bollig, Paul Gastin, Madhavan Mukund 2, and K. Narayan Kumar 2 LSV, ENS Cachan, CNRS, France {akshay,ollig,gastin}@lsv.ens-cachan.fr

More information

Trace- and Failure-Based Semantics for Responsiveness

Trace- and Failure-Based Semantics for Responsiveness Trace- and Failure-Based Semantics for Responsiveness Walter Vogler 1 and Christian Stahl 2 and Richard Müller 2,3 1 Institut für Informatik, Universität Augsburg, Germany vogler@informatik.uni-augsburg.de

More information

CS 121, Section 2. Week of September 16, 2013

CS 121, Section 2. Week of September 16, 2013 CS 121, Section 2 Week of September 16, 2013 1 Concept Review 1.1 Overview In the past weeks, we have examined the finite automaton, a simple computational model with limited memory. We proved that DFAs,

More information

A Compositional Approach to Bisimulation of Arenas of Finite State Machines

A Compositional Approach to Bisimulation of Arenas of Finite State Machines A Compositional Approach to Bisimulation of Arenas of Finite State Machines Giordano Pola, Maria D. Di Benedetto and Elena De Santis Department of Electrical and Information Engineering, Center of Excellence

More information

Formal Methods for Specifying and Verifying Distributed Algorithms Process Algebra vs I/O Automata

Formal Methods for Specifying and Verifying Distributed Algorithms Process Algebra vs I/O Automata Formal Methods for Specifying and Verifying Distributed Algorithms Process Algebra vs I/O Automata Marina Gelastou, Chryssis Georgiou and Anna Philippou Department of Computer Science, University of Cyprus,

More information

Name: Matriculation Number: Tutorial Group: A B C D E

Name: Matriculation Number: Tutorial Group: A B C D E Name: Matriculation Number: Tutorial Group: A B C D E Question: 1 (5 Points) 2 (6 Points) 3 (5 Points) 4 (5 Points) Total (21 points) Score: General instructions: The written test contains 4 questions

More information

Pseudo-automata for generalized regular expressions

Pseudo-automata for generalized regular expressions Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.

More information

INTRODUCTION TO NONMONOTONIC REASONING

INTRODUCTION TO NONMONOTONIC REASONING Faculty of Computer Science Chair of Automata Theory INTRODUCTION TO NONMONOTONIC REASONING Anni-Yasmin Turhan Dresden, WS 2017/18 About the Course Course Material Book "Nonmonotonic Reasoning" by Grigoris

More information

Process Algebras and Concurrent Systems

Process Algebras and Concurrent Systems Process Algebras and Concurrent Systems Rocco De Nicola Dipartimento di Sistemi ed Informatica Università di Firenze Process Algebras and Concurrent Systems August 2006 R. De Nicola (DSI-UNIFI) Process

More information

Theoretical Foundations of the UML Lecture 18: Statecharts Semantics (1)

Theoretical Foundations of the UML Lecture 18: Statecharts Semantics (1) Theoretical Foundations of the UML Lecture 18: Statecharts Semantics (1) Joost-Pieter Katoen Lehrstuhl für Informatik 2 Software Modeling and Verification Group http://moves.rwth-aachen.de/teaching/ws-1415/uml/

More information

Logic: Intro & Propositional Definite Clause Logic

Logic: Intro & Propositional Definite Clause Logic Logic: Intro & Propositional Definite Clause Logic Alan Mackworth UBC CS 322 Logic 1 February 27, 2013 P & M extbook 5.1 Lecture Overview Recap: CSP planning Intro to Logic Propositional Definite Clause

More information

A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice

A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice Luis Pino*, Filippo Bonchi** and Frank Valencia* (Presented by: Jorge A. Pe rez) *E quipe Come te, LIX, Laboratoire

More information

MCS 115 Exam 2 Solutions Apr 26, 2018

MCS 115 Exam 2 Solutions Apr 26, 2018 MCS 11 Exam Solutions Apr 6, 018 1 (10 pts) Suppose you have an infinitely large arrel and a pile of infinitely many ping-pong alls, laeled with the positive integers 1,,3,, much like in the ping-pong

More information

Click to edit. Master title. style

Click to edit. Master title. style Query Learning of Derived ω-tree Languages in Polynomial Time Dana Angluin, Tımos Antonopoulos & Dana 1 Query Learning a set of possile concepts Question Answer tc Learner Teacher Tries to identify a target

More information

Model Checking I. What are LTL and CTL? dack. and. dreq. and. q0bar

Model Checking I. What are LTL and CTL? dack. and. dreq. and. q0bar Model Checking I What are LTL and CTL? and dack q0 or D dreq D q0bar and 1 View circuit as a transition system (dreq, q0, dack) (dreq, q0, dack ) q0 = dreq dack = dreq and (q0 or (not q0 and dack)) q0

More information

Failure detectors Introduction CHAPTER

Failure detectors Introduction CHAPTER CHAPTER 15 Failure detectors 15.1 Introduction This chapter deals with the design of fault-tolerant distributed systems. It is widely known that the design and verification of fault-tolerent distributed

More information

Please give details of your answer. A direct answer without explanation is not counted.

Please give details of your answer. A direct answer without explanation is not counted. Please give details of your answer. A direct answer without explanation is not counted. Your answers must be in English. Please carefully read problem statements. During the exam you are not allowed to

More information

Algorithms Exam TIN093 /DIT602

Algorithms Exam TIN093 /DIT602 Algorithms Exam TIN093 /DIT602 Course: Algorithms Course code: TIN 093, TIN 092 (CTH), DIT 602 (GU) Date, time: 21st October 2017, 14:00 18:00 Building: SBM Responsible teacher: Peter Damaschke, Tel. 5405

More information

Algorithms, Probability, and Computing Fall 2010 Exam

Algorithms, Probability, and Computing Fall 2010 Exam Eidgenossische Technische Hochschule Zurich Ecole polytechnique federale de Zurich Politecnico federale di Zurigo Swiss Federal Institute of Technology Zurich Institute of Theoretical Computer Science

More information

Complete Process Semantics for Inhibitor Nets Technical Report

Complete Process Semantics for Inhibitor Nets Technical Report Complete Process Semantics for Inhibitor Nets Technical Report Gabriel Juhás 2, Robert Lorenz 1, and Sebastian Mauser 1 1 Department of Applied Computer Science, Catholic University of Eichstätt-Ingolstadt,

More information

A Logical Viewpoint on Process-Algebraic Quotients

A Logical Viewpoint on Process-Algebraic Quotients ! A Logical Viewpoint on Process-Algebraic Quotients Antonín Kučera and avier sparza Faculty of nformatics, Masaryk University, Botanická 68a, 62 Brno, Czech Republic, nstitut für nformatik, Technische

More information

Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi

Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 3 Brief Review of Signals and Systems My subject for today s discussion

More information

An introduction to process calculi: Calculus of Communicating Systems (CCS)

An introduction to process calculi: Calculus of Communicating Systems (CCS) An introduction to process calculi: Calculus of Communicating Systems (CCS) Lecture 2 of Modelli Matematici dei Processi Concorrenti Paweł Sobociński University of Southampton, UK Intro to process calculi:

More information

Fault Tolerant Computing CS 530 Fault Modeling. Yashwant K. Malaiya Colorado State University

Fault Tolerant Computing CS 530 Fault Modeling. Yashwant K. Malaiya Colorado State University CS 530 Fault Modeling Yashwant K. Malaiya Colorado State University 1 Objectives The number of potential defects in a unit under test is extremely large. A fault-model presumes that most of the defects

More information

The WHILE Hierarchy of Program Schemes is Infinite

The WHILE Hierarchy of Program Schemes is Infinite The WHILE Hierarchy of Program Schemes is Infinite Can Adam Alayrak and Thomas Noll RWTH Aachen Ahornstr. 55, 52056 Aachen, Germany alayrak@informatik.rwth-aachen.de and noll@informatik.rwth-aachen.de

More information

Model Checking for Propositions CS477 Formal Software Dev Methods

Model Checking for Propositions CS477 Formal Software Dev Methods S477 Formal Software Dev Methods Elsa L Gunter 2112 S, UIU egunter@illinois.edu http://courses.engr.illinois.edu/cs477 Slides based in part on previous lectures by Mahesh Vishwanathan, and by Gul gha January

More information

On Decision Problems for Probabilistic Büchi Automata

On Decision Problems for Probabilistic Büchi Automata On Decision Prolems for Proailistic Büchi Automata Christel Baier 1, Nathalie Bertrand 2, Marcus Größer 1 1 TU Dresden, Germany 2 IRISA, INRIA Rennes, France Cachan 05 février 2008 Séminaire LSV 05/02/08,

More information

CSCE 155N Fall Homework Assignment 2: Stress-Strain Curve. Assigned: September 11, 2012 Due: October 02, 2012

CSCE 155N Fall Homework Assignment 2: Stress-Strain Curve. Assigned: September 11, 2012 Due: October 02, 2012 CSCE 155N Fall 2012 Homework Assignment 2: Stress-Strain Curve Assigned: September 11, 2012 Due: October 02, 2012 Note: This assignment is to be completed individually - collaboration is strictly prohibited.

More information

Comparing State Machines: Equivalence and Refinement

Comparing State Machines: Equivalence and Refinement Chapter 14 Comparing State Machines: Equivalence and Refinement Hongwei Zhang http://www.cs.wayne.edu/~hzhang/ Ack.: this lecture is prepared in part based on slides of Lee, Sangiovanni-Vincentelli, Seshia.

More information