2nd Exam. First Name: Second Name: Matriculation Number: Degree Programme (please mark): CS Bachelor CS Master CS Lehramt SSE Master Other:
|
|
- Corey Holt
- 5 years ago
- Views:
Transcription
1 2 Concurrency Theory WS 2013/2014 Chair for Software Modeling and Verification Rheinisch-Westfälische Technische Hochschule Aachen Prof. Dr. Ir. Joost-Pieter Katoen apl. Prof. Dr. Thomas Noll S. Chakraorty, B. Kaminski, H. Wu Concurrency Theory WS 2013/2014 2nd Exam First Name: Second Name: Degree Programme (please mark): CS Bachelor CS Master CS Lehramt SSE Master Other: General Information: Mark every sheet with your matriculation numer. Check that your copy of the exam consists of 12 sheets (24 pages). Duration of exam: 120 minutes. No helping materials (e.g. ooks, notes, slides) are permitted. Give your solution on the respective sheet. Also use the ackside if necessary. If you need more paper, ask the assistants. Write with lue or lack ink; do not use a pencil or red ink. Make sure all electronic devices are switched off and are nowhere near you. Any attempt at deception leads to failure for this exam, even if it is detected only later. Σ Points Task 1 16 Task 2 27 Task 3 22 Task 4 21 Task 5 23 Task 6 11 Σ 120 Points otained
2 Task 1 (Modeling with Value Passing CCS) (11+5 Points) In this task, you are requested to model a technique called Triple-Modular Redundancy (TMR) with error detection for fault tolerance in distriuted systems in value-passing CCS. The overview of the system is provided in following diagram. In TMR, to increase the reliaility three copies of system (called components) are used. Three input value copies are sent to each component y using a splitter (S) respectively; the voter then accepts the results from each of the component and outputs the majority value. In our case, one component consists of a module (M i ) and a detector (D i ) (1 i 3). A functional module normally will get and pass the same value to D i (via mo i ) as from what it gets, ut if a fault occurs, differing values will e passed. The detector will first record the value and pass the value to voter (via do i ), then later compare this value with the feedack value from the voter (via vo i ) to determine a fault situation. Here, we assume the set V al of input values is given y V al = {0, 1}, and only one of the three modular can e faulty and the splitter, voter and detectors work always errorless. Additional information: In the diagram, the action name in ( ) means it is an internal synchronization action, otherwise it is a external action. M1 (mi1) fault1 detect1 (do1) (vo1) in M2 D2 V out S (mi3) (mi2) (vo2) fault2 detect2 (do3) (vo3) (mo3) M3 (mo1) (mo2) D1 D3 (do2) fault3 detect3 (a) Model this system using value-passing CCS! You should reuse the component definition (with index) when it is possile. 2
3 3
4 () Now we add a new operator called hide with respect to an action set H in CCS language, which is defined y following SOS rule: a (hide P P 1 ) (a H H) hide H P a hide H P a (hide P P 2 ) (a H H) hide H P τ hide H P Informally speaking, this operator can turn all the actions in H into τ. Let Cycler 1 = fault 1.detect 1.Cycler 1 and let T MR e your modelled system. Argue why your system satisfies the verification condition that hide {in, out, fault 2, detect 2, fault 3, detect 3 } T MR Cycler 1 which states that if a fault occurs in M 1, D 1 should always detect this fault. 4
5 5
6 Task 2 (Laeled Transition Systems) ( Points) (a) Consider the following CCS process definition: A = ( (B C) + D ) \ {com} B = a.com.b +.nil C = D + E D = com.d E =.C Derive all legal outgoing transitions A α A y giving their derivation tree! (act) a.com.b a com.b a (sum1) a.com.b +.nil com.b (call) B a com.b (par1) B C a com.b C (sum1) (B C) + D a com.b C ( ) a (res) (B C) + D \ {com} (com C) \ {com} (call) A a (com.b C) \ {com} (act).nil nil (sum2) a.com.b +.nil com.b (call) B com.b (par1) B C com.b C (sum1) (B C) + D com.b C ( ) (res) (B C) + D \ {com} (com C) \ {com} (call) A (com.b C) \ {com} (act).c C (call) E C (sum2) D + E C (call) C C (par2) B C B C (sum1) (B C) + D B C ( ) (res) (B C) + D \ {com} (B C) \ {com} (call) A (B C) \ {com} 6
7 7
8 () Reconsider the CCS process definition from Task 2 (a): A = ( (B C) + D ) \ {com} B = a.com.b +.nil C = D + E D = com.d E =.C Draw LTS(A) and lael the nodes with the corresponding CCS processes! A a a (com.b C) \ {com} (B C) \ {com} (nil C) \ {com} τ (B D) \ {com} (nil D) \ {com} a τ (com.b D) \ {com} 8
9 (c) Give the trace language Tr ( (B D) \ {com} ) of process (B D) \ {com}! Pref ( (aτ) ) = ( a(τa) + (aτ) ( + ε) ) 9
10 Task 3 (HML and Bisimulation) (15+7 Points) Given are the following three CCS processes: A =.B + a.c + a.d.c D = a.d.e + a.f +.G + a.i J = a.l +.K + a.m B = a.a + a.d.c E =.H + c.d.e K = a.o + a.n C =.A + c.d.c F =.D + c.d.f L = d.m G = a.d.e + a.h H =.G + a.d.f + a.e I = c.d.e +.D M =.J + c.n N = d.m O = a.l + a.m (a) Draw the LTSs for A, D, and J respectively. Prove or disprove A D, A J and D J. For proving or disproving that two processes are strongly isimilar, you can use the game characterization of isimilarity. For disproving you may provide an HML formula which is satisfied y one process ut not y the other. 10
11 11
12 () Express the property that actions a and occur in alternation in HML+Recursion! Note that this does not imply that a and are strictly followed y each other (i.e. etween any two occurrences of a a occurs and vice versa, ut etween an a and a the other symols c and d may occur). Check whether process A satisfies the property or not! 12
13 13
14 Task 4 (Preservation of Strong Bisimilarity) (6+15 Points) (a) Let synhide L ( ), where L is a set of actions, e a unary CCS operator with the following semantics: (synhide) P α P β L: P β.p synhide L (P ) α synhide L (P ) Prove or disprove: synhide L ( ) preserves strong isimilarity, i.e. for any two strongly isimilar processes S T it holds that synhide L (S) synhide L (T ). synhide L ( ) does not preserve strong isimilarity. For that, consider the two (clearly isimilar) processes nil.nil and.nil. Applying synhide {} ( ) to oth processes yields on one hand the process synhide {} (nil.nil) which can make a transition to synhide {} (nil nil) and on the other hand the process synhide {} (.nil) which cannot mimic this transition. Hence the two processes synhide {} (nil.nil) and synhide {} (.nil) are not isimilar and thus synhide L ( ) does not preserve isimilarity. 14
15 15
16 () Let e a inary CCS operator with the following semantics: (dag1) P (dag2) P α Q α Q P Q α Q α P Q α P Q α P (dag3) P α P Q α Q P Q α P Q Prove or disprove: preserves strong isimilarity, i.e. for any two strongly isimilar processes S T and any other process R it holds that S R is strongly isimilar to T R (and you may omit in your proof the analogous case for R S is strongly isimilar to R T ). Let S T e two strongly isimilar processes. We define a new relation B = { (U R, V R) R Prc, S T } and prove that B is a strong isimulation on S R and T R for any process R: = S T [ ] S α S = T : T α T S T [ ] T α T = S : S α S S T (Def.) α Case 1: R : = = [ S R [ T R [ S R [ T R = S R B T R α Case 2: R R : [ = S R = [ S R [ T R [ T R = S R B T R ] α S = T : T R α T S T ] α T = S : S R α S S T ] α S = T : T R α T S B T ] α T = S : S R α S S B T ] α S R = T : T R α T R S T ] α T R = S : S R α S R S T ] α S = T : T R α T S R B T R ] α T = S : S R α S S R B R T (dag2 rule) ( B) (dag3 rule) (Def. B) 16
17 17
18 Task 5 (From Modified CCS to Petri Nets) (8+8+7 Points) In the lecture, we have introduce an occurrence net (Petri net) semantics for CCS processes. Now we modify the parallel composition operation to a new operator ( A ) w.r.t to an action set A. Informally speaking, this operator requests a forced synchronization on an action etween two processes if the action elongs to the set A. The formal SOS rules for this operator are as follows: (Syn) P a P Q a Q P A Q a P A Q a A a P P a A (Par 1 ) P A Q a P A Q a Q Q a A (Par 2 ) (a A) P A Q a P A Q (a) Give the occurrence net semantics for the process P! P = x.a.p + y.a.q Q = z.a.q 18
19 19
20 () Formally define the occurrence net semantics for the operator A and give the occurrence net semantics for P {a} Q ased on your definition! Note that, since the occurrence net is infinite, you should stop as soon as some part in the occurrence net repeats. 20
21 21
22 (c) Compute the McMillan prefix of the resulting occurrence net from (). 22
23 23
24 Task 6 (Petri net Acceptale Languages) (11 Points) Let Σ e a finite alphaet and let N = (P, T, F, M 0, λ) e a laelled Petri net in which all transitions in T are laelled y a laeling function λ: T Σ. Then the trace language Tr(N) of N is defined as the following set: { w = λ(a 1 ) λ(a k ) M 0 a 1 M1 a 1 a k Mk is a complete sequential run of N A language L Σ is called Petri net recognizale, if there exists a laelled Petri net N such that Tr(N) = L. Provide an exact description of the language that is recognized y the following Petri net! Your description shall not make any reference ack to the Petri net itself! }. c a a { w1 c w 2 w1, w 2 {a, }, w 1 w 2 a = w 1 w 2, w 1 a w 2, w 1 w 2 a } 24
The State Explosion Problem
The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis
More informationOverview. 1 Lecture 1: Introduction. 2 Lecture 2: Message Sequence Charts. Joost-Pieter Katoen Theoretical Foundations of the UML 1/32
Overview 1 Lecture 1: Introduction 2 Lecture 2: Message Sequence Charts Joost-Pieter Katoen Theoretical Foundations of the UML 1/32 Theoretical Foundations of the UML Lecture 1: Introduction Joost-Pieter
More informationSemantics and Verification
Semantics and Verification Lecture 2 informal introduction to CCS syntax of CCS semantics of CCS 1 / 12 Sequential Fragment Parallelism and Renaming CCS Basics (Sequential Fragment) Nil (or 0) process
More informationBranching Bisimilarity with Explicit Divergence
Branching Bisimilarity with Explicit Divergence Ro van Glaeek National ICT Australia, Sydney, Australia School of Computer Science and Engineering, University of New South Wales, Sydney, Australia Bas
More informationExam Theoretical Foundations of UML WS 2012/13
2 Prof. Dr. Ir. Joost-Pieter Ktoen Flk Sher, Srin von Styp Exm Theoreticl Foundtions of UML WS 2012/13 First Nme: Second Nme: Mtricultion Numer: Degree Progrmme (plese mrk): CS Mster SSE Mster Other: Σ
More informationFault Tolerance. Dealing with Faults
Fault Tolerance Real-time computing systems must be fault-tolerant: they must be able to continue operating despite the failure of a limited subset of their hardware or software. They must also allow graceful
More informationFinite Automata and Regular Languages (part II)
Finite Automata and Regular Languages (part II) Prof. Dan A. Simovici UMB 1 / 25 Outline 1 Nondeterministic Automata 2 / 25 Definition A nondeterministic finite automaton (ndfa) is a quintuple M = (A,
More informationCommunication and Concurrency: CCS
Communication and Concurrency: CCS R. Milner, A Calculus of Communicating Systems, 1980 cours SSDE Master 1 Why calculi? Prove properties on programs and languages Principle: tiny syntax, small semantics,
More informationTrace Refinement of π-calculus Processes
Trace Refinement of pi-calculus Processes Trace Refinement of π-calculus Processes Manuel Gieseking manuel.gieseking@informatik.uni-oldenburg.de) Correct System Design, Carl von Ossietzky University of
More informationFinding Complex Solutions of Quadratic Equations
y - y - - - x x Locker LESSON.3 Finding Complex Solutions of Quadratic Equations Texas Math Standards The student is expected to: A..F Solve quadratic and square root equations. Mathematical Processes
More informationSUFFIX TREE. SYNONYMS Compact suffix trie
SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix
More informationAutomata, Logic and Games: Theory and Application
Automata, Logic and Games: Theory and Application 2 Parity Games, Tree Automata, and S2S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong S2S 14-19 June
More informationVertical Implementation
Information and Computation 70, 95 33 (00) doi:0.006/inco.00.967, availale online at http://www.idealirary.com on Vertical Implementation Arend Rensink Faculty of Informatics, University of Twente, Postus
More informationA Note on Scope and Infinite Behaviour in CCS-like Calculi p.1/32
A Note on Scope and Infinite Behaviour in CCS-like Calculi GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Joint work with Pablo Giambiagi and Frank Valencia A
More informationSemantic Equivalences and the. Verification of Infinite-State Systems 1 c 2004 Richard Mayr
Semantic Equivalences and the Verification of Infinite-State Systems Richard Mayr Department of Computer Science Albert-Ludwigs-University Freiburg Germany Verification of Infinite-State Systems 1 c 2004
More informationTopics in Concurrency
Topics in Concurrency Lecture 3 Jonathan Hayman 18 October 2016 Towards a more basic language Aim: removal of variables to reveal symmetry of input and output Transitions for value-passing carry labels
More informationCommunication and Concurrency: CCS. R. Milner, A Calculus of Communicating Systems, 1980
Communication and Concurrency: CCS R. Milner, A Calculus of Communicating Systems, 1980 Why calculi? Prove properties on programs and languages Principle: tiny syntax, small semantics, to be handled on
More informationStructure Preserving Bisimilarity,
Structure Preserving Bisimilarity, Supporting an Operational Petri Net Semantics of CCSP Rob van Glabbeek NICTA, Sydney, Australia University of New South Wales, Sydney, Australia September 2015 Milner:
More informationCombinational Techniques for Reliability Modeling
Combinational Techniques for Reliability Modeling Prof. Naga Kandasamy, ECE Department Drexel University, Philadelphia, PA 19104. January 24, 2009 The following material is derived from these text books.
More informationProgram Analysis. Lecture 5. Rayna Dimitrova WS 2016/2017
Program Analysis Lecture 5 Rayna Dimitrova WS 2016/2017 2/21 Recap: Constant propagation analysis Goal: For each program point, determine whether a variale has a constant value whenever an execution reaches
More informationComplex Systems Design & Distributed Calculus and Coordination
Complex Systems Design & Distributed Calculus and Coordination Concurrency and Process Algebras: Theory and Practice Francesco Tiezzi University of Camerino francesco.tiezzi@unicam.it A.A. 2014/2015 F.
More informationA Weak Bisimulation for Weighted Automata
Weak Bisimulation for Weighted utomata Peter Kemper College of William and Mary Weighted utomata and Semirings here focus on commutative & idempotent semirings Weak Bisimulation Composition operators Congruence
More informationDecidable Subsets of CCS
Decidable Subsets of CCS based on the paper with the same title by Christensen, Hirshfeld and Moller from 1994 Sven Dziadek Abstract Process algebra is a very interesting framework for describing and analyzing
More informationRepresentation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam
Symmetry and Quantum Information Feruary 6, 018 Representation theory of S(), density operators, purification Lecture 7 Michael Walter, niversity of Amsterdam Last week, we learned the asic concepts of
More informationMethods for the specification and verification of business processes MPB (6 cfu, 295AA)
Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Roberto Bruni http://www.di.unipi.it/~bruni 08 - Petri nets basics 1 Object Formalization of the basic concepts of
More informationCONNECTOR ALGEBRAS FOR C/E AND P/T NETS INTERACTIONS
Logical Methods in Computer Science Vol. 9(3:6)203, pp. 65 www.lmcs-online.org Sumitted Apr. 5, 202 Pulished Sep. 7, 203 CONNECTOR ALGEBRAS FOR C/E AND P/T NETS INTERACTIONS ROBERTO BRUNI a, HERNÁN MELGRATTI,
More informationCpE358/CS381. Switching Theory and Logical Design. Class 16
CpE358/CS38 Switching Theory and Logical Design Class 6 CpE358/CS38 Summer- 24 Copyright 24-585 Today Fundamental concepts of digital systems (Mano Chapter ) inary codes, number systems, and arithmetic
More informationA Brief Introduction to Model Checking
A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:
More informationBuilding a befer mousetrap. Transi-on Graphs. L = { abba } Building a befer mousetrap. L = { abba } L = { abba } 2/16/15
Building a efer mousetrap Let s uild an FA that only accepts the string aa from Σ = { a } Models of Computa-on Lecture #5 (a?er quiz) Chapter 6 Building a efer mousetrap Let s uild an FA that only accepts
More informationLocal state refinement on Elementary Net Systems: an approach based on morphisms
Local state refinement on Elementary Net Systems: an approach based on morphisms Luca Bernardinello, Elisabetta Mangioni, and Lucia Pomello Dipartimento di Informatica Sistemistica e Comunicazione, Università
More informationProbabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford
Probabilistic Model Checking Michaelmas Term 2011 Dr. Dave Parker Department of Computer Science University of Oxford Overview Temporal logic Non-probabilistic temporal logic CTL Probabilistic temporal
More informationReliable Computing I
Instructor: Mehdi Tahoori Reliable Computing I Lecture 5: Reliability Evaluation INSTITUTE OF COMPUTER ENGINEERING (ITEC) CHAIR FOR DEPENDABLE NANO COMPUTING (CDNC) National Research Center of the Helmholtz
More informationTemporal Logic. Stavros Tripakis University of California, Berkeley. We have designed a system. We want to check that it is correct.
EE 244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2016 Temporal logic Stavros Tripakis University of California, Berkeley Stavros Tripakis (UC Berkeley) EE 244, Fall 2016
More informationFinal Exam /614 Bug Catching: Automated Program Verification Matt Fredrikson André Platzer. December 17, 2017
Final Exam 15-414/614 Bug Catching: Automated Program Verification Matt Fredrikson André Platzer December 17, 2017 Name: Andrew ID: André Platzer aplatzer Instructions This exam is closed-book with one
More informationTrustworthy, Useful Languages for. Probabilistic Modeling and Inference
Trustworthy, Useful Languages for Probabilistic Modeling and Inference Neil Toronto Dissertation Defense Brigham Young University 2014/06/11 Master s Research: Super-Resolution Toronto et al. Super-Resolution
More informationCharacterizing Fault-Tolerant Systems by Means of Simulation Relations
Characterizing Fault-Tolerant Systems by Means of Simulation Relations TECHNICAL REPORT Ramiro Demasi 1, Pablo F. Castro 2,3, Thomas S.E. Maibaum 1, and Nazareno Aguirre 2,3 1 Department of Computing and
More informationCCS: Syntax & Semantics (Final Version)
CCS: & Semantics (Final Version) Prof. Susan Older 14 September 2017 (CIS 400/632) CCS & Semantics 14 September 2017 1 / 10 Relevant Syntactic Sets: A Recap from Last Time We have the following countably
More informationPlan for Today and Beginning Next week (Lexical Analysis)
Plan for Today and Beginning Next week (Lexical Analysis) Regular Expressions Finite State Machines DFAs: Deterministic Finite Automata Complications NFAs: Non Deterministic Finite State Automata From
More informationModels of Concurrency
Models of Concurrency GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Thanks to Frank Valencia Models of Concurrency p.1/57 Concurrency is Everywhere Concurrent
More informationFormal Techniques for Software Engineering: CCS: A Calculus for Communicating Systems
Formal Techniques for Software Engineering: CCS: A Calculus for Communicating Systems Rocco De Nicola IMT Institute for Advanced Studies, Lucca rocco.denicola@imtlucca.it June 2013 Lesson 10 R. De Nicola
More informationFinite-State Model Checking
EECS 219C: Computer-Aided Verification Intro. to Model Checking: Models and Properties Sanjit A. Seshia EECS, UC Berkeley Finite-State Model Checking G(p X q) Temporal logic q p FSM Model Checker Yes,
More informationInequalities. Inequalities. Curriculum Ready.
Curriculum Ready www.mathletics.com Copyright 009 3P Learning. All rights reserved. First edition printed 009 in Australia. A catalogue record for this ook is availale from 3P Learning Ltd. ISBN 978--986-60-4
More informationCSE Theory of Computing: Homework 3 Regexes and DFA/NFAs
CSE 34151 Theory of Computing: Homework 3 Regexes and DFA/NFAs Version 1: Fe. 6, 2018 Instructions Unless otherwise specified, all prolems from the ook are from Version 3. When a prolem in the International
More informationDepartment of Electrical and Computer Engineering University of Wisconsin Madison. Fall Midterm Examination CLOSED BOOK
Department of Electrical and Computer Engineering University of Wisconsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 203-204 Midterm Examination CLOSED OOK Kewal K. Saluja Date:
More informationReversal of regular languages and state complexity
Reversal of regular languages and state complexity Juraj Šeej Institute of Computer Science, Faculty of Science, P. J. Šafárik University Jesenná 5, 04001 Košice, Slovakia juraj.seej@gmail.com Astract.
More informationTTA and PALS: Formally Verified Design Patterns for Distributed Cyber-Physical
TTA and PALS: Formally Verified Design Patterns for Distributed Cyber-Physical DASC 2011, Oct/19 CoMMiCS Wilfried Steiner wilfried.steiner@tttech.com TTTech Computertechnik AG John Rushby rushby@csl.sri.com
More informationCS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs
CS 42 Lecture 3 Automating lexical analysis 29 August 2 Lecturer: Andrew Myers A lexer generator converts a lexical specification consisting of a list of regular expressions and corresponding actions into
More informationA Simplified Approach for Testing Real-Time Systems Based on Action Refinement
A Simplified Approach for Testing Real-Time Systems Based on Action Refinement Saddek Bensalem, Moez Krichen, Lotfi Majdoub, Riadh Robbana, Stavros Tripakis Verimag Laboratory, Centre Equation 2, avenue
More informationHigh Performance Computing
Master Degree Program in Computer Science and Networking, 2014-15 High Performance Computing 2 nd appello February 11, 2015 Write your name, surname, student identification number (numero di matricola),
More informationRecent results on Timed Systems
Recent results on Timed Systems Time Petri Nets and Timed Automata Béatrice Bérard LAMSADE Université Paris-Dauphine & CNRS berard@lamsade.dauphine.fr Based on joint work with F. Cassez, S. Haddad, D.
More informationFrom High-Level Component-Based Models to Distributed Implementations
From High-Level Component-Based Models to Distributed Implementations Borzoo Bonakdarpour Marius Bozga Mohamad Jaber Jean Quilbeuf Joseph Sifakis VERIMAG, Centre Équation, 2 avenue de Vignate, 38610, Gières,
More informationM = (Q,Σ,δ,q 0,F) Σ is the alphabet over which the transitions are defined.
LECTURE 23 10.1 Formal Definition of a DFA Definition 10.1 A Deterministic Finite Automaton (DFA) M, is a five-tuple: where M = (Q,Σ,δ, 0,F) Q is a finite set of states. It is important that the set of
More informationEfficient Computation of Program Equivalence for Confluent Concurrent Constraint Programming
Efficient Computation of Program Equivalence for Confluent Concurrent Constraint Programming Luis F. Pino INRIA/DGA and LIX École Polytechnique 91128 Palaiseau, France luis.pino@lix.polytechnique.fr Filippo
More informationSome techniques and results in deciding bisimilarity
Some techniques and results in deciding bisimilarity Petr Jančar Dept of Computer Science Technical University Ostrava (FEI VŠB-TU) Czech Republic www.cs.vsb.cz/jancar Talk at the Verification Seminar,
More informationLecture 4 Event Systems
Lecture 4 Event Systems This lecture is based on work done with Mark Bickford. Marktoberdorf Summer School, 2003 Formal Methods One of the major research challenges faced by computer science is providing
More informationCS 420, Spring 2018 Homework 4 Solutions. 1. Use the Pumping Lemma to show that the following languages are not regular: (a) {0 2n 10 n n 0};
CS 420, Spring 2018 Homework 4 Solutions 1. Use the Pumping Lemma to show that the following languages are not regular: (a) {0 2n 10 n n 0}; Solution: Given p 1, choose s = 0 2p 10 p. Then, s is in the
More informationDES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models
4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe
More informationMath Analysis CP WS 4.X- Section Review A
Math Analysis CP WS 4.X- Section 4.-4.4 Review Complete each question without the use of a graphing calculator.. Compare the meaning of the words: roots, zeros and factors.. Determine whether - is a root
More informationLING/C SC/PSYC 438/538. Lecture 17 Sandiway Fong
LING/C SC/PSYC 438/538 Lecture 7 Sandiway Fong Today's Topic Review of ungraded homework Closure properties of FSA Practice! Homework out on Thursday From last time Ungraded Homework 6 apply the set-of-states
More informationDepartment of Electrical and Computer Engineering University of Wisconsin Madison. Fall Midterm Examination CLOSED BOOK
Department of Electrical and Computer Engineering University of Wisconsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 2014-2015 Midterm Examination CLOSED BOOK Kewal K. Saluja
More informationReliability of Technical Systems
Reliability of Technical Systems Main Topics 1. Short Introduction, Reliability Parameters: Failure Rate, Failure Probability, etc. 2. Some Important Reliability Distributions 3. Component Reliability
More informationIntroduction to Temporal Logic. The purpose of temporal logics is to specify properties of dynamic systems. These can be either
Introduction to Temporal Logic The purpose of temporal logics is to specify properties of dynamic systems. These can be either Desired properites. Often liveness properties like In every infinite run action
More informationCommunicating and Mobile Systems
Communicating and Mobile Systems Overview:! Programming Model! Interactive Behavior! Labeled Transition System! Bisimulation! The π-calculus! Data Structures and λ-calculus encoding in the π-calculus References:!
More informationMidterm 1. Your Exam Room: Name of Person Sitting on Your Left: Name of Person Sitting on Your Right: Name of Person Sitting in Front of You:
CS70 Discrete Mathematics and Probability Theory, Fall 2018 Midterm 1 8:00-10:00pm, 24 September Your First Name: SIGN Your Name: Your Last Name: Your Exam Room: Name of Person Sitting on Your Left: Name
More informationModel Checking I. What are LTL and CTL? dack. and. dreq. and. q0bar
Model Checking I What are LTL and CTL? q0 or and dack dreq q0bar and 1 View circuit as a transition system (dreq, q0, dack) (dreq, q0, dack ) q0 = dreq and dack = dreq & (q0 + ( q0 & dack)) q0 or and D
More informationTopics in Concurrency
Topics in Concurrency Lecture 3 Jonathan Hayman 18 February 2015 Recap: Syntax of CCS Expressions: Arithmetic a and Boolean b Processes: p ::= nil nil process (τ p) silent/internal action (α!a p) output
More informationDependable Computer Systems
Dependable Computer Systems Part 3: Fault-Tolerance and Modelling Contents Reliability: Basic Mathematical Model Example Failure Rate Functions Probabilistic Structural-Based Modeling: Part 1 Maintenance
More informationFachgebiet Leistungselektronik und Elektrische Antriebstechnik. Test Examination: Mechatronics and Electrical Drives
Prof. Dr. Ing. Joachim Böcker Test Examination: Mechatronics and Electrical Drives 8.1.214 First Name: Student number: Last Name: Course of Study: Exercise: 1 2 3 Total (Points) (2) (2) (2) (6) Duration:
More informationLabeled Transition Systems
Labeled Transition Systems Lecture #1 of Probabilistic Models for Concurrency Joost-Pieter Katoen Lehrstuhl II: Programmiersprachen u. Softwarevalidierung E-mail: katoen@cs.rwth-aachen.de March 12, 2005
More information10. The GNFA method is used to show that
CSE 355 Midterm Examination 27 February 27 Last Name Sample ASU ID First Name(s) Ima Exam # Sample Regrading of Midterms If you believe that your grade has not been recorded correctly, return the entire
More informationTheoretical Foundations of the UML
Theoretical Foundations of the UML Lecture 17+18: A Logic for MSCs Joost-Pieter Katoen Lehrstuhl für Informatik 2 Software Modeling and Verification Group moves.rwth-aachen.de/teaching/ws-1718/fuml/ 5.
More informationDistributed Timed Automata with Independently Evolving Clocks
Distriuted Timed Automata with Independently Evolving Clocks S. Akshay,3, Benedikt Bollig, Paul Gastin, Madhavan Mukund 2, and K. Narayan Kumar 2 LSV, ENS Cachan, CNRS, France {akshay,ollig,gastin}@lsv.ens-cachan.fr
More informationTrace- and Failure-Based Semantics for Responsiveness
Trace- and Failure-Based Semantics for Responsiveness Walter Vogler 1 and Christian Stahl 2 and Richard Müller 2,3 1 Institut für Informatik, Universität Augsburg, Germany vogler@informatik.uni-augsburg.de
More informationCS 121, Section 2. Week of September 16, 2013
CS 121, Section 2 Week of September 16, 2013 1 Concept Review 1.1 Overview In the past weeks, we have examined the finite automaton, a simple computational model with limited memory. We proved that DFAs,
More informationA Compositional Approach to Bisimulation of Arenas of Finite State Machines
A Compositional Approach to Bisimulation of Arenas of Finite State Machines Giordano Pola, Maria D. Di Benedetto and Elena De Santis Department of Electrical and Information Engineering, Center of Excellence
More informationFormal Methods for Specifying and Verifying Distributed Algorithms Process Algebra vs I/O Automata
Formal Methods for Specifying and Verifying Distributed Algorithms Process Algebra vs I/O Automata Marina Gelastou, Chryssis Georgiou and Anna Philippou Department of Computer Science, University of Cyprus,
More informationName: Matriculation Number: Tutorial Group: A B C D E
Name: Matriculation Number: Tutorial Group: A B C D E Question: 1 (5 Points) 2 (6 Points) 3 (5 Points) 4 (5 Points) Total (21 points) Score: General instructions: The written test contains 4 questions
More informationPseudo-automata for generalized regular expressions
Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.
More informationINTRODUCTION TO NONMONOTONIC REASONING
Faculty of Computer Science Chair of Automata Theory INTRODUCTION TO NONMONOTONIC REASONING Anni-Yasmin Turhan Dresden, WS 2017/18 About the Course Course Material Book "Nonmonotonic Reasoning" by Grigoris
More informationProcess Algebras and Concurrent Systems
Process Algebras and Concurrent Systems Rocco De Nicola Dipartimento di Sistemi ed Informatica Università di Firenze Process Algebras and Concurrent Systems August 2006 R. De Nicola (DSI-UNIFI) Process
More informationTheoretical Foundations of the UML Lecture 18: Statecharts Semantics (1)
Theoretical Foundations of the UML Lecture 18: Statecharts Semantics (1) Joost-Pieter Katoen Lehrstuhl für Informatik 2 Software Modeling and Verification Group http://moves.rwth-aachen.de/teaching/ws-1415/uml/
More informationLogic: Intro & Propositional Definite Clause Logic
Logic: Intro & Propositional Definite Clause Logic Alan Mackworth UBC CS 322 Logic 1 February 27, 2013 P & M extbook 5.1 Lecture Overview Recap: CSP planning Intro to Logic Propositional Definite Clause
More informationA Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice
A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice Luis Pino*, Filippo Bonchi** and Frank Valencia* (Presented by: Jorge A. Pe rez) *E quipe Come te, LIX, Laboratoire
More informationMCS 115 Exam 2 Solutions Apr 26, 2018
MCS 11 Exam Solutions Apr 6, 018 1 (10 pts) Suppose you have an infinitely large arrel and a pile of infinitely many ping-pong alls, laeled with the positive integers 1,,3,, much like in the ping-pong
More informationClick to edit. Master title. style
Query Learning of Derived ω-tree Languages in Polynomial Time Dana Angluin, Tımos Antonopoulos & Dana 1 Query Learning a set of possile concepts Question Answer tc Learner Teacher Tries to identify a target
More informationModel Checking I. What are LTL and CTL? dack. and. dreq. and. q0bar
Model Checking I What are LTL and CTL? and dack q0 or D dreq D q0bar and 1 View circuit as a transition system (dreq, q0, dack) (dreq, q0, dack ) q0 = dreq dack = dreq and (q0 or (not q0 and dack)) q0
More informationFailure detectors Introduction CHAPTER
CHAPTER 15 Failure detectors 15.1 Introduction This chapter deals with the design of fault-tolerant distributed systems. It is widely known that the design and verification of fault-tolerent distributed
More informationPlease give details of your answer. A direct answer without explanation is not counted.
Please give details of your answer. A direct answer without explanation is not counted. Your answers must be in English. Please carefully read problem statements. During the exam you are not allowed to
More informationAlgorithms Exam TIN093 /DIT602
Algorithms Exam TIN093 /DIT602 Course: Algorithms Course code: TIN 093, TIN 092 (CTH), DIT 602 (GU) Date, time: 21st October 2017, 14:00 18:00 Building: SBM Responsible teacher: Peter Damaschke, Tel. 5405
More informationAlgorithms, Probability, and Computing Fall 2010 Exam
Eidgenossische Technische Hochschule Zurich Ecole polytechnique federale de Zurich Politecnico federale di Zurigo Swiss Federal Institute of Technology Zurich Institute of Theoretical Computer Science
More informationComplete Process Semantics for Inhibitor Nets Technical Report
Complete Process Semantics for Inhibitor Nets Technical Report Gabriel Juhás 2, Robert Lorenz 1, and Sebastian Mauser 1 1 Department of Applied Computer Science, Catholic University of Eichstätt-Ingolstadt,
More informationA Logical Viewpoint on Process-Algebraic Quotients
! A Logical Viewpoint on Process-Algebraic Quotients Antonín Kučera and avier sparza Faculty of nformatics, Masaryk University, Botanická 68a, 62 Brno, Czech Republic, nstitut für nformatik, Technische
More informationCommunication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi
Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 3 Brief Review of Signals and Systems My subject for today s discussion
More informationAn introduction to process calculi: Calculus of Communicating Systems (CCS)
An introduction to process calculi: Calculus of Communicating Systems (CCS) Lecture 2 of Modelli Matematici dei Processi Concorrenti Paweł Sobociński University of Southampton, UK Intro to process calculi:
More informationFault Tolerant Computing CS 530 Fault Modeling. Yashwant K. Malaiya Colorado State University
CS 530 Fault Modeling Yashwant K. Malaiya Colorado State University 1 Objectives The number of potential defects in a unit under test is extremely large. A fault-model presumes that most of the defects
More informationThe WHILE Hierarchy of Program Schemes is Infinite
The WHILE Hierarchy of Program Schemes is Infinite Can Adam Alayrak and Thomas Noll RWTH Aachen Ahornstr. 55, 52056 Aachen, Germany alayrak@informatik.rwth-aachen.de and noll@informatik.rwth-aachen.de
More informationModel Checking for Propositions CS477 Formal Software Dev Methods
S477 Formal Software Dev Methods Elsa L Gunter 2112 S, UIU egunter@illinois.edu http://courses.engr.illinois.edu/cs477 Slides based in part on previous lectures by Mahesh Vishwanathan, and by Gul gha January
More informationOn Decision Problems for Probabilistic Büchi Automata
On Decision Prolems for Proailistic Büchi Automata Christel Baier 1, Nathalie Bertrand 2, Marcus Größer 1 1 TU Dresden, Germany 2 IRISA, INRIA Rennes, France Cachan 05 février 2008 Séminaire LSV 05/02/08,
More informationCSCE 155N Fall Homework Assignment 2: Stress-Strain Curve. Assigned: September 11, 2012 Due: October 02, 2012
CSCE 155N Fall 2012 Homework Assignment 2: Stress-Strain Curve Assigned: September 11, 2012 Due: October 02, 2012 Note: This assignment is to be completed individually - collaboration is strictly prohibited.
More informationComparing State Machines: Equivalence and Refinement
Chapter 14 Comparing State Machines: Equivalence and Refinement Hongwei Zhang http://www.cs.wayne.edu/~hzhang/ Ack.: this lecture is prepared in part based on slides of Lee, Sangiovanni-Vincentelli, Seshia.
More information