Composition of ConGolog Programs
|
|
- Heather Webb
- 5 years ago
- Views:
Transcription
1 Composition of ConGolog Programs Sebastian Sardina 1 Giuseppe De Giacomo 2 1 Department of Computer Science and Information Technology RMIT University, Melbourne, AUSTRALIA 2 Dipartimento di Informatica e Sistemistica Antonio Ruberti Sapienza Universita di Roma, Rome, ITALY 1 / 18
2 Behavior Composition: The Basic Idea... Environment (description of actions; prec. & effects) Available Behaviors (description of the behavior of available agents/devices) 2 / 18
3 Behavior Composition: The Basic Idea... Environment (description of actions; prec. & effects) Target Behavior (desired behavior) Available Behaviors (description of the behavior of available agents/devices) 2 / 18
4 Behavior Composition: The Basic Idea... Environment (description of actions; prec. & effects) Controller Target Behavior (desired behavior) Available Behaviors (description of the behavior of available agents/devices) 2 / 18
5 Behavior Composition: The Basic Idea... Environment (description of actions; prec. & effects) Controller Target Behavior (desired behavior) Available Behaviors (description of the behavior of available agents/devices) 2 / 18
6 Behavior Composition: The Basic Idea... Environment (description of actions; prec. & effects) Now with unbounded data! Controller Target Behavior (desired behavior) Available Behaviors (description of the behavior of available agents/devices) 2 / 18
7 The ConGolog Composition Problem Given: 1 An action theory D; 2 n available programs δ 1,..., δ n ; 3 a target program δ t. 3 / 18
8 Given: 1 An action theory D; The ConGolog Composition Problem 2 n available programs δ 1,..., δ n ; 3 a target program δ t. Task: find an orchestrator/delegator that coordinates the concurrent execution of the available programs so as to mimic/realize the target program. 3 / 18
9 Given: 1 An action theory D; The ConGolog Composition Problem 2 n available programs δ 1,..., δ n ; 3 a target program δ t. Task: find an orchestrator/delegator that coordinates the concurrent execution of the available programs so as to mimic/realize the target program. agent/plan coordination, virtual agents; web-service composition; composition of business processes 3 / 18
10 Given: 1 An action theory D; The ConGolog Composition Problem 2 n available programs δ 1,..., δ n ; 3 a target program δ t. Task: find an orchestrator/delegator that coordinates the concurrent execution of the available programs so as to mimic/realize the target program. agent/plan coordination, virtual agents; web-service composition; composition of business processes Notable features: Programs may include non-deterministic points & may not terminate. Domain may be infinite. Programs may go over infinite states. 3 / 18
11 Controller for a Music Jukebox while True do { if ( Playing ( song)pending(song)) then (π song, disk).{ (Pending(song) InDisk(song, disk))?; select(song); load(disk); play(song) } else wait } 4 / 18
12 Controller for a Music Jukebox while True do { if ( Playing ( song)pending(song)) then (π song, disk).{ (Pending(song) InDisk(song, disk))?; select(song); load(disk); play(song) } else wait } Domain tests relative to an action theory. 4 / 18
13 Controller for a Music Jukebox while True do { if ( Playing ( song)pending(song)) then (π song, disk).{ (Pending(song) InDisk(song, disk))?; select(song); load(disk); play(song) } else wait } Domain tests relative to an action theory. Domain actions. 4 / 18
14 Controller for a Music Jukebox while True do { if ( Playing ( song)pending(song)) then (π song, disk).{ (Pending(song) InDisk(song, disk))?; select(song); load(disk); play(song) } else wait } Domain tests relative to an action theory. Domain actions. Nondeterministic features. 4 / 18
15 Semantics for High-Level Programs In terms of two predicates: 1 Trans(δ, s, δ, s ): program δ can evolve one step from situation s to situation s with remaining program δ. Trans(δ 1 ; δ 2, s, δ, s ) Trans(δ 1, s, δ 1, s ) δ = δ 1 ; δ 2 Final(δ 1, s) Trans(δ 2, s, δ, s ). 2 Final(δ, s): program δ may terminate successfully in s. Final(δ 1 ; δ 2, s) Final(δ 1, s) Final(δ 2, s) 5 / 18
16 Formalizing the Composition Problem: Simulation Informally: System S simulates system T if S can match all T s moves, forever. 6 / 18
17 Formalizing the Composition Problem: Simulation Informally: System S simulates system T if S can match all T s moves, forever. Formally [Milner IJCAI 71]: Given two labelled TSs S = (Σ S, A S, S ) and T = (Σ T, A T, T ), the simulation is the largest relation Sim Σ S Σ T such that: if Sim(s, t) holds (state s simulates state t), then: if t α T t, then there exists s α S s and Sim(s, t ). 6 / 18
18 The Composition Problem: Simulation Sim(δ t, δ 1,..., δ n, s): available programs can simulate the target program in s. where Sim(δ t, δ 1,..., δ n, s) S. ( S(δ t, δ 1,..., δ n, s) δ t, δ 1,..., δ n, s.θ[s](δ t, δ 1,..., δ n, s) ), Θ[S](δ t, δ 1,..., δ n, s) = def S(δ ( t, δ 1,..., δ n, s) Final(δt, s) i=1,...,n Final(δ i, s) ) ( δ t, s Trans(δ t, s, δ t, s ) i=1,...,n δ i.trans(δ i, s, δ i, s ) S(δ t, δ 1,..., δ i,..., δ n, s ) ). If the simulation holds then one can build an orchestrator generator based on it. 7 / 18
19 The Composition Problem: Simulation Sim(δ t, δ 1,..., δ n, s): available programs can simulate the target program in s. where Sim(δ t, δ 1,..., δ n, s) S. ( S(δ t, δ 1,..., δ n, s) δ t, δ 1,..., δ n, s.θ[s](δ t, δ 1,..., δ n, s) ), Second Θ[S](δ t, δ 1,..., δ n, s) = def order! S(δ ( t, δ 1,..., δ n, s) Final(δt, s) i=1,...,n Final(δ i, s) ) ( δ t, s Trans(δ t, s, δ t, s ) i=1,...,n δ i.trans(δ i, s, δ i, s ) S(δ t, δ 1,..., δ i,..., δ n, s ) ). If the simulation holds then one can build an orchestrator generator based on it. 7 / 18
20 The Technique Relies on the following tools /notions: 1 Simulation approximates: [Tarski 55] Check simulation in a finite way. 2 Regression mechanism: [Reiter 91; Pirri & Reiter 99] Reason on formulas after action performance. 3 Characteristic graphs: [Classen&Lakemeyer KR 08] Abstract (infinite) program states into a finite graph. 8 / 18
21 The Technique Relies on the following tools /notions: 1 Simulation approximates: [Tarski 55] Check simulation in a finite way. 2 Regression mechanism: [Reiter 91; Pirri & Reiter 99] Reason on formulas after action performance. 3 Characteristic graphs: [Classen&Lakemeyer KR 08] Abstract (infinite) program states into a finite graph. 9 / 18
22 Simulation Approximates Sim k (δ t, δ 1,..., δ n, s): the available programs can simulate k steps of the target program in s. Sim 0(δ t, δ 1,..., δ n, s) (Final(δ t, s) V i=1,...,n Final(δ i, s)). Sim k+1 (δ t, δ 1,..., δ n, s) Sim k (δ t, δ 1,..., δ n, s) ` δ t, s.trans(δ t, s, δ t, s ) W i=1,...,n δ i.trans(δ i, s, δ i, s ) Sim k (δ t, δ 1,..., δ i,..., δ n, s ). 10 / 18
23 Simulation Approximates Sim k (δ t, δ 1,..., δ n, s): the available programs can simulate k steps of the target program in s. Sim 0(δ t, δ 1,..., δ n, s) (Final(δ t, s) V i=1,...,n Final(δ i, s)). Sim k+1 (δ t, δ 1,..., δ n, s) Sim k (δ t, δ 1,..., δ n, s) ` δ t, s.trans(δ t, s, δ t, s ) W i=1,...,n δ i.trans(δ i, s, δ i, s ) Sim k (δ t, δ 1,..., δ i,..., δ n, s ). Proposition For every k 0, if Sim k (δ t, δ 1,..., δ n, s) Sim k+1 (δ t, δ 1,..., δ n, s), then Sim k (δ t, δ 1,..., δ n, s) Sim(δ t, δ 1,..., δ n, s). 10 / 18
24 The Technique Relies on the following tools /notions: 1 Simulation approximates: [Tarski 55] Check simulation in a finite way. 2 Regression mechanism: [Reiter 91; Pirri & Reiter 99] Reason on formulas after action performance. computes what has to be true in situation s so that φ is true after doing action α in s. R[φ(do(α, s))] = φ (s) action α has been eliminated! 3 Characteristic graphs: [Classen&Lakemeyer KR 08] Abstract (infinite) program states into a finite graph. 11 / 18
25 The Technique Relies on the following tools /notions: 1 Simulation approximates: [Tarski 55] Check simulation in a finite way. 2 Regression mechanism: [Reiter 91; Pirri & Reiter 99] Reason on formulas after action performance. 3 Characteristic graphs: [Classen&Lakemeyer KR 08] Abstract (infinite) program states into a finite graph. 12 / 18
26 Characteristic Graph for δ music πsong, disk : select(song), v 0 Pending(song) InDisk(song, disk) Playing v 1 wait, Playing song.pending(song) play(song), True load(disk), True v 2 δ music. = while True do { if ( Playing ( song)pending(song)) then πsong, disk.{ (Pending(song) InDisk(song, disk))?; select(song); load(disk); play(song) } else wait } v 0 = δ music, False v 1 = load(disk); play(song), False v 2 = play(song), False 13 / 18
27 The Composition Problem: Simulation Sim(δ t, δ 1,..., δ n, s): available programs can simulate the target program in s. where Sim(δ t, δ 1,..., δ n, s) S. ( S(δ t, δ 1,..., δ n, s) δ t, δ 1,..., δ n, s.θ[s](δ t, δ 1,..., δ n, s) ), Θ[S](δ t, δ 1,..., δ n, s) = def S(δ ( t, δ 1,..., δ n, s) Final(δt, s) i=1,...,n Final(δ i, s) ) ( δ t, s Trans(δ t, s, δ t, s ) i=1,...,n δ i.trans(δ i, s, δ i, s ) S(δ t, δ 1,..., δ i,..., δ n, s ) ). If the simulation holds then one can build an orchestrator generator based on it. 14 / 18
28 Algorithm SymSim(δ 0 t, δ 0 1,..., δ0 n) Computes relation X containing tuples of the form v t, v 1,..., v n, φ : v t, v 1,..., v n are nodes in the characteristic graphs. FO formula φ: the target program in v t is simulated by the available programs in v 1,..., v n. 15 / 18
29 Algorithm SymSim(δ 0 t, δ 0 1,..., δ0 n) Computes relation X containing tuples of the form v t, v 1,..., v n, φ : v t, v 1,..., v n are nodes in the characteristic graphs. FO formula φ: the target program in v t is simulated by the available programs in v 1,..., v n. 1 X 0 := { (δ t, γ t ), (δ 1, γ 1 ),..., (δ n, γ n ), γ t n i=1 γ i (δ j, γ j ) in G δ 0 j } 0-step simulation: check for termination mimicking. 15 / 18
30 Algorithm SymSim(δ 0 t, δ 0 1,..., δ0 n) Computes relation X containing tuples of the form v t, v 1,..., v n, φ : v t, v 1,..., v n are nodes in the characteristic graphs. FO formula φ: the target program in v t is simulated by the available programs in v 1,..., v n. 1 X 0 := { (δ t, γ t ), (δ 1, γ 1 ),..., (δ n, γ n ), γ t n i=1 γ i (δ j, γ j ) in G δ 0 j } 0-step simulation: check for termination mimicking. 2 At every step, compute Next[X ]: one step refinement of the simulation: Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }. φ new : we can safely mimic (any) single action from the target. 15 / 18
31 Algorithm SymSim(δ 0 t, δ 0 1,..., δ0 n) Computes relation X containing tuples of the form v t, v 1,..., v n, φ : v t, v 1,..., v n are nodes in the characteristic graphs. FO formula φ: the target program in v t is simulated by the available programs in v 1,..., v n. 1 X 0 := { (δ t, γ t ), (δ 1, γ 1 ),..., (δ n, γ n ), γ t n i=1 γ i (δ j, γ j ) in G δ 0 j } 0-step simulation: check for termination mimicking. 2 At every step, compute Next[X ]: one step refinement of the simulation: Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }. φ new : we can safely mimic (any) single action from the target. 3 X represents the approximates of the simulation, refined at each iteration. 15 / 18
32 Algorithm SymSim(δ 0 t, δ 0 1,..., δ0 n) Computes relation X containing tuples of the form v t, v 1,..., v n, φ : v t, v 1,..., v n are nodes in the characteristic graphs. FO formula φ: the target program in v t is simulated by the available programs in v 1,..., v n. 1 X 0 := { (δ t, γ t ), (δ 1, γ 1 ),..., (δ n, γ n ), γ t n i=1 γ i (δ j, γ j ) in G δ 0 j } 0-step simulation: check for termination mimicking. 2 At every step, compute Next[X ]: one step refinement of the simulation: Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }. φ new : we can safely mimic (any) single action from the target. 3 X represents the approximates of the simulation, refined at each iteration. 4 Stop when X = Next[X ]. 15 / 18
33 Next[X ]: One-step refinement of the simulation Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }, φ new = π x αt v t v t ( Et ψ t x.ψ t [s] Poss(α t, s) n i=1 π y.α v i i v ψi i E i v t,v1,...,v i,...,vn,φ i X ) y.α t = α i ψ i [s] R[φ i (do(α i, s))]. For every potential target evolution from v t to v t via action α t,... if it can be done in the program (ψ t holds) and the action α t is possible,... then some available prog. δ i can evolve from v i to v i via action α i such that: 1 the action α i can be matched to α t ; 2 the program can indeed do the step; 3 after doing the step, we are still in simulation. 16 / 18
34 Next[X ]: One-step refinement of the simulation Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }, φ new = π x αt v t v t ( Et ψ t x.ψ t [s] Poss(α t, s) n i=1 π y.α v i i v ψi i E i v t,v1,...,v i,...,vn,φ i X ) y.α t = α i ψ i [s] R[φ i (do(α i, s))]. For every potential target evolution from v t to v t via action α t,... if it can be done in the program (ψ t holds) and the action α t is possible,... then some available prog. δ i can evolve from v i to v i via action α i such that: 1 the action α i can be matched to α t ; 2 the program can indeed do the step; 3 after doing the step, we are still in simulation. 16 / 18
35 Next[X ]: One-step refinement of the simulation Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }, φ new = π x αt v t v t ( Et ψ t x.ψ t [s] Poss(α t, s) n i=1 π y.α v i i v ψi i E i v t,v1,...,v i,...,vn,φ i X ) y.α t = α i ψ i [s] R[φ i (do(α i, s))]. For every potential target evolution from v t to v t via action α t,... if it can be done in the program (ψ t holds) and the action α t is possible,... then some available prog. δ i can evolve from v i to v i via action α i such that: 1 the action α i can be matched to α t ; 2 the program can indeed do the step; 3 after doing the step, we are still in simulation. 16 / 18
36 Next[X ]: One-step refinement of the simulation Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }, φ new = π x αt v t v t ( Et ψ t x.ψ t [s] Poss(α t, s) n i=1 π y.α v i i v ψi i E i v t,v1,...,v i,...,vn,φ i X ) y.α t = α i ψ i [s] R[φ i (do(α i, s))]. For every potential target evolution from v t to v t via action α t,... if it can be done in the program (ψ t holds) and the action α t is possible,... then some available prog. δ i can evolve from v i to v i via action α i such that: 1 the action α i can be matched to α t ; 2 the program can indeed do the step; 3 after doing the step, we are still in simulation. 16 / 18
37 Next[X ]: One-step refinement of the simulation Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }, φ new = π x αt v t v t ( Et ψ t x.ψ t [s] Poss(α t, s) n i=1 π y.α v i i v ψi i E i v t,v1,...,v i,...,vn,φ i X ) y.α t = α i ψ i [s] R[φ i (do(α i, s))]. For every potential target evolution from v t to v t via action α t,... if it can be done in the program (ψ t holds) and the action α t is possible,... then some available prog. δ i can evolve from v i to v i via action α i such that: 1 the action α i can be matched to α t ; 2 the program can indeed do the step; 3 after doing the step, we are still in simulation. 16 / 18
38 Next[X ]: One-step refinement of the simulation Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }, φ new = π x αt v t v t ( Et ψ t x.ψ t [s] Poss(α t, s) n i=1 π y.α v i i v ψi i E i v t,v1,...,v i,...,vn,φ i X ) y.α t = α i ψ i [s] R[φ i (do(α i, s))]. For every potential target evolution from v t to v t via action α t,... if it can be done in the program (ψ t holds) and the action α t is possible,... then some available prog. δ i can evolve from v i to v i via action α i such that: 1 the action α i can be matched to α t ; 2 the program can indeed do the step; 3 after doing the step, we are still in simulation. 16 / 18
39 Next[X ]: One-step refinement of the simulation Next[X ] = { v t, v 1,..., v n, φ old φ new v t, v 1,..., v n, φ old X }, φ new = π x αt v t v t ( Et ψ t x.ψ t [s] Poss(α t, s) n i=1 π y.α v i i v ψi i E i v t,v1,...,v i,...,vn,φ i X ) y.α t = α i ψ i [s] R[φ i (do(α i, s))]. For every potential target evolution from v t to v t via action α t,... if it can be done in the program (ψ t holds) and the action α t is possible,... then some available prog. δ i can evolve from v i to v i via action α i such that: 1 the action α i can be matched to α t ; 2 the program can indeed do the step; 3 after doing the step, we are still in simulation. 16 / 18
40 Technical Results Theorem If algorithm SymSim(δ 0 t, δ 0 1,..., δ0 n) terminates returning the set X. Then, Axioms = Sim(δ t, δ 1,..., δ n, s) φ[s], where (δ t, γ t ), (δ 1, γ 1 ),..., (δ n, γ n ), φ X. 17 / 18
41 Technical Results Theorem If algorithm SymSim(δ 0 t, δ 0 1,..., δ0 n) terminates returning the set X. Then, Axioms = Sim(δ t, δ 1,..., δ n, s) φ[s], where (δ t, γ t ), (δ 1, γ 1 ),..., (δ n, γ n ), φ X. Moreover, we can construct a delegator controller to realize the composition on-the-fly using FO entailment only (on D S0 ). Idea: after a request, jump to a configuration v t, v 1,..., v n, φ X for which φ holds. 17 / 18
42 Conclusions Reasoning on unbounded data and processes is a challenge for CS since it leads infinite state systems. Standard approach: abstract to finite systems (see literature on Verification). Here instead we are proposing an alternative approach rooted in KR and AI. 18 / 18
43 Conclusions Reasoning on unbounded data and processes is a challenge for CS since it leads infinite state systems. Standard approach: abstract to finite systems (see literature on Verification). Here instead we are proposing an alternative approach rooted in KR and AI. Specifically: Based on transforming the second-order formula for checking the dynamic property of simulation into a first-order one talking only about the static properties of the initial situation/db. 18 / 18
44 Conclusions Reasoning on unbounded data and processes is a challenge for CS since it leads infinite state systems. Standard approach: abstract to finite systems (see literature on Verification). Here instead we are proposing an alternative approach rooted in KR and AI. Specifically: Based on transforming the second-order formula for checking the dynamic property of simulation into a first-order one talking only about the static properties of the initial situation/db. Main research direction for future work: 1 incomplete information about the initial situation. offline vs online interpreters (see literature on high-level programs in AI). 2 identify cases in which the technique becomes sound & complete. 18 / 18
On Ability to Autonomously Execute Agent Programs with Sensing
On Ability to Autonomously Execute Agent Programs with Sensing Sebastian Sardiña Dept. of Computer Science University of Toronto ssardina@cs.toronto.edu Yves Lespérance Dept. of Computer Science York University
More informationif t 1,...,t k Terms and P k is a k-ary predicate, then P k (t 1,...,t k ) Formulas (atomic formulas)
FOL Query Evaluation Giuseppe De Giacomo Università di Roma La Sapienza Corso di Seminari di Ingegneria del Software: Data and Service Integration Laurea Specialistica in Ingegneria Informatica Università
More informationLecture 3: High-level Programming in the Situation Calculus: Golog and ConGolog
DIS La Sapienza, PhD Course: Reasoning about Action and High-Level Programs Lecture 3: High-level Programming in the Situation Calculus: Golog and ConGolog Yves Lespérance Dept. of Computer Science & Engineering,
More informationReconciling Situation Calculus and Fluent Calculus
Reconciling Situation Calculus and Fluent Calculus Stephan Schiffel and Michael Thielscher Department of Computer Science Dresden University of Technology {stephan.schiffel,mit}@inf.tu-dresden.de Abstract
More informationInterpreting Golog Programs in Flux
Interpreting Golog Programs in Flux Stephan Schiffel and Michael Thielscher Department of Computer Science Dresden University of Technology {stephan.schiffel,mit}@inf.tu-dresden.de Abstract A new semantics
More informationOn the Progression of Situation Calculus Basic Action Theories: Resolving a 10-year-old Conjecture
On the Progression of Situation Calculus Basic Action Theories: Resolving a 10-year-old Conjecture Stavros Vassos and Hector J Levesque Department of Computer Science University of Toronto Toronto, ON,
More informationOn the Semantics of Deliberation in IndiGolog
On the Semantics of Deliberation in IndiGolog From Theory to Implementation GIUSEPPE DE GIACOMO (degiacomo@dis.uniroma1.it) Dip. Informatica e Sistemistica, Università di Roma La Sapienza, Via Salaria
More informationTractable Reasoning with Incomplete First-Order Knowledge in Dynamic Systems with Context-Dependent Actions
Tractable Reasoning with Incomplete First-Order Knowledge in Dynamic Systems with Context-Dependent Actions Yongmei Liu and Hector J. Levesque Department of Computer Science University of Toronto Toronto,
More informationAutomatic Synthesis of New Behaviors from a Library of Available Behaviors
Automatic Synthesis of New Behaviors from a Library of Available Behaviors Giuseppe De Giacomo Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Roma, Italy degiacomo@dis.uniroma1.it
More informationAutomata-Theoretic Model Checking of Reactive Systems
Automata-Theoretic Model Checking of Reactive Systems Radu Iosif Verimag/CNRS (Grenoble, France) Thanks to Tom Henzinger (IST, Austria), Barbara Jobstmann (CNRS, Grenoble) and Doron Peled (Bar-Ilan University,
More informationOn the semantics of deliberation in IndiGolog from theory to implementation
Annals of Mathematics and Artificial Intelligence 41: 259 299, 2004. 2004 Kluwer Academic Publishers. Printed in the Netherlands. On the semantics of deliberation in IndiGolog from theory to implementation
More informationConGolog, a concurrent programming language based on the situation calculus
Artificial Intelligence 121 (2000) 109 169 ConGolog, a concurrent programming language based on the situation calculus Giuseppe De Giacomo a,, Yves Lespérance b, Hector J. Levesque c a Dipartimento di
More informationDecidable Reasoning in a Modified Situation Calculus
Decidable Reasoning in a Modified Situation Calculus Yilan Gu Dept. of Computer Science University of Toronto 10 King s College Road Toronto, ON, M5S 3G4, Canada Email: yilan@cs.toronto.edu Abstract We
More informationThe State Explosion Problem
The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis
More informationOn the Progression of Knowledge in the Situation Calculus
On the Progression of Knowledge in the Situation Calculus Yongmei Liu Department of Computer Science Sun Yat-sen University Guangzhou, China Joint work with Ximing Wen KRW-2012, Guiyang June 17, 2012 Y.
More informationGeneralized Planning: Synthesizing Plans that Work for Multiple Environments
Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Generalized Planning: Synthesizing Plans that Work for Multiple Environments Yuxiao Hu Department of Computer
More informationDesign of Distributed Systems Melinda Tóth, Zoltán Horváth
Design of Distributed Systems Melinda Tóth, Zoltán Horváth Design of Distributed Systems Melinda Tóth, Zoltán Horváth Publication date 2014 Copyright 2014 Melinda Tóth, Zoltán Horváth Supported by TÁMOP-412A/1-11/1-2011-0052
More informationReasoning about State Constraints in the Situation Calculus
Reasoning about State Constraints in the Situation Calculus Joint work with Naiqi Li and Yi Fan Yongmei Liu Dept. of Computer Science Sun Yat-sen University Guangzhou, China Presented at IRIT June 26,
More informationOn the Limits of Planning over Belief States under Strict Uncertainty
On the Limits of Planning over Belief States under Strict Uncertainty Sebastian Sardina Dept. of Comp. Sci. RMIT University Melbourne, AUSTRLIA ssardina@cs.rmit.edu.au Giuseppe De Giacomo Dipart. di Infor.
More informationDeveloping Modal Tableaux and Resolution Methods via First-Order Resolution
Developing Modal Tableaux and Resolution Methods via First-Order Resolution Renate Schmidt University of Manchester Reference: Advances in Modal Logic, Vol. 6 (2006) Modal logic: Background Established
More informationA Generic Framework and Solver for Synthesizing Finite-State Controllers
A Generic Framework and Solver for Synthesizing Finite-State Controllers Yuxiao Hu Department of Computer Science University of Toronto Toronto, ON M5S3G4, Canada yuxiao@cs.toronto.edu Giuseppe De Giacomo
More information3-Valued Abstraction-Refinement
3-Valued Abstraction-Refinement Sharon Shoham Academic College of Tel-Aviv Yaffo 1 Model Checking An efficient procedure that receives: A finite-state model describing a system A temporal logic formula
More informationinitial state to some prespecied goal state, the task is to nd a sequence of actions that constitutes a legal execution of some prespecied non-determi
ConGolog, a concurrent programming language based on the situation calculus: foundations Giuseppe De Giacomo Dipartimento di Informatica e Sistemistica Universita di Roma \La Sapienza" Via Salaria 113,
More informationAxiomatic Semantics. Lecture 9 CS 565 2/12/08
Axiomatic Semantics Lecture 9 CS 565 2/12/08 Axiomatic Semantics Operational semantics describes the meaning of programs in terms of the execution steps taken by an abstract machine Denotational semantics
More informationProgression and Verification of Situation Calculus Agents with Bounded Beliefs
Progression and Verification of Situation Calculus Agents with Bounded Beliefs Giuseppe De Giacomo DIAG, Sapienza Università di Roma Roma, Italy degiacomo@dis.uniroma1.it Yves Lespérance EECS York University
More informationFormal Verification of Mobile Network Protocols
Dipartimento di Informatica, Università di Pisa, Italy milazzo@di.unipi.it Pisa April 26, 2005 Introduction Modelling Systems Specifications Examples Algorithms Introduction Design validation ensuring
More informationOn Defaults in Action Theories
On Defaults in Action Theories Hannes Strass and Michael Thielscher Department of Computer Science Dresden University of Technology {hannes.strass,mit}@inf.tu-dresden.de Abstract. We study the integration
More informationI N F S Y S R E S E A R C H R E P O R T REASONING ABOUT ACTIONS WITH SENSING UNDER QUALITATIVE AND PROBABILISTIC UNCERTAINTY
I N F S Y S R E S E A R C H R E P O R T INSTITUT FÜR INFORMATIONSSYSTEME ARBEITSBEREICH WISSENSBASIERTE SYSTEME REASONING ABOUT ACTIONS WITH SENSING UNDER QUALITATIVE AND PROBABILISTIC UNCERTAINTY LUCA
More informationOnline Agent Supervision in the Situation Calculus
Online Agent Supervision in the Situation Calculus Bita Banihashemi York University Toronto, ON, Canada bita@cse.yorku.ca Giuseppe De Giacomo Sapienza Università di Roma Roma, Italy degiacomo@dis.uniroma1.it
More informationHoare Logic (I): Axiomatic Semantics and Program Correctness
Hoare Logic (I): Axiomatic Semantics and Program Correctness (Based on [Apt and Olderog 1991; Gries 1981; Hoare 1969; Kleymann 1999; Sethi 199]) Yih-Kuen Tsay Dept. of Information Management National Taiwan
More informationProofs of Correctness: Introduction to Axiomatic Verification
Proofs of Correctness: Introduction to Axiomatic Verification Introduction Weak correctness predicate Assignment statements Sequencing Selection statements Iteration 1 Introduction What is Axiomatic Verification?
More informationSFM-11:CONNECT Summer School, Bertinoro, June 2011
SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision
More informationContinuing the KRR Journey
1 Weeks 1 3 Week 4 Week 5 Week 6 Continuing the KRR Journey Propositional and first-order logic (FOL) Expressiveness and Decidability: Propositional logic is decidable, FOL is not. Classical planning problems:
More informationStatic Program Analysis using Abstract Interpretation
Static Program Analysis using Abstract Interpretation Introduction Static Program Analysis Static program analysis consists of automatically discovering properties of a program that hold for all possible
More informationDescription Logics. Deduction in Propositional Logic. franconi. Enrico Franconi
(1/20) Description Logics Deduction in Propositional Logic Enrico Franconi franconi@cs.man.ac.uk http://www.cs.man.ac.uk/ franconi Department of Computer Science, University of Manchester (2/20) Decision
More informationT Reactive Systems: Temporal Logic LTL
Tik-79.186 Reactive Systems 1 T-79.186 Reactive Systems: Temporal Logic LTL Spring 2005, Lecture 4 January 31, 2005 Tik-79.186 Reactive Systems 2 Temporal Logics Temporal logics are currently the most
More informationAn Optimal Frontier of the Efficiency of Tissue P Systems with Cell Division
An Optimal Frontier of the Efficiency of Tissue P Systems with Cell Division A.E. Porreca 1, Niall Murphy 2,3, Mario J. Pérez-Jiménez 4 1 Dipartimento di Informatica, Sistemistica e Comunicazione Università
More informationReasoning Under Uncertainty: Introduction to Probability
Reasoning Under Uncertainty: Introduction to Probability CPSC 322 Lecture 23 March 12, 2007 Textbook 9 Reasoning Under Uncertainty: Introduction to Probability CPSC 322 Lecture 23, Slide 1 Lecture Overview
More informationThe Bakery Algorithm: Yet Another Specification and Verification 0
The Bakery Algorithm: Yet Another Specification and Verification 0 Egon Börger 1 Yuri Gurevich 2 Dean Rosenzweig 3 Abstract In a meeting at Schloss Dagstuhl in June 1993, Uri Abraham and Menachem Magidor
More informationbrels: A System for the Integration of Knowledge Bases
brels: A System for the Integration of Knowledge Bases Paolo Liberatore and Marco Schaerf Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I-00198, Roma, Italy
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More informationNon-Markovian Control in the Situation Calculus
Non-Markovian Control in the Situation Calculus An Elaboration Niklas Hoppe Seminar Foundations Of Artificial Intelligence Knowledge-Based Systems Group RWTH Aachen May 3, 2009 1 Contents 1 Introduction
More informationEfficient Reasoning in Proper Knowledge Bases with Unknown Individuals
Efficient Reasoning in Proper Knowledge Bases with Unknown Individuals Giuseppe De Giacomo Sapienza Università di Roma Rome, Italy degiacomo@dis.uniroma1.it Yves Lespérance York University Toronto, Canada
More informationChapter 4: Computation tree logic
INFOF412 Formal verification of computer systems Chapter 4: Computation tree logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 CTL: a specification
More informationFormal Verification: further Complexity Issues and Applications
Università degli Studi di Roma La Sapienza Dottorato di Ricerca in Ingegneria Informatica XVIII Ciclo 2005 Formal Verification: further Complexity Issues and Applications Andrea Ferrara Università degli
More informationIterated Belief Change in the Situation Calculus
Iterated Belief Change in the Situation Calculus Steven Shapiro a,, Maurice Pagnucco b, Yves Lespérance c, Hector J. Levesque a a Department of Computer Science, University of Toronto, Toronto, ON M5S
More informationPLEASE DO NOT REMOVE THIS PAGE
Thank you for downloading this document from the RMIT ResearchR Repository Citation: Liu, H, Wang, D, Huimin, L and Chen, T 2009, 'On the integration of metamorphic testing and model checking', in Hans
More informationData Complexity of Query Answering in Description Logics
Data Complexity of Query Answering in Description Logics Diego Calvanese 1, Giuseppe De Giacomo 2, Domenico Lembo 2, Maurizio Lenzerini 2, Riccardo Rosati 2 1 Faculty of Computer Science Free University
More information1 First-order logic. 1 Syntax of first-order logic. 2 Semantics of first-order logic. 3 First-order logic queries. 2 First-order query evaluation
Knowledge Bases and Databases Part 1: First-Order Queries Diego Calvanese Faculty of Computer Science Master of Science in Computer Science A.Y. 2007/2008 Overview of Part 1: First-order queries 1 First-order
More informationTimo Latvala. February 4, 2004
Reactive Systems: Temporal Logic LT L Timo Latvala February 4, 2004 Reactive Systems: Temporal Logic LT L 8-1 Temporal Logics Temporal logics are currently the most widely used specification formalism
More informationPropositional and Predicate Logic - V
Propositional and Predicate Logic - V Petr Gregor KTIML MFF UK WS 2016/2017 Petr Gregor (KTIML MFF UK) Propositional and Predicate Logic - V WS 2016/2017 1 / 21 Formal proof systems Hilbert s calculus
More informationVARIABLE-STRENGTH CONDITIONAL PREFERENCES FOR RANKING OBJECTS IN ONTOLOGIES
I N F S Y S R E S E A R C H R E P O R T INSTITUT FÜR INFORMATIONSSYSTEME ARBEITSBEREICH WISSENSBASIERTE SYSTEME VARIABLE-STRENGTH CONDITIONAL PREFERENCES FOR RANKING OBJECTS IN ONTOLOGIES THOMAS LUKASIEWICZ
More informationDynamic Semantics. Dynamic Semantics. Operational Semantics Axiomatic Semantics Denotational Semantic. Operational Semantics
Dynamic Semantics Operational Semantics Denotational Semantic Dynamic Semantics Operational Semantics Operational Semantics Describe meaning by executing program on machine Machine can be actual or simulated
More informationBounded Stacks, Bags and Queues
Bounded Stacks, Bags and Queues J.C.M. Baeten 1 and J.A. Bergstra 2,3 1 Department of Mathematics and Computing Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven, The Netherlands,
More informationI N F S Y S R E S E A R C H R E P O R T PROBABILISTIC LOGIC UNDER COHERENCE: COMPLEXITY AND ALGORITHMS INSTITUT FÜR INFORMATIONSSYSTEME
I N F S Y S R E S E A R C H R E P O R T INSTITUT FÜR INFORMATIONSSYSTEME ABTEILUNG WISSENSBASIERTE SYSTEME PROBABILISTIC LOGIC UNDER COHERENCE: COMPLEXITY AND ALGORITHMS Veronica BIAZZO Thomas LUKASIEWICZ
More informationDesigning and Evaluating Generic Ontologies
Designing and Evaluating Generic Ontologies Michael Grüninger Department of Industrial Engineering University of Toronto gruninger@ie.utoronto.ca August 28, 2007 1 Introduction One of the many uses of
More informationParallel Behavior Composition for Manufacturing
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI-6) Parallel Behavior Composition for Manufacturing Paolo Felli University of Nottingham, UK paolo.felli@nottingham.ac.uk
More informationI N F S Y S R E S E A R C H R E P O R T
I N F S Y S R E S E A R C H R E P O R T INSTITUT FÜR INFORMATIONSSYSTEME ABTEILUNG WISSENSBASIERTE SYSTEME STRUCTURE-BASED CAUSES AND EXPLANATIONS IN THE INDEPENDENT CHOICE LOGIC Alberto Finzi and Thomas
More informationAUTOMATED REASONING. Agostino Dovier. Udine, October 2, Università di Udine CLPLAB
AUTOMATED REASONING Agostino Dovier Università di Udine CLPLAB Udine, October 2, 2017 AGOSTINO DOVIER (CLPLAB) AUTOMATED REASONING UDINE, OCTOBER 2, 2017 1 / 28 COURSE PLACEMENT International Master Degree
More informationEfficient Computation of Program Equivalence for Confluent Concurrent Constraint Programming
Efficient Computation of Program Equivalence for Confluent Concurrent Constraint Programming Luis F. Pino INRIA/DGA and LIX École Polytechnique 91128 Palaiseau, France luis.pino@lix.polytechnique.fr Filippo
More informationProjection using Regression and Sensors
Projection using Regression and Sensors Giuseppe De Giacomo Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 11, 00198 Roma, Italy degiacomo@dis.uniroma1.it Hector
More informationAn Introduction to Hybrid Systems Modeling
CS620, IIT BOMBAY An Introduction to Hybrid Systems Modeling Ashutosh Trivedi Department of Computer Science and Engineering, IIT Bombay CS620: New Trends in IT: Modeling and Verification of Cyber-Physical
More informationPairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events
Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle
More informationPropositional Reasoning
Propositional Reasoning CS 440 / ECE 448 Introduction to Artificial Intelligence Instructor: Eyal Amir Grad TAs: Wen Pu, Yonatan Bisk Undergrad TAs: Sam Johnson, Nikhil Johri Spring 2010 Intro to AI (CS
More informationVerification of Artifact-centric Processes
Verification of Artifact-centric Processes Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti Dottorato di Ricerca in Ingegneria Informatica XXV Ciclo Candidate Riccardo De
More informationGeneralized Planning: Non-Deterministic Abstractions and Trajectory Constraints
Blai Bonet Univ. Simón Bolívar Caracas, Venezuela bonet@ldc.usb.ve Generalized Planning: Non-Deterministic Abstractions and Trajectory Constraints Giuseppe De Giacomo Sapienza Univ. Roma Rome, Italy degiacomo@dis.uniroma1.it
More informationToday s Lecture. Lecture 4: Formal SE. Some Important Points. Formal Software Engineering. Introduction to Formal Software Engineering
Today s Lecture Lecture 4: Formal SE Introduction to Formal Software Engineering Discuss Models Discuss Formal Notations Kenneth M. Anderson Foundations of Software Engineering CSCI 5828 - Spring Semester,
More informationConsensus and Universal Construction"
Consensus and Universal Construction INF346, 2015 So far Shared-memory communication: safe bits => multi-valued atomic registers atomic registers => atomic/immediate snapshot 2 Today Reaching agreement
More informationReasoning about Actions with Sensing under Qualitative and Probabilistic Uncertainty
Reasoning about Actions with Sensing under Qualitative and Probabilistic Uncertainty Luca Iocchi and homas Lukasiewicz 2 and Daniele Nardi and Riccardo Rosati Abstract. We focus on the aspect of sensing
More informationComplexity. Complexity Theory Lecture 3. Decidability and Complexity. Complexity Classes
Complexity Theory 1 Complexity Theory 2 Complexity Theory Lecture 3 Complexity For any function f : IN IN, we say that a language L is in TIME(f(n)) if there is a machine M = (Q, Σ, s, δ), such that: L
More informationChapter 3 Deterministic planning
Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions
More informationBusiness Process Verification with Constraint Temporal Answer Set Programming
1 Online appendix for the paper Business Process Verification with Constraint Temporal Answer Set Programming published in Theory and Practice of Logic Programming Laura Giordano DISIT, Università del
More informationPlan Generation and Plan Execution in Agent Programming
Plan Generation and Plan Execution in Agent Programming M. Birna van Riemsdijk and Mehdi Dastani Institute of Information and Computing Sciences Utrecht University The Netherlands {birna, mehdi}@cs.uu.nl
More informationModular Verification of Concurrent Programs via Sequential Model Checking. Dan Rasin
Modular Verification of Concurrent Programs via Sequential Model Checking Dan Rasin Modular Verification of Concurrent Programs via Sequential Model Checking Research Thesis Submitted in partial fulfillment
More informationLocal Conditional High-Level Robot Programs (extended version)
Local Conditional High-Level Robot Programs (extended version) Sebastian Sardiña Department of Computer Science University of Toronto Toronto, Canada M5S 1A4 ssardina@cs.toronto.edu, WWW home page: http://www.cs.toronto.edu
More informationA Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a
A Preference Semantics for Ground Nonmonotonic Modal Logics Daniele Nardi and Riccardo Rosati Dipartimento di Informatica e Sistemistica, Universita di Roma \La Sapienza", Via Salaria 113, I-00198 Roma,
More informationLecture Notes on Software Model Checking
15-414: Bug Catching: Automated Program Verification Lecture Notes on Software Model Checking Matt Fredrikson André Platzer Carnegie Mellon University Lecture 19 1 Introduction So far we ve focused on
More informationUndecidability in Epistemic Planning
Undecidability in Epistemic Planning Thomas Bolander, DTU Compute, Tech Univ of Denmark Joint work with: Guillaume Aucher, Univ Rennes 1 Bolander: Undecidability in Epistemic Planning p. 1/17 Introduction
More informationAbstraction of Agents Executing Online and their Abilities in the Situation Calculus
Abstraction of Agents Executing Online and their Abilities in the Situation Calculus Bita Banihashemi 1, Giuseppe De Giacomo 2, Yves Lespérance 1 1 York University 2 Sapienza Università di Roma bita@cse.yorku.ca,
More informationLinear-time Temporal Logic
Linear-time Temporal Logic Pedro Cabalar Department of Computer Science University of Corunna, SPAIN cabalar@udc.es 2015/2016 P. Cabalar ( Department Linear oftemporal Computer Logic Science University
More informationLogical Agents. Knowledge based agents. Knowledge based agents. Knowledge based agents. The Wumpus World. Knowledge Bases 10/20/14
0/0/4 Knowledge based agents Logical Agents Agents need to be able to: Store information about their environment Update and reason about that information Russell and Norvig, chapter 7 Knowledge based agents
More informationSpring 2015 Program Analysis and Verification. Lecture 4: Axiomatic Semantics I. Roman Manevich Ben-Gurion University
Spring 2015 Program Analysis and Verification Lecture 4: Axiomatic Semantics I Roman Manevich Ben-Gurion University Agenda Basic concepts of correctness Axiomatic semantics (pages 175-183) Hoare Logic
More informationHoare Logic: Reasoning About Imperative Programs
Hoare Logic: Reasoning About Imperative Programs COMP1600 / COMP6260 Dirk Pattinson Australian National University Semester 2, 2017 Catch Up / Drop in Lab When Fridays, 15.00-17.00 Where N335, CSIT Building
More informationdemanding computationally in all but simple settings. An alternative approach that is showing promise is that of high-level program execution [20]. Th
ConGolog, a concurrent programming language based on the situation calculus Giuseppe De Giacomo Dipartimento di Informatica e Sistemistica Universita di Roma \La Sapienza" Via Salaria 113, 00198 Roma,
More informationMULTI-AGENT ONLY-KNOWING
MULTI-AGENT ONLY-KNOWING Gerhard Lakemeyer Computer Science, RWTH Aachen University Germany AI, Logic, and Epistemic Planning, Copenhagen October 3, 2013 Joint work with Vaishak Belle Contents of this
More informationHelsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 66
Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 66 Teknillisen korkeakoulun tietojenkäsittelyteorian laboratorion tutkimusraportti 66 Espoo 2000 HUT-TCS-A66
More informationTemporal logics and explicit-state model checking. Pierre Wolper Université de Liège
Temporal logics and explicit-state model checking Pierre Wolper Université de Liège 1 Topics to be covered Introducing explicit-state model checking Finite automata on infinite words Temporal Logics and
More informationA Tableaux Calculus for KLM Preferential and Cumulative Logics
A Tableaux Calculus for KLM Preferential and Cumulative Logics Laura Giordano, Valentina Gliozzi, Nicola Olivetti, Gian Luca Pozzato Dipartimento di Informatica - Università del Piemonte Orientale A. Avogadro
More informationOn the Aggregation Problem for Synthesized Web Services
On the Aggregation Problem for Synthesized Web Services Ting Deng a, Wenfei Fan b,c, Leonid Libkin b, Yinghui Wu b a State Key Laboratory of Software Development Environment, Beihang University b University
More informationBounded Situation Calculus Action Theories and Decidable Verification
Proceedings of the Thirteenth International Conference on Principles of Knowledge Representation and Reasoning Bounded Situation Calculus Action Theories and Decidable Verification Giuseppe De Giacomo
More informationCIS (More Propositional Calculus - 6 points)
1 CIS6333 Homework 1 (due Friday, February 1) 1. (Propositional Calculus - 10 points) --------------------------------------- Let P, Q, R range over state predicates of some program. Prove or disprove
More informationKnowledge in the Situation Calculus
Knowledge in the Situation Calculus Adrian Pearce joint work with Ryan Kelly Department of Computing and Information Systems The University of Melbourne 22 September 2014 1 / 43 A (slightly adapted) well-known
More informationRegister machines L2 18
Register machines L2 18 Algorithms, informally L2 19 No precise definition of algorithm at the time Hilbert posed the Entscheidungsproblem, just examples. Common features of the examples: finite description
More informationCOMP219: Artificial Intelligence. Lecture 19: Logic for KR
COMP219: Artificial Intelligence Lecture 19: Logic for KR 1 Overview Last time Expert Systems and Ontologies Today Logic as a knowledge representation scheme Propositional Logic Syntax Semantics Proof
More informationProperty Persistence in the Situation Calculus
Property Persistence in the Situation Calculus Ryan F. Kelly, Adrian R. Pearce 1, Department of Computer Science and Software Engineering The University of Melbourne Victoria, 3010, Australia Abstract
More informationDecidable Subsets of CCS
Decidable Subsets of CCS based on the paper with the same title by Christensen, Hirshfeld and Moller from 1994 Sven Dziadek Abstract Process algebra is a very interesting framework for describing and analyzing
More informationAN ANALYSIS OF SYSTEMATIC APPROACHES TO REASONING ABOUT ACTIONS AND CHANGE
AN ANALYSIS OF SYSTEMATIC APPROACHES TO REASONING ABOUT ACTIONS AND CHANGE MICHAEL THIELSCHER Intellektik, Informatik, TH Darmstadt Alexanderstraße 10, D 64283 Darmstadt, Germany In: P. Jorrand, ed., Proc.
More informationCOMP219: Artificial Intelligence. Lecture 19: Logic for KR
COMP219: Artificial Intelligence Lecture 19: Logic for KR 1 Overview Last time Expert Systems and Ontologies Today Logic as a knowledge representation scheme Propositional Logic Syntax Semantics Proof
More informationNegotiation Games. Javier Esparza and Philipp Hoffmann. Fakultät für Informatik, Technische Universität München, Germany
Negotiation Games Javier Esparza and Philipp Hoffmann Fakultät für Informatik, Technische Universität München, Germany Abstract. Negotiations, a model of concurrency with multi party negotiation as primitive,
More informationAutomata-based Verification - III
CS3172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20/22: email: howard.barringer@manchester.ac.uk March 2005 Third Topic Infinite Word Automata Motivation Büchi Automata
More information