FASTer acceleration of counter automata in practice
|
|
- Jade Berry
- 6 years ago
- Views:
Transcription
1 FASTer acceleration of counter automata in practice Sébastien Bardin Joint work with Jérôme Leroux and Alain Finkel LSV - CNRS & ENS de Cachan
2 Outline 1. Counter system model-checking (a) Presburger sets and automata (b) Acceleration (c) Heuristic 2. The tool FAST (a) Overview (b) Related tools (c) In practice 3. Verication of the TTP protocol with FAST (a) Presentation of the protocol (b) Verication for 1 fault and N stations (c) Polyhedral acceleration (d) Verication for 2 faults and N stations 4. Conclusion and future work
3 Counter systems model checking - 1 We focus on counter systems, which are automata extended with integer variables. Counter systems allow to model a large range of complex systems: Abstract multi-threaded java programs, Embedded systems (TTP/C), All Broadcast Protocols,...
4 Counter systems model checking - 1 We focus on counter systems, which are automata extended with integer variables. Counter systems allow to model a large range of complex systems: Abstract multi-threaded java programs, Embedded systems (TTP/C), All Broadcast Protocols,... But checking safety properties is undecidable for counter systems!!
5 Counter systems model checking - 2 To overcome this problem, we have chosen: A symbolic representation of integer vectors by automata. An acceleration technique to help convergence:
6 Notion of Acceleration acceleration to compute in one operation the iteration of a transition.
7 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then
8 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then With the classical algorithm
9 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If then With the classical algorithm.
10 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If then With the classical algorithm.
11 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If then With the classical algorithm.
12 ! Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If then With the classical algorithm and so on!!
13 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then With Acceleration
14 " Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If With Acceleration then.
15 Related work FAST: Bardin, Finkel, Leroux, Petrucci [FSTTCS02], [CAV03], LASH: Boigelot, Rassart, Wolper [CAV94], [SAS95], [CAV98], [TACAS00], [CAV03], TREX: Asarin, Bouajjani, Collomb-Annichini, Lakhnech, Sighireanu, [SPIN00], [SAS01], [CAV01].
16 , dened & % $ " # Presburger sets and automata Presburger arithmetics is the rst order additive theory by 0 ) (/. ' )-' ', )' )+* ( % ( ' ( ) ( (. ) (54 )32 )1 (
17 " # )' )-' ', )' ( ) ( ( Presburger sets and automata Presburger arithmetics is the rst order additive theory by & % $, dened (/. 0 )+* ( % ( ' ) (54 )32 )1 (. This theory is decidable, and Presburger sets can be represented symbolically by automata: DFA [Boudet, Comon CAAP96], NDD [Wolper, Boigelot TACAS00], UBA [Leroux, INFINITY03].
18 " # )' )-' ', )' ( ) ( ( Presburger sets and automata Presburger arithmetics is the rst order additive theory by & % $, dened (/. 0 )+* ( % ( ' ) (54 )32 )1 (. This theory is decidable, and Presburger sets can be represented symbolically by automata: DFA [Boudet, Comon CAAP96], NDD [Wolper, Boigelot TACAS00], UBA [Leroux, INFINITY03]. This representation is closed under and : 9 are decidable. Moreover the image of a Presburger set by an afne function is still a Presburger set.
19 " # )' )-' ', )' ( ) ( ( Presburger sets and automata Presburger arithmetics is the rst order additive theory by & % $, dened (/. 0 )+* ( % ( ' ) (54 )32 )1 (. This theory is decidable, and Presburger sets can be represented symbolically by automata: DFA [Boudet, Comon CAAP96], NDD [Wolper, Boigelot TACAS00], UBA [Leroux, INFINITY03]. This representation is closed under and : 9 are decidable. Moreover the image of a Presburger set by an afne function is still a Presburger set. The automata representation provides an efcient framework to check safety properties on counter systems!!
20 @? ;? = ;? ;? = = = = Automata representation in practice - 1 in basis An automaton to < ;< = eq < ;<>= ;<>= ;< = bad
21 ;? ;? = = = = = = = = = < ;? = = < < < = = = = = = = = = = = = = = B? < B? < B? < = = = Automata representation in practice - 2 in basis An automaton to < < = ;< = ;< < < = < = <>= ;< = < <>= ;<>= < = <>= ;<>= < = ;< = C C D CED bad
22 K J F $ " : I Counter systems A Presburger-linear function is dened by where the guard is a Presburger set. I H G H G F I
23 K J F $ " : I L L L K Counter systems A Presburger-linear function is dened by where the guard is a Presburger set. I H G H G F I A counter system L is a tuple L where is a nite alphabet of actions and is a set of Presburger-linear functions. F5M P FON F5M
24 K J F $ " : I L L L K Q L K Counter systems A Presburger-linear function is dened by where the guard is a Presburger set. I H G H G F I A counter system L is a tuple L where is a nite alphabet of actions and is a set of Presburger-linear functions. F5M P FON F5M L is the multiplicative monoid generated by the set of square matrices of a counter system L. P G N
25 K J F $ " : I L L L K Q L K Counter systems A Presburger-linear function is dened by where the guard is a Presburger set. I H G H G F I A counter system L is a tuple L where is a nite alphabet of actions and is a set of Presburger-linear functions. F5M P FON F5M L is the multiplicative monoid generated by the set of square matrices of a counter system L. P G N Counter systems with a nite monoid have nice acceleration properties and appear to be well-spread in practice (transfer/reset/inhibitors Petri Nets, Broadcast protocols,... )
26 F F F R F Acceleration for counter systems Let be a function, and. TS a set, we dene the acceleration of by.
27 F F F R F F Acceleration for counter systems Let be a function, and. TS a set, we dene the acceleration of by is the relation associated with VU.
28 F F F R F F F K Acceleration for counter systems Let be a function, and. TS a set, we dene the acceleration of by is the relation associated with VU. Theorem [Finkel Leroux, FSTTCS02] For a Presburger-linear function with a nite monoid, can be computed as a Presburger formula, of the form I H G U I K Y! # [% J[ X Z Y W! - IX W ) U
29 F G Y Y Idea of the construction nite. & G # with I H G H $ \ K J $ \ ] $ \
30 F H G Y Y " NG a` NG Idea of the construction nite. & G # with I H G $ \ K J $ \ ] $ \ such that "/_ K ^ is nite, so there exists & G #
31 F H G Y Y " N N Y Y Idea of the construction nite. & G # with I H G $ \ K J $ \ ] $ \ NG a` NG such that "/_ K ^ is nite, so there exists & G # a N G b Y a èdgf $ \ K J " K Jcb Notice that
32 F H G Y Y " N N Y Y kj Y W h i m n ` N W o p W o - n b Idea of the construction nite. & G # with I H G $ \ K J $ \ ] $ \ NG a` NG such that "/_ K ^ is nite, so there exists & G # a N G b Y a èdgf $ \ K J " K Jcb Notice that $ $ _ i "/_ K W [ m a l Nl p ^ [ X [ X b. a n Y ` NG b Y. Y n n
33 F H G Y Y " N N Y Y kj Y W h i m n ` N W o p n W o - b kj F W WW - [#!! J o K Idea of the construction nite. & G # with I H G $ \ K J $ \ ] $ \ NG a` NG such that "/_ K ^ is nite, so there exists & G # a N G b Y a èdgf $ \ K J " K Jcb Notice that $ $ _ i "/_ K W [ m a l Nl p ^ [ X a n Y ` NG [ X b. b Y. Y n n [ - W U Finally we have p h WW! I K % hx K W [ [ - W is a Presburger set!! qu
34 v u u u u? v u z? v u u < x v u u? r < x? v u u u u? v u r < x u How to nd out the accelerations? < v r Wr s <>= v z Wz s w x z~ < v r Wr s w x r~ < v W us < x v r{ < v W us w x r{ u} Wz s <>= v r Wr s wyx rts Initial configuration: state=time time brake W s < = W s rts r s z s z us W us < x v < v r W s Wz s < = r s u} rts Property to check : < v r Wr s wyx z s < v W us wyx rts u}? r always holds. stop late Wz s < = W us < x v r{ < v r W s r~ u}
35 ƒ pƒ o o! ] Reduction result Theorem [reduction, Finkel Leroux FSTTCS02] Any acceleration of functions in a nite set of Presburger-linear functions can be reduced to the acceleration of functions in a reduced set, such that the cardinal of is polynomial in. p ƒ Z I 6 I m H G F m 4 I H G F I m H G F m
36 Heuristic Extension of the classic algorithm, adding cycles (meta-transitions). 2 problems: nd good cycles avoid automata explosion
37 ] Heuristic Extension of the classic algorithm, adding cycles (meta-transitions). 2 problems: nd good cycles avoid automata explosion incremental computation and reduction
38 ] ] Heuristic Extension of the classic algorithm, adding cycles (meta-transitions). 2 problems: nd good cycles avoid automata explosion incremental computation and reduction minimization step
39 ] ] 1!! % 6 1!! Š Heuristic 1. Extension of the classic algorithm, adding cycles (meta-transitions). 2 problems: nd good cycles avoid automata explosion 2. Compute ƒ Z incremental computation and reduction minimization step, the reduced set of cycles of length 3. Use the search algorithm with ˆ and 4. if a xpoint is found then return else (the stop criterion is met) do ƒ Z Œ
40 F F F Heuristic -2 The search algorithm: 2 nested greedy algorithms while there exists such that reaches new states do end while return
41 F F F # F Heuristic -2 The search algorithm: 2 nested greedy algorithms while there exists such that reaches new states do while there exists f such that ) F ) ) ) do end while end while return
42 Fast We implement our results in the tool FAST. FAST is a tool: with a powerful model, that automatically computes the reachability set in most practical cases, easy to use thanks to the GUI interface.
43 v Ž v v s s Ÿ s? Ÿ Tools with acceleration and counters acceleration auto. cycle search guards actions variable type yes yes W s Presburger FAST yes no W s convex sets LASH no W s convex sets v ž yes yes v šœš š ž TREX ž yes yes šœš šœÿ s
44 Fast architecture Machine M1 InterFAST guided edition of models and strategies control and feedback during the analysis network Machine M2 ServerFAST FAST Heuristic Acceleration Automata library
45 ( W Fast Inputs Input Model : A counter system such that each transition is: ] H 4 ] 4G ] W 4 P ] 4 ' ( P
46 ( W Fast Inputs Input Model : A counter system such that each transition is: ] H 4 ] 4G ] W 4 P ] 4 ' ( P Input Strategy : A high level query language with Automatic computation of reachability sets, Presburger solver, Modular analyzer.
47 Case Studies 80% of 40 counter systems (mainly taken from ALV, BABYLON, TREX) have been automatically analysed. In particular: Abstract multi-threaded java programs, Embedded systems (TTP/C), All Broadcast Protocols, Complex toy examples (Swimming Pool),
48 The TTP protocol - overview From car industry. Communications between embedded microprocessors (stations). Clique avoidance mechanism to prevent the partitioning of valid stations after a failure.
49 The TTP protocol - overview From car industry. Communications between embedded microprocessors (stations). Clique avoidance mechanism to prevent the partitioning of valid stations after a failure. N stations communicating through a shared bus messages are broadcast, static time slots to send and receive messages
50 The TTP protocol - overview From car industry. Communications between embedded microprocessors (stations). Clique avoidance mechanism to prevent the partitioning of valid stations after a failure. N stations communicating through a shared bus messages are broadcast, static time slots to send and receive messages Idea: a station which considers itself as faulty becomes inactive. a station which receives more invalid messages than valid ones must be faulty.
51 G [ [ The TTP protocol ƒ N a boolean matrix of size (ack) and station station ƒ U _ (fail) integer vectors of size receiving message sending from station
52 G [ o p o[ G [ The TTP protocol ƒ N a boolean matrix of size (ack) and station if else station ƒ U _ (fail) integer vectors of size receiving message correctly received then p o[ ƒ U sending p from station p o[ ƒ N
53 G [ o p o[ G [ G G The TTP protocol ƒ N a boolean matrix of size (ack) and station if else station if else ƒ U _ (fail) integer vectors of size receiving message correctly received then p o[ ƒ U sending p o[ ƒ U & p o[ ƒ N then p po[ o[ p p o[ ƒ N from station, becomes inactive, p o[ ƒ N,! p o[ ƒ U p o[
54 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
55 ª m m ª The TTP protocol - In practice ack fail inactive stations ƒ U ƒ N A failure occurs while is sending.
56 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
57 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
58 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
59 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
60 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
61 ª m m ª ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive # p o ª ƒ N p o ª ƒ U then becomes inactive.
62 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
63 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
64 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
65 ª m m ª m The TTP protocol - In practice ack fail inactive stations ƒ U ƒ N # p o m ƒ N p o m ƒ U then becomes inactive.
66 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive
67 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive Valid stations belongs to the same clique!!
68 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02):
69 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02): Manual proof of correctness (N stations, k faults). Provide a family of abstractions depending on the number of faults. Semi-automatic verication with tools LASH and ALV (N stations, 1 fault).
70 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02): Manual proof of correctness (N stations, k faults). Provide a family of abstractions depending on the number of faults. Semi-automatic verication with tools LASH and ALV (N stations, 1 fault). large parametric counter automaton (16 transitions) complex guards
71 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02): Manual proof of correctness (N stations, k faults). Provide a family of abstractions depending on the number of faults. Semi-automatic verication with tools LASH and ALV (N stations, 1 fault). large parametric counter automaton (16 transitions) complex guards Few tools are adapted.
72 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02): Manual proof of correctness (N stations, k faults). Provide a family of abstractions depending on the number of faults. Semi-automatic verication with tools LASH and ALV (N stations, 1 fault). large parametric counter automaton (16 transitions) complex guards Few tools are adapted. Interesting to test FAST on the TTP.
73 Model for the TTP, 1 fault N stations init / CF=0,CW=N,Cp=0 d=0,df=0 df<cf / df++,cp++ d<cw / d++,cp++ normal Cp=N / Cp=0,d=0,dF=0 df<cf / df++, Cp++ / C1>=0, C0>=0, C1+C0=CW, d1=1,d0=0, df=0,cp=1 d1<c1 & C1+C0 2d0>0 / d1++, Cp++ round1 d1<c1 & C1+C0 2d0<=0/ C1,dF++,CF++,Cp++ d0<c0 & C1+C0 2d1>0 / d0++, Cp++ d0<c0 & C1+C0 2d1<=0 / C0,dF++,CF++,Cp++ Cp=N / CW=C1+C0,Cp=0, d=0,df=0 df<cf / df++,cp++ Cp=N / d1=0,d0=0,df=0,cp=0 Cp=N &!(C1=0) &!(C0=0) / d1=0,d0=0,df=0,cp=0 later d1<c1 & C1>C0 / d1++,cp++ d1<c1 & C1<=C0 / C1,CF++,dF++,Cp++ d0<c0 & C0<=C1 / C0, CF++, df++,cp++ d0<c0 & C0>C1 / d0++,cp++
74 Model for the TTP, 1 fault N stations d<cw / d++,cp++ Cp=N / Cp=0,d=0,dF=0 df<cf / df++, Cp++ d1<c1 & C1+C0 2d0>0 / d1++, Cp++ d1<c1 & C1+C0 2d0<=0/ C1,dF++,CF++,Cp++ init / C1>=0, C0>=0, C1+C0=CW, d1=1,d0=0, df=0,cp=1 CF=0,CW=N,Cp=0 d=0,df=0 normal df<cf / df++,cp++ round1 d0<c0 & C1+C0 2d1>0 / d0++, Cp++ d0<c0 & C1+C0 2d1<=0 / C0,dF++,CF++,Cp++ df<cf / df++,cp++ Cp=N / d1=0,d0=0,df=0,cp=0 Cp=N &!(C1=0) &!(C0=0) / d1=0,d0=0,df=0,cp=0 later d1<c1 & C1>C0 / d1++,cp++ d1<c1 & C1<=C0 / C1,CF++,dF++,Cp++ d0<c0 & C0<=C1 / C0, CF++, df++,cp++ d0<c0 & C0>C1 / d0++,cp++
75 Verication with Fast, 1 fault A large model: 16 transitions, 9 variables easy to describe in FAST input model, full automatic verication (no intermediate property) the exact reachability set is computed the property is veried cycles of length 1, the reachability set has 27,932 nodes on a pentium 4 (2.4 GHz) with 1 Gbyte RAM, computation takes 940 sec. and 73 Mbytes.
76 Model for the TTP, 2 faults N stations t4 t6 t7 d00=0 & d11=0 & d10=0 & da00=0 & da11=0 & da10=0 & df00=0 & df11=0 & df10=0 & df=0 & Cp2=1 & Cp1=d0+d1+1 & N>=0 & CW=N & C11>=1 & C00>=1 & C10>=1 & d1<=c10 & d0<=c00 & C11+C00+C10=CW t2 t3 t25 round1 t8 t19 t18 t2 : Cp1<N & d11<c11 & CW 2d0 2d00 2d10>0/ d11++,cp1++,cp2++ t3: Cp1<N & d10<c10 d1 & CW 2d0 2d00 2d11>0/ d10++,cp1++,cp2++ t4 : Cp1<N & d00<c00 d0 & CW 2d1 2d10 2d11>0/ d00++,cp1++,cp2++ t6 : Cp1<N & d11<c11 d1 & CW 2d0 2d00 2d10<=0/ df++,cp1++,cp2++,c11 t7 : Cp1<N & d10<c10 & CW 2d0 2d00 2d11<=0/ df++,cp1++,cp2++,c10 t8 : Cp1<N &d00<c00 d0 & CW 2d1 2d10 2d11<=0/ df++,cp1++,cp2++,c00 t18 : Cp1>=N & Cp2<N & Pred1/ d11++,cp1++,cp2++,da11++ t19 : Cp1>=N & Cp2<N & Pred2/ d10++,cp1++,cp2++,da10++ t21 : Cp1>=N & Cp2<N & Pred3/d00++,Cp1++,Cp2++,dA00++ t22 : Cp1>=N & Cp2<N &!Pred1/ df++,df11++,cp1++,cp2++,c11 t23 : Cp1>=N & Cp2<N &!Pred2/ df++,df10++,cp1++,cp2++,c10 t25 : Cp1>=N & Cp2<N &!Pred3/ df++, df00++,cp1++,cp2++,c00 t33 t34 t23 later t26 t22 t27 t28 t21 t26 : Cp2=N / df=0,d11=0,d10=0,d00=0,cp2=0 t27 : Cp2<N & d11<c11 & C11 C10 C00>0 / d11++,cp2++ t28 : Cp2<N & d10<c10 & C10 C11 C00>0 / d10++,cp2++ t30 : Cp2<N & d00<c00 & C00 C10 C11>0 / d00++, Cp2++ t31 : Cp2<N & d11<c11 & C11 C10 C00<=0 / C11,Cp2++,dF++,CF++ t32 : Cp2<N & d10<c10 & C10 C11 C00<=0 / C10,Cp2++,CF++,dF++ t33 : Cp2<N & d00<c00 & C00 C10 C11<=0 / C00,Cp2++,CF++,dF++ t34 : Cp2<N & df<cf / Cp2++,dF++ t32 t30 t31 Pred1 : d1+d11 da11 df11 da10 df10 d0 d10 d00+da00+df00>0 Pred2 : d1+d10 da10 df10 da11 df11 d0 d11 d00+da00+df00>0 Pred3 : d0+d00 da00 df00 d1 d11 d10+da11+da10+df11+df10>0
77 Verication with Fast, 2 faults A very large model: 20 transitions, 18 variables Guards are very complex.
78 Verication with Fast, 2 faults A very large model: 20 transitions, 18 variables Guards are very complex. When computing the acceleration relation of transition representation exceeds its limits and FAST stops. ( «, the internal
79 Verication with Fast, 2 faults A very large model: 20 transitions, 18 variables Guards are very complex. When computing the acceleration relation of transition representation exceeds its limits and FAST stops. Intermediate automata have more than states!! ( «, the internal
80 Verication with Fast, 2 faults A very large model: 20 transitions, 18 variables Guards are very complex. When computing the acceleration relation of transition representation exceeds its limits and FAST stops. Intermediate automata have more than states!! ( «, the internal Our acceleration formula is too expensive in this case!!
81 Faster acceleration Almost all the transitions are translations over convex polyhedra
82 Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard.
83 Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula:
84 K Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula: W ) U X Z Y W! - IX 1 I K Y! # [% J[
85 K Y W K! W Y Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula: 1 I! # [% J[ X Z Y! - IX K W ) U I m Z l k & X Z Y! - IX K W ) U
86 K Y W K! W Y " µ ² H H Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula: 1 I! # [% J[ X Z Y! - IX K W ) U I m Z l k & X Z Y! - IX K W ) U Œ ² µ ³c µ ±c² c 3 K W 4 P _ K W U
87 K Y W K! W Y " µ ² H H Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula: 1 I! # [% J[ X Z Y! - IX K W ) U I m Z l k & X Z Y! - IX K W ) U Œ ² µ ³c µ ±c² c 3 K W 4 P _ K W U The polyhedral acceleration is quadratic in the size of the function while the generic formula (1) is at most elementary in the size of the function.
88 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults.
89 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed.
90 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!)
91 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed.
92 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed. For an arbitrary value of, the intermediate automata exceed the limit.
93 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed. For an arbitrary value of We have to use an overapproximation for, the intermediate automata exceed the limit..
94 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed. For an arbitrary value of We have to use an overapproximation for simplify some guards, remove some variables, modular analysis., the intermediate automata exceed the limit..
95 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed. For an arbitrary value of We have to use an overapproximation for simplify some guards, remove some variables, modular analysis., the intermediate automata exceed the limit. The protocol is veried with FAST for 2 fauts and N stations..
96 Abstraction for the TTP with 2 faults t3 t19: Cp2<N & d10<c10 / d10++,cp2++ t2 t18 : Cp2<N & d11<c11 / d11++,cp2++ t4 t21 : Cp2<N & d00<c00 / d00++,cp2++ d00=0 & d11=0 & d10=0 & Cp2=1 & N>=0 & C11>=1 & C00>=1 & C10>=1 & C00+C11+C10=N t8 t25 : Cp2<N &d00<c00 / Cp2++,C00 round1 t7 t23 : Cp2<N & d10<c10 / Cp2++,C10 t6 t22 : Cp2<N & d11<c11 / Cp2++,C11 Compute reachable states R1 t34 : Cp2<N & df<cf / Cp2++,dF++ t27 : Cp2<N & d11<c11 & C11 C10 C00>0 / d11++,cp2++ t33 : Cp2<N & d00<c00 & C00 C10 C11<=0 / C00,Cp2++,CF++,dF++ reachable states R1 later t28 : Cp2<N & d10<c10 & C10 C11 C00>0 / d10++,cp2++ t32 : Cp2<N & d10<c10 & C10 C11 C00<=0 / C10,Cp2++,dF++,CF++ t31 : Cp2<N & d11<c11 & C11 C10 C00<=0 / C11,Cp2++,dF++,CF++ t30 : Cp2<N & d00<c00 & C00 C10 C11>0 / d00++, Cp2++ Check Property P2 : Cp2=N => C11=0&C10=0&C00>0 C11=0&C10>0&C00=0 C11>0&C10=0&C00=0
97 ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ Results Presburger acceleration polyhedral acceleration time1 memory1 time2 memory2 number of seconds Mbytes seconds Mbytes states 1 fault, N stations ,932 2 faults, 5 stations 2 faults, 10 stations 2 faults, 15 stations 2 faults, N stations ,684 12, ,427 2 faults, N stations ,036 (abstraction)
98 Conclusion and Future Works Conclusion: Polyhedral acceleration appears to be interesting in practice, But for complex systems like the TTP, we are never far from the limits of the tool. Future Works: Other specic acceleration formula, More efcient Presburger library to scale up to wider systems.
Reversal-Bounded Counter Machines
Reversal-Bounded Counter Machines Stéphane Demri LSV, CNRS, ENS Cachan Workshop on Logics for Resource-Bounded Agents, Barcelona, August 2015 Overview Presburger Counter Machines Reversal-Bounded Counter
More informationFAST: Acceleration from theory to practice
Software Tools for Technology Transfer manuscript No. (will be inserted by the editor) FAST: Acceleration from theory to practice Sébastien Bardin 1, Alain Finkel 2, Jérôme Leroux 3, Laure Petrucci 4 1
More informationThe Affine Hull of a Binary Automaton is Computable in Polynomial Time
INFINITY 2003 Preliminary Version The Affine Hull of a Binary Automaton is Computable in Polynomial Time Jérôme Leroux 1 Laboratoire Spécification et Vérification, CNRS UMR 8643 & ENS de Cachan, 61 av.
More informationFlat acceleration in symbolic model checking
Flat acceleration in symbolic model checking Sébastien Bardin 1, Alain Finkel 1, Jérôme Leroux 2, and Philippe Schnoebelen 1 1 LSV: ENS de Cachan & CNRS UMR 8643, 61, av. Pdt. Wilson, 94235 Cachan Cedex,
More informationReversal-Bounded Counter Machines Revisited
Reversal-Bounded Counter Machines Revisited Alain Finkel 1 and Arnaud Sangnier 1,2 1 LSV, ENS Cachan, CNRS & 2 EDF R&D 61 av. du pdt Wilson 94230 Cachan. France {finkel,sangnier}@lsv.ens-cachan.fr Abstract.
More informationFast Acceleration of Ultimately Periodic Relations
Fast Acceleration of Ultimately Periodic Relations Marius Bozga 1, Radu Iosif 1, Filip Konečný 1,2 1 VERIMAG / CNRS / University of Grenoble, France 2 Brno University of Technology, Czech Republic Fast
More informationFlat counter automata almost everywhere!
Flat counter automata almost everywhere! Jérôme Leroux and Grégoire Sutre Projet Vertecs, IRISA / INRIA Rennes, FRANCE Équipe MVTsi, CNRS / LABRI, FRANCE Counter-automata verification A simple counter-automata:
More informationEmmanuelle Encrenaz Alain Finkel. Automatic verification of counter systems with ranking function. Research Report LSV-07-25
Emmanuelle Encrenaz Alain Finkel Automatic verification of counter systems with ranking function Research Report LSV-07-25 July 2007 or with entcsmacro.sty for your meeting. Both can be found at the ENTCS
More informationTaming Past LTL and Flat Counter Systems
Taming Past LTL and Flat Counter Systems Stéphane Demri 2, Amit Kumar Dhar 1, Arnaud Sangnier 1 1. LIAFA, Univ Paris Diderot, Sorbonne Paris Cité, CNRS, France 2. LSV, ENS Cachan, CNRS, INRIA, France June
More informationstarting from the initial states. In this paper, we therefore consider how forward verication can be carried out for lossy channel systems. For that w
On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels Parosh Aziz Abdulla 1, Ahmed Bouajjani 2, and Bengt Jonsson 1 1 Dept. of Computer Systems, P.O. Box 325, S-751 05 Uppsala, Sweden, fparosh,bengtg@docs.uu.se
More informationNew Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations
New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (Extended Abstract) Gaoyan Xie, Cheng Li and Zhe Dang School of Electrical Engineering and
More informationAccelerated Data-Flow Analysis
Accelerated Data-Flow Analysis Jérôme Leroux, Grégoire Sutre To cite this version: Jérôme Leroux, Grégoire Sutre. Accelerated Data-Flow Analysis. Springer Berlin. Static Analysis, 2007, Kongens Lyngby,
More informationFlat Acceleration in Symbolic Model Checking
Flat Acceleration in Symbolic Model Checking Sébastien Bardin 1, Alain Finkel 1,Jérôme Leroux 2, and Philippe Schnoebelen 1 1 LSV: ENS de Cachan & CNRS UMR 8643, 61, av. Pdt. Wilson, 94235 Cachan Cedex,
More informationReachability Analysis of Pushdown Automata with an Upper Stack
Reachability Analysis of Pushdown Automata with an Upper Stack Adrien Pommellet 1 Marcio Diaz 1 Tayssir Touili 2 1 Université Paris-Diderot and LIPN, France 2 LIPN, CNRS, and Université Paris 13, France
More informationTaming Past LTL and Flat Counter Systems
Taming Past LTL and Flat Counter Systems Amit Kumar Dhar LIAFA, Univ Paris Diderot, Paris Cité Sorbonne, CNRS, France April 2, 2012 Joint work with : Stéphane Demri(LSV) and Arnaud Sangnier(LIAFA) LIAFA
More informationExtending abstract acceleration methods to data-flow programs with numerical inputs
Extending abstract acceleration methods to data-flow programs with numerical inputs Article (Published Version) Schrammel, Peter and Jeannet, Bertrand (200) Extending abstract acceleration methods to data-flow
More informationOn-the-Fly Analysis of Systems with Unbounded, Lossy. FIFO Channels.
On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels Parosh Aziz Abdulla 1, Ahmed Bouajjani 2, and Bengt Jonsson 1 1 Dept. of Computer Systems, P.O. Box 325, S-751 05 Uppsala, Sweden, fparosh,bengtg@docs.uu.se
More informationSemantic Equivalences and the. Verification of Infinite-State Systems 1 c 2004 Richard Mayr
Semantic Equivalences and the Verification of Infinite-State Systems Richard Mayr Department of Computer Science Albert-Ludwigs-University Freiburg Germany Verification of Infinite-State Systems 1 c 2004
More informationTUM{INFO{10-I /1.{FI Alle Rechte vorbehalten Nachdruck auch auszugsweise verboten c1998 SFB 342 Methoden und Werkzeuge fur die Nutzung parallele
TECHNISCHE UNIVERSIT AT M U N C H E N INSTITUT F UR INFORMATIK Sonderforschungsbereich 342: Methoden und Werkzeuge fur die Nutzung paralleler Rechnerarchitekturen Lossy Counter Machines Richard Mayr TUM-I9827
More informationModels for Efficient Timed Verification
Models for Efficient Timed Verification François Laroussinie LSV / ENS de Cachan CNRS UMR 8643 Monterey Workshop - Composition of embedded systems Model checking System Properties Formalizing step? ϕ Model
More informationAdvanced topic: Space complexity
Advanced topic: Space complexity CSCI 3130 Formal Languages and Automata Theory Siu On CHAN Chinese University of Hong Kong Fall 2016 1/28 Review: time complexity We have looked at how long it takes to
More informationChecking Liveness Properties of Presburger Counter Systems using Reachability Analysis
Checking Liveness Properties of Presburger Counter Systems using Reachability Analysis K. Vasanta Lakshmi, Aravind Acharya, and Raghavan Komondoor Indian Institute of Science, Bangalore {kvasanta,aravind.acharya,raghavan}@csa.iisc.ernet.in
More informationRobust Controller Synthesis in Timed Automata
Robust Controller Synthesis in Timed Automata Ocan Sankur LSV, ENS Cachan & CNRS Joint with Patricia Bouyer, Nicolas Markey, Pierre-Alain Reynier. Ocan Sankur (ENS Cachan) Robust Control in Timed Automata
More informationVerifying qualitative and quantitative properties with LTL over concrete domains
Verifying qualitative and quantitative properties with LTL over concrete domains Régis Gascon Laboratoire Spécification et Vérification CNRS & ENS Cachan FRANCE gascon@lsv.ens-cachan.fr Abstract. We introduce
More informationCEGAR:Counterexample-Guided Abstraction Refinement
CEGAR: Counterexample-guided Abstraction Refinement Sayan Mitra ECE/CS 584: Embedded System Verification November 13, 2012 Outline Finite State Systems: Abstraction Refinement CEGAR Validation Refinment
More informationIMITATOR: A Tool for Synthesizing Constraints on Timing Bounds of Timed Automata
ICTAC 09 IMITATOR: A Tool for Synthesizing Constraints on Timing Bounds of Timed Automata Étienne ANDRÉ Laboratoire Spécification et Vérification LSV, ENS de Cachan & CNRS Étienne ANDRÉ (LSV) ICTAC 09
More informationComputability and Complexity
Computability and Complexity Lecture 5 Reductions Undecidable problems from language theory Linear bounded automata given by Jiri Srba Lecture 5 Computability and Complexity 1/14 Reduction Informal Definition
More informationOn Reducing Linearizability to State Reachability 1
On Reducing Linearizability to State Reachability 1 Ahmed Bouajjani a, Michael Emmi b, Constantin Enea a, Jad Hamza a a LIAFA, Université Paris Diderot b IMDEA Software Institute, Spain Abstract Ecient
More informationMonotonic Abstraction in Parameterized Verification
Monotonic Abstraction in Parameterized Verification Parosh Aziz Abdulla 1 Department of Information Technology Uppsala University Sweden Giorgio Delzanno 2 Dipartimento Informatica e Scienze dell Informazione
More informationThe Power of Hybrid Acceleration
The Power of Hybrid Acceleration Bernard Boigelot 1 and Frédéric Herbreteau 2 1 Institut Montefiore, B28 Université de Liège B-4000 Liège, Belgium boigelot@montefiore.ulg.ac.be 2 LaBRI 351, cours de la
More informationAnalysis of a Boost Converter Circuit Using Linear Hybrid Automata
Analysis of a Boost Converter Circuit Using Linear Hybrid Automata Ulrich Kühne LSV ENS de Cachan, 94235 Cachan Cedex, France, kuehne@lsv.ens-cachan.fr 1 Introduction Boost converter circuits are an important
More informationRegular Model Checking and Verification of Cellular Automata
Aalborg University Master Thesis Regular Model Checking and Verification of Cellular Automata Authors: Joakim Byg Kenneth Yrke Jørgensen {jokke,kyrke}@cs.aau.dk Department of Computer Science Dat 6 June
More informationRepresenting Arithmetic Constraints with Finite Automata: An Overview
Representing Arithmetic Constraints with Finite Automata: An Overview Bernard Boigelot Pierre Wolper Université de Liège Motivation Linear numerical constraints are a very common and useful formalism (our
More informationModel-Checking CTL* over Flat Presburger Counter Systems
Model-Checking CTL* over Flat Presburger Counter Systems Stéphane Demri * Alain Finkel * Valentin Goranko ** Govert van Drimmelen *** * LSV, ENS Cachan, CNRS, INRIA 61 av. Pdt. Wilson, 94235 Cachan Cedex,
More informationLecture 2: Symbolic Model Checking With SAT
Lecture 2: Symbolic Model Checking With SAT Edmund M. Clarke, Jr. School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 (Joint work over several years with: A. Biere, A. Cimatti, Y.
More informationFlat Parametric Counter Automata
Flat Parametric Counter Automata Marius Bozga, Radu Iosif, Yassine Lakhnech To cite this version: Marius Bozga, Radu Iosif, Yassine Lakhnech. Flat Parametric Counter Automata. Bugliesi, M.; Preneel, B.;
More informationPushdown timed automata:a binary reachability characterization and safety verication
Theoretical Computer Science 302 (2003) 93 121 www.elsevier.com/locate/tcs Pushdown timed automata:a binary reachability characterization and safety verication Zhe Dang School of Electrical Engineering
More informationDeterministic Finite Automaton (DFA)
1 Lecture Overview Deterministic Finite Automata (DFA) o accepting a string o defining a language Nondeterministic Finite Automata (NFA) o converting to DFA (subset construction) o constructed from a regular
More informationFundamenta Informaticae 30 (1997) 23{41 1. Petri Nets, Commutative Context-Free Grammars,
Fundamenta Informaticae 30 (1997) 23{41 1 IOS Press Petri Nets, Commutative Context-Free Grammars, and Basic Parallel Processes Javier Esparza Institut fur Informatik Technische Universitat Munchen Munchen,
More information{},{a},{a,c} {},{c} {c,d}
Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au
More information7. Queueing Systems. 8. Petri nets vs. State Automata
Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models
More informationMONOTONIC ABSTRACTION (ON EFFICIENT VERIFICATION OF PARAMETERIZED SYSTEMS)
International Journal of Foundations of Computer Science Vol. 20, No. 5 (2009) 779 801 c World Scientific Publishing Company MONOTONIC ABSTRACTION (ON EFFICIENT VERIFICATION OF PARAMETERIZED SYSTEMS) PAROSH
More informationSoftware Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based Methods Ákos Hajdu PhD student Department of Measurement and Information Systems, Budapest University of Technology and Economics MTA-BME Lendület Cyber-Physical
More informationSoftware Verification
Software Verification Grégoire Sutre LaBRI, University of Bordeaux, CNRS, France Summer School on Verification Technology, Systems & Applications September 2008 Grégoire Sutre Software Verification VTSA
More informationOptimal Metric Planning with State Sets in Automata Representation
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008) Optimal Metric Planning with State Sets in Automata Representation Björn Ulrich Borowsky and Stefan Edelkamp Fakultät für
More informationSymbolic Verification of Hybrid Systems: An Algebraic Approach
European Journal of Control (2001)71±16 # 2001 EUCA Symbolic Verification of Hybrid Systems An Algebraic Approach Martin v. Mohrenschildt Department of Computing and Software, Faculty of Engineering, McMaster
More informationA Polynomial Time Presburger Criterion and Synthesis for Number Decision Diagrams
A Polynomial Time Presburger Criterion and Synthesis for Number Decision Diagrams Jérôme Leroux To cite this version: Jérôme Leroux. A Polynomial Time Presburger Criterion and Synthesis for Number Decision
More informationFormal Verification Techniques. Riccardo Sisto, Politecnico di Torino
Formal Verification Techniques Riccardo Sisto, Politecnico di Torino State exploration State Exploration and Theorem Proving Exhaustive exploration => result is certain (correctness or noncorrectness proof)
More informationFMCAD 2013 Parameter Synthesis with IC3
FMCAD 2013 Parameter Synthesis with IC3 A. Cimatti, A. Griggio, S. Mover, S. Tonetta FBK, Trento, Italy Motivations and Contributions Parametric descriptions of systems arise in many domains E.g. software,
More informationNotes on State Minimization
U.C. Berkeley CS172: Automata, Computability and Complexity Handout 1 Professor Luca Trevisan 2/3/2015 Notes on State Minimization These notes present a technique to prove a lower bound on the number of
More informationAutomatic Generation of Polynomial Invariants for System Verification
Automatic Generation of Polynomial Invariants for System Verification Enric Rodríguez-Carbonell Technical University of Catalonia Talk at EPFL Nov. 2006 p.1/60 Plan of the Talk Introduction Need for program
More informationTESTING is one of the most important parts of the
IEEE TRANSACTIONS 1 Generating Complete Controllable Test Suites for Distributed Testing Robert M. Hierons, Senior Member, IEEE Abstract A test suite is m-complete for finite state machine (FSM) M if it
More informationAlgorithmic Verification of Stability of Hybrid Systems
Algorithmic Verification of Stability of Hybrid Systems Pavithra Prabhakar Kansas State University University of Kansas February 24, 2017 1 Cyber-Physical Systems (CPS) Systems in which software "cyber"
More informationOverview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?
Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits
More informationEmbedded Systems 5. Synchronous Composition. Lee/Seshia Section 6.2
Embedded Systems 5-1 - Synchronous Composition Lee/Seshia Section 6.2 Important semantic model for concurrent composition Here: composition of actors Foundation of Statecharts, Simulink, synchronous programming
More informationUpper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology
More informationHomework Assignment 6 Answers
Homework Assignment 6 Answers CSCI 2670 Introduction to Theory of Computing, Fall 2016 December 2, 2016 This homework assignment is about Turing machines, decidable languages, Turing recognizable languages,
More informationReachability analysis of multithreaded software with asynchronous communication
Reachability analysis of multithreaded software with asynchronous communication Ahmed Bouajjani 1, Javier Esparza 2, Stefan Schwoon 2, and Jan Strejček 2 1 LIAFA, University of Paris 7, abou@liafa.jussieu.fr
More informationStudent#: CISC-462 Exam, December XY, 2017 Page 1 of 12
Student#: CISC-462 Exam, December XY, 2017 Page 1 of 12 Queen s University, Faculty of Arts and Science, School of Computing CISC-462 Final Exam, December XY, 2017 (Instructor: Kai Salomaa) INSTRUCTIONS
More informationAutomata-Theoretic LTL Model-Checking
Automata-Theoretic LTL Model-Checking Arie Gurfinkel arie@cmu.edu SEI/CMU Automata-Theoretic LTL Model-Checking p.1 LTL - Linear Time Logic (Pn 77) Determines Patterns on Infinite Traces Atomic Propositions
More informationOn (Omega-)Regular Model Checking
On (Omega-)Regular Model Checking Axel Legay Universié de Liège Institut Montefiore, B8 Liège, Belgium Pierre Wolper Universié de Liège Institut Montefiore, B8 Liège, Belgium Checking infinite-state systems
More informationUCLID: Deciding Combinations of Theories via Eager Translation to SAT. SAT-based Decision Procedures
UCLID: Deciding Combinations of Theories via Eager Translation to SAT Sanjit A. Seshia SAT-based Decision Procedures Input Formula Input Formula Satisfiability-preserving Boolean Encoder Boolean Formula
More informationFlat Counter Automata Almost Everywhere!
Flat Counter Automata Almost Everywhere! Jérôme Leroux, Grégoire Sutre To cite this version: Jérôme Leroux, Grégoire Sutre. Flat Counter Automata Almost Everywhere!. Third International Symposium, ATVA
More informationAcceleration in Multi-Pushdown Systems
Acceleration in Multi-Pushdown Systems Mohamed Faouzi Atig 1 K. Narayan Kumar 2 and Prakash Saivasan 2 1 Uppsala University, Sweden /mohamed faouzi.atig@it.uu.se 2 Chennai Mathematical Institute, India
More informationcachan.fr/publis/ Accepted for publication in Theoretical Computer Science
http://www.lsv.ens cachan.fr/publis/ Accepted for publication in Theoretical Computer Science A Polynomial -Bisimilar Normalization for Reset Petri Nets Catherine Dufourd y Alain Finkel y Abstract Reset
More informationFall 1999 Formal Language Theory Dr. R. Boyer. 1. There are other methods of nding a regular expression equivalent to a nite automaton in
Fall 1999 Formal Language Theory Dr. R. Boyer Week Four: Regular Languages; Pumping Lemma 1. There are other methods of nding a regular expression equivalent to a nite automaton in addition to the ones
More informationLearning to Verify Branching Time Properties
Learning to Verify Branching Time Properties Abhay Vardhan and Mahesh Viswanathan Dept. of Computer Science, Univ. of Illinois at Urbana-Champaign, USA Abstract. We present a new model checking algorithm
More informationDES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models
4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe
More informationReachability in Succinct and Parametric One-Counter Automata
Reachability in Succinct and Parametric One-Counter Automata Christoph Haase, Stephan Kreutzer, Joël Ouaknine, and James Worrell Oxford University Computing Laboratory, UK {chrh,kreutzer,joel,jbw}@comlab.ox.ac.uk
More informationProbabilistic Model Checking and Strategy Synthesis for Robot Navigation
Probabilistic Model Checking and Strategy Synthesis for Robot Navigation Dave Parker University of Birmingham (joint work with Bruno Lacerda, Nick Hawes) AIMS CDT, Oxford, May 2015 Overview Probabilistic
More informationScalable and Accurate Verification of Data Flow Systems. Cesare Tinelli The University of Iowa
Scalable and Accurate Verification of Data Flow Systems Cesare Tinelli The University of Iowa Overview AFOSR Supported Research Collaborations NYU (project partner) Chalmers University (research collaborator)
More informationPRESBURGER COUNTER MACHINES
UNIVERSITÉ DE BORDEAUX ÉCOLE DOCTORALE DE MATHÉMATIQUES ET INFORMATIQUE DE BORDEAUX Habilitation à Diriger des Recherches Jérôme Leroux PRESBURGER COUNTER MACHINES Jury : Préparée au LaBRI, équipe MF Rapporteurs
More informationSymbolic Reachability Analysis of Lazy Linear Hybrid Automata. Susmit Jha, Bryan Brady and Sanjit A. Seshia
Symbolic Reachability Analysis of Lazy Linear Hybrid Automata Susmit Jha, Bryan Brady and Sanjit A. Seshia Traditional Hybrid Automata Traditional Hybrid Automata do not model delay and finite precision
More informationCS6901: review of Theory of Computation and Algorithms
CS6901: review of Theory of Computation and Algorithms Any mechanically (automatically) discretely computation of problem solving contains at least three components: - problem description - computational
More informationMinimization Techniques for Symbolic Automata
University of Connecticut OpenCommons@UConn Honors Scholar Theses Honors Scholar Program Spring 5-1-2018 Minimization Techniques for Symbolic Automata Jonathan Homburg jonhom1996@gmail.com Follow this
More informationEE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo
EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories 1 Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo Outline: Contracts and compositional methods for system design Where and why using
More informationHybrid systems and computer science a short tutorial
Hybrid systems and computer science a short tutorial Eugene Asarin Université Paris 7 - LIAFA SFM 04 - RT, Bertinoro p. 1/4 Introductory equations Hybrid Systems = Discrete+Continuous SFM 04 - RT, Bertinoro
More informationDiscrete abstractions of hybrid systems for verification
Discrete abstractions of hybrid systems for verification George J. Pappas Departments of ESE and CIS University of Pennsylvania pappasg@ee.upenn.edu http://www.seas.upenn.edu/~pappasg DISC Summer School
More informationOutline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 3. Logarithmic Space Reinhard Pichler Institute of Logic and Computation DBAI Group TU Wien 3. Logarithmic Space 3.1 Computational
More informationLearning cover context-free grammars from structural data
Learning cover context-free grammars from structural data Mircea Marin Gabriel Istrate West University of Timişoara, Romania 11th International Colloquium on Theoretical Aspects of Computing ICTAC 2014
More informationActively learning to verify safety for FIFO automata
Actively learning to verify safety for FIFO automata Abhay Vardhan, Koushik Sen, Mahesh Viswanathan, Gul Agha Dept. of Computer Science, Univ. of Illinois at Urbana-Champaign, USA {vardhan,ksen,vmahesh,agha}@cs.uiuc.edu
More informationFoundations of Informatics: a Bridging Course
Foundations of Informatics: a Bridging Course Week 3: Formal Languages and Semantics Thomas Noll Lehrstuhl für Informatik 2 RWTH Aachen University noll@cs.rwth-aachen.de http://www.b-it-center.de/wob/en/view/class211_id948.html
More informationAutomated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol
Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol Béatrice Bérard and Laurent Fribourg LSV Ecole Normale Supérieure de Cachan & CNRS 61 av. Pdt. Wilson - 94235 Cachan
More informationSynthesis of Designs from Property Specifications
Synthesis of Designs from Property Specifications Amir Pnueli New York University and Weizmann Institute of Sciences FMCAD 06 San Jose, November, 2006 Joint work with Nir Piterman, Yaniv Sa ar, Research
More informationIntroduction. Büchi Automata and Model Checking. Outline. Büchi Automata. The simplest computation model for infinite behaviors is the
Introduction Büchi Automata and Model Checking Yih-Kuen Tsay Department of Information Management National Taiwan University FLOLAC 2009 The simplest computation model for finite behaviors is the finite
More informationBounded Model Checking with SAT/SMT. Edmund M. Clarke School of Computer Science Carnegie Mellon University 1/39
Bounded Model Checking with SAT/SMT Edmund M. Clarke School of Computer Science Carnegie Mellon University 1/39 Recap: Symbolic Model Checking with BDDs Method used by most industrial strength model checkers:
More informationPrimitive recursive functions: decidability problems
Primitive recursive functions: decidability problems Armando B. Matos October 24, 2014 Abstract Although every primitive recursive (PR) function is total, many problems related to PR functions are undecidable.
More informationIHS 3: Test of Digital Systems R.Ubar, A. Jutman, H-D. Wuttke
IHS 3: Test of Digital Systems R.Ubar, A. Jutman, H-D. Wuttke Integrierte Hard- und Softwaresysteme RT-Level Design data path and control path on RT-level RT level simulation Functional units (F1,..,F4)
More informationReachability Analysis of Multithreaded Software with Asynchronous Communication
Reachability Analysis of Multithreaded Software with Asynchronous Communication Ahmed Bouajjani 1, Javier Esparza, Stefan Schwoon, and Jan Strejček 1 LIAFA, University of Paris 7, abou@liafa.jussieu.fr
More information3515ICT: Theory of Computation. Regular languages
3515ICT: Theory of Computation Regular languages Notation and concepts concerning alphabets, strings and languages, and identification of languages with problems (H, 1.5). Regular expressions (H, 3.1,
More information198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007
198:538 Complexity of Computation Lecture 16 Rutgers University, Spring 2007 8 March 2007 In this lecture we discuss Shamir s theorem that PSPACE is the set of languages that have interactive proofs with
More informationTheory of Computation CS3102 Spring 2015 A tale of computers, math, problem solving, life, love and tragic death
Theory of Computation CS3102 Spring 2015 A tale of computers, math, problem solving, life, love and tragic death Robbie Hott www.cs.virginia.edu/~jh2jf Department of Computer Science University of Virginia
More informationWork in Progress: Reachability Analysis for Time-triggered Hybrid Systems, The Platoon Benchmark
Work in Progress: Reachability Analysis for Time-triggered Hybrid Systems, The Platoon Benchmark François Bidet LIX, École polytechnique, CNRS Université Paris-Saclay 91128 Palaiseau, France francois.bidet@polytechnique.edu
More information3130CIT Theory of Computation
GRIFFITH UNIVERSITY School of Computing and Information Technology 3130CIT Theory of Computation Final Examination, Semester 2, 2006 Details Total marks: 120 (40% of the total marks for this subject) Perusal:
More informationA Generic Framework for Reasoning about Dynamic Networks of Infinite-State Processes
A Generic Framework for Reasoning about Dynamic Networks of Infinite-State Processes Ahmed Bouajjani, Yan Jurski, and Mihaela Sighireanu LIAFA, University of Paris 7, Case 7014, 2 place Jussieu, 75251
More informationfor System Modeling, Analysis, and Optimization
Fundamental Algorithms for System Modeling, Analysis, and Optimization Stavros Tripakis UC Berkeley EECS 144/244 Fall 2013 Copyright 2013, E. A. Lee, J. Roydhowdhury, S. A. Seshia, S. Tripakis All rights
More informationEmbedded Systems Design: Optimization Challenges. Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden
of /4 4 Embedded Systems Design: Optimization Challenges Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden Outline! Embedded systems " Example area: automotive electronics " Embedded systems
More informationRecent results on Timed Systems
Recent results on Timed Systems Time Petri Nets and Timed Automata Béatrice Bérard LAMSADE Université Paris-Dauphine & CNRS berard@lamsade.dauphine.fr Based on joint work with F. Cassez, S. Haddad, D.
More informationOptimal Metric Planning with State Sets in Automata Representation [3]
Optimal Metric Planning with State Sets in Automata Representation [3] Björn Ulrich Borowsky Stefan Edelkamp Fakultät für Informatik, Technische Universität Dortmund, Germany 2008 (Slides by ) Goal and
More informationThe Downward-Closure of Petri Net Languages
The Downward-Closure of Petri Net Languages Peter Habermehl 1, Roland Meyer 1, and Harro Wimmel 2 1 LIAFA, Paris Diderot University & CNRS e-mail: {peter.habermehl,roland.meyer}@liafa.jussieu.fr 2 Department
More information