Is There a Best Büchi Automaton for Explicit Model Checking?

Size: px
Start display at page:

Download "Is There a Best Büchi Automaton for Explicit Model Checking?"

Transcription

1 Is There Best Büchi Automton for Explicit Model Checking? Frntišek Blhoudek Msryk University Brno, Czech Republic Alexndre Duret-Lutz LRDE, EPITA Le Kremlin-Bicêtre, Frnce Jn Strejček Msryk University Brno, Czech Republic Mojmír Křetínský Msryk University Brno, Czech Republic ABSTRACT LTL to Büchi utomt (BA) trnsltors re trditionlly optimized to produce utomt with smll number of sttes or smll number of non-deterministic sttes. In this pper, we serch for properties of Büchi utomt tht relly influence the performnce of explicit model checkers. We do tht by mnul nlysis of severl utomt nd by experiments with common LTL-to-BA trnsltors nd relistic verifiction tsks. As result of these experiences, we gin better insight into the chrcteristics of utomt tht work well with Spin. Ctegories nd Subject Descriptors F.4.1 [Mthemticl Logic nd Forml Lnguges]: Mthemticl Logic temporl logic; D.2.4 [Softwre Engineering]: Softwre/Progrm Verifiction forml methods, model checking Generl Terms Theory, Algorithms, Verifiction Keywords Liner temporl logic, Büchi utomt, explicit model checking 1. INTRODUCTION The utomt-theoretic pproch to explicit model checking of Liner-time Temporl Logic (LTL) [25] cn be broken down into four steps: (1) build the stte spce, i.e., n utomton S representing ll the possible executions of the system to be verified, (2) trnslte n LTL formul ϕ representing desired property of the system into Büchi SPIN 14, July 21 23, 2014, Sn Jose, CA, USA This is the uthor s version of the work. It is posted here for your personl use. The definitive version ws published by ACM, Automton (BA) A ϕ tht ccepts ll words violting ϕ, (3) build the synchronous product S A ϕ of these two systems, nd finlly (4) check this product for emptiness. If S A ϕ ccepts word, it is n execution of S tht invlidtes ϕ, i.e., counterexmple. In typicl explicit model checker, the construction of the stte spce S nd its synchronous product with A ϕ re done one-the-fly, driven by needs of n emptiness check procedure. This ensures tht only the prt of the stte spce tht is comptible with A ϕ will be constructed. Further, the whole construction cn be stopped s soon s the emptiness check finds counterexmple, i.e., rechble cycle contining n ccepting stte. Here we focus on the influence of property utomton A ϕ on the steps (3) nd (4) of model checking procedure. There re mny lgorithms nd tools for trnslting n LTL formul into Büchi utomton, yet they produce vrious lnguge equivlent utomt. For instnce, Figure 4 shows severl Büchi utomt for the LTL formul GF GFb. Should one be preferred over the others? The intuition tht smller A ϕ produces smller synchronous product S A ϕ is not lwys correct. More importntly, it is not quite relevnt: ultimtely, only the prt of the product tht is explored by the emptiness check does mtter. Some uthors of utomt optimiztions or LTL-to- BA trnsltion improvements (e.g., Etessmi nd Holzmnn [10] nd Dx et l. [5]) provide lso running times of selected emptiness check executed on the product of obtined utomt nd either rndom stte spces or few relistic systems. Etessmi nd Holzmnn [10] even complined tht the reltion between the size of A ϕ nd the running time of the model checking procedure ws difficult to predict, especilly in the presence of counterexmple. In order to select n idel utomton for expressing formul, one should be wre of the inner workings of the emptiness check procedure tht will be used. Among the vrious existing emptiness checks, we hve decided to focus on the stndrd emptiness check of Spin, which is sequentil lgorithm bsed on Nested Depth-First Serch (NDFS) [17]. We look t concrete exmples of how formule re trnslted differently by existing tools to gin better insight into the chrcteristics of utomt tht work well with Spin. Our results should stimulte LTL-to-BA trnsltion

2 reserchers to focus on nother spects of produced utomt: not only their size nd determinism. The pper is orgnized s follows. The next section motivtes our reserch by experimentl results quntifying the influence of property utomt on the performnce of the explicit model checker Spin. Section 3 describes stndrd pproches to utomt optimiztion motivted by reduction of the product size. In Section 4, we discuss how property utomt cn ffect the performnce of the NDFS-bsed emptiness check of Spin. We ssume fmilirity with LTL nd Büchi utomt [3]. 2. MOTIVATION BY EMPIRICAL DATA First of ll, we present experimentl results showing how importnt the impct of Büchi utomt on Spin s performnce cn be. We use the following benchmrk, softwre, nd hrdwre. Benchmrk. The considered benchmrk set is bsed on the set of relistic model checking tsks BEEM [19]. In ddition to the originl 769 pirs of model in Promel nd corresponding specifiction formul we dded, to ech model describing some mutul exclusion lgorithm (ltogether 23 instnces of prmetric models clled nderson, peterson, nd bkery), three specifiction formule: 1. GF(P 0@CS) GF(P 0@NCS) mening tht if process P 0 spends infinitely mny steps in criticl section, then it lso spends infinitely mny steps in noncriticl section, 2. GF(P 0@NCS) GF(P 0@CS) mening tht if process P 0 spends infinitely mny steps in non-criticl section, then it lso spends infinitely mny steps in criticl section, 3. FG ( (P 0@CS P 1@CS) (P 0@CS P 2@CS) (P 1@CS P 2@CS) ) mening tht fter finitely mny steps, it never hppens tht two of the processes P 0, P 1, nd P 2 re in criticl section t the sme time. To sum up, we consider = 838 verifiction tsks. All the benchmrks nd mesurements presented in this section re vilble t publictions/spin2014.tr.gz. Softwre. We use five LTL-to-BA trnsltors presented in Tble 1: Spin nd LTL2BA re well estblished nd populr trnsltors, MoDeLL ws the first trnsltor focusing on determinism of produced utomt, nd LTL3BA nd Spot represent contemporry trnsltors. The lst two trnsltors re used in severl settings: the settings denoted by LTL3BA (det) nd Spot (det) im to produce more deterministic utomt, while the setting clled Spot (no jump) is explined in Section 4. The sme version of Spin (with its defult settings nd the mximl serch depth set to ) is lso used in ll our experiments to perform ll model checking steps except the LTL-to-BA trnsltion. In prticulr, the prtil-order reduction, which severely limits the explortion of the stte-spce, is enbled. Hrdwre. All computtions re performed on n HP DL980 G7 server with 8 eight-core 64-bit processors Intel Xeon X GHz nd 448 GiB DDR3 RAM. Ech execution of Spin hs been restricted by 30 minutes timeout nd memory limit of 20GiB. Tble 1: Considered LTL-to-BA trnsltors, for reference. tool version commnd Spin [10, 16] spin -f LTL2BA [12] 1.1 ltl2b -f MoDeLL [21] mod2spin -f LTL3BA [1] ltl3b -S -f LTL3BA (det) ltl3b -S -M -f Spot [7] ltl2tgb -s Spot (det) ltl2tgb -s -D Spot (no jump) ltl2tgb -s -x degen-lskip=0 Originlly, we hve mesured the impct of Büchi utomt on Spin by its running time. Unfortuntely, our computtion server is shred with other users nd its vrible worklod hs led to enormous dispersion of mesured running times. We hve observed running time difference of over 300% on the sme input. Hence, insted on running times, we focus on the count of visited trnsitions, which is stble sttistic produced directly by Spin. The number of visited trnsitions ccumultes the numbers of product trnsitions explored in depth-first serches executed during run of the NDFS lgorithm (see Section 4 for brief description of NDFS). Hence, the number of visited trnsitions should be proportionl to the running time on dedicted mchine. For ech of the 838 considered verifiction tsks, we trnslte the negtion of the formul by ll the mentioned trnsltors nd we run Spin on the model with ech of the obtined utomt. Trnsltion of the negted formul to n utomton is instntneous (it tkes less thn 0.1s) in nerly ll cses: there is only one formul for which the trnsltor built in Spin needs couple of seconds to finish. For 823 tsks, Spin successfully finishes the computtion within the given limits for t lest two utomt obtined by different trnsltion tools. For ech such verifiction tsk, we find the mximl nd the miniml numbers of visited trnsitions nd we compute their rtio. Intuitively, the rtio represents how mny times slower Spin cn be if we choose the worst of the produced utomt compred to the best of those. Out of the 823 tsks, the rtio is exctly 1 only in 35 cses. In other words, in more thn 95% of the considered verifiction tsks, the choice of n LTL-to-BA trnsltor hs n influence on running time of Spin. In fct, the rtios significntly differ for verifiction tsks where the model stisfies given formul nd for those with counterexmple. Out of the 823 tsks, 731 tsks contin counterexmples while 92 tsks do not. The rtios for these two sets re presented by box-plots in Figure 1. One cn clerly see tht the selection of Büchi utomton hs bigger impct on the verifiction tsks with counterexmples (medin rtio is over 5.6) thn on the tsks without counterexmples (medin rtio i.4). Both sets contin extreme cses where the rtios exceed Spin lso provides sttistics for stored sttes, which is the totl count of constructed nd stored product sttes nd should be proportionl to the memory consumed by Spin. If we compute rtios of mximl nd miniml numbers of stored sttes, we get the rtio 1 in 68 out of the 823 tsks.

3 tsks with counterexmple 92 tsks without counterexmple Rtio mx / min (A 1) (A 2) (S) Figure 2: Two BA for GF nd stte spce. A 1 S hs 3 sttes wheres A 2 S hs 6. Note tht edges in the utomt re lbelled by Boolen formule over tomic propositions, where mens, stnds for true, nd used lter mens b. Formlly, n edge lbelled with formul ρ represents ll the trnsitions tht re lbelled with subset M of tomic propositions such tht M = ρ. trnsitions sttes trnsitions sttes Figure 1: Impct of the Büchi utomt on model checking. For ech verifiction tsk, we compute rtios between the mximum nd minimum number of trnsitions (or unique sttes) visited by Spin using ll vilble Büchi utomt. In ech column, box spns between the first nd third qurtiles, nd is split by the medin (whose vlue is given). The whiskers show the rnge of rtios below the first nd bove the third qurtile tht re not further wy from the qurtiles thn 1.5 times the interqurtile rnge. Other vlues re shown s outliers using circles. On Figure 1 one cn see tht the sitution is nlogous to rtios of visited trnsitions, but the rtios of stored sttes re slightly lower. To sum up, the choice of Büchi utomton is n importnt issue substntilly ffecting both running time nd memory needed for the explicit model checking process implemented in Spin. 3. STANDARD APPROACH TO OPTIMI- ZATION: HELPING THE PRODUCT Most of the work on optimizing the trnsltion of LTL formule to Büchi utomt hs focused on building Büchi utomt with the smllest possible number of sttes [e.g. 4, 12, 22, 15, 24]. This is motivted by the observtion tht the synchronous product of Büchi utomton A with stte spce S cn hve the sme number of sttes s their Crtesin product in the worst cse: S A S A. Therefore, decresing A lowers the upper bound on S A. However it is possible to build contrived exmples where smller A yield lrger product. For instnce, removing one stte in the utomton A 1 of Figure 2 doubles the size of its product with the stte spce S of the sme figure from 3 to 6 sttes. Of course, if S ws similr cycle of 2 sttes, the smller utomton A 2 would give smller product. Hence, one cnnot hope to build n optiml property utomton A without priori knowledge of the system S. With the introduction of LBTT [23], tool tht checks the output of different LTL-to-BA trnsltors by doing mny cross-comprisons, including some products with rndom stte spces, tool designers strted to evlute not only the size of the produced utomt, but lso the size of their products with rndom stte spces [e.g. 21, 8]. A recent clone of LBTT clled ltlcross [6] computes multiple products with rndom stte spces to lessen the luck fctor. Sebstini nd Tonett [21] used this product with rndom stte spce mesurement to benchmrk their trnsltor MoDeLL ginst other vilble trnsltors to support the clim tht producing more deterministic Büchi utomt might be more importnt thn producing smll Büchi utomt. Benchmrks bsed on the size of products my look like Tble 2. The tble shows tht MoDeLL genertes utomt tht re slightly bigger thn LTL2BA (its competitor in 2003) but when looking t the product, MoDeLL cuses fewer trnsitions to be built. If the number of trnsitions is proportionl to the running time of model checker nd the number of sttes is proportionl to its memory consumption, MoDeLL hs effectively trded memory for speed. MoDeLL s results do not pper to hold tody: more recent trnsltors such s LTL3BA or the trnsltor of Spot cn produce utomt tht re significntly smller nd yield smller products with rndom stte spces. These trnsltors lso hve options to produce more deterministic utomt, but the resulting products re not lwys better. The right prt of Tble 2 compres the trnsltors by the sizes of products of produced utomt with fixed set of rndom systems. For instnce, one cn observe tht even though Spot (6) produces the lowest ccumulted number of product trnsitions in this benchmrk, there re 30 formule where the generted products hve more trnsitions thn those obtined by LTL3BA (det) (5). Conversely, utomt from LTL3BA (det) produce products with more trnsitions thn those of Spot for 76 formule. It should be noted tht optimizing A to minimize S A is not equivlent to optimizing A for the model checking procedure, becuse the product S A is constructed onthe-fly by most emptiness check lgorithms. An emptiness check my explore prt of the product, nd my explore it severl times. Ultimtely, ny chnge to A should relly be mesured only by its effect on the model checker used. Such n evlution ws done for instnce by Dx et l. [5]: in ddition to explining how to build miniml wek deterministic Büchi utomt (WDBA) for subclss of LTL,

4 Tble 2: Trnsltion of 178 formule from the literture [9, 22, 11] using different LTL-to-BA trnsltors, with timeout of 60 seconds. Column n indictes how mny trnsltions re successful within the llocted time. The utomt columns show ccumulted vlues of stndrd utomt chrcteristics for ll successful trnsltions. Column ndst gives the number of non-deterministic sttes in the utomt. All produced utomt re synchronized with the sme 100 rndom systems, nd the medin number of sttes nd trnsitions of these products is kept. The products columns represent the medins ccumulted over ll successful trnsltions. The right-most prt of the tble counts the number of formule for which the trnsltor on the row produces n utomton with higher medin number of trnsitions in the products tht the trnsltor of the column. utomt products cses with product trns bigger thn... n sttes ndst edges trns sttes trns (1) (2) (3) (4) (5) (6) (7) (8) (1) Spin (2) LTL2BA (3) MoDeLL (4) LTL3BA (5) LTL3BA (det) (6) Spot (7) Spot (det) (8) Spot (no jump) they showed tht their miniml WDBA re smller thn the non-deterministic BA produced by other trnsltors. They lso show tht they improved the running times of Spin on few verifiction tsks. 1 We study how Spin s emptiness check cn be helped by chnging A in the next section. Improving the size of the product is one wy to improve the performnce of Spin (s the exmple of Section 4.5 illustrtes), but there re lso other spects. For exmple, the loction of ccepting sttes hve n influence too. 4. ANOTHER VIEW TO OPTIMIZATION: HELPING THE EMPTINESS CHECK 4.1 Emptiness Checks with Nested DFS To check the emptiness of S A ϕ, one should serch for cycle tht is rechble from the initil stte nd tht contins t lest one ccepting stte. The emptiness check procedure used in Spin by defult is bsed on two nested depthfirst serches [17]: the min DFS, which we shll cll blue, explores the product (on-the-fly) nd every time it would bcktrck from n ccepting stte s (i.e., ll successors of s hve been explored by the blue DFS) it strts second, red DFS from s. If the red DFS reches ny stte on the blue DFS serch stck then rechble nd ccepting cycle is found (since s is rechble from ll sttes on the blue DFS serch stck) nd the lgorithm reports it s counterexmple. Otherwise, the red DFS termintes nd the blue DFS cn continue. The two DFS lwys ignore sttes tht hve been completely explored by n instnce of the red DFS, so stte is never visited more thn twice. As n extr optimiztion, if the blue DFS hits its own serch stck by following trnsition tht is either going to or coming from n ccepting stte [13, 20], then n ccepting 1 We omitted their tool from our benchmrk becuse (1) it only supports subset of LTL, nd (2) their optimiztion is implemented in Spot nd both tools would therefore return the sme utomt. Besides, the subset of LTL does not include the formule studied in Sections 4.3 nd 4.5. (B 1) (B 2) Figure 3: Automt for G( X( X( X))). B 1 is inherently wek, B 2 is wek. cycle cn be reported without even strting ny red DFS. This cn be effectively pplied only on products with n ccepting cycle. When counterexmple exists in the product, the emptiness check my report it more or less rpidly depending on the order in which it hs explored the trnsitions of the product. With ny luck, the first trnsition selected t ech step of the DFS will led to n ccepting cycle. Conversely, the first trnsitions followed might led to huge component of the product tht just turns out to be ded-end, nd from which the emptiness check hs to bcktrck before finding the counterexmple. As the selected trnsition order in S A ϕ depends on the order of the trnsitions in the property utomton A ϕ, this explins some of the huge differences noticed in Figure 1. Note tht previous ttempts to explore reordering of the trnsitions of A to help the emptiness check hve been inconclusive [14], so we did not pursue this direction. (Furthermore the swrming techniques [18] used nowdys mkes this topic even less ttrctive: in these pproches severl threds compete to find counterexmple in S A ϕ using different, rndom trnsition order for A ϕ.) 4.2 Wek Automt The optimiztion we just described, where the blue DFS cn detect n ccepting cycle without running red DFS if it hits its own stck on (or from) n ccepting stte, suggests tht of the two utomt of Figure 3, B 2 should be preferred. Indeed when the blue DFS reches stte of its serch stck in the product S B 2, it is gurnteed to come from (nd go to) n ccepting stte, detecting the ccepting cycle without

5 strting red DFS. In the product S B 1 we might be less lucky if we close the cycle with the trnsition t the bottom of B 1: in tht cse the product hs to be explored second time by the red DFS. This exmple ctully illustrtes the distinction between wek utomt nd inherently wek utomt. An inherently wek utomton is n utomton in which strongly connected components (SCCs) cnnot mix ccepting cycles with non-ccepting cycles. A wek utomton is n inherently wek utomton in which the sttes of ech SCC re either ll ccepting or ll non-ccepting. Any inherently wek utomton cn evidently be trnsformed into n equivlent wek utomton [2]. Hving more ccepting sttes is not necessrily good from the point of view of the NDFS since red DFS is strted every time the blue DFS bcktrcks from n ccepting stte. However if n entire SCC is non-ccepting, the first red DFS will cover it fully, nd ech successive red DFS will immeditely return becuse it ttempts to process stte tht hs lredy been seen by previous red DFS. 4.3 Automt for GF GFb Figure 4 shows six different Büchi utomt for the formul GF GFb produced by the considered tools. Note tht if you ignore the exchnge of nd b (which hve symmetric purpose in the originl formul), utomt C 4 nd C 5 differ only in the initil stte nd thus cnnot be distinguished by ny determinism-bsed or size-bsed metrics. Tble 3 cptures dt bout Spin s runs on model of the bkery mutul exclusion protocol tken from BEEM nd the property utomt of Figure 4. The propositions nd b describe situtions tht (different) pirs of processes re in the criticl section t the sme time. The protocol prevents such sitution so neither nor b is ever true in the model. We observe tht in cse of products with utomt C 5 nd C 6 (both produced by Spot), Spin explores ech product twice becuse it triggers the red DFS from the initil stte of the product. This is not the cse for the other utomt. This yields the following hypothesis: When we suppose tht there is no ccepting cycle in the product, the utomton should keep its ccepting sttes s fr s possible from the initil stte. The further they re, the more chnce we hve tht the product will never rech the stte, nd therefore no red DFS will be triggered. For instnce, if we ignore the renming of tomic propositions, the utomton C 3 could be obtined from C 6 by unrolling the ccepting cycle by one step, so tht the cycle is entered on non-ccepting stte, nd the ccepting stte is ctully the lst one visited on the cycle. 2 This superfluous initil stte only mkes negligible difference on the product, nd does not incur ny noticeble difference for Spin compred to C 1, C 2, or C 4. Similrly, if we do not expect n ccepting cycle in the product, the inherently wek utomton B 1 of Figure 3 could be chnged by letting the right-most stte be ccepting insted of the middle one. 2 This is not ctully the reson why MoDeLL produces C 3. Internlly, MoDeLL trnsltes the formul into Büchi utomton with lbels on sttes nd hs to del with possibly multiple initil sttes. When it outputs n utomton, it lwys dds n extr initil stte with copies of the outgoing trnsitions of ll the originl initil sttes, even if the originl utomton hd only one initil stte. See lso D 3 of Figure 6 where nd were the originl initil sttes. 4.4 Trnsltion Differences Most LTL-to-BA trnsltors follow multi-steps procedure where they first trnslte given LTL formul into generlized Büchi utomton, often with trnsition-bsed cceptnce (TGBA), such s those of Figure 5. Trnsltors then degenerlize these utomt to obtin BA. Other simplifiction procedures my be pplied to these utomt, but it turns out tht the lst three utomt of Figure 4 were ll obtined by degenerlizing G 1 in Figure 5, nd their differences re due to choices mde in the degenerliztion procedure. When degenerlizing TGBA G with m cceptnce sets F 1,..., F m (the nd on the Figure 5), the structure of G is cloned m + 1 times. Let us cll ech of these clones level. For ech stte of level i m, ll trnsitions tht were originlly in F i hve their destintion redirected to the next level, the destintion of ll trnsitions in level m + 1 re redirected to level 1. Finlly, ll the sttes of the level m + 1 re mde ccepting. The initil stte cn be put on ny level. This procedure ensures tht words ccepted by the degenerlized utomton correspond to words recognized by runs of G tht visit ll cceptnce sets infinitely often. Accepting cycles in products involving these degenerlized utomt will lwys involve t lest m + 1 sttes. The degenerliztion pplied to G 1 with the initil stte on the lst level nd the cceptnce sets ordered s, then, produces the utomton C 6 of Figure 4. Recll tht the edge lbelled with corresponds to the four edges lbelled by, b,, nd b in the originl utomton G 1. An optimiztion introduced by Gstin nd Oddoux [12] consists in jumping levels. If trnsition of level i m belongs to F i... F j, its destintion cn be redirected directly to the level j + 1. Similrly, if trnsition from the level m+1 is in F 1... F j, it cn be redirected to the level j + 1. Implementing this optimiztion gives utomton C 5. Chnging the degenerliztion order to, then, nd putting the initil sttes on the first level would give utomton C 4. Often (but not in this exmple), jumping levels is wy to effectively void creting useless copies of some sttes. Another side effect of this optimiztion is tht some ccepting cycles my be shorter thn m + 1: the chnge effectively keeps the utomton s close to the ccepting level s possible. If we re looking for counterexmples, C 5 pper better thn C 6 becuse its ccepting cycles re shorter on the verge. We recll tht the initil stte of degenerlized utomton cn be put on ny level. For exmple, Ginnkopoulou nd Lerd [15] noticed tht by chnging the initil level, they could sometimes sve some sttes, so they try to use both the first nd the lst level nd keep the smllest utomton. In our exmple, C 4 nd C 5 differ only by the choice of the initil level (nd degenerliztion order but this is negligible s nd b re symmetric in our problem), there is no size difference, nd yet it mkes huge difference in the running time of Spin, s discussed in the previous section. Another trnsltion difference evidently comes from the difference between the generlized utomt obtined from the LTL formul. In our cse C 4, C 5, nd C 6 were obtined from G 1 while C 1 nd C 2 were obtined from G 2. (The difference with Spin (C 1) is tht it does no level jumping from the ccepting stte.) The difference between G 1 nd G 2 is cused

6 b b b b b s i b b b b b b b b b (C 1) Spin (C 2) LTL2BA & LTL3BA (C 3) MoDeLL (C 4) LTL3BA (det) (C 5) Spot & Spot (det) (C 6) Spot (no jump) Figure 4: Automt for GF GFb generted by different tools nd options. Tble 3: Sttistics bout generted utomt nd Spin s run on model bkery.7.pm nd formul GF GFb where neither nor b ever occurs in the model. The corresponding utomt re shown in Fig. 4. utomton size sttistics from Spin s execution sttes ndst edges trns stored sttes visited trns time C 1 Spin k 88s C 2 LTL2BA & LTL3BA k 99s C 3 MoDeLL k 109s C 4 LTL3BA (det) k 101s C 5 Spot & Spot (det) k 211s C 6 Spot (no jump) k 191s b (G 1) b b (G 2) b Figure 5: Two TGBA for GF GFb. Accepting runs must visit nd infinitely often. by choices mde during the trnsltion to fvor deterministic sttes in the cse of G 1. In our exmple of Tble 3, this improved determinism mkes no difference since nd b re never true in the model. 4.5 Automt for (GF GFb) We now focus on nother concrete cse: (GF GFb) on mutex protocols. The formul without negtion describes tht if some process visits infinitely often the criticl section, it infinitely often leves it this property holds in model peterson.4.pm nd therefore Spin hs to build the whole product to find tht it contins no ccepting cycle. Tble 4 shows series of experiments of verifiction of the model peterson.4.pm ginst this formul, using different tools to obtin Büchi utomton. In this cse, ech tool produces different utomton, s shown in the first prt of Figure 6. Note gin tht utomt D 2 nd D 4 cnnot be distinguished only by determinism nd size metrics (see Tble 4). They differ only in the trget of the outgoing edge of, yet we observe significnt difference in Spin s behviors. We ctully use 12 different utomt for this formul. The first seven of the tble re generted by the considered tools. The other re hndwritten by modifying the previous utomt to explore which spects of the utomt mke significnt difference in Spin s behvior s described further. D 8 is dpted from D 6 by chnging the degenerliztion level on which we enter the SCC. D 9 keeps the strong initil gurd of D 6 but then uses the ccepting SCC of D 2. D 10 is mix of D 6 nd D 2 to observe the influence of the gurds compred to. D 11 is version of D 2 in which the SCC is mde deterministic s in D 6. Finlly, D 12 fixes D 5 by removing the spurious s i. Bsed on Tble 4 we cn group these utomt in three ctegories, listed from the best to the worst with respect to Spin s performnce. Before we discuss these ctegories, it is importnt to notice tht in model where mens the process is in the criticl section nd b mens the process leves the criticl section, we cn expect most of the stte spce to be lbelled by. D 6, D 7, D 8, D 9 Automt with the smllest number of trnsitions. Note tht the no jump version (D 7) nd the one with non-deterministic SCC (D 9) both yields few more sttes nd trnsitions in the product, but the difference is not significnt. The key property of these utomt is tht they cn leve stte only by reding, wheres other utomt re more permissive. D 1, D 2, D 3, D 10, D 11 All these utomt exhibit more nondeterminism on stte nd will enter the ccepting SCC even fter reding. However when this hppens, they do not rech the ccepting stte before is red, so this limits the number of red DFS. D 4, D 5, D 12 These utomt go from to the ccepting stte ech time they red. This both mkes the product unnecessrily lrge, but it lso forces mny clls to the red DFS every time product stte with property utomton stte is bcktrcked. The nondeterminism in ccepting SCC of D 4 cuses it to visits only slightly more sttes thn the other two utomt. A comprison of utomt D 6 nd D 11 nd their impct on Spin s performnce show tht the hypothesis of Section 4.3 cnnot be used lone to select the best utomton.

7 s i s i s 3 (D 1) Spin (D 2) LTL2BA (D 3) MoDeLL (D 4) LTL3BA (D 5) LTL3BA (det) (D 6) Spot & Spot (det) (D 7) Spot (no jump) (D 8) (D 9) (D 10) (D 11) (D 12) Figure 6: Automt for the formul (GF GFb). Tble 4: Sttistics bout generted utomt nd Spin s run on the empty product between model peterson.4.pm nd formul (GF GFb). The corresponding utomt re shown in Fig. 6. utomton size sttistics from Spin s execution sttes ndst edges trns stored sttes visited trns time D 1 Spin k 6.04s D 2 LTL2BA k 5.95s D 3 MoDeLL k 6.13s D 4 LTL3BA k 12.10s D 5 LTL3BA (det) k 12.00s D 6 Spot k 2.26s D 7 Spot (no jump) k 2.34s D k 2.43s D k 2.43s D k 7.38s D k 7.07s D k 12.30s

8 Indeed, D 6 outperforms D 11 even if the distnce from the initil to the ccepting stte is shorter in D 6. Here the more restrictive lbel of trnsition (, ) in D 6 plys n importnt role s well. To sum up, if we suppose tht there is no ccepting cycle in the product, the utomton should 1. keep ccepting sttes s fr s possible from the initil stte (compre D 11 to D 12) nd 2. use more restrictive lbels (compre D 6 to D 12) in order to mke the ccepting sttes s hrd to rech s possible. Moreover, mking use of more restrictive lbels cn lso help to reduce the product. An pproprite metric tking these two fctors into ccount, s well s n LTL-to-BA trnsltion reflecting these hypotheses, re topics for our future reserch. 5. CONCLUSION LTL-to-BA trnsltors hve severl degrees of freedom when producing utomt. Some of these choices hve effects on the product with system to be verified nd lso to the emptiness check of the product. However, these effects re difficult to predict. So fr, most uthors of LTL-to-BA trnsltion tools hve mesured the performnce of their tools by looking t the size of the output, sometimes lso by looking t the size of products with rndom stte spces. While building smll product generlly helps the emptiness check, we hve provided evidence tht the size of A ϕ nd even the size of S A ϕ does not lwys correlte to the performnce of the emptiness check of S A ϕ. For instnce, s Spin uses Nested DFS, the loctions of ccepting sttes of A ϕ cn hve drmtic impct to Spin s running time. When system S stisfies ϕ, i.e., S A ϕ contins no ccepting cycle, the best utomton for Spin to verify it should hve ccepting sttes tht re hrd to rech from the initil stte, s it will lessen the chnce tht red DFS is strted. We observed tht such choice cn be mde during the degenerliztion procedure, or by unrolling some ccepting cycles. On the contrry, if S A ϕ contins n ccepting cycle, Spin cn find it fster if the ccepting sttes of A ϕ re esy to rech from the initil stte nd the ccepting cycles re short. Furthermore, the emptiness check cn use n optimiztion if the utomton is wek. We pln to exmine these suggestions nd potentilly integrte them in future versions of our trnsltors. Furthermore, we pln to devise set of heuristics to select the best utomton of given set of cndidtes. Clerly, LTL-to-BA trnsltors should tune their output ccording to the purposed use of the BA: BA used for bug finding need not to be the sme s BA used to prove correctness. Here we focused on the Nested DFS implementtion of Spin, but mny other emptiness checks exist. For instnce, some emptiness checks bsed on the enumertion of SCCs re insensible to the loction of ccepting sttes on cycle, so our suggestions should not be generlized blindly. Another point tht cn be influenced by the property utomton is the size of the counterexmple generted. The question of finding n utomton tht is optiml from this point of view is left open by Gstin et l. [13]. 6. ACKNOWLEDGMENTS Authors would like to thnk Vojtěch Rujbr for the initil inspirtion nd three nonynous referees for their suggestions. Fr. Blhoudek, M. Křetínský, nd J. Strejček hve been supported by The Czech Science Foundtion, grnt GBP202/12/G REFERENCES [1] T. Bbik, M. Křetínský, V. Řehák, nd J. Strejček. LTL to Büchi utomt trnsltion: Fst nd more deterministic. In TACAS 12, vol of LNCS, pp Springer, [2] B. Boigelot, S. Jodogne, nd P. Wolper. On the use of wek utomt for deciding liner rithmetic with integer nd rel vribles. In IJCAR 01, vol of LNCS, pp Springer, [3] E. M. Clrke, O. Grumberg, nd D. A. Peled. Model Checking. The MIT Press, [4] J.-M. Couvreur. On-the-fly verifiction of temporl logic. In FM 99, vol of LNCS, pp , Sept Springer. [5] C. Dx, J. Eisinger, nd F. Kledtke. Mechnizing the powerset construction for restricted clsses of ω-utomt. In ATVA 07, vol of LNCS. Springer, Oct [6] A. Duret-Lutz. Mnipulting LTL formuls using Spot 1.0. In ATVA 13, vol of LNCS, pp , Oct Springer. [7] A. Duret-Lutz. LTL trnsltion improvements in Spot 1.0. Interntionl Journl on Criticl Computer-Bsed Systems, 5(1/2):31 54, Mr [8] A. Duret-Lutz nd D. Poitrenud. SPOT: n Extensible Model Checking Librry using Trnsition-bsed Generlized Büchi Automt. In MASCOTS 04, pp , Oct IEEE Computer Society Press. [9] M. B. Dwyer, G. S. Avrunin, nd J. C. Corbett. Property specifiction ptterns for finite-stte verifiction. In FMSP 98, pp. 7 15, Mr ACM Press. [10] K. Etessmi nd G. J. Holzmnn. Optimizing Büchi Automt. In CONCUR 00, vol of LNCS, pp Springer, [11] K. Etessmi nd G. J. Holzmnn. Optimizing Büchi utomt. In Concur 00, vol of LNCS, pp , Springer. [12] P. Gstin nd D. Oddoux. Fst LTL to Büchi utomt trnsltion. In CAV 01, vol of LNCS, pp , Springer. [13] P. Gstin, P. Moro, nd M. Zeitoun. Minimiztion of counterexmples in SPIN. In SPIN 04, vol of LNCS, pp , Apr [14] J. Geldenhuys nd A. Vlmri. More efficient on-the-fly LTL verifiction with Trjn s lgorithm. Theoreticl Computer Science, 345(1):60 82, Nov [15] D. Ginnkopoulou nd F. Lerd. From sttes to trnsitions: Improving trnsltion of LTL formulæ to Büchi utomt. In FORTE 02, vol of LNCS, pp , Nov Springer.

9 [16] G. J. Holzmnn. The Spin Model Checker: Primer nd Reference Mnul. Addison-Wesley, [17] G. J. Holzmnn, D. A. Peled, nd M. Ynnkkis. On nested depth first serch. In SPIN 96, vol. 32 of DIMACS. Americn Mthemticl Society, My [18] G. J. Holzmnn, R. Joshi, nd A. Groce. Swrm verifiction techniques. IEEE Trnsction on Softwre Engineering, 37(6): , [19] R. Pelánek. BEEM: benchmrks for explicit model checkers. In SPIN 07, vol of LNCS, pp Springer, [20] S. Schwoon nd J. Esprz. A note on on-the-fly verifiction lgorithms. In TACAS 05, vol of LNCS, Apr Springer. [21] R. Sebstini nd S. Tonett. More deterministic vs. smller Büchi utomt for efficient LTL model checking. In CHARME 03, vol of LNCS, pp , Oct Springer. [22] F. Somenzi nd R. Bloem. Efficient Büchi utomt for LTL formulæ. In CAV 00, vol of LNCS, pp , Springer. [23] H. Turiinen nd K. Heljnko. Testing LTL formul trnsltion into Büchi utomt. Interntionl Journl on Softwre Tools for Technology Trnsfer, 4 (1):57 70, [24] X. Thirioux. Simple nd efficient trnsltion from LTL formuls to Büchi utomt. In FMICS 02, vol. 66(2) of ENTCS, July Elsevier. [25] M. Y. Vrdi. An utomt-theoretic pproch to liner temporl logic. In Bnff 94, vol of LNCS, pp , Springer.

LTL Translation Improvements in Spot

LTL Translation Improvements in Spot LTL Trnsltion Improvements in Spot Alexndre Duret-Lutz http://www.lrde.epit.fr/~dl/ VECoS'11 16 September 2011 Alexndre Duret-Lutz LTL Trnsltion Improvements 1 / 19 Context High-level

More information

CS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan

CS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan CS 267: Automted Verifiction Lecture 8: Automt Theoretic Model Checking Instructor: Tevfik Bultn LTL Properties Büchi utomt [Vrdi nd Wolper LICS 86] Büchi utomt: Finite stte utomt tht ccept infinite strings

More information

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

Lecture 9: LTL and Büchi Automata

Lecture 9: LTL and Büchi Automata Lecture 9: LTL nd Büchi Automt 1 LTL Property Ptterns Quite often the requirements of system follow some simple ptterns. Sometimes we wnt to specify tht property should only hold in certin context, clled

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

Minimal DFA. minimal DFA for L starting from any other

Minimal DFA. minimal DFA for L starting from any other Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

Formal Methods in Software Engineering

Formal Methods in Software Engineering Forml Methods in Softwre Engineering Lecture 09 orgniztionl issues Prof. Dr. Joel Greenyer Decemer 9, 2014 Written Exm The written exm will tke plce on Mrch 4 th, 2015 The exm will tke 60 minutes nd strt

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

Designing finite automata II

Designing finite automata II Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata CS103B ndout 18 Winter 2007 Ferury 28, 2007 Finite Automt Initil text y Mggie Johnson. Introduction Severl childrens gmes fit the following description: Pieces re set up on plying ord; dice re thrown or

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.6.: Push Down Automt Remrk: This mteril is no longer tught nd not directly exm relevnt Anton Setzer (Bsed

More information

Nondeterminism and Nodeterministic Automata

Nondeterminism and Nodeterministic Automata Nondeterminism nd Nodeterministic Automt 61 Nondeterminism nd Nondeterministic Automt The computtionl mchine models tht we lerned in the clss re deterministic in the sense tht the next move is uniquely

More information

1.4 Nonregular Languages

1.4 Nonregular Languages 74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll

More information

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014 CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1 Chpter Five: Nondeterministic Finite Automt Forml Lnguge, chpter 5, slide 1 1 A DFA hs exctly one trnsition from every stte on every symol in the lphet. By relxing this requirement we get relted ut more

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Infinite Geometric Series

Infinite Geometric Series Infinite Geometric Series Finite Geometric Series ( finite SUM) Let 0 < r < 1, nd let n be positive integer. Consider the finite sum It turns out there is simple lgebric expression tht is equivlent to

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

CS 188: Artificial Intelligence Spring 2007

CS 188: Artificial Intelligence Spring 2007 CS 188: Artificil Intelligence Spring 2007 Lecture 3: Queue-Bsed Serch 1/23/2007 Srini Nrynn UC Berkeley Mny slides over the course dpted from Dn Klein, Sturt Russell or Andrew Moore Announcements Assignment

More information

How to simulate Turing machines by invertible one-dimensional cellular automata

How to simulate Turing machines by invertible one-dimensional cellular automata How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex

More information

Lecture 09: Myhill-Nerode Theorem

Lecture 09: Myhill-Nerode Theorem CS 373: Theory of Computtion Mdhusudn Prthsrthy Lecture 09: Myhill-Nerode Theorem 16 Ferury 2010 In this lecture, we will see tht every lnguge hs unique miniml DFA We will see this fct from two perspectives

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

This lecture covers Chapter 8 of HMU: Properties of CFLs

This lecture covers Chapter 8 of HMU: Properties of CFLs This lecture covers Chpter 8 of HMU: Properties of CFLs Turing Mchine Extensions of Turing Mchines Restrictions of Turing Mchines Additionl Reding: Chpter 8 of HMU. Turing Mchine: Informl Definition B

More information

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute Victor Admchik Dnny Sletor Gret Theoreticl Ides In Computer Science CS 5-25 Spring 2 Lecture 2 Mr 3, 2 Crnegie Mellon University Deterministic Finite Automt Finite Automt A mchine so simple tht you cn

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information

Software Engineering using Formal Methods

Software Engineering using Formal Methods Softwre Engineering using Forml Methods Propositionl nd (Liner) Temporl Logic Wolfgng Ahrendt 13th Septemer 2016 SEFM: Liner Temporl Logic /GU 160913 1 / 60 Recpitultion: FormlistionFormlistion: Syntx,

More information

Handout: Natural deduction for first order logic

Handout: Natural deduction for first order logic MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes

More information

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh Finite Automt Informtics 2A: Lecture 3 Mry Cryn School of Informtics University of Edinburgh mcryn@inf.ed.c.uk 21 September 2018 1 / 30 Lnguges nd Automt Wht is lnguge? Finite utomt: recp Some forml definitions

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Design and Analysis of Distributed Interacting Systems

Design and Analysis of Distributed Interacting Systems Design nd Anlysis of Distriuted Intercting Systems Lecture 6 LTL Model Checking Prof. Dr. Joel Greenyer My 16, 2013 Some Book References (1) C. Bier, J.-P. Ktoen: Principles of Model Checking. The MIT

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

CSCI 340: Computational Models. Kleene s Theorem. Department of Computer Science

CSCI 340: Computational Models. Kleene s Theorem. Department of Computer Science CSCI 340: Computtionl Models Kleene s Theorem Chpter 7 Deprtment of Computer Science Unifiction In 1954, Kleene presented (nd proved) theorem which (in our version) sttes tht if lnguge cn e defined y ny

More information

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9.

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9. Regulr Expressions, Pumping Lemm, Right Liner Grmmrs Ling 106 Mrch 25, 2002 1 Regulr Expressions A regulr expression descries or genertes lnguge: it is kind of shorthnd for listing the memers of lnguge.

More information

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as Improper Integrls Two different types of integrls cn qulify s improper. The first type of improper integrl (which we will refer to s Type I) involves evluting n integrl over n infinite region. In the grph

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation Strong Bisimultion Overview Actions Lbeled trnsition system Trnsition semntics Simultion Bisimultion References Robin Milner, Communiction nd Concurrency Robin Milner, Communicting nd Mobil Systems 32

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

More on automata. Michael George. March 24 April 7, 2014

More on automata. Michael George. March 24 April 7, 2014 More on utomt Michel George Mrch 24 April 7, 2014 1 Automt constructions Now tht we hve forml model of mchine, it is useful to mke some generl constructions. 1.1 DFA Union / Product construction Suppose

More information

Math 8 Winter 2015 Applications of Integration

Math 8 Winter 2015 Applications of Integration Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl

More information

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford Probbilistic Model Checking Michelms Term 2011 Dr. Dve Prker Deprtment of Computer Science University of Oxford Long-run properties Lst lecture: regulr sfety properties e.g. messge filure never occurs

More information

Review of Gaussian Quadrature method

Review of Gaussian Quadrature method Review of Gussin Qudrture method Nsser M. Asi Spring 006 compiled on Sundy Decemer 1, 017 t 09:1 PM 1 The prolem To find numericl vlue for the integrl of rel vlued function of rel vrile over specific rnge

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets Concepts of Concurrent Computtion Spring 205 Lecture 9: Petri Nets Sebstin Nnz Chris Poskitt Chir of Softwre Engineering Petri nets Petri nets re mthemticl models for describing systems with concurrency

More information

1.3 Regular Expressions

1.3 Regular Expressions 56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,

More information

NFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun:

NFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun: CMPU 240 Lnguge Theory nd Computtion Spring 2019 NFAs nd Regulr Expressions Lst clss: Introduced nondeterministic finite utomt with -trnsitions Tody: Prove n NFA- is no more powerful thn n NFA Introduce

More information

Model Reduction of Finite State Machines by Contraction

Model Reduction of Finite State Machines by Contraction Model Reduction of Finite Stte Mchines y Contrction Alessndro Giu Dip. di Ingegneri Elettric ed Elettronic, Università di Cgliri, Pizz d Armi, 09123 Cgliri, Itly Phone: +39-070-675-5892 Fx: +39-070-675-5900

More information

Learning Moore Machines from Input-Output Traces

Learning Moore Machines from Input-Output Traces Lerning Moore Mchines from Input-Output Trces Georgios Gintmidis 1 nd Stvros Tripkis 1,2 1 Alto University, Finlnd 2 UC Berkeley, USA Motivtion: lerning models from blck boxes Inputs? Lerner Forml Model

More information

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton 25. Finite Automt AUTOMATA AND LANGUAGES A system of computtion tht only hs finite numer of possile sttes cn e modeled using finite utomton A finite utomton is often illustrted s stte digrm d d d. d q

More information

From LTL to Symbolically Represented Deterministic Automata

From LTL to Symbolically Represented Deterministic Automata Motivtion nd Prolem Setting Determinizing Non-Confluent Automt Det. vi Automt Hierrchy From LTL to Symoliclly Represented Deterministic Automt Andres Morgenstern Klus Schneider Sven Lmerti Mnuel Gesell

More information

MAA 4212 Improper Integrals

MAA 4212 Improper Integrals Notes by Dvid Groisser, Copyright c 1995; revised 2002, 2009, 2014 MAA 4212 Improper Integrls The Riemnn integrl, while perfectly well-defined, is too restrictive for mny purposes; there re functions which

More information

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages Deprtment of Computer Science, Austrlin Ntionl University COMP2600 Forml Methods for Softwre Engineering Semester 2, 206 Assignment Automt, Lnguges, nd Computility Smple Solutions Finite Stte Automt nd

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

COMPUTER SCIENCE TRIPOS

COMPUTER SCIENCE TRIPOS CST.2011.2.1 COMPUTER SCIENCE TRIPOS Prt IA Tuesdy 7 June 2011 1.30 to 4.30 COMPUTER SCIENCE Pper 2 Answer one question from ech of Sections A, B nd C, nd two questions from Section D. Submit the nswers

More information

CS667 Lecture 6: Monte Carlo Integration 02/10/05

CS667 Lecture 6: Monte Carlo Integration 02/10/05 CS667 Lecture 6: Monte Crlo Integrtion 02/10/05 Venkt Krishnrj Lecturer: Steve Mrschner 1 Ide The min ide of Monte Crlo Integrtion is tht we cn estimte the vlue of n integrl by looking t lrge number of

More information

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38 Theory of Computtion Regulr Lnguges (NTU EE) Regulr Lnguges Fll 2017 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of Finite Automt A finite utomton hs finite set of control

More information

Formal languages, automata, and theory of computation

Formal languages, automata, and theory of computation Mälrdlen University TEN1 DVA337 2015 School of Innovtion, Design nd Engineering Forml lnguges, utomt, nd theory of computtion Thursdy, Novemer 5, 14:10-18:30 Techer: Dniel Hedin, phone 021-107052 The exm

More information

Bernoulli Numbers Jeff Morton

Bernoulli Numbers Jeff Morton Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f

More information

Theoretical foundations of Gaussian quadrature

Theoretical foundations of Gaussian quadrature Theoreticl foundtions of Gussin qudrture 1 Inner product vector spce Definition 1. A vector spce (or liner spce) is set V = {u, v, w,...} in which the following two opertions re defined: (A) Addition of

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

20 MATHEMATICS POLYNOMIALS

20 MATHEMATICS POLYNOMIALS 0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of

More information

Riemann is the Mann! (But Lebesgue may besgue to differ.)

Riemann is the Mann! (But Lebesgue may besgue to differ.) Riemnn is the Mnn! (But Lebesgue my besgue to differ.) Leo Livshits My 2, 2008 1 For finite intervls in R We hve seen in clss tht every continuous function f : [, b] R hs the property tht for every ɛ >

More information

automata for formal methods: little steps towards perfection

automata for formal methods: little steps towards perfection utomt for forml methods: little steps towrds perfection Frntišek Blhoudek phd thesis corrected version (September 25, 2018) Fculty of Informtics Msryk University Brno Mrch 2018 Acknowledgements I will

More information

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!)

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!) CMSC 330: Orgniztion of Progrmming Lnguges DFAs, nd NFAs, nd Regexps (Oh my!) CMSC330 Spring 2018 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

Credibility Hypothesis Testing of Fuzzy Triangular Distributions

Credibility Hypothesis Testing of Fuzzy Triangular Distributions 666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct

More information

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2016

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2016 CS125 Lecture 12 Fll 2016 12.1 Nondeterminism The ide of nondeterministic computtions is to llow our lgorithms to mke guesses, nd only require tht they ccept when the guesses re correct. For exmple, simple

More information

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2014

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2014 CS125 Lecture 12 Fll 2014 12.1 Nondeterminism The ide of nondeterministic computtions is to llow our lgorithms to mke guesses, nd only require tht they ccept when the guesses re correct. For exmple, simple

More information

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d Interntionl Industril Informtics nd Computer Engineering Conference (IIICEC 15) Driving Cycle Construction of City Rod for Hybrid Bus Bsed on Mrkov Process Deng Pn1,, Fengchun Sun1,b*, Hongwen He1, c,

More information

The steps of the hypothesis test

The steps of the hypothesis test ttisticl Methods I (EXT 7005) Pge 78 Mosquito species Time of dy A B C Mid morning 0.0088 5.4900 5.5000 Mid Afternoon.3400 0.0300 0.8700 Dusk 0.600 5.400 3.000 The Chi squre test sttistic is the sum of

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations. Lecture 3 3 Solving liner equtions In this lecture we will discuss lgorithms for solving systems of liner equtions Multiplictive identity Let us restrict ourselves to considering squre mtrices since one

More information

3 Regular expressions

3 Regular expressions 3 Regulr expressions Given n lphet Σ lnguge is set of words L Σ. So fr we were le to descrie lnguges either y using set theory (i.e. enumertion or comprehension) or y n utomton. In this section we shll

More information

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014 SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 014 Mrk Scheme: Ech prt of Question 1 is worth four mrks which re wrded solely for the correct nswer.

More information

Parse trees, ambiguity, and Chomsky normal form

Parse trees, ambiguity, and Chomsky normal form Prse trees, miguity, nd Chomsky norml form In this lecture we will discuss few importnt notions connected with contextfree grmmrs, including prse trees, miguity, nd specil form for context-free grmmrs

More information

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7 CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees

More information

5.1 Definitions and Examples 5.2 Deterministic Pushdown Automata

5.1 Definitions and Examples 5.2 Deterministic Pushdown Automata CSC4510 AUTOMATA 5.1 Definitions nd Exmples 5.2 Deterministic Pushdown Automt Definitions nd Exmples A lnguge cn be generted by CFG if nd only if it cn be ccepted by pushdown utomton. A pushdown utomton

More information

Theory of Computation Regular Languages

Theory of Computation Regular Languages Theory of Computtion Regulr Lnguges Bow-Yw Wng Acdemi Sinic Spring 2012 Bow-Yw Wng (Acdemi Sinic) Regulr Lnguges Spring 2012 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of

More information

Improper Integrals, and Differential Equations

Improper Integrals, and Differential Equations Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted

More information

1 Probability Density Functions

1 Probability Density Functions Lis Yn CS 9 Continuous Distributions Lecture Notes #9 July 6, 28 Bsed on chpter by Chris Piech So fr, ll rndom vribles we hve seen hve been discrete. In ll the cses we hve seen in CS 9, this ment tht our

More information

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral Improper Integrls Every time tht we hve evluted definite integrl such s f(x) dx, we hve mde two implicit ssumptions bout the integrl:. The intervl [, b] is finite, nd. f(x) is continuous on [, b]. If one

More information

Non-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1

Non-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1 Non-Deterministic Finite Automt Fll 2018 Costs Busch - RPI 1 Nondeterministic Finite Automton (NFA) Alphbet ={} q q2 1 q 0 q 3 Fll 2018 Costs Busch - RPI 2 Nondeterministic Finite Automton (NFA) Alphbet

More information

Chapter 2 Finite Automata

Chapter 2 Finite Automata Chpter 2 Finite Automt 28 2.1 Introduction Finite utomt: first model of the notion of effective procedure. (They lso hve mny other pplictions). The concept of finite utomton cn e derived y exmining wht

More information

Finite Automata-cont d

Finite Automata-cont d Automt Theory nd Forml Lnguges Professor Leslie Lnder Lecture # 6 Finite Automt-cont d The Pumping Lemm WEB SITE: http://ingwe.inghmton.edu/ ~lnder/cs573.html Septemer 18, 2000 Exmple 1 Consider L = {ww

More information

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

State Minimization for DFAs

State Minimization for DFAs Stte Minimiztion for DFAs Red K & S 2.7 Do Homework 10. Consider: Stte Minimiztion 4 5 Is this miniml mchine? Step (1): Get rid of unrechle sttes. Stte Minimiztion 6, Stte is unrechle. Step (2): Get rid

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2 CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system. Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

Refined interfaces for compositional verification

Refined interfaces for compositional verification Refined interfces for compositionl verifiction Frédéric Lng INRI Rhône-lpes http://www.inrilpes.fr/vsy Motivtion Enumertive verifiction of concurrent systems Prllel composition of synchronous processes

More information