Monitoring the full range of ω-regular properties of Stochastic Systems

Size: px
Start display at page:

Download "Monitoring the full range of ω-regular properties of Stochastic Systems"

Transcription

1 Monitoring the full range of ω-regular properties of Stochastic Systems Kalpana Gondi, Yogesh K. Patel, A. Prasad Sistla University of Illinois at Chicago

2 Outline of the talk Motivation

3 Outline of the talk Motivation Monitoring Stochastic Systems

4 Outline of the talk Motivation Monitoring Stochastic Systems Deterministic, Probabilistic, Hybrid Algorithms

5 Outline of the talk Motivation Monitoring Stochastic Systems Deterministic, Probabilistic, Hybrid Algorithms Implementation

6 Motivation A component C, not thouroughly tested/verified.

7 Motivation A component C, not thouroughly tested/verified. C may exhibit computations that violate the correctness spec Φ

8 Motivation A component C, not thouroughly tested/verified. C may exhibit computations that violate the correctness spec Φ Need a monitor M that detects incorrect computations at run time

9 Motivation A component C, not thouroughly tested/verified. C may exhibit computations that violate the correctness spec Φ Need a monitor M that detects incorrect computations at run time M observes the computation of C and checks for violation of Φ

10 Another Motivation Liveness of C verified assuming fairness.

11 Another Motivation Liveness of C verified assuming fairness. Need to monitor C for violation of liveness or fairness.

12 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99])

13 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99]) How to monitor general Φ??

14 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99]) How to monitor general Φ?? Φ conjunction of a safety and a liveness property

15 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99]) How to monitor general Φ?? Φ conjunction of a safety and a liveness property Over approximate Φ by a safety property [AR05] (Liberal Monitor)

16 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99]) How to monitor general Φ?? Φ conjunction of a safety and a liveness property Over approximate Φ by a safety property [AR05] (Liberal Monitor) Under approximate it by a safety property [MSSZ05,SZZ06] (Conservative Monitor)

17 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton.

18 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton. New Work:

19 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton. New Work: Φ is a Det. Streett automaton all ω-regular properties.

20 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton. New Work: Φ is a Det. Streett automaton all ω-regular properties. Accurate Deterministic, Probablistic and Hybrid Algs.

21 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton. New Work: Φ is a Det. Streett automaton all ω-regular properties. Accurate Deterministic, Probablistic and Hybrid Algs. Implementation: Tool Stochastic Monitor(SM)

22 Monitoring Stochastic Systems A Hidden Markov Chain (HMC) is a pair (G,O) where G = (S,R,φ) is a finite Markov chain;

23 Monitoring Stochastic Systems A Hidden Markov Chain (HMC) is a pair (G,O) where G = (S,R,φ) is a finite Markov chain; O : S Σ is an output function

24 Monitoring Stochastic Systems A Hidden Markov Chain (HMC) is a pair (G,O) where G = (S,R,φ) is a finite Markov chain; O : S Σ is an output function Σ = 2 P, P set of atomic propositions

25 Monitoring Stochastic Systems A Hidden Markov Chain (HMC) is a pair (G,O) where G = (S,R,φ) is a finite Markov chain; O : S Σ is an output function Σ = 2 P, P set of atomic propositions Define E the class of measurable subsets of Σ ω as the smallest set so that For every α Σ, ασ ω E. Closed under complementation and countable union.

26 Example 1 1/3 s 0 1/3 s 1 P,Q Q 1/3 s 2 Q 1 For any state s, F s defines a probability measure on E. F s0 ( P) = 1 2.

27 Accuracy of a Monitor The system is given by a HMC H which is known.

28 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state

29 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state Correctness spec given by a det. Streett automaton A

30 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state Correctness spec given by a det. Streett automaton A Acceptance condition of A: Pairs of subsets (RED, GREEN)

31 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state Correctness spec given by a det. Streett automaton A Acceptance condition of A: Pairs of subsets (RED, GREEN) Construct a monitor M so that L(M) L(A). L(M) is a safety property.

32 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state Correctness spec given by a det. Streett automaton A Acceptance condition of A: Pairs of subsets (RED, GREEN) Construct a monitor M so that L(M) L(A). L(M) is a safety property. (Acceptance) Accuracy of M is the conditional probability F s0 (L(M) L(A)) s 0 initial system state.

33 Monitoring Algorithms Preprocessing 1

34 Monitoring Algorithms Preprocessing Compute Markov chain G the product of G and A. 1

35 Monitoring Algorithms Preprocessing Compute Markov chain G the product of G and A. A state (s,q) in G is good if F s (L(A q )) = 1 and bad if F s (L(A q )) is 0. A q same as A with starting state q. 1

36 Monitoring Algorithms Preprocessing Compute Markov chain G the product of G and A. A state (s,q) in G is good if F s (L(A q )) = 1 and bad if F s (L(A q )) is 0. A q same as A with starting state q. Compute good and bad states of G. 1

37 Monitoring Algorithms Preprocessing Compute Markov chain G the product of G and A. A state (s,q) in G is good if F s (L(A q )) = 1 and bad if F s (L(A q )) is 0. A q same as A with starting state q. Compute good and bad states of G. Simulates A on the sequence of system outputs. 1

38 Deterministic Monitoring Algorithm Maintains the following variables 1

39 Deterministic Monitoring Algorithm Maintains the following variables X: possible system states, initialized to {s 0 }. 1

40 Deterministic Monitoring Algorithm Maintains the following variables X: possible system states, initialized to {s 0 }. q: the automaton state, initialized to q 0. 1

41 Deterministic Monitoring Algorithm Maintains the following variables X: possible system states, initialized to {s 0 }. q: the automaton state, initialized to q 0. i: denotes the number of times an accepting automaton state is reached. Initialized to 0. 1

42 Deterministic Monitoring Algorithm Maintains the following variables X: possible system states, initialized to {s 0 }. q: the automaton state, initialized to q 0. i: denotes the number of times an accepting automaton state is reached. Initialized to 0. counter : denotes the number of expected outputs before an accepting automaton state. 1

43 Det. Alg. Continued Procedure GetInputAndU pdate(): Get next input from the system; Simulate A for one step and Update q as well as X; If all states in X {q} are good then accept; If all states in X {q} are bad then reject; 1

44 Deterministic Algorithm Contd Loop forever GetInputAndUpdate(); If q RED then counter := counter 1; If counter = 0 then reject; If q GREEN then {i := i + 1; counter := f(q,x,i)} 1

45 Theorem: For any y, 0 y < 1, there exists a constant c such that if f(q,x,i) = c i then the acceptance accuracy of the monitor is at least y. Theorem: If the HMC is fully visible, then the monitor can be simplified to have acceptance accuracy to be 1. 1

46 Example:Resource Acquisition T v 1 T t 1/2 1/2 1/2 w C 1 1/2 s N 1/3 N 1/3 s 1 1/3 1/3 w C t 1/3 T 1/3 s is the initial state. v the state where the server crashed. Property to be monitored (T C). Acceptance accuracy of 0.9 can be achieved by choosing k = 3. 1

47 Probabilistic Algorithm Uses probability variable p instead of counter. p initialized to probability value p 0. Uses variables X, q as before. Loop forever GetInputAndUpdate(); If q RED then reject with probability p; If q GREEN then p := p c 1

48 Probabilistic Algorithm Contd. Theorem: For any y, 0 y < 1, there exists constants p 0,c for which the acceptance accuracy of the monitor is at least y. 1

49 Hybrid Algorithm Combines both deterministic, probabilistic algs. Uses variable counter initialized to k. Uses variables X, q as before. 1

50 Hybrid Algorithm Contd. Loop forever GetInputAndUpdate(); If q RED then counter, Toss a fair coin; If counter = 0 then If last k coin tosses were tails then reject Else counter := k; If q GREEN then counter := + + k 1

51 Hybrid Algorithm Contd. Theorem: For any y, 0 y < 1, there exists an initail counter value such that the acceptance accuracy of the monitor is at least y. 2

52 Implementation Developed a tool : SM (Stochastic Monitor) Input: high level description of a synch. probabilistic program; Uses PRISM tool to obtain the Markov chain M; Takes automaton A as another input; Constructs product Markov Chain M ; Computes its good, bad product states; Generates a monitor using other parameters. 2

53 Experimental Results Considered three examples; Peterson s Mutual Excl Alg: Second process can die in the critical section; Property Monitored: (T 1 C 1 ); Mutual Excl with Semaphores: Second can die in the critical section Property Monitored: T 1 C 1 ; Bounded Retransmission Protocol: Packets can be lost in transmission; Property Monitored: The file will eventually be transmitted. 2

54 Experimental results Contd 2

55 Experimental Results Contd 2

56 Related Work Our [SS08] paper gave det algs for det.buchi automata Monitoring for safety properties done by many people [Si87], [KV99], etc. Recent work Amorium and Rosu (CAV2005) handle some liveness. Concentrate on evaluating efficiently atomic propositions in system states. The paper [PZZ 2005] uses game theoretic approach. 2

57 Conclusion Need to extend to Hidden Markov Decision Processes to handle asynchronous concurrency Other cost measures for tuning deterministic algs for HMCs. How to monitor for complex systems? Use Assume/guarantee paradigms. 2

Synthesizing Robust Systems

Synthesizing Robust Systems Synthesizing Robust Systems Roderick Bloem and Karin Greimel (TU-Graz) Thomas Henzinger (EPFL and IST-Austria) Barbara Jobstmann (CNRS/Verimag) FMCAD 2009 in Austin, Texas Barbara Jobstmann 1 Motivation

More information

Timo Latvala. March 7, 2004

Timo Latvala. March 7, 2004 Reactive Systems: Safety, Liveness, and Fairness Timo Latvala March 7, 2004 Reactive Systems: Safety, Liveness, and Fairness 14-1 Safety Safety properties are a very useful subclass of specifications.

More information

Chapter 3: Linear temporal logic

Chapter 3: Linear temporal logic INFOF412 Formal verification of computer systems Chapter 3: Linear temporal logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 LTL: a specification

More information

On the Expressiveness and Complexity of Randomization in Finite State Monitors

On the Expressiveness and Complexity of Randomization in Finite State Monitors On the Expressiveness and Complexity of Randomization in Finite State Monitors Rohit Chadha Univ. of Illinois at Urbana-Champaign and A. Prasad Sistla Univ. of Illinois at Chicago and Mahesh Viswanathan

More information

Randomized Algorithms. Andreas Klappenecker

Randomized Algorithms. Andreas Klappenecker Randomized Algorithms Andreas Klappenecker Randomized Algorithms A randomized algorithm is an algorithm that makes random choices during its execution. A randomized algorithm uses values generated by a

More information

Lecture notes for probability. Math 124

Lecture notes for probability. Math 124 Lecture notes for probability Math 124 What is probability? Probabilities are ratios, expressed as fractions, decimals, or percents, determined by considering results or outcomes of experiments whose result

More information

LECTURE 1. 1 Introduction. 1.1 Sample spaces and events

LECTURE 1. 1 Introduction. 1.1 Sample spaces and events LECTURE 1 1 Introduction The first part of our adventure is a highly selective review of probability theory, focusing especially on things that are most useful in statistics. 1.1 Sample spaces and events

More information

Automata-based Verification - III

Automata-based Verification - III COMP30172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20: email: howard.barringer@manchester.ac.uk March 2009 Third Topic Infinite Word Automata Motivation Büchi Automata

More information

Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems

Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems Alberto Puggelli DREAM Seminar - November 26, 2013 Collaborators and PIs:

More information

Janson s Inequality and Poisson Heuristic

Janson s Inequality and Poisson Heuristic Janson s Inequality and Poisson Heuristic Dinesh K CS11M019 IIT Madras April 30, 2012 Dinesh (IITM) Janson s Inequality April 30, 2012 1 / 11 Outline 1 Motivation Dinesh (IITM) Janson s Inequality April

More information

CS505: Distributed Systems

CS505: Distributed Systems Department of Computer Science CS505: Distributed Systems Lecture 10: Consensus Outline Consensus impossibility result Consensus with S Consensus with Ω Consensus Most famous problem in distributed computing

More information

Infinite Games. Sumit Nain. 28 January Slides Credit: Barbara Jobstmann (CNRS/Verimag) Department of Computer Science Rice University

Infinite Games. Sumit Nain. 28 January Slides Credit: Barbara Jobstmann (CNRS/Verimag) Department of Computer Science Rice University Infinite Games Sumit Nain Department of Computer Science Rice University 28 January 2013 Slides Credit: Barbara Jobstmann (CNRS/Verimag) Motivation Abstract games are of fundamental importance in mathematics

More information

CDS 270 (Fall 09) - Lecture Notes for Assignment 8.

CDS 270 (Fall 09) - Lecture Notes for Assignment 8. CDS 270 (Fall 09) - Lecture Notes for Assignment 8. ecause this part of the course has no slides or textbook, we will provide lecture supplements that include, hopefully, enough discussion to complete

More information

Symmetry Reductions. A. Prasad Sistla University Of Illinois at Chicago

Symmetry Reductions. A. Prasad Sistla University Of Illinois at Chicago Symmetry Reductions. A. Prasad Sistla University Of Illinois at Chicago Model-Checking Concurrent PGM Temporal SPEC Model Checker Yes/No Counter Example Approach Build the global state graph Algorithm

More information

Büchi Automata and their closure properties. - Ajith S and Ankit Kumar

Büchi Automata and their closure properties. - Ajith S and Ankit Kumar Büchi Automata and their closure properties - Ajith S and Ankit Kumar Motivation Conventional programs accept input, compute, output result, then terminate Reactive program : not expected to terminate

More information

Automata-based Verification - III

Automata-based Verification - III CS3172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20/22: email: howard.barringer@manchester.ac.uk March 2005 Third Topic Infinite Word Automata Motivation Büchi Automata

More information

Probabilistic Büchi Automata with non-extremal acceptance thresholds

Probabilistic Büchi Automata with non-extremal acceptance thresholds Probabilistic Büchi Automata with non-extremal acceptance thresholds Rohit Chadha 1, A. Prasad Sistla, and Mahesh Viswanathan 3 1 LSV, ENS Cachan & CNRS & INRIA Saclay, France Univ. of IIlinois, Chicago,

More information

Sample Spaces, Random Variables

Sample Spaces, Random Variables Sample Spaces, Random Variables Moulinath Banerjee University of Michigan August 3, 22 Probabilities In talking about probabilities, the fundamental object is Ω, the sample space. (elements) in Ω are denoted

More information

Alan Bundy. Automated Reasoning LTL Model Checking

Alan Bundy. Automated Reasoning LTL Model Checking Automated Reasoning LTL Model Checking Alan Bundy Lecture 9, page 1 Introduction So far we have looked at theorem proving Powerful, especially where good sets of rewrite rules or decision procedures have

More information

LTL is Closed Under Topological Closure

LTL is Closed Under Topological Closure LTL is Closed Under Topological Closure Grgur Petric Maretić, Mohammad Torabi Dashti, David Basin Department of Computer Science, ETH Universitätstrasse 6 Zürich, Switzerland Abstract We constructively

More information

CS256/Spring 2008 Lecture #11 Zohar Manna. Beyond Temporal Logics

CS256/Spring 2008 Lecture #11 Zohar Manna. Beyond Temporal Logics CS256/Spring 2008 Lecture #11 Zohar Manna Beyond Temporal Logics Temporal logic expresses properties of infinite sequences of states, but there are interesting properties that cannot be expressed, e.g.,

More information

Logic Model Checking

Logic Model Checking Logic Model Checking Lecture Notes 10:18 Caltech 101b.2 January-March 2004 Course Text: The Spin Model Checker: Primer and Reference Manual Addison-Wesley 2003, ISBN 0-321-22862-6, 608 pgs. the assignment

More information

Mathematical Foundations of Computer Science Lecture Outline October 18, 2018

Mathematical Foundations of Computer Science Lecture Outline October 18, 2018 Mathematical Foundations of Computer Science Lecture Outline October 18, 2018 The Total Probability Theorem. Consider events E and F. Consider a sample point ω E. Observe that ω belongs to either F or

More information

Monty Hall Puzzle. Draw a tree diagram of possible choices (a possibility tree ) One for each strategy switch or no-switch

Monty Hall Puzzle. Draw a tree diagram of possible choices (a possibility tree ) One for each strategy switch or no-switch Monty Hall Puzzle Example: You are asked to select one of the three doors to open. There is a large prize behind one of the doors and if you select that door, you win the prize. After you select a door,

More information

Impossibility of Distributed Consensus with One Faulty Process

Impossibility of Distributed Consensus with One Faulty Process Impossibility of Distributed Consensus with One Faulty Process Journal of the ACM 32(2):374-382, April 1985. MJ Fischer, NA Lynch, MS Peterson. Won the 2002 Dijkstra Award (for influential paper in distributed

More information

Venn Diagrams; Probability Laws. Notes. Set Operations and Relations. Venn Diagram 2.1. Venn Diagrams; Probability Laws. Notes

Venn Diagrams; Probability Laws. Notes. Set Operations and Relations. Venn Diagram 2.1. Venn Diagrams; Probability Laws. Notes Lecture 2 s; Text: A Course in Probability by Weiss 2.4 STAT 225 Introduction to Probability Models January 8, 2014 s; Whitney Huang Purdue University 2.1 Agenda s; 1 2 2.2 Intersection: the intersection

More information

Temporal logics and model checking for fairly correct systems

Temporal logics and model checking for fairly correct systems Temporal logics and model checking for fairly correct systems Hagen Völzer 1 joint work with Daniele Varacca 2 1 Lübeck University, Germany 2 Imperial College London, UK LICS 2006 Introduction Five Philosophers

More information

Efficient Model Checking of Safety Properties

Efficient Model Checking of Safety Properties Efficient Model Checking of Safety Properties Timo Latvala timo.latvala@hut.fi Laboratory for Theoretical Computer Science Helsinki University of Technology Finland Spin 2003 p.1/16 Introduction Safety

More information

Advanced Automata Theory 7 Automatic Functions

Advanced Automata Theory 7 Automatic Functions Advanced Automata Theory 7 Automatic Functions Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory

More information

Dynamic Programming Lecture #4

Dynamic Programming Lecture #4 Dynamic Programming Lecture #4 Outline: Probability Review Probability space Conditional probability Total probability Bayes rule Independent events Conditional independence Mutual independence Probability

More information

Chapter 1: Introduction to Probability Theory

Chapter 1: Introduction to Probability Theory ECE5: Stochastic Signals and Systems Fall 8 Lecture - September 6, 8 Prof. Salim El Rouayheb Scribe: Peiwen Tian, Lu Liu, Ghadir Ayache Chapter : Introduction to Probability Theory Axioms of Probability

More information

Bounded Synthesis. Sven Schewe and Bernd Finkbeiner. Universität des Saarlandes, Saarbrücken, Germany

Bounded Synthesis. Sven Schewe and Bernd Finkbeiner. Universität des Saarlandes, Saarbrücken, Germany Bounded Synthesis Sven Schewe and Bernd Finkbeiner Universität des Saarlandes, 66123 Saarbrücken, Germany Abstract. The bounded synthesis problem is to construct an implementation that satisfies a given

More information

Computer-Aided Program Design

Computer-Aided Program Design Computer-Aided Program Design Spring 2015, Rice University Unit 3 Swarat Chaudhuri February 5, 2015 Temporal logic Propositional logic is a good language for describing properties of program states. However,

More information

Alternating nonzero automata

Alternating nonzero automata Alternating nonzero automata Application to the satisfiability of CTL [,, P >0, P =1 ] Hugo Gimbert, joint work with Paulin Fournier LaBRI, Université de Bordeaux ANR Stoch-MC 06/07/2017 Control and verification

More information

The Complexity of Stochastic Müller Games

The Complexity of Stochastic Müller Games The Complexity of Stochastic Müller Games Krishnendu Chatterjee Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2007-110 http://www.eecs.berkeley.edu/pubs/techrpts/2007/eecs-2007-110.html

More information

Reasoning about Time and Reliability

Reasoning about Time and Reliability Reasoning about Time and Reliability Probabilistic CTL model checking Daniel Bruns Institut für theoretische Informatik Universität Karlsruhe 13. Juli 2007 Seminar Theorie und Anwendung von Model Checking

More information

Finite State Machines Transducers Markov Models Hidden Markov Models Büchi Automata

Finite State Machines Transducers Markov Models Hidden Markov Models Büchi Automata Finite State Machines Transducers Markov Models Hidden Markov Models Büchi Automata Chapter 5 Deterministic Finite State Transducers A Moore machine M = (K,, O,, D, s, A), where: K is a finite set of states

More information

Lecture 20 : Markov Chains

Lecture 20 : Markov Chains CSCI 3560 Probability and Computing Instructor: Bogdan Chlebus Lecture 0 : Markov Chains We consider stochastic processes. A process represents a system that evolves through incremental changes called

More information

Random Variable. Pr(X = a) = Pr(s)

Random Variable. Pr(X = a) = Pr(s) Random Variable Definition A random variable X on a sample space Ω is a real-valued function on Ω; that is, X : Ω R. A discrete random variable is a random variable that takes on only a finite or countably

More information

Temporal Logic. M φ. Outline. Why not standard logic? What is temporal logic? LTL CTL* CTL Fairness. Ralf Huuck. Kripke Structure

Temporal Logic. M φ. Outline. Why not standard logic? What is temporal logic? LTL CTL* CTL Fairness. Ralf Huuck. Kripke Structure Outline Temporal Logic Ralf Huuck Why not standard logic? What is temporal logic? LTL CTL* CTL Fairness Model Checking Problem model, program? M φ satisfies, Implements, refines property, specification

More information

6.262: Discrete Stochastic Processes 2/2/11. Lecture 1: Introduction and Probability review

6.262: Discrete Stochastic Processes 2/2/11. Lecture 1: Introduction and Probability review 6.262: Discrete Stochastic Processes 2/2/11 Lecture 1: Introduction and Probability review Outline: Probability in the real world Probability as a branch of mathematics Discrete stochastic processes Processes

More information

ELEG 3143 Probability & Stochastic Process Ch. 1 Probability

ELEG 3143 Probability & Stochastic Process Ch. 1 Probability Department of Electrical Engineering University of Arkansas ELEG 3143 Probability & Stochastic Process Ch. 1 Probability Dr. Jingxian Wu wuj@uark.edu OUTLINE 2 Applications Elementary Set Theory Random

More information

Origins of Probability Theory

Origins of Probability Theory 1 16.584: INTRODUCTION Theory and Tools of Probability required to analyze and design systems subject to uncertain outcomes/unpredictability/randomness. Such systems more generally referred to as Experiments.

More information

2. Elements of the Theory of Computation, Lewis and Papadimitrou,

2. Elements of the Theory of Computation, Lewis and Papadimitrou, Introduction Finite Automata DFA, regular languages Nondeterminism, NFA, subset construction Regular Epressions Synta, Semantics Relationship to regular languages Properties of regular languages Pumping

More information

On the Accepting Power of 2-Tape Büchi Automata

On the Accepting Power of 2-Tape Büchi Automata On the Accepting Power of 2-Tape Büchi Automata Equipe de Logique Mathématique Université Paris 7 STACS 2006 Acceptance of infinite words In the sixties, Acceptance of infinite words by finite automata

More information

Uses of finite automata

Uses of finite automata Chapter 2 :Finite Automata 2.1 Finite Automata Automata are computational devices to solve language recognition problems. Language recognition problem is to determine whether a word belongs to a language.

More information

1 Modelling and Simulation

1 Modelling and Simulation 1 Modelling and Simulation 1.1 Introduction This course teaches various aspects of computer-aided modelling for the performance evaluation of computer systems and communication networks. The performance

More information

A Symbolic Approach to Safety LTL Synthesis

A Symbolic Approach to Safety LTL Synthesis A Symbolic Approach to Safety LTL Synthesis Shufang Zhu 1 Lucas M. Tabajara 2 Jianwen Li Geguang Pu 1 Moshe Y. Vardi 2 1 East China Normal University 2 Rice Lucas M. Tabajara (Rice University) 2 University

More information

Recognizing Safety and Liveness by Alpern and Schneider

Recognizing Safety and Liveness by Alpern and Schneider Recognizing Safety and Liveness by Alpern and Schneider Calvin Deutschbein 17 Jan 2017 1 Intro 1.1 Safety What is safety? Bad things do not happen For example, consider the following safe program in C:

More information

Lecture 1 Introduction to Probability and Set Theory Text: A Course in Probability by Weiss

Lecture 1 Introduction to Probability and Set Theory Text: A Course in Probability by Weiss Lecture 1 to and Set Theory Text: A Course in by Weiss 1.2 2.3 STAT 225 to Models January 13, 2014 to and Whitney Huang Purdue University 1.1 Agenda to and 1 2 3 1.2 Motivation Uncertainty/Randomness in

More information

SFM-11:CONNECT Summer School, Bertinoro, June 2011

SFM-11:CONNECT Summer School, Bertinoro, June 2011 SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision

More information

Linear-Time Logic. Hao Zheng

Linear-Time Logic. Hao Zheng Linear-Time Logic Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng (CSE, USF)

More information

CS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis

CS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis CS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis Eli Upfal Eli Upfal@brown.edu Office: 319 TA s: Lorenzo De Stefani and Sorin Vatasoiu cs155tas@cs.brown.edu It is remarkable

More information

Peled, Vardi, & Yannakakis: Black Box Checking

Peled, Vardi, & Yannakakis: Black Box Checking Peled, Vardi, & Yannakakis: Black Box Checking Martin Leucker leucker@it.uu.se Department of Computer Systems,, Sweden Plan Preliminaries State identification and verification Conformance Testing Extended

More information

Preliminary Statistics Lecture 2: Probability Theory (Outline) prelimsoas.webs.com

Preliminary Statistics Lecture 2: Probability Theory (Outline) prelimsoas.webs.com 1 School of Oriental and African Studies September 2015 Department of Economics Preliminary Statistics Lecture 2: Probability Theory (Outline) prelimsoas.webs.com Gujarati D. Basic Econometrics, Appendix

More information

Theory of Computation 4 Non-Deterministic Finite Automata

Theory of Computation 4 Non-Deterministic Finite Automata Theory of Computation 4 Non-Deterministic Finite Automata Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Theory of Computation

More information

The algorithmic analysis of hybrid system

The algorithmic analysis of hybrid system The algorithmic analysis of hybrid system Authors: R.Alur, C. Courcoubetis etc. Course teacher: Prof. Ugo Buy Xin Li, Huiyong Xiao Nov. 13, 2002 Summary What s a hybrid system? Definition of Hybrid Automaton

More information

Discrete Event Systems Exam

Discrete Event Systems Exam Computer Engineering and Networks Laboratory TEC, NSG, DISCO HS 2016 Prof. L. Thiele, Prof. L. Vanbever, Prof. R. Wattenhofer Discrete Event Systems Exam Friday, 3 rd February 2017, 14:00 16:00. Do not

More information

Automatic Synthesis of Distributed Protocols

Automatic Synthesis of Distributed Protocols Automatic Synthesis of Distributed Protocols Rajeev Alur Stavros Tripakis 1 Introduction Protocols for coordination among concurrent processes are an essential component of modern multiprocessor and distributed

More information

Overview. overview / 357

Overview. overview / 357 Overview overview6.1 Introduction Modelling parallel systems Linear Time Properties Regular Properties Linear Temporal Logic (LTL) Computation Tree Logic syntax and semantics of CTL expressiveness of CTL

More information

Linear Temporal Logic and Büchi Automata

Linear Temporal Logic and Büchi Automata Linear Temporal Logic and Büchi Automata Yih-Kuen Tsay Department of Information Management National Taiwan University FLOLAC 2009 Yih-Kuen Tsay (SVVRL @ IM.NTU) Linear Temporal Logic and Büchi Automata

More information

Introduction to Probability. Ariel Yadin. Lecture 1. We begin with an example [this is known as Bertrand s paradox]. *** Nov.

Introduction to Probability. Ariel Yadin. Lecture 1. We begin with an example [this is known as Bertrand s paradox]. *** Nov. Introduction to Probability Ariel Yadin Lecture 1 1. Example: Bertrand s Paradox We begin with an example [this is known as Bertrand s paradox]. *** Nov. 1 *** Question 1.1. Consider a circle of radius

More information

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

Week 12-13: Discrete Probability

Week 12-13: Discrete Probability Week 12-13: Discrete Probability November 21, 2018 1 Probability Space There are many problems about chances or possibilities, called probability in mathematics. When we roll two dice there are possible

More information

CMPSCI 240: Reasoning about Uncertainty

CMPSCI 240: Reasoning about Uncertainty CMPSCI 240: Reasoning about Uncertainty Lecture 2: Sets and Events Andrew McGregor University of Massachusetts Last Compiled: January 27, 2017 Outline 1 Recap 2 Experiments and Events 3 Probabilistic Models

More information

Linear-time Temporal Logic

Linear-time Temporal Logic Linear-time Temporal Logic Pedro Cabalar Department of Computer Science University of Corunna, SPAIN cabalar@udc.es 2015/2016 P. Cabalar ( Department Linear oftemporal Computer Logic Science University

More information

Math 1313 Experiments, Events and Sample Spaces

Math 1313 Experiments, Events and Sample Spaces Math 1313 Experiments, Events and Sample Spaces At the end of this recording, you should be able to define and use the basic terminology used in defining experiments. Terminology The next main topic in

More information

ONR MURI AIRFOILS: Animal Inspired Robust Flight with Outer and Inner Loop Strategies. Calin Belta

ONR MURI AIRFOILS: Animal Inspired Robust Flight with Outer and Inner Loop Strategies. Calin Belta ONR MURI AIRFOILS: Animal Inspired Robust Flight with Outer and Inner Loop Strategies Provable safety for animal inspired agile flight Calin Belta Hybrid and Networked Systems (HyNeSs) Lab Department of

More information

Sanjit A. Seshia EECS, UC Berkeley

Sanjit A. Seshia EECS, UC Berkeley EECS 219C: Computer-Aided Verification Explicit-State Model Checking: Additional Material Sanjit A. Seshia EECS, UC Berkeley Acknowledgments: G. Holzmann Checking if M satisfies : Steps 1. Compute Buchi

More information

Probability Theory. Introduction to Probability Theory. Principles of Counting Examples. Principles of Counting. Probability spaces.

Probability Theory. Introduction to Probability Theory. Principles of Counting Examples. Principles of Counting. Probability spaces. Probability Theory To start out the course, we need to know something about statistics and probability Introduction to Probability Theory L645 Advanced NLP Autumn 2009 This is only an introduction; for

More information

Visibly Linear Dynamic Logic

Visibly Linear Dynamic Logic Visibly Linear Dynamic Logic Joint work with Alexander Weinert (Saarland University) Martin Zimmermann Saarland University September 8th, 2016 Highlights Conference, Brussels, Belgium Martin Zimmermann

More information

Dept. of Linguistics, Indiana University Fall 2015

Dept. of Linguistics, Indiana University Fall 2015 L645 Dept. of Linguistics, Indiana University Fall 2015 1 / 34 To start out the course, we need to know something about statistics and This is only an introduction; for a fuller understanding, you would

More information

Automata-Theoretic Model Checking of Reactive Systems

Automata-Theoretic Model Checking of Reactive Systems Automata-Theoretic Model Checking of Reactive Systems Radu Iosif Verimag/CNRS (Grenoble, France) Thanks to Tom Henzinger (IST, Austria), Barbara Jobstmann (CNRS, Grenoble) and Doron Peled (Bar-Ilan University,

More information

Introduction to probability theory

Introduction to probability theory Introduction to probability theory Fátima Sánchez Cabo Institute for Genomics and Bioinformatics, TUGraz f.sanchezcabo@tugraz.at 07/03/2007 - p. 1/35 Outline Random and conditional probability (7 March)

More information

On Model Checking Techniques for Randomized Distributed Systems. Christel Baier Technische Universität Dresden

On Model Checking Techniques for Randomized Distributed Systems. Christel Baier Technische Universität Dresden On Model Checking Techniques for Randomized Distributed Systems Christel Baier Technische Universität Dresden joint work with Nathalie Bertrand Frank Ciesinski Marcus Größer / 6 biological systems, resilient

More information

Revisiting Synthesis of GR(1) Specifications

Revisiting Synthesis of GR(1) Specifications Revisiting Synthesis of GR(1) Specifications Uri Klein & Amir Pnueli Courant Institute of Mathematical Sciences, NYU Haifa Verification Conference, October 2010 What Is Synthesis? Rather than implement

More information

Games with Costs and Delays

Games with Costs and Delays Games with Costs and Delays Martin Zimmermann Saarland University June 20th, 2017 LICS 2017, Reykjavik, Iceland Martin Zimmermann Saarland University Games with Costs and Delays 1/14 Gale-Stewart Games

More information

Uncountable Automatic Classes and Learning

Uncountable Automatic Classes and Learning Uncountable Automatic Classes and Learning Sanjay Jain a,1, Qinglong Luo a, Pavel Semukhin b,2, Frank Stephan c,3 a Department of Computer Science, National University of Singapore, Singapore 117417, Republic

More information

ω-automata Automata that accept (or reject) words of infinite length. Languages of infinite words appear:

ω-automata Automata that accept (or reject) words of infinite length. Languages of infinite words appear: ω-automata ω-automata Automata that accept (or reject) words of infinite length. Languages of infinite words appear: in verification, as encodings of non-terminating executions of a program. in arithmetic,

More information

Computation Tree Logic (CTL) & Basic Model Checking Algorithms

Computation Tree Logic (CTL) & Basic Model Checking Algorithms Computation Tree Logic (CTL) & Basic Model Checking Algorithms Martin Fränzle Carl von Ossietzky Universität Dpt. of Computing Science Res. Grp. Hybride Systeme Oldenburg, Germany 02917: CTL & Model Checking

More information

Countability Sets of Measure Zero Random Reals Normal Numbers There s a Bear in There. The Real Thing. Paul McCann. Wednesday, 3 August, 2011

Countability Sets of Measure Zero Random Reals Normal Numbers There s a Bear in There. The Real Thing. Paul McCann. Wednesday, 3 August, 2011 Wednesday, 3 August, 2011 Outline Countability 1 Countability 2 3 4 5 Counting with the Natural Numbers A set S is countable if there is a function f from N onto S. That is, we can label each s S by a

More information

Perfect-information Stochastic Parity Games

Perfect-information Stochastic Parity Games Perfect-information Stochastic Parity Games Wies law Zielonka LIAFA, case 7014 Université Paris 7 2, Place Jussieu 75251 Paris Cedex 05, France zielonka@liafa.jussieu.fr Abstract. We show that in perfect-information

More information

Decidability Results for Probabilistic Hybrid Automata

Decidability Results for Probabilistic Hybrid Automata Decidability Results for Probabilistic Hybrid Automata Prof. Dr. Erika Ábrahám Informatik 2 - Theory of Hybrid Systems RWTH Aachen SS09 - Probabilistic hybrid automata 1 / 17 Literatur Jeremy Sproston:

More information

Fast Acceleration of Ultimately Periodic Relations

Fast Acceleration of Ultimately Periodic Relations Fast Acceleration of Ultimately Periodic Relations Marius Bozga 1, Radu Iosif 1, Filip Konečný 1,2 1 VERIMAG / CNRS / University of Grenoble, France 2 Brno University of Technology, Czech Republic Fast

More information

Chapter 5: Linear Temporal Logic

Chapter 5: Linear Temporal Logic Chapter 5: Linear Temporal Logic Prof. Ali Movaghar Verification of Reactive Systems Spring 94 Outline We introduce linear temporal logic (LTL), a logical formalism that is suited for specifying LT properties.

More information

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Rachid Guerraoui Petr Kouznetsov Distributed Programming Laboratory EPFL Abstract Recent papers [7, 9] define the weakest failure detector

More information

Great Theoretical Ideas in Computer Science. Lecture 4: Deterministic Finite Automaton (DFA), Part 2

Great Theoretical Ideas in Computer Science. Lecture 4: Deterministic Finite Automaton (DFA), Part 2 5-25 Great Theoretical Ideas in Computer Science Lecture 4: Deterministic Finite Automaton (DFA), Part 2 January 26th, 27 Formal definition: DFA A deterministic finite automaton (DFA) M =(Q,,,q,F) M is

More information

ELEG 3143 Probability & Stochastic Process Ch. 1 Experiments, Models, and Probabilities

ELEG 3143 Probability & Stochastic Process Ch. 1 Experiments, Models, and Probabilities Department of Electrical Engineering University of Arkansas ELEG 3143 Probability & Stochastic Process Ch. 1 Experiments, Models, and Probabilities Dr. Jing Yang jingyang@uark.edu OUTLINE 2 Applications

More information

Finitary Winning in \omega-regular Games

Finitary Winning in \omega-regular Games Finitary Winning in \omega-regular Games Krishnendu Chatterjee Thomas A. Henzinger Florian Horn Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2007-120

More information

Stats Probability Theory

Stats Probability Theory Stats 241.3 Probability Theory Instructor: Office: W.H.Laverty 235 McLean Hall Phone: 966-6096 Lectures: Evaluation: M T W Th F 1:30pm - 2:50pm Thorv 105 Lab: T W Th 3:00-3:50 Thorv 105 Assignments, Labs,

More information

Probabilistic model checking with PRISM

Probabilistic model checking with PRISM Probabilistic model checking with PRISM Marta Kwiatkowska Department of Computer Science, University of Oxford 4th SSFT, Menlo College, May 204 Part 2 Markov decision processes Overview (Part 2) Introduction

More information

Computing and Communications 2. Information Theory -Entropy

Computing and Communications 2. Information Theory -Entropy 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Entropy Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Entropy Joint entropy

More information

Decidable and Expressive Classes of Probabilistic Automata

Decidable and Expressive Classes of Probabilistic Automata Decidable and Expressive Classes of Probabilistic Automata Yue Ben a, Rohit Chadha b, A. Prasad Sistla a, Mahesh Viswanathan c a University of Illinois at Chicago, USA b University of Missouri, USA c University

More information

Partially Ordered Two-way Büchi Automata

Partially Ordered Two-way Büchi Automata Partially Ordered Two-way Büchi Automata Manfred Kufleitner Alexander Lauser FMI, Universität Stuttgart, Germany {kufleitner, lauser}@fmi.uni-stuttgart.de June 14, 2010 Abstract We introduce partially

More information

MODULE 2 RANDOM VARIABLE AND ITS DISTRIBUTION LECTURES DISTRIBUTION FUNCTION AND ITS PROPERTIES

MODULE 2 RANDOM VARIABLE AND ITS DISTRIBUTION LECTURES DISTRIBUTION FUNCTION AND ITS PROPERTIES MODULE 2 RANDOM VARIABLE AND ITS DISTRIBUTION LECTURES 7-11 Topics 2.1 RANDOM VARIABLE 2.2 INDUCED PROBABILITY MEASURE 2.3 DISTRIBUTION FUNCTION AND ITS PROPERTIES 2.4 TYPES OF RANDOM VARIABLES: DISCRETE,

More information

1.225J J (ESD 205) Transportation Flow Systems

1.225J J (ESD 205) Transportation Flow Systems 1.225J J (ESD 25) Transportation Flow Systems Lecture 9 Simulation Models Prof. Ismail Chabini and Prof. Amedeo R. Odoni Lecture 9 Outline About this lecture: It is based on R16. Only material covered

More information

EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo

EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories 1 Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo Outline: Contracts and compositional methods for system design Where and why using

More information

Lecture 2 Automata Theory

Lecture 2 Automata Theory Lecture 2 Automata Theory Ufuk Topcu Nok Wongpiromsarn Richard M. Murray Outline: Transition systems Linear-time properties Regular propereties EECI, 14 May 2012 This short-course is on this picture applied

More information

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1 Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1 Stavros Tripakis 2 VERIMAG Technical Report TR-2004-26 November 2004 Abstract We introduce problems of decentralized

More information

Independence. P(A) = P(B) = 3 6 = 1 2, and P(C) = 4 6 = 2 3.

Independence. P(A) = P(B) = 3 6 = 1 2, and P(C) = 4 6 = 2 3. Example: A fair die is tossed and we want to guess the outcome. The outcomes will be 1, 2, 3, 4, 5, 6 with equal probability 1 6 each. If we are interested in getting the following results: A = {1, 3,

More information