Monitoring the full range of ω-regular properties of Stochastic Systems
|
|
- Anna Cox
- 5 years ago
- Views:
Transcription
1 Monitoring the full range of ω-regular properties of Stochastic Systems Kalpana Gondi, Yogesh K. Patel, A. Prasad Sistla University of Illinois at Chicago
2 Outline of the talk Motivation
3 Outline of the talk Motivation Monitoring Stochastic Systems
4 Outline of the talk Motivation Monitoring Stochastic Systems Deterministic, Probabilistic, Hybrid Algorithms
5 Outline of the talk Motivation Monitoring Stochastic Systems Deterministic, Probabilistic, Hybrid Algorithms Implementation
6 Motivation A component C, not thouroughly tested/verified.
7 Motivation A component C, not thouroughly tested/verified. C may exhibit computations that violate the correctness spec Φ
8 Motivation A component C, not thouroughly tested/verified. C may exhibit computations that violate the correctness spec Φ Need a monitor M that detects incorrect computations at run time
9 Motivation A component C, not thouroughly tested/verified. C may exhibit computations that violate the correctness spec Φ Need a monitor M that detects incorrect computations at run time M observes the computation of C and checks for violation of Φ
10 Another Motivation Liveness of C verified assuming fairness.
11 Another Motivation Liveness of C verified assuming fairness. Need to monitor C for violation of liveness or fairness.
12 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99])
13 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99]) How to monitor general Φ??
14 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99]) How to monitor general Φ?? Φ conjunction of a safety and a liveness property
15 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99]) How to monitor general Φ?? Φ conjunction of a safety and a liveness property Over approximate Φ by a safety property [AR05] (Liberal Monitor)
16 Solution If Φ is Safety Property then easy ([AS85,Si85,Si87,KV99]) How to monitor general Φ?? Φ conjunction of a safety and a liveness property Over approximate Φ by a safety property [AR05] (Liberal Monitor) Under approximate it by a safety property [MSSZ05,SZZ06] (Conservative Monitor)
17 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton.
18 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton. New Work:
19 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton. New Work: Φ is a Det. Streett automaton all ω-regular properties.
20 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton. New Work: Φ is a Det. Streett automaton all ω-regular properties. Accurate Deterministic, Probablistic and Hybrid Algs.
21 Comparison to earlier work Earlier Work [SS08]: Deterministic Monitors for the case Φ is a Det. Buchi automaton. New Work: Φ is a Det. Streett automaton all ω-regular properties. Accurate Deterministic, Probablistic and Hybrid Algs. Implementation: Tool Stochastic Monitor(SM)
22 Monitoring Stochastic Systems A Hidden Markov Chain (HMC) is a pair (G,O) where G = (S,R,φ) is a finite Markov chain;
23 Monitoring Stochastic Systems A Hidden Markov Chain (HMC) is a pair (G,O) where G = (S,R,φ) is a finite Markov chain; O : S Σ is an output function
24 Monitoring Stochastic Systems A Hidden Markov Chain (HMC) is a pair (G,O) where G = (S,R,φ) is a finite Markov chain; O : S Σ is an output function Σ = 2 P, P set of atomic propositions
25 Monitoring Stochastic Systems A Hidden Markov Chain (HMC) is a pair (G,O) where G = (S,R,φ) is a finite Markov chain; O : S Σ is an output function Σ = 2 P, P set of atomic propositions Define E the class of measurable subsets of Σ ω as the smallest set so that For every α Σ, ασ ω E. Closed under complementation and countable union.
26 Example 1 1/3 s 0 1/3 s 1 P,Q Q 1/3 s 2 Q 1 For any state s, F s defines a probability measure on E. F s0 ( P) = 1 2.
27 Accuracy of a Monitor The system is given by a HMC H which is known.
28 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state
29 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state Correctness spec given by a det. Streett automaton A
30 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state Correctness spec given by a det. Streett automaton A Acceptance condition of A: Pairs of subsets (RED, GREEN)
31 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state Correctness spec given by a det. Streett automaton A Acceptance condition of A: Pairs of subsets (RED, GREEN) Construct a monitor M so that L(M) L(A). L(M) is a safety property.
32 Accuracy of a Monitor The system is given by a HMC H which is known. Outputs of H are observable but not the state Correctness spec given by a det. Streett automaton A Acceptance condition of A: Pairs of subsets (RED, GREEN) Construct a monitor M so that L(M) L(A). L(M) is a safety property. (Acceptance) Accuracy of M is the conditional probability F s0 (L(M) L(A)) s 0 initial system state.
33 Monitoring Algorithms Preprocessing 1
34 Monitoring Algorithms Preprocessing Compute Markov chain G the product of G and A. 1
35 Monitoring Algorithms Preprocessing Compute Markov chain G the product of G and A. A state (s,q) in G is good if F s (L(A q )) = 1 and bad if F s (L(A q )) is 0. A q same as A with starting state q. 1
36 Monitoring Algorithms Preprocessing Compute Markov chain G the product of G and A. A state (s,q) in G is good if F s (L(A q )) = 1 and bad if F s (L(A q )) is 0. A q same as A with starting state q. Compute good and bad states of G. 1
37 Monitoring Algorithms Preprocessing Compute Markov chain G the product of G and A. A state (s,q) in G is good if F s (L(A q )) = 1 and bad if F s (L(A q )) is 0. A q same as A with starting state q. Compute good and bad states of G. Simulates A on the sequence of system outputs. 1
38 Deterministic Monitoring Algorithm Maintains the following variables 1
39 Deterministic Monitoring Algorithm Maintains the following variables X: possible system states, initialized to {s 0 }. 1
40 Deterministic Monitoring Algorithm Maintains the following variables X: possible system states, initialized to {s 0 }. q: the automaton state, initialized to q 0. 1
41 Deterministic Monitoring Algorithm Maintains the following variables X: possible system states, initialized to {s 0 }. q: the automaton state, initialized to q 0. i: denotes the number of times an accepting automaton state is reached. Initialized to 0. 1
42 Deterministic Monitoring Algorithm Maintains the following variables X: possible system states, initialized to {s 0 }. q: the automaton state, initialized to q 0. i: denotes the number of times an accepting automaton state is reached. Initialized to 0. counter : denotes the number of expected outputs before an accepting automaton state. 1
43 Det. Alg. Continued Procedure GetInputAndU pdate(): Get next input from the system; Simulate A for one step and Update q as well as X; If all states in X {q} are good then accept; If all states in X {q} are bad then reject; 1
44 Deterministic Algorithm Contd Loop forever GetInputAndUpdate(); If q RED then counter := counter 1; If counter = 0 then reject; If q GREEN then {i := i + 1; counter := f(q,x,i)} 1
45 Theorem: For any y, 0 y < 1, there exists a constant c such that if f(q,x,i) = c i then the acceptance accuracy of the monitor is at least y. Theorem: If the HMC is fully visible, then the monitor can be simplified to have acceptance accuracy to be 1. 1
46 Example:Resource Acquisition T v 1 T t 1/2 1/2 1/2 w C 1 1/2 s N 1/3 N 1/3 s 1 1/3 1/3 w C t 1/3 T 1/3 s is the initial state. v the state where the server crashed. Property to be monitored (T C). Acceptance accuracy of 0.9 can be achieved by choosing k = 3. 1
47 Probabilistic Algorithm Uses probability variable p instead of counter. p initialized to probability value p 0. Uses variables X, q as before. Loop forever GetInputAndUpdate(); If q RED then reject with probability p; If q GREEN then p := p c 1
48 Probabilistic Algorithm Contd. Theorem: For any y, 0 y < 1, there exists constants p 0,c for which the acceptance accuracy of the monitor is at least y. 1
49 Hybrid Algorithm Combines both deterministic, probabilistic algs. Uses variable counter initialized to k. Uses variables X, q as before. 1
50 Hybrid Algorithm Contd. Loop forever GetInputAndUpdate(); If q RED then counter, Toss a fair coin; If counter = 0 then If last k coin tosses were tails then reject Else counter := k; If q GREEN then counter := + + k 1
51 Hybrid Algorithm Contd. Theorem: For any y, 0 y < 1, there exists an initail counter value such that the acceptance accuracy of the monitor is at least y. 2
52 Implementation Developed a tool : SM (Stochastic Monitor) Input: high level description of a synch. probabilistic program; Uses PRISM tool to obtain the Markov chain M; Takes automaton A as another input; Constructs product Markov Chain M ; Computes its good, bad product states; Generates a monitor using other parameters. 2
53 Experimental Results Considered three examples; Peterson s Mutual Excl Alg: Second process can die in the critical section; Property Monitored: (T 1 C 1 ); Mutual Excl with Semaphores: Second can die in the critical section Property Monitored: T 1 C 1 ; Bounded Retransmission Protocol: Packets can be lost in transmission; Property Monitored: The file will eventually be transmitted. 2
54 Experimental results Contd 2
55 Experimental Results Contd 2
56 Related Work Our [SS08] paper gave det algs for det.buchi automata Monitoring for safety properties done by many people [Si87], [KV99], etc. Recent work Amorium and Rosu (CAV2005) handle some liveness. Concentrate on evaluating efficiently atomic propositions in system states. The paper [PZZ 2005] uses game theoretic approach. 2
57 Conclusion Need to extend to Hidden Markov Decision Processes to handle asynchronous concurrency Other cost measures for tuning deterministic algs for HMCs. How to monitor for complex systems? Use Assume/guarantee paradigms. 2
Synthesizing Robust Systems
Synthesizing Robust Systems Roderick Bloem and Karin Greimel (TU-Graz) Thomas Henzinger (EPFL and IST-Austria) Barbara Jobstmann (CNRS/Verimag) FMCAD 2009 in Austin, Texas Barbara Jobstmann 1 Motivation
More informationTimo Latvala. March 7, 2004
Reactive Systems: Safety, Liveness, and Fairness Timo Latvala March 7, 2004 Reactive Systems: Safety, Liveness, and Fairness 14-1 Safety Safety properties are a very useful subclass of specifications.
More informationChapter 3: Linear temporal logic
INFOF412 Formal verification of computer systems Chapter 3: Linear temporal logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 LTL: a specification
More informationOn the Expressiveness and Complexity of Randomization in Finite State Monitors
On the Expressiveness and Complexity of Randomization in Finite State Monitors Rohit Chadha Univ. of Illinois at Urbana-Champaign and A. Prasad Sistla Univ. of Illinois at Chicago and Mahesh Viswanathan
More informationRandomized Algorithms. Andreas Klappenecker
Randomized Algorithms Andreas Klappenecker Randomized Algorithms A randomized algorithm is an algorithm that makes random choices during its execution. A randomized algorithm uses values generated by a
More informationLecture notes for probability. Math 124
Lecture notes for probability Math 124 What is probability? Probabilities are ratios, expressed as fractions, decimals, or percents, determined by considering results or outcomes of experiments whose result
More informationLECTURE 1. 1 Introduction. 1.1 Sample spaces and events
LECTURE 1 1 Introduction The first part of our adventure is a highly selective review of probability theory, focusing especially on things that are most useful in statistics. 1.1 Sample spaces and events
More informationAutomata-based Verification - III
COMP30172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20: email: howard.barringer@manchester.ac.uk March 2009 Third Topic Infinite Word Automata Motivation Büchi Automata
More informationPolynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems
Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems Alberto Puggelli DREAM Seminar - November 26, 2013 Collaborators and PIs:
More informationJanson s Inequality and Poisson Heuristic
Janson s Inequality and Poisson Heuristic Dinesh K CS11M019 IIT Madras April 30, 2012 Dinesh (IITM) Janson s Inequality April 30, 2012 1 / 11 Outline 1 Motivation Dinesh (IITM) Janson s Inequality April
More informationCS505: Distributed Systems
Department of Computer Science CS505: Distributed Systems Lecture 10: Consensus Outline Consensus impossibility result Consensus with S Consensus with Ω Consensus Most famous problem in distributed computing
More informationInfinite Games. Sumit Nain. 28 January Slides Credit: Barbara Jobstmann (CNRS/Verimag) Department of Computer Science Rice University
Infinite Games Sumit Nain Department of Computer Science Rice University 28 January 2013 Slides Credit: Barbara Jobstmann (CNRS/Verimag) Motivation Abstract games are of fundamental importance in mathematics
More informationCDS 270 (Fall 09) - Lecture Notes for Assignment 8.
CDS 270 (Fall 09) - Lecture Notes for Assignment 8. ecause this part of the course has no slides or textbook, we will provide lecture supplements that include, hopefully, enough discussion to complete
More informationSymmetry Reductions. A. Prasad Sistla University Of Illinois at Chicago
Symmetry Reductions. A. Prasad Sistla University Of Illinois at Chicago Model-Checking Concurrent PGM Temporal SPEC Model Checker Yes/No Counter Example Approach Build the global state graph Algorithm
More informationBüchi Automata and their closure properties. - Ajith S and Ankit Kumar
Büchi Automata and their closure properties - Ajith S and Ankit Kumar Motivation Conventional programs accept input, compute, output result, then terminate Reactive program : not expected to terminate
More informationAutomata-based Verification - III
CS3172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20/22: email: howard.barringer@manchester.ac.uk March 2005 Third Topic Infinite Word Automata Motivation Büchi Automata
More informationProbabilistic Büchi Automata with non-extremal acceptance thresholds
Probabilistic Büchi Automata with non-extremal acceptance thresholds Rohit Chadha 1, A. Prasad Sistla, and Mahesh Viswanathan 3 1 LSV, ENS Cachan & CNRS & INRIA Saclay, France Univ. of IIlinois, Chicago,
More informationSample Spaces, Random Variables
Sample Spaces, Random Variables Moulinath Banerjee University of Michigan August 3, 22 Probabilities In talking about probabilities, the fundamental object is Ω, the sample space. (elements) in Ω are denoted
More informationAlan Bundy. Automated Reasoning LTL Model Checking
Automated Reasoning LTL Model Checking Alan Bundy Lecture 9, page 1 Introduction So far we have looked at theorem proving Powerful, especially where good sets of rewrite rules or decision procedures have
More informationLTL is Closed Under Topological Closure
LTL is Closed Under Topological Closure Grgur Petric Maretić, Mohammad Torabi Dashti, David Basin Department of Computer Science, ETH Universitätstrasse 6 Zürich, Switzerland Abstract We constructively
More informationCS256/Spring 2008 Lecture #11 Zohar Manna. Beyond Temporal Logics
CS256/Spring 2008 Lecture #11 Zohar Manna Beyond Temporal Logics Temporal logic expresses properties of infinite sequences of states, but there are interesting properties that cannot be expressed, e.g.,
More informationLogic Model Checking
Logic Model Checking Lecture Notes 10:18 Caltech 101b.2 January-March 2004 Course Text: The Spin Model Checker: Primer and Reference Manual Addison-Wesley 2003, ISBN 0-321-22862-6, 608 pgs. the assignment
More informationMathematical Foundations of Computer Science Lecture Outline October 18, 2018
Mathematical Foundations of Computer Science Lecture Outline October 18, 2018 The Total Probability Theorem. Consider events E and F. Consider a sample point ω E. Observe that ω belongs to either F or
More informationMonty Hall Puzzle. Draw a tree diagram of possible choices (a possibility tree ) One for each strategy switch or no-switch
Monty Hall Puzzle Example: You are asked to select one of the three doors to open. There is a large prize behind one of the doors and if you select that door, you win the prize. After you select a door,
More informationImpossibility of Distributed Consensus with One Faulty Process
Impossibility of Distributed Consensus with One Faulty Process Journal of the ACM 32(2):374-382, April 1985. MJ Fischer, NA Lynch, MS Peterson. Won the 2002 Dijkstra Award (for influential paper in distributed
More informationVenn Diagrams; Probability Laws. Notes. Set Operations and Relations. Venn Diagram 2.1. Venn Diagrams; Probability Laws. Notes
Lecture 2 s; Text: A Course in Probability by Weiss 2.4 STAT 225 Introduction to Probability Models January 8, 2014 s; Whitney Huang Purdue University 2.1 Agenda s; 1 2 2.2 Intersection: the intersection
More informationTemporal logics and model checking for fairly correct systems
Temporal logics and model checking for fairly correct systems Hagen Völzer 1 joint work with Daniele Varacca 2 1 Lübeck University, Germany 2 Imperial College London, UK LICS 2006 Introduction Five Philosophers
More informationEfficient Model Checking of Safety Properties
Efficient Model Checking of Safety Properties Timo Latvala timo.latvala@hut.fi Laboratory for Theoretical Computer Science Helsinki University of Technology Finland Spin 2003 p.1/16 Introduction Safety
More informationAdvanced Automata Theory 7 Automatic Functions
Advanced Automata Theory 7 Automatic Functions Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory
More informationDynamic Programming Lecture #4
Dynamic Programming Lecture #4 Outline: Probability Review Probability space Conditional probability Total probability Bayes rule Independent events Conditional independence Mutual independence Probability
More informationChapter 1: Introduction to Probability Theory
ECE5: Stochastic Signals and Systems Fall 8 Lecture - September 6, 8 Prof. Salim El Rouayheb Scribe: Peiwen Tian, Lu Liu, Ghadir Ayache Chapter : Introduction to Probability Theory Axioms of Probability
More informationBounded Synthesis. Sven Schewe and Bernd Finkbeiner. Universität des Saarlandes, Saarbrücken, Germany
Bounded Synthesis Sven Schewe and Bernd Finkbeiner Universität des Saarlandes, 66123 Saarbrücken, Germany Abstract. The bounded synthesis problem is to construct an implementation that satisfies a given
More informationComputer-Aided Program Design
Computer-Aided Program Design Spring 2015, Rice University Unit 3 Swarat Chaudhuri February 5, 2015 Temporal logic Propositional logic is a good language for describing properties of program states. However,
More informationAlternating nonzero automata
Alternating nonzero automata Application to the satisfiability of CTL [,, P >0, P =1 ] Hugo Gimbert, joint work with Paulin Fournier LaBRI, Université de Bordeaux ANR Stoch-MC 06/07/2017 Control and verification
More informationThe Complexity of Stochastic Müller Games
The Complexity of Stochastic Müller Games Krishnendu Chatterjee Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2007-110 http://www.eecs.berkeley.edu/pubs/techrpts/2007/eecs-2007-110.html
More informationReasoning about Time and Reliability
Reasoning about Time and Reliability Probabilistic CTL model checking Daniel Bruns Institut für theoretische Informatik Universität Karlsruhe 13. Juli 2007 Seminar Theorie und Anwendung von Model Checking
More informationFinite State Machines Transducers Markov Models Hidden Markov Models Büchi Automata
Finite State Machines Transducers Markov Models Hidden Markov Models Büchi Automata Chapter 5 Deterministic Finite State Transducers A Moore machine M = (K,, O,, D, s, A), where: K is a finite set of states
More informationLecture 20 : Markov Chains
CSCI 3560 Probability and Computing Instructor: Bogdan Chlebus Lecture 0 : Markov Chains We consider stochastic processes. A process represents a system that evolves through incremental changes called
More informationRandom Variable. Pr(X = a) = Pr(s)
Random Variable Definition A random variable X on a sample space Ω is a real-valued function on Ω; that is, X : Ω R. A discrete random variable is a random variable that takes on only a finite or countably
More informationTemporal Logic. M φ. Outline. Why not standard logic? What is temporal logic? LTL CTL* CTL Fairness. Ralf Huuck. Kripke Structure
Outline Temporal Logic Ralf Huuck Why not standard logic? What is temporal logic? LTL CTL* CTL Fairness Model Checking Problem model, program? M φ satisfies, Implements, refines property, specification
More information6.262: Discrete Stochastic Processes 2/2/11. Lecture 1: Introduction and Probability review
6.262: Discrete Stochastic Processes 2/2/11 Lecture 1: Introduction and Probability review Outline: Probability in the real world Probability as a branch of mathematics Discrete stochastic processes Processes
More informationELEG 3143 Probability & Stochastic Process Ch. 1 Probability
Department of Electrical Engineering University of Arkansas ELEG 3143 Probability & Stochastic Process Ch. 1 Probability Dr. Jingxian Wu wuj@uark.edu OUTLINE 2 Applications Elementary Set Theory Random
More informationOrigins of Probability Theory
1 16.584: INTRODUCTION Theory and Tools of Probability required to analyze and design systems subject to uncertain outcomes/unpredictability/randomness. Such systems more generally referred to as Experiments.
More information2. Elements of the Theory of Computation, Lewis and Papadimitrou,
Introduction Finite Automata DFA, regular languages Nondeterminism, NFA, subset construction Regular Epressions Synta, Semantics Relationship to regular languages Properties of regular languages Pumping
More informationOn the Accepting Power of 2-Tape Büchi Automata
On the Accepting Power of 2-Tape Büchi Automata Equipe de Logique Mathématique Université Paris 7 STACS 2006 Acceptance of infinite words In the sixties, Acceptance of infinite words by finite automata
More informationUses of finite automata
Chapter 2 :Finite Automata 2.1 Finite Automata Automata are computational devices to solve language recognition problems. Language recognition problem is to determine whether a word belongs to a language.
More information1 Modelling and Simulation
1 Modelling and Simulation 1.1 Introduction This course teaches various aspects of computer-aided modelling for the performance evaluation of computer systems and communication networks. The performance
More informationA Symbolic Approach to Safety LTL Synthesis
A Symbolic Approach to Safety LTL Synthesis Shufang Zhu 1 Lucas M. Tabajara 2 Jianwen Li Geguang Pu 1 Moshe Y. Vardi 2 1 East China Normal University 2 Rice Lucas M. Tabajara (Rice University) 2 University
More informationRecognizing Safety and Liveness by Alpern and Schneider
Recognizing Safety and Liveness by Alpern and Schneider Calvin Deutschbein 17 Jan 2017 1 Intro 1.1 Safety What is safety? Bad things do not happen For example, consider the following safe program in C:
More informationLecture 1 Introduction to Probability and Set Theory Text: A Course in Probability by Weiss
Lecture 1 to and Set Theory Text: A Course in by Weiss 1.2 2.3 STAT 225 to Models January 13, 2014 to and Whitney Huang Purdue University 1.1 Agenda to and 1 2 3 1.2 Motivation Uncertainty/Randomness in
More informationSFM-11:CONNECT Summer School, Bertinoro, June 2011
SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision
More informationLinear-Time Logic. Hao Zheng
Linear-Time Logic Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng (CSE, USF)
More informationCS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis
CS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis Eli Upfal Eli Upfal@brown.edu Office: 319 TA s: Lorenzo De Stefani and Sorin Vatasoiu cs155tas@cs.brown.edu It is remarkable
More informationPeled, Vardi, & Yannakakis: Black Box Checking
Peled, Vardi, & Yannakakis: Black Box Checking Martin Leucker leucker@it.uu.se Department of Computer Systems,, Sweden Plan Preliminaries State identification and verification Conformance Testing Extended
More informationPreliminary Statistics Lecture 2: Probability Theory (Outline) prelimsoas.webs.com
1 School of Oriental and African Studies September 2015 Department of Economics Preliminary Statistics Lecture 2: Probability Theory (Outline) prelimsoas.webs.com Gujarati D. Basic Econometrics, Appendix
More informationTheory of Computation 4 Non-Deterministic Finite Automata
Theory of Computation 4 Non-Deterministic Finite Automata Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Theory of Computation
More informationThe algorithmic analysis of hybrid system
The algorithmic analysis of hybrid system Authors: R.Alur, C. Courcoubetis etc. Course teacher: Prof. Ugo Buy Xin Li, Huiyong Xiao Nov. 13, 2002 Summary What s a hybrid system? Definition of Hybrid Automaton
More informationDiscrete Event Systems Exam
Computer Engineering and Networks Laboratory TEC, NSG, DISCO HS 2016 Prof. L. Thiele, Prof. L. Vanbever, Prof. R. Wattenhofer Discrete Event Systems Exam Friday, 3 rd February 2017, 14:00 16:00. Do not
More informationAutomatic Synthesis of Distributed Protocols
Automatic Synthesis of Distributed Protocols Rajeev Alur Stavros Tripakis 1 Introduction Protocols for coordination among concurrent processes are an essential component of modern multiprocessor and distributed
More informationOverview. overview / 357
Overview overview6.1 Introduction Modelling parallel systems Linear Time Properties Regular Properties Linear Temporal Logic (LTL) Computation Tree Logic syntax and semantics of CTL expressiveness of CTL
More informationLinear Temporal Logic and Büchi Automata
Linear Temporal Logic and Büchi Automata Yih-Kuen Tsay Department of Information Management National Taiwan University FLOLAC 2009 Yih-Kuen Tsay (SVVRL @ IM.NTU) Linear Temporal Logic and Büchi Automata
More informationIntroduction to Probability. Ariel Yadin. Lecture 1. We begin with an example [this is known as Bertrand s paradox]. *** Nov.
Introduction to Probability Ariel Yadin Lecture 1 1. Example: Bertrand s Paradox We begin with an example [this is known as Bertrand s paradox]. *** Nov. 1 *** Question 1.1. Consider a circle of radius
More informationThe State Explosion Problem
The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis
More informationWeek 12-13: Discrete Probability
Week 12-13: Discrete Probability November 21, 2018 1 Probability Space There are many problems about chances or possibilities, called probability in mathematics. When we roll two dice there are possible
More informationCMPSCI 240: Reasoning about Uncertainty
CMPSCI 240: Reasoning about Uncertainty Lecture 2: Sets and Events Andrew McGregor University of Massachusetts Last Compiled: January 27, 2017 Outline 1 Recap 2 Experiments and Events 3 Probabilistic Models
More informationLinear-time Temporal Logic
Linear-time Temporal Logic Pedro Cabalar Department of Computer Science University of Corunna, SPAIN cabalar@udc.es 2015/2016 P. Cabalar ( Department Linear oftemporal Computer Logic Science University
More informationMath 1313 Experiments, Events and Sample Spaces
Math 1313 Experiments, Events and Sample Spaces At the end of this recording, you should be able to define and use the basic terminology used in defining experiments. Terminology The next main topic in
More informationONR MURI AIRFOILS: Animal Inspired Robust Flight with Outer and Inner Loop Strategies. Calin Belta
ONR MURI AIRFOILS: Animal Inspired Robust Flight with Outer and Inner Loop Strategies Provable safety for animal inspired agile flight Calin Belta Hybrid and Networked Systems (HyNeSs) Lab Department of
More informationSanjit A. Seshia EECS, UC Berkeley
EECS 219C: Computer-Aided Verification Explicit-State Model Checking: Additional Material Sanjit A. Seshia EECS, UC Berkeley Acknowledgments: G. Holzmann Checking if M satisfies : Steps 1. Compute Buchi
More informationProbability Theory. Introduction to Probability Theory. Principles of Counting Examples. Principles of Counting. Probability spaces.
Probability Theory To start out the course, we need to know something about statistics and probability Introduction to Probability Theory L645 Advanced NLP Autumn 2009 This is only an introduction; for
More informationVisibly Linear Dynamic Logic
Visibly Linear Dynamic Logic Joint work with Alexander Weinert (Saarland University) Martin Zimmermann Saarland University September 8th, 2016 Highlights Conference, Brussels, Belgium Martin Zimmermann
More informationDept. of Linguistics, Indiana University Fall 2015
L645 Dept. of Linguistics, Indiana University Fall 2015 1 / 34 To start out the course, we need to know something about statistics and This is only an introduction; for a fuller understanding, you would
More informationAutomata-Theoretic Model Checking of Reactive Systems
Automata-Theoretic Model Checking of Reactive Systems Radu Iosif Verimag/CNRS (Grenoble, France) Thanks to Tom Henzinger (IST, Austria), Barbara Jobstmann (CNRS, Grenoble) and Doron Peled (Bar-Ilan University,
More informationIntroduction to probability theory
Introduction to probability theory Fátima Sánchez Cabo Institute for Genomics and Bioinformatics, TUGraz f.sanchezcabo@tugraz.at 07/03/2007 - p. 1/35 Outline Random and conditional probability (7 March)
More informationOn Model Checking Techniques for Randomized Distributed Systems. Christel Baier Technische Universität Dresden
On Model Checking Techniques for Randomized Distributed Systems Christel Baier Technische Universität Dresden joint work with Nathalie Bertrand Frank Ciesinski Marcus Größer / 6 biological systems, resilient
More informationRevisiting Synthesis of GR(1) Specifications
Revisiting Synthesis of GR(1) Specifications Uri Klein & Amir Pnueli Courant Institute of Mathematical Sciences, NYU Haifa Verification Conference, October 2010 What Is Synthesis? Rather than implement
More informationGames with Costs and Delays
Games with Costs and Delays Martin Zimmermann Saarland University June 20th, 2017 LICS 2017, Reykjavik, Iceland Martin Zimmermann Saarland University Games with Costs and Delays 1/14 Gale-Stewart Games
More informationUncountable Automatic Classes and Learning
Uncountable Automatic Classes and Learning Sanjay Jain a,1, Qinglong Luo a, Pavel Semukhin b,2, Frank Stephan c,3 a Department of Computer Science, National University of Singapore, Singapore 117417, Republic
More informationω-automata Automata that accept (or reject) words of infinite length. Languages of infinite words appear:
ω-automata ω-automata Automata that accept (or reject) words of infinite length. Languages of infinite words appear: in verification, as encodings of non-terminating executions of a program. in arithmetic,
More informationComputation Tree Logic (CTL) & Basic Model Checking Algorithms
Computation Tree Logic (CTL) & Basic Model Checking Algorithms Martin Fränzle Carl von Ossietzky Universität Dpt. of Computing Science Res. Grp. Hybride Systeme Oldenburg, Germany 02917: CTL & Model Checking
More informationCountability Sets of Measure Zero Random Reals Normal Numbers There s a Bear in There. The Real Thing. Paul McCann. Wednesday, 3 August, 2011
Wednesday, 3 August, 2011 Outline Countability 1 Countability 2 3 4 5 Counting with the Natural Numbers A set S is countable if there is a function f from N onto S. That is, we can label each s S by a
More informationPerfect-information Stochastic Parity Games
Perfect-information Stochastic Parity Games Wies law Zielonka LIAFA, case 7014 Université Paris 7 2, Place Jussieu 75251 Paris Cedex 05, France zielonka@liafa.jussieu.fr Abstract. We show that in perfect-information
More informationDecidability Results for Probabilistic Hybrid Automata
Decidability Results for Probabilistic Hybrid Automata Prof. Dr. Erika Ábrahám Informatik 2 - Theory of Hybrid Systems RWTH Aachen SS09 - Probabilistic hybrid automata 1 / 17 Literatur Jeremy Sproston:
More informationFast Acceleration of Ultimately Periodic Relations
Fast Acceleration of Ultimately Periodic Relations Marius Bozga 1, Radu Iosif 1, Filip Konečný 1,2 1 VERIMAG / CNRS / University of Grenoble, France 2 Brno University of Technology, Czech Republic Fast
More informationChapter 5: Linear Temporal Logic
Chapter 5: Linear Temporal Logic Prof. Ali Movaghar Verification of Reactive Systems Spring 94 Outline We introduce linear temporal logic (LTL), a logical formalism that is suited for specifying LT properties.
More informationFinally the Weakest Failure Detector for Non-Blocking Atomic Commit
Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Rachid Guerraoui Petr Kouznetsov Distributed Programming Laboratory EPFL Abstract Recent papers [7, 9] define the weakest failure detector
More informationGreat Theoretical Ideas in Computer Science. Lecture 4: Deterministic Finite Automaton (DFA), Part 2
5-25 Great Theoretical Ideas in Computer Science Lecture 4: Deterministic Finite Automaton (DFA), Part 2 January 26th, 27 Formal definition: DFA A deterministic finite automaton (DFA) M =(Q,,,q,F) M is
More informationELEG 3143 Probability & Stochastic Process Ch. 1 Experiments, Models, and Probabilities
Department of Electrical Engineering University of Arkansas ELEG 3143 Probability & Stochastic Process Ch. 1 Experiments, Models, and Probabilities Dr. Jing Yang jingyang@uark.edu OUTLINE 2 Applications
More informationFinitary Winning in \omega-regular Games
Finitary Winning in \omega-regular Games Krishnendu Chatterjee Thomas A. Henzinger Florian Horn Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2007-120
More informationStats Probability Theory
Stats 241.3 Probability Theory Instructor: Office: W.H.Laverty 235 McLean Hall Phone: 966-6096 Lectures: Evaluation: M T W Th F 1:30pm - 2:50pm Thorv 105 Lab: T W Th 3:00-3:50 Thorv 105 Assignments, Labs,
More informationProbabilistic model checking with PRISM
Probabilistic model checking with PRISM Marta Kwiatkowska Department of Computer Science, University of Oxford 4th SSFT, Menlo College, May 204 Part 2 Markov decision processes Overview (Part 2) Introduction
More informationComputing and Communications 2. Information Theory -Entropy
1896 1920 1987 2006 Computing and Communications 2. Information Theory -Entropy Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Entropy Joint entropy
More informationDecidable and Expressive Classes of Probabilistic Automata
Decidable and Expressive Classes of Probabilistic Automata Yue Ben a, Rohit Chadha b, A. Prasad Sistla a, Mahesh Viswanathan c a University of Illinois at Chicago, USA b University of Missouri, USA c University
More informationPartially Ordered Two-way Büchi Automata
Partially Ordered Two-way Büchi Automata Manfred Kufleitner Alexander Lauser FMI, Universität Stuttgart, Germany {kufleitner, lauser}@fmi.uni-stuttgart.de June 14, 2010 Abstract We introduce partially
More informationMODULE 2 RANDOM VARIABLE AND ITS DISTRIBUTION LECTURES DISTRIBUTION FUNCTION AND ITS PROPERTIES
MODULE 2 RANDOM VARIABLE AND ITS DISTRIBUTION LECTURES 7-11 Topics 2.1 RANDOM VARIABLE 2.2 INDUCED PROBABILITY MEASURE 2.3 DISTRIBUTION FUNCTION AND ITS PROPERTIES 2.4 TYPES OF RANDOM VARIABLES: DISCRETE,
More information1.225J J (ESD 205) Transportation Flow Systems
1.225J J (ESD 25) Transportation Flow Systems Lecture 9 Simulation Models Prof. Ismail Chabini and Prof. Amedeo R. Odoni Lecture 9 Outline About this lecture: It is based on R16. Only material covered
More informationEE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo
EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories 1 Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo Outline: Contracts and compositional methods for system design Where and why using
More informationLecture 2 Automata Theory
Lecture 2 Automata Theory Ufuk Topcu Nok Wongpiromsarn Richard M. Murray Outline: Transition systems Linear-time properties Regular propereties EECI, 14 May 2012 This short-course is on this picture applied
More informationDecentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1
Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1 Stavros Tripakis 2 VERIMAG Technical Report TR-2004-26 November 2004 Abstract We introduce problems of decentralized
More informationIndependence. P(A) = P(B) = 3 6 = 1 2, and P(C) = 4 6 = 2 3.
Example: A fair die is tossed and we want to guess the outcome. The outcomes will be 1, 2, 3, 4, 5, 6 with equal probability 1 6 each. If we are interested in getting the following results: A = {1, 3,
More information