30 research outputs found

    Bug Hunting with False Negatives Revisited

    Get PDF
    Safe data abstractions are widely used for verification purposes. Positive verification results can be transferred from the abstract to the concrete system. When a property is violated in the abstract system, one still has to check whether a concrete violation scenario exists. However, even when the violation scenario is not reproducible in the concrete system (a false negative), it may still contain information on possible sources of bugs. Here, we propose a bug hunting framework based on abstract violation scenarios. We first extract a violation pattern from one abstract violation scenario. The violation pattern represents multiple abstract violation scenarios, increasing the chance that a corresponding concrete violation exists. Then, we look for a concrete violation that corresponds to the violation pattern by using constraint solving techniques. Finally, we define the class of counterexamples that we can handle and argue correctness of the proposed framework. Our method combines two formal techniques, model checking and constraint solving. Through an analysis of contracting and precise abstractions, we are able to integrate overapproximation by abstraction with concrete counterexample generation

    “We Learnt that Being Together Would Give us a Voice”: Gender Perspectives on the East African Improved-Cookstove Value Chain

    Get PDF
    © 2019, © 2019 IAFFE. Improved cookstoves (ICS) have been promoted for several decades, with little success. Advocates looking to drive uptake encourage greater involvement of women in ICS enterprises, on the largely unproven premise that women’s participation in the value chain will enhance their financial bottom line while giving a boost to ICS sales. This paper tests the validity of that premise, using qualitative evidence from East Africa. The analysis shows gender-differentiated outcomes for enterprises across the value chain. Women-led enterprises are significantly underrepresented at higher levels of the chain, where sales volumes are highest. Value-chain positioning also influences access to key inputs like finance, potentially reinforcing the gender divide in enterprise performance. The findings challenge the dominant narrative in the ICS field about the inevitability of the link between market participation and economic empowerment for women and indicate a need to look beyond conventional market models to enhance financial outcomes for women

    Three notes on the complexity of model checking fixpoint logic with chop

    Get PDF
    This paper analyses the complexity of model checking fixpoint logic with Chop – an extension of the modal μ-calculus with a sequential composition operator. It uses two known game-based characterisations to derive the following results: the combined model checking complexity as well as the data complexity of FLC are EXPTIME-complete. This is already the case for its alternation-free fragment. The expression complexity of FLC is trivially P-hard and limited from above by the complexity of solving a parity game, i.e. in UP ∩ co-UP. For any fragment of fixed alternation depth, in particular alternation- free formulas it is P-complete

    Labelled transition systems as a Stone space

    Get PDF
    A fully abstract and universal domain model for modal transition systems and refinement is shown to be a maximal-points space model for the bisimulation quotient of labelled transition systems over a finite set of events. In this domain model we prove that this quotient is a Stone space whose compact, zero-dimensional, and ultra-metrizable Hausdorff topology measures the degree of bisimilarity such that image-finite labelled transition systems are dense. Using this compactness we show that the set of labelled transition systems that refine a modal transition system, its ''set of implementations'', is compact and derive a compactness theorem for Hennessy-Milner logic on such implementation sets. These results extend to systems that also have partially specified state propositions, unify existing denotational, operational, and metric semantics on partial processes, render robust consistency measures for modal transition systems, and yield an abstract interpretation of compact sets of labelled transition systems as Scott-closed sets of modal transition systems.Comment: Changes since v2: Metadata updat

    Tense logic based on finite orthomodular posets

    Full text link
    It is widely accepted that the logic of quantum mechanics is based on orthomodular posets. However, such a logic is not dynamic in the sense that it does not incorporate time dimension. To fill this gap, we introduce certain tense operators on such a logic in an inexact way, but still satisfying requirements asked on tense operators in the classical logic based on Boolean algebras or in various non-classical logics. Our construction of tense operators works perfectly when the orthomodular poset in question is finite. We investigate the behaviour of these tense operators, e.g. we show that some of them form a dynamic pair. Moreover, we prove that if the tense operators preserve one of the inexact connectives conjunction or implication as defined by the authors recently in another paper, then they also preserve the other one. Finally, we show how to construct the binary relation of time preference on a given time set provided the tense operators are given, up to equivalence induced by natural quasiorders
    corecore