9,993 research outputs found
A new approach for diagnosability analysis of Petri nets using Verifier Nets
In this paper, we analyze the diagnosability properties of labeled Petri nets. We consider the standard notion of diagnosability of languages, requiring that every occurrence of an unobservable fault event be eventually detected, as well as the stronger notion of diagnosability in K steps, where the detection must occur within a fixed bound of K event occurrences after the fault. We give necessary and sufficient conditions for these two notions of diagnosability for both bounded and unbounded Petri nets and then present an algorithmic technique for testing the conditions based on linear programming. Our approach is novel and based on the analysis of the reachability/coverability graph of a special Petri net, called Verifier Net, that is built from the Petri net model of the given system. In the case of systems that are diagnosable in K steps, we give a procedure to compute the bound K. To the best of our knowledge, this is the first time that necessary and sufficient conditions for diagnosability and diagnosability in K steps of labeled unbounded Petri nets are presented
Forward Analysis and Model Checking for Trace Bounded WSTS
We investigate a subclass of well-structured transition systems (WSTS), the
bounded---in the sense of Ginsburg and Spanier (Trans. AMS 1964)---complete
deterministic ones, which we claim provide an adequate basis for the study of
forward analyses as developed by Finkel and Goubault-Larrecq (Logic. Meth.
Comput. Sci. 2012). Indeed, we prove that, unlike other conditions considered
previously for the termination of forward analysis, boundedness is decidable.
Boundedness turns out to be a valuable restriction for WSTS verification, as we
show that it further allows to decide all -regular properties on the
set of infinite traces of the system
Tightening the Complexity of Equivalence Problems for Commutative Grammars
We show that the language equivalence problem for regular and context-free
commutative grammars is coNEXP-complete. In addition, our lower bound
immediately yields further coNEXP-completeness results for equivalence problems
for communication-free Petri nets and reversal-bounded counter automata.
Moreover, we improve both lower and upper bounds for language equivalence for
exponent-sensitive commutative grammars.Comment: 21 page
Recommended from our members
Petri net equivalence
Determining whether two Petri nets are equivalent is an interesting problem from both practical and theoretical standpoints. Although it is undecidable in the general case, for many interesting nets the equivalence problem is solvable. This paper explores, mostly from a theoretical point of view, some of the issues of Petri net equivalence, including both reachability sets and languages. Some new definitions of reachability set equivalence are described which allow the markings of some places to be treated identically or ignored, analogous to the Petri net languages in which multiple transitions may be labeled with the same symbol or with the empty string. The complexity of some decidable Petri net equivalence problems is analyzed
1-Safe Petri nets and special cube complexes: equivalence and applications
Nielsen, Plotkin, and Winskel (1981) proved that every 1-safe Petri net
unfolds into an event structure . By a result of Thiagarajan
(1996 and 2002), these unfoldings are exactly the trace regular event
structures. Thiagarajan (1996 and 2002) conjectured that regular event
structures correspond exactly to trace regular event structures. In a recent
paper (Chalopin and Chepoi, 2017, 2018), we disproved this conjecture, based on
the striking bijection between domains of event structures, median graphs, and
CAT(0) cube complexes. On the other hand, in Chalopin and Chepoi (2018) we
proved that Thiagarajan's conjecture is true for regular event structures whose
domains are principal filters of universal covers of (virtually) finite special
cube complexes.
In the current paper, we prove the converse: to any finite 1-safe Petri net
one can associate a finite special cube complex such that the
domain of the event structure (obtained as the unfolding of
) is a principal filter of the universal cover of .
This establishes a bijection between 1-safe Petri nets and finite special cube
complexes and provides a combinatorial characterization of trace regular event
structures.
Using this bijection and techniques from graph theory and geometry (MSO
theory of graphs, bounded treewidth, and bounded hyperbolicity) we disprove yet
another conjecture by Thiagarajan (from the paper with S. Yang from 2014) that
the monadic second order logic of a 1-safe Petri net is decidable if and only
if its unfolding is grid-free.
Our counterexample is the trace regular event structure
which arises from a virtually special square complex . The domain of
is grid-free (because it is hyperbolic), but the MSO
theory of the event structure is undecidable
Forward Analysis for WSTS, Part III: Karp-Miller Trees
This paper is a sequel of "Forward Analysis for WSTS, Part I: Completions"
[STACS 2009, LZI Intl. Proc. in Informatics 3, 433-444] and "Forward Analysis
for WSTS, Part II: Complete WSTS" [Logical Methods in Computer Science 8(3),
2012]. In these two papers, we provided a framework to conduct forward
reachability analyses of WSTS, using finite representations of downward-closed
sets. We further develop this framework to obtain a generic Karp-Miller
algorithm for the new class of very-WSTS. This allows us to show that
coverability sets of very-WSTS can be computed as their finite ideal
decompositions. Under natural effectiveness assumptions, we also show that LTL
model checking for very-WSTS is decidable. The termination of our procedure
rests on a new notion of acceleration levels, which we study. We characterize
those domains that allow for only finitely many accelerations, based on ordinal
ranks
Algorithmic Verification of Asynchronous Programs
Asynchronous programming is a ubiquitous systems programming idiom to manage
concurrent interactions with the environment. In this style, instead of waiting
for time-consuming operations to complete, the programmer makes a non-blocking
call to the operation and posts a callback task to a task buffer that is
executed later when the time-consuming operation completes. A co-operative
scheduler mediates the interaction by picking and executing callback tasks from
the task buffer to completion (and these callbacks can post further callbacks
to be executed later). Writing correct asynchronous programs is hard because
the use of callbacks, while efficient, obscures program control flow.
We provide a formal model underlying asynchronous programs and study
verification problems for this model. We show that the safety verification
problem for finite-data asynchronous programs is expspace-complete. We show
that liveness verification for finite-data asynchronous programs is decidable
and polynomial-time equivalent to Petri Net reachability. Decidability is not
obvious, since even if the data is finite-state, asynchronous programs
constitute infinite-state transition systems: both the program stack and the
task buffer of pending asynchronous calls can be potentially unbounded.
Our main technical construction is a polynomial-time semantics-preserving
reduction from asynchronous programs to Petri Nets and conversely. The
reduction allows the use of algorithmic techniques on Petri Nets to the
verification of asynchronous programs.
We also study several extensions to the basic models of asynchronous programs
that are inspired by additional capabilities provided by implementations of
asynchronous libraries, and classify the decidability and undecidability of
verification questions on these extensions.Comment: 46 pages, 9 figure
- …