4,524 research outputs found
Improving search order for reachability testing in timed automata
Standard algorithms for reachability analysis of timed automata are sensitive
to the order in which the transitions of the automata are taken. To tackle this
problem, we propose a ranking system and a waiting strategy. This paper
discusses the reason why the search order matters and shows how a ranking
system and a waiting strategy can be integrated into the standard reachability
algorithm to alleviate and prevent the problem respectively. Experiments show
that the combination of the two approaches gives optimal search order on
standard benchmarks except for one example. This suggests that it should be
used instead of the standard BFS algorithm for reachability analysis of timed
automata
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis
The safety of infinite state systems can be checked by a backward
reachability procedure. For certain classes of systems, it is possible to prove
the termination of the procedure and hence conclude the decidability of the
safety problem. Although backward reachability is property-directed, it can
unnecessarily explore (large) portions of the state space of a system which are
not required to verify the safety property under consideration. To avoid this,
invariants can be used to dramatically prune the search space. Indeed, the
problem is to guess such appropriate invariants. In this paper, we present a
fully declarative and symbolic approach to the mechanization of backward
reachability of infinite state systems manipulating arrays by Satisfiability
Modulo Theories solving. Theories are used to specify the topology and the data
manipulated by the system. We identify sufficient conditions on the theories to
ensure the termination of backward reachability and we show the completeness of
a method for invariant synthesis (obtained as the dual of backward
reachability), again, under suitable hypotheses on the theories. We also
present a pragmatic approach to interleave invariant synthesis and backward
reachability so that a fix-point for the set of backward reachable states is
more easily obtained. Finally, we discuss heuristics that allow us to derive an
implementation of the techniques in the model checker MCMT, showing remarkable
speed-ups on a significant set of safety problems extracted from a variety of
sources.Comment: Accepted for publication in Logical Methods in Computer Scienc
Zone-based verification of timed automata: extrapolations, simulations and what next?
Timed automata have been introduced by Rajeev Alur and David Dill in the
early 90's. In the last decades, timed automata have become the de facto model
for the verification of real-time systems. Algorithms for timed automata are
based on the traversal of their state-space using zones as a symbolic
representation. Since the state-space is infinite, termination relies on finite
abstractions that yield a finite representation of the reachable states.
The first solution to get finite abstractions was based on extrapolations of
zones, and has been implemented in the industry-strength tool Uppaal. A
different approach based on simulations between zones has emerged in the last
ten years, and has been implemented in the fully open source tool TChecker. The
simulation-based approach has led to new efficient algorithms for reachability
and liveness in timed automata, and has also been extended to richer models
like weighted timed automata, and timed automata with diagonal constraints and
updates.
In this article, we survey the extrapolation and simulation techniques, and
discuss some open challenges for the future.Comment: Invited contribution at FORMATS'2
Distributed and parallel Ada and the Ada 9X recommendations
Recently, the DoD has sponsored work towards a new version of Ada, intended to support the construction of distributed systems. The revised version, often called Ada 9X, will become the new standard sometimes in the 1990s. It is intended that Ada 9X should provide language features giving limited support for distributed system construction. The requirements for such features are given. Many of the most advanced computer applications involve embedded systems that are comprised of parallel processors or networks of distributed computers. If Ada is to become the widely adopted language envisioned by many, it is essential that suitable compilers and tools be available to facilitate the creation of distributed and parallel Ada programs for these applications. The major languages issues impacting distributed and parallel programming are reviewed, and some principles upon which distributed/parallel language systems should be built are suggested. Based upon these, alternative language concepts for distributed/parallel programming are analyzed
Step Away from the Podium! A Lesson Plan for Peer Learning
Ready to revamp the way you teach the library catalog and general databases? Learn how to turn the typical lecture session on its head and ensure each class is different from the last. This versatile lesson can easily be sliced and diced into separate lessons. Attendees will be exposed to numerous attention-getting activities and a plan chock full of teaching moments. The combination of game-like activities, exploratory learning, and presentations will generate a buzz amongst your students. During the presentation, attendees may engage with the content by responding to online polls with their personal mobile devices or laptops. All lesson materials will be available to the attendees
ALPACAS: A Language for Parametric Assessment of Critical Architecture Safety
This paper introduces Alpacas, a domain-specific language and algorithms aimed at architecture modeling and safety assessment for critical systems. It allows to study the effects of random and systematic faults on complex critical systems and their reliability. The underlying semantic framework of the language is Stochastic Guarded Transition Systems, for which Alpacas provides a feature-rich declarative modeling language and algorithms for symbolic analysis and Monte-Carlo simulation, allowing to compute safety indicators such as minimal cutsets and reliability. Built as a domain-specific language deeply embedded in Scala 3, Alpacas offers generic modeling capabilities and type-safety unparalleled in other existing safety assessment frameworks. This improved expressive power allows to address complex system modeling tasks, such as formalizing the architectural design space of a critical function, and exploring it to identify the most reliable variant. The features and algorithms of Alpacas are illustrated on a case study of a thrust allocation and power dispatch system for an electric vertical takeoff and landing aircraft
A Survey on Routing in Anonymous Communication Protocols
The Internet has undergone dramatic changes in the past 15 years, and now forms a global communication platform that billions of users rely on for their daily activities. While this transformation has brought tremendous benefits to society, it has also created new threats to online privacy, ranging from profiling of users for monetizing personal information to nearly omnipotent governmental surveillance. As a result, public interest in systems for anonymous communication has drastically increased. Several such systems have been proposed in the literature, each of which offers anonymity guarantees in different scenarios and under different assumptions, reflecting the plurality of approaches for how messages can be anonymously routed to their destination. Understanding this space of competing approaches with their different guarantees and assumptions is vital for users to understand the consequences of different design options. In this work, we survey previous research on designing, developing, and deploying systems for anonymous communication. To this end, we provide a taxonomy for clustering all prevalently considered approaches (including Mixnets, DC-nets, onion routing, and DHT-based protocols) with respect to their unique routing characteristics, deployability, and performance. This, in particular, encompasses the topological structure of the underlying network; the routing information that has to be made available to the initiator of the conversation; the underlying communication model; and performance-related indicators such as latency and communication layer. Our taxonomy and comparative assessment provide important insights about the differences between the existing classes of anonymous communication protocols, and it also helps to clarify the relationship between the routing characteristics of these protocols, and their performance and scalability
- …