1,287 research outputs found
Making Random Choices Invisible to the Scheduler
When dealing with process calculi and automata which express both
nondeterministic and probabilistic behavior, it is customary to introduce the
notion of scheduler to solve the nondeterminism. It has been observed that for
certain applications, notably those in security, the scheduler needs to be
restricted so not to reveal the outcome of the protocol's random choices, or
otherwise the model of adversary would be too strong even for ``obviously
correct'' protocols. We propose a process-algebraic framework in which the
control on the scheduler can be specified in syntactic terms, and we show how
to apply it to solve the problem mentioned above. We also consider the
definition of (probabilistic) may and must preorders, and we show that they are
precongruences with respect to the restricted schedulers. Furthermore, we show
that all the operators of the language, except replication, distribute over
probabilistic summation, which is a useful property for verification
Making Random Choices Invisible to the Scheduler
International audienceWhen dealing with process calculi and automata which express both nondeterministic and probabilistic behavior, it is customary to introduce the notion of scheduler to resolve the nondeterminism. It has been observed that for certain applications, notably those in security, the scheduler needs to be restricted so not to reveal the outcome of the protocol's random choices, or otherwise the model of adversary would be too strong even for ``obviously correct'' protocols. We propose a process-algebraic framework in which the control on the scheduler can be specified in syntactic terms, and we show how to apply it to solve the problem mentioned above. We also consider the definition of (probabilistic) may and must preorders, and we show that they are precongruences with respect to the restricted schedulers. Furthermore, we show that all the operators of the language, except replication, distribute over probabilistic summation, which is a useful property for verification
Testing Reactive Probabilistic Processes
We define a testing equivalence in the spirit of De Nicola and Hennessy for
reactive probabilistic processes, i.e. for processes where the internal
nondeterminism is due to random behaviour. We characterize the testing
equivalence in terms of ready-traces. From the characterization it follows that
the equivalence is insensitive to the exact moment in time in which an internal
probabilistic choice occurs, which is inherent from the original testing
equivalence of De Nicola and Hennessy. We also show decidability of the testing
equivalence for finite systems for which the complete model may not be known
Meeting in a Polygon by Anonymous Oblivious Robots
The Meeting problem for searchers in a polygon (possibly with
holes) consists in making the searchers move within , according to a
distributed algorithm, in such a way that at least two of them eventually come
to see each other, regardless of their initial positions. The polygon is
initially unknown to the searchers, and its edges obstruct both movement and
vision. Depending on the shape of , we minimize the number of searchers
for which the Meeting problem is solvable. Specifically, if has a
rotational symmetry of order (where corresponds to no
rotational symmetry), we prove that searchers are sufficient, and
the bound is tight. Furthermore, we give an improved algorithm that optimally
solves the Meeting problem with searchers in all polygons whose
barycenter is not in a hole (which includes the polygons with no holes). Our
algorithms can be implemented in a variety of standard models of mobile robots
operating in Look-Compute-Move cycles. For instance, if the searchers have
memory but are anonymous, asynchronous, and have no agreement on a coordinate
system or a notion of clockwise direction, then our algorithms work even if the
initial memory contents of the searchers are arbitrary and possibly misleading.
Moreover, oblivious searchers can execute our algorithms as well, encoding
information by carefully positioning themselves within the polygon. This code
is computable with basic arithmetic operations, and each searcher can
geometrically construct its own destination point at each cycle using only a
compass. We stress that such memoryless searchers may be located anywhere in
the polygon when the execution begins, and hence the information they initially
encode is arbitrary. Our algorithms use a self-stabilizing map construction
subroutine which is of independent interest.Comment: 37 pages, 9 figure
Model-based testing of probabilistic systems
This work presents an executable model-based testing framework for probabilistic systems with non-determinism. We provide algorithms to automatically generate, execute and evaluate test cases from a probabilistic requirements specification. The framework connects input/output conformance-theory with hypothesis testing: our algorithms handle functional correctness, while statistical methods assess, if the frequencies observed during the test process correspond to the probabilities specified in the requirements. At the core of our work lies the conformance relation for probabilistic input/output conformance, enabling us to pin down exactly when an implementation should pass a test case. We establish the correctness of our framework alongside this relation as soundness and completeness; Soundness states that a correct implementation indeed passes a test suite, while completeness states that the framework is powerful enough to discover each deviation from a specification up to arbitrary precision for a sufficiently large sample size. The underlying models are probabilistic automata that allow invisible internal progress. We incorporate divergent systems into our framework by phrasing four rules that each well-formed system needs to adhere to. This enables us to treat divergence as the absence of output, or quiescence, which is a well-studied formalism in model-based testing. Lastly, we illustrate the application of our framework on three case studies
Compositional methods for information-hiding
International audienceSystems concerned with information hiding often use randomization to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a system can be expressed in terms of the probability of error associated with the inference of the secret information. We consider a probabilistic process calculus to specify such systems, and we study how the operators affect the probability of error. In particular, we characterize constructs that have the property of not decreasing the degree of protection, and that can therefore be considered safe in the modular construction of these systems. As a case study, we apply these techniques to the Dining Cryptographers, and we derive a generalization of Chaum's strong anonymity result
- …