1,727 research outputs found
Applying Formal Methods to Networking: Theory, Techniques and Applications
Despite its great importance, modern network infrastructure is remarkable for
the lack of rigor in its engineering. The Internet which began as a research
experiment was never designed to handle the users and applications it hosts
today. The lack of formalization of the Internet architecture meant limited
abstractions and modularity, especially for the control and management planes,
thus requiring for every new need a new protocol built from scratch. This led
to an unwieldy ossified Internet architecture resistant to any attempts at
formal verification, and an Internet culture where expediency and pragmatism
are favored over formal correctness. Fortunately, recent work in the space of
clean slate Internet design---especially, the software defined networking (SDN)
paradigm---offers the Internet community another chance to develop the right
kind of architecture and abstractions. This has also led to a great resurgence
in interest of applying formal methods to specification, verification, and
synthesis of networking protocols and applications. In this paper, we present a
self-contained tutorial of the formidable amount of work that has been done in
formal methods, and present a survey of its applications to networking.Comment: 30 pages, submitted to IEEE Communications Surveys and Tutorial
Universal First-Order Logic is Superfluous for NL, P, NP and coNP
In this work we continue the syntactic study of completeness that began with
the works of Immerman and Medina. In particular, we take a conjecture raised by
Medina in his dissertation that says if a conjunction of a second-order and a
first-order sentences defines an NP-complete problems via fops, then it must be
the case that the second-order conjoint alone also defines a NP-complete
problem. Although this claim looks very plausible and intuitive, currently we
cannot provide a definite answer for it. However, we can solve in the
affirmative a weaker claim that says that all ``consistent'' universal
first-order sentences can be safely eliminated without the fear of losing
completeness. Our methods are quite general and can be applied to complexity
classes other than NP (in this paper: to NLSPACE, PTIME, and coNP), provided
the class has a complete problem satisfying a certain combinatorial property
Computability and analysis: the legacy of Alan Turing
We discuss the legacy of Alan Turing and his impact on computability and
analysis.Comment: 49 page
Two Variable vs. Linear Temporal Logic in Model Checking and Games
Model checking linear-time properties expressed in first-order logic has
non-elementary complexity, and thus various restricted logical languages are
employed. In this paper we consider two such restricted specification logics,
linear temporal logic (LTL) and two-variable first-order logic (FO2). LTL is
more expressive but FO2 can be more succinct, and hence it is not clear which
should be easier to verify. We take a comprehensive look at the issue, giving a
comparison of verification problems for FO2, LTL, and various sublogics thereof
across a wide range of models. In particular, we look at unary temporal logic
(UTL), a subset of LTL that is expressively equivalent to FO2; we also consider
the stutter-free fragment of FO2, obtained by omitting the successor relation,
and the expressively equivalent fragment of UTL, obtained by omitting the next
and previous connectives. We give three logic-to-automata translations which
can be used to give upper bounds for FO2 and UTL and various sublogics. We
apply these to get new bounds for both non-deterministic systems (hierarchical
and recursive state machines, games) and for probabilistic systems (Markov
chains, recursive Markov chains, and Markov decision processes). We couple
these with matching lower-bound arguments. Next, we look at combining FO2
verification techniques with those for LTL. We present here a language that
subsumes both FO2 and LTL, and inherits the model checking properties of both
languages. Our results give both a unified approach to understanding the
behaviour of FO2 and LTL, along with a nearly comprehensive picture of the
complexity of verification for these logics and their sublogics.Comment: 37 pages, to be published in Logical Methods in Computer Science
journal, includes material presented in Concur 2011 and QEST 2012 extended
abstract
Model Checking Lower Bounds for Simple Graphs
A well-known result by Frick and Grohe shows that deciding FO logic on trees
involves a parameter dependence that is a tower of exponentials. Though this
lower bound is tight for Courcelle's theorem, it has been evaded by a series of
recent meta-theorems for other graph classes. Here we provide some additional
non-elementary lower bound results, which are in some senses stronger. Our goal
is to explain common traits in these recent meta-theorems and identify barriers
to further progress. More specifically, first, we show that on the class of
threshold graphs, and therefore also on any union and complement-closed class,
there is no model-checking algorithm with elementary parameter dependence even
for FO logic. Second, we show that there is no model-checking algorithm with
elementary parameter dependence for MSO logic even restricted to paths (or
equivalently to unary strings), unless E=NE. As a corollary, we resolve an open
problem on the complexity of MSO model-checking on graphs of bounded max-leaf
number. Finally, we look at MSO on the class of colored trees of depth d. We
show that, assuming the ETH, for every fixed d>=1 at least d+1 levels of
exponentiation are necessary for this problem, thus showing that the (d+1)-fold
exponential algorithm recently given by Gajarsk\`{y} and Hlin\u{e}n\`{y} is
essentially optimal
- …