21 research outputs found
Parameterized Verification of Safety Properties in Ad Hoc Network Protocols
We summarize the main results proved in recent work on the parameterized
verification of safety properties for ad hoc network protocols. We consider a
model in which the communication topology of a network is represented as a
graph. Nodes represent states of individual processes. Adjacent nodes represent
single-hop neighbors. Processes are finite state automata that communicate via
selective broadcast messages. Reception of a broadcast is restricted to
single-hop neighbors. For this model we consider a decision problem that can be
expressed as the verification of the existence of an initial topology in which
the execution of the protocol can lead to a configuration with at least one
node in a certain state. The decision problem is parametric both on the size
and on the form of the communication topology of the initial configurations. We
draw a complete picture of the decidability and complexity boundaries of this
problem according to various assumptions on the possible topologies.Comment: In Proceedings PACO 2011, arXiv:1108.145
Integer Vector Addition Systems with States
This paper studies reachability, coverability and inclusion problems for
Integer Vector Addition Systems with States (ZVASS) and extensions and
restrictions thereof. A ZVASS comprises a finite-state controller with a finite
number of counters ranging over the integers. Although it is folklore that
reachability in ZVASS is NP-complete, it turns out that despite their
naturalness, from a complexity point of view this class has received little
attention in the literature. We fill this gap by providing an in-depth analysis
of the computational complexity of the aforementioned decision problems. Most
interestingly, it turns out that while the addition of reset operations to
ordinary VASS leads to undecidability and Ackermann-hardness of reachability
and coverability, respectively, they can be added to ZVASS while retaining
NP-completness of both coverability and reachability.Comment: 17 pages, 2 figure
LIPIcs
Fault-tolerant distributed algorithms play an important role in many critical/high-availability applications. These algorithms are notoriously difficult to implement correctly, due to asynchronous communication and the occurrence of faults, such as the network dropping messages or computers crashing. Nonetheless there is surprisingly little language and verification support to build distributed systems based on fault-tolerant algorithms. In this paper, we present some of the challenges that a designer has to overcome to implement a fault-tolerant distributed system. Then we review different models that have been proposed to reason about distributed algorithms and sketch how such a model can form the basis for a domain-specific programming language. Adopting a high-level programming model can simplify the programmer's life and make the code amenable to automated verification, while still compiling to efficiently executable code. We conclude by summarizing the current status of an ongoing language design and implementation project that is based on this idea
Ordered Navigation on Multi-attributed Data Words
We study temporal logics and automata on multi-attributed data words.
Recently, BD-LTL was introduced as a temporal logic on data words extending LTL
by navigation along positions of single data values. As allowing for navigation
wrt. tuples of data values renders the logic undecidable, we introduce ND-LTL,
an extension of BD-LTL by a restricted form of tuple-navigation. While complete
ND-LTL is still undecidable, the two natural fragments allowing for either
future or past navigation along data values are shown to be Ackermann-hard, yet
decidability is obtained by reduction to nested multi-counter systems. To this
end, we introduce and study nested variants of data automata as an intermediate
model simplifying the constructions. To complement these results we show that
imposing the same restrictions on BD-LTL yields two 2ExpSpace-complete
fragments while satisfiability for the full logic is known to be as hard as
reachability in Petri nets
Bisimulation Equivalence of First-Order Grammars is ACKERMANN-Complete
Checking whether two pushdown automata with restricted silent actions are
weakly bisimilar was shown decidable by S\'enizergues (1998, 2005). We provide
the first known complexity upper bound for this famous problem, in the
equivalent setting of first-order grammars. This ACKERMANN upper bound is
optimal, and we also show that strong bisimilarity is primitive-recursive when
the number of states of the automata is fixed
On Functions Weakly Computable by Pushdown Petri Nets and Related Systems
We consider numerical functions weakly computable by grammar-controlled
vector addition systems (GVASes, a variant of pushdown Petri nets). GVASes can
weakly compute all fast growing functions for
, hence they are computationally more powerful than
standard vector addition systems. On the other hand they cannot weakly compute
the inverses or indeed any sublinear function. The proof relies
on a pumping lemma for runs of GVASes that is of independent interest
Affine Extensions of Integer Vector Addition Systems with States
We study the reachability problem for affine -VASS, which are
integer vector addition systems with states in which transitions perform affine
transformations on the counters. This problem is easily seen to be undecidable
in general, and we therefore restrict ourselves to affine -VASS
with the finite-monoid property (afmp--VASS). The latter have the
property that the monoid generated by the matrices appearing in their affine
transformations is finite. The class of afmp--VASS encompasses
classical operations of counter machines such as resets, permutations,
transfers and copies. We show that reachability in an afmp--VASS
reduces to reachability in a -VASS whose control-states grow
linearly in the size of the matrix monoid. Our construction shows that
reachability relations of afmp--VASS are semilinear, and in
particular enables us to show that reachability in -VASS with
transfers and -VASS with copies is PSPACE-complete. We then focus
on the reachability problem for affine -VASS with monogenic
monoids: (possibly infinite) matrix monoids generated by a single matrix. We
show that, in a particular case, the reachability problem is decidable for this
class, disproving a conjecture about affine -VASS with infinite
matrix monoids we raised in a preliminary version of this paper. We complement
this result by presenting an affine -VASS with monogenic matrix
monoid and undecidable reachability relation
History-Register Automata
Programs with dynamic allocation are able to create and use an unbounded
number of fresh resources, such as references, objects, files, etc. We propose
History-Register Automata (HRA), a new automata-theoretic formalism for
modelling such programs. HRAs extend the expressiveness of previous approaches
and bring us to the limits of decidability for reachability checks. The
distinctive feature of our machines is their use of unbounded memory sets
(histories) where input symbols can be selectively stored and compared with
symbols to follow. In addition, stored symbols can be consumed or deleted by
reset. We show that the combination of consumption and reset capabilities
renders the automata powerful enough to imitate counter machines, and yields
closure under all regular operations apart from complementation. We moreover
examine weaker notions of HRAs which strike different balances between
expressiveness and effectiveness.Comment: LMCS (improved version of FoSSaCS
Revisiting Ackermann-hardness for lossy counter machines and reset Petri nets
www.lsv.ens-cachan.fr/~phs Abstract. We prove that coverability and termination are not primitive-recursive for lossy counter machines and for Reset Petri nets.
Complexity Hierarchies Beyond Elementary
We introduce a hierarchy of fast-growing complexity classes and show its
suitability for completeness statements of many non elementary problems. This
hierarchy allows the classification of many decision problems with a
non-elementary complexity, which occur naturally in logic, combinatorics,
formal languages, verification, etc., with complexities ranging from simple
towers of exponentials to Ackermannian and beyond.Comment: Version 3 is the published version in TOCT 8(1:3), 2016. I will keep
updating the catalogue of problems from Section 6 in future revision