454 research outputs found
Verification for Timed Automata extended with Unbounded Discrete Data Structures
We study decidability of verification problems for timed automata extended
with unbounded discrete data structures. More detailed, we extend timed
automata with a pushdown stack. In this way, we obtain a strong model that may
for instance be used to model real-time programs with procedure calls. It is
long known that the reachability problem for this model is decidable. The goal
of this paper is to identify subclasses of timed pushdown automata for which
the language inclusion problem and related problems are decidable
Revisiting Reachability in Timed Automata
We revisit a fundamental result in real-time verification, namely that the
binary reachability relation between configurations of a given timed automaton
is definable in linear arithmetic over the integers and reals. In this paper we
give a new and simpler proof of this result, building on the well-known
reachability analysis of timed automata involving difference bound matrices.
Using this new proof, we give an exponential-space procedure for model checking
the reachability fragment of the logic parametric TCTL. Finally we show that
the latter problem is NEXPTIME-hard
Quantitative and Approximate Monitoring
In runtime verification, a monitor watches a trace of a system and, if
possible, decides after observing each finite prefix whether or not the unknown
infinite trace satisfies a given specification. We generalize the theory of
runtime verification to monitors that attempt to estimate numerical values of
quantitative trace properties (instead of attempting to conclude boolean values
of trace specifications), such as maximal or average response time along a
trace. Quantitative monitors are approximate: with every finite prefix, they
can improve their estimate of the infinite trace's unknown property value.
Consequently, quantitative monitors can be compared with regard to a
precision-cost trade-off: better approximations of the property value require
more monitor resources, such as states (in the case of finite-state monitors)
or registers, and additional resources yield better approximations. We
introduce a formal framework for quantitative and approximate monitoring, show
how it conservatively generalizes the classical boolean setting for monitoring,
and give several precision-cost trade-offs for monitors. For example, we prove
that there are quantitative properties for which every additional register
improves monitoring precision.Comment: To appear in LICS 2021; corrected a referenc
Equivalence-Checking on Infinite-State Systems: Techniques and Results
The paper presents a selection of recently developed and/or used techniques
for equivalence-checking on infinite-state systems, and an up-to-date overview
of existing results (as of September 2004)
Pure Nash Equilibria in Concurrent Deterministic Games
We study pure-strategy Nash equilibria in multi-player concurrent
deterministic games, for a variety of preference relations. We provide a novel
construction, called the suspect game, which transforms a multi-player
concurrent game into a two-player turn-based game which turns Nash equilibria
into winning strategies (for some objective that depends on the preference
relations of the players in the original game). We use that transformation to
design algorithms for computing Nash equilibria in finite games, which in most
cases have optimal worst-case complexity, for large classes of preference
relations. This includes the purely qualitative framework, where each player
has a single omega-regular objective that she wants to satisfy, but also the
larger class of semi-quantitative objectives, where each player has several
omega-regular objectives equipped with a preorder (for instance, a player may
want to satisfy all her objectives, or to maximise the number of objectives
that she achieves.)Comment: 72 page
Well Structured Transition Systems with History
We propose a formal model of concurrent systems in which the history of a
computation is explicitly represented as a collection of events that provide a
view of a sequence of configurations. In our model events generated by
transitions become part of the system configurations leading to operational
semantics with historical data. This model allows us to formalize what is
usually done in symbolic verification algorithms. Indeed, search algorithms
often use meta-information, e.g., names of fired transitions, selected
processes, etc., to reconstruct (error) traces from symbolic state exploration.
The other interesting point of the proposed model is related to a possible new
application of the theory of well-structured transition systems (wsts). In our
setting wsts theory can be applied to formally extend the class of properties
that can be verified using coverability to take into consideration (ordered and
unordered) historical data. This can be done by using different types of
representation of collections of events and by combining them with wsts by
using closure properties of well-quasi orderings.Comment: In Proceedings GandALF 2015, arXiv:1509.0685
- …