328 research outputs found
A lower bound on CNF encodings of the at-most-one constraint
Constraint "at most one" is a basic cardinality constraint which requires
that at most one of its boolean inputs is set to . This constraint is
widely used when translating a problem into a conjunctive normal form (CNF) and
we investigate its CNF encodings suitable for this purpose. An encoding differs
from a CNF representation of a function in that it can use auxiliary variables.
We are especially interested in propagation complete encodings which have the
property that unit propagation is strong enough to enforce consistency on input
variables. We show a lower bound on the number of clauses in any propagation
complete encoding of the "at most one" constraint. The lower bound almost
matches the size of the best known encodings. We also study an important case
of 2-CNF encodings where we show a slightly better lower bound. The lower bound
holds also for a related "exactly one" constraint.Comment: 38 pages, version 3 is significantly reorganized in order to improve
readabilit
Diagnostic Approach for the Differentiation of the Pandemic Influenza A(H1N1)v Virus from Recent Human Influenza Viruses by Real-Time PCR
BACKGROUND: The current spread of pandemic influenza A(H1N1)v virus necessitates an intensified surveillance of influenza virus infections worldwide. So far, in many laboratories routine diagnostics were limited to generic influenza virus detection only. To provide interested laboratories with real-time PCR assays for type and subtype identification, we present a bundle of PCR assays with which any human influenza A and B virus can be easily identified, including assays for the detection of the pandemic A(H1N1)v virus. PRINCIPAL FINDINGS: The assays show optimal performance characteristics in their validation on plasmids containing the respective assay target sequences. All assays have furthermore been applied to several thousand clinical samples since 2007 (assays for seasonal influenza) and April 2009 (pandemic influenza assays), respectively, and showed excellent results also on clinical material. CONCLUSIONS: We consider the presented assays to be well suited for the detection and subtyping of circulating influenza viruses
Bounded Determinization of Timed Automata with Silent Transitions
Deterministic timed automata are strictly less expressive than their
non-deterministic counterparts, which are again less expressive than those with
silent transitions. As a consequence, timed automata are in general
non-determinizable. This is unfortunate since deterministic automata play a
major role in model-based testing, observability and implementability. However,
by bounding the length of the traces in the automaton, effective
determinization becomes possible. We propose a novel procedure for bounded
determinization of timed automata. The procedure unfolds the automata to
bounded trees, removes all silent transitions and determinizes via disjunction
of guards. The proposed algorithms are optimized to the bounded setting and
thus are more efficient and can handle a larger class of timed automata than
the general algorithms. The approach is implemented in a prototype tool and
evaluated on several examples. To our best knowledge, this is the first
implementation of this type of procedure for timed automata.Comment: 25 page
QRAT+: Generalizing QRAT by a More Powerful QBF Redundancy Property
The QRAT (quantified resolution asymmetric tautology) proof system simulates
virtually all inference rules applied in state of the art quantified Boolean
formula (QBF) reasoning tools. It consists of rules to rewrite a QBF by adding
and deleting clauses and universal literals that have a certain redundancy
property. To check for this redundancy property in QRAT, propositional unit
propagation (UP) is applied to the quantifier free, i.e., propositional part of
the QBF. We generalize the redundancy property in the QRAT system by QBF
specific UP (QUP). QUP extends UP by the universal reduction operation to
eliminate universal literals from clauses. We apply QUP to an abstraction of
the QBF where certain universal quantifiers are converted into existential
ones. This way, we obtain a generalization of QRAT we call QRAT+. The
redundancy property in QRAT+ based on QUP is more powerful than the one in QRAT
based on UP. We report on proof theoretical improvements and experimental
results to illustrate the benefits of QRAT+ for QBF preprocessing.Comment: preprint of a paper to be published at IJCAR 2018, LNCS, Springer,
including appendi
SAT-Based Synthesis Methods for Safety Specs
Automatic synthesis of hardware components from declarative specifications is
an ambitious endeavor in computer aided design. Existing synthesis algorithms
are often implemented with Binary Decision Diagrams (BDDs), inheriting their
scalability limitations. Instead of BDDs, we propose several new methods to
synthesize finite-state systems from safety specifications using decision
procedures for the satisfiability of quantified and unquantified Boolean
formulas (SAT-, QBF- and EPR-solvers). The presented approaches are based on
computational learning, templates, or reduction to first-order logic. We also
present an efficient parallelization, and optimizations to utilize reachability
information and incremental solving. Finally, we compare all methods in an
extensive case study. Our new methods outperform BDDs and other existing work
on some classes of benchmarks, and our parallelization achieves a super-linear
speedup. This is an extended version of [5], featuring an additional appendix.Comment: Extended version of a paper at VMCAI'1
Invasive earthworms reduce chemical defense and increase herbivory and pathogen infection in native trees
Recent research shows that earthworms can alter defense traits of plants against herbivores and pathogens by affecting soil biochemistry. Yet, the effects of invasive earthworms on defense traits of native plants from previously earthworm-free ecosystems as well as the consequences for multitrophic interactions are virtually unknown. Here we use a combination of an observational study and a complementary experimental study to investigate the effects of invasive earthworms on leaf defense traits, herbivore damage and pathogen infection in two poplar tree species (Populus balsamifera and Populus tremuloides) native to North American boreal forests. Our observational study showed that earthworm invasion was associated with enhanced leaf herbivory (by leaf-chewing insects) in saplings of both tree species. However, we only detected significant shifts in the concentration of chemical defense compounds in response to earthworm invasion for P. balsamifera. Specifically, leaf phenolic concentrations, including salicinoids and catechin, were lower in P. balsamifera from earthworm-invaded sites. Our experimental study confirmed an earthworm-induced reduction in leaf defense levels in P. balsamifera for one of the defense compounds, tremulacin. The experimental study additionally showed that invasive earthworms reduced leaf dry matter content, potentially increasing leaf palatability, and enhanced susceptibility of trees to infection by a fungal pathogen, but not to aphid infestation, in the same tree species. Synthesis. Our results show that invasive earthworms can decrease the concentrations of some chemical defense compounds in P. balsamifera, which could make them susceptible to leaf-chewing insects. Such potential impacts of invasive earthworms are likely to have implications for tree survival and competition, native tree biodiversity and ecosystem functioning
Generating Non-Linear Interpolants by Semidefinite Programming
Interpolation-based techniques have been widely and successfully applied in
the verification of hardware and software, e.g., in bounded-model check- ing,
CEGAR, SMT, etc., whose hardest part is how to synthesize interpolants. Various
work for discovering interpolants for propositional logic, quantifier-free
fragments of first-order theories and their combinations have been proposed.
However, little work focuses on discovering polynomial interpolants in the
literature. In this paper, we provide an approach for constructing non-linear
interpolants based on semidefinite programming, and show how to apply such
results to the verification of programs by examples.Comment: 22 pages, 4 figure
Automatic Abstraction in SMT-Based Unbounded Software Model Checking
Software model checkers based on under-approximations and SMT solvers are
very successful at verifying safety (i.e. reachability) properties. They
combine two key ideas -- (a) "concreteness": a counterexample in an
under-approximation is a counterexample in the original program as well, and
(b) "generalization": a proof of safety of an under-approximation, produced by
an SMT solver, are generalizable to proofs of safety of the original program.
In this paper, we present a combination of "automatic abstraction" with the
under-approximation-driven framework. We explore two iterative approaches for
obtaining and refining abstractions -- "proof based" and "counterexample based"
-- and show how they can be combined into a unified algorithm. To the best of
our knowledge, this is the first application of Proof-Based Abstraction,
primarily used to verify hardware, to Software Verification. We have
implemented a prototype of the framework using Z3, and evaluate it on many
benchmarks from the Software Verification Competition. We show experimentally
that our combination is quite effective on hard instances.Comment: Extended version of a paper in the proceedings of CAV 201
Running on Fumes--Preventing Out-of-Gas Vulnerabilities in Ethereum Smart Contracts using Static Resource Analysis
Gas is a measurement unit of the computational effort that it will take to
execute every single operation that takes part in the Ethereum blockchain
platform. Each instruction executed by the Ethereum Virtual Machine (EVM) has
an associated gas consumption specified by Ethereum. If a transaction exceeds
the amount of gas allotted by the user (known as gas limit), an out-of-gas
exception is raised. There is a wide family of contract vulnerabilities due to
out-of-gas behaviours. We report on the design and implementation of GASTAP, a
Gas-Aware Smart contracT Analysis Platform, which takes as input a smart
contract (either in EVM, disassembled EVM, or in Solidity source code) and
automatically infers sound gas upper bounds for all its public functions. Our
bounds ensure that if the gas limit paid by the user is higher than our
inferred gas bounds, the contract is free of out-of-gas vulnerabilities
Efficient Certified Resolution Proof Checking
We present a novel propositional proof tracing format that eliminates complex
processing, thus enabling efficient (formal) proof checking. The benefits of
this format are demonstrated by implementing a proof checker in C, which
outperforms a state-of-the-art checker by two orders of magnitude. We then
formalize the theory underlying propositional proof checking in Coq, and
extract a correct-by-construction proof checker for our format from the
formalization. An empirical evaluation using 280 unsatisfiable instances from
the 2015 and 2016 SAT competitions shows that this certified checker usually
performs comparably to a state-of-the-art non-certified proof checker. Using
this format, we formally verify the recent 200 TB proof of the Boolean
Pythagorean Triples conjecture
- …