1,190 research outputs found

    An update on the status of wet forest stream-dwelling frogs of the Eungella region

    Get PDF
    Eungella’s wet forests are home to a number of stream-breeding frogs including three species endemic to the Eungella region: the Eungella dayfrog (Taudactylus eungellensis), Eungella tinkerfrog (T. liemi), and northern gastric brooding frog (Rheobatrachus vitellinus). During the mid-1980s, T. eungellensis and R. vitellinus suffered dramatic population declines attributable to amphibian chytridiomycosis, a disease caused by the amphibian chytrid fungus (Batrachochytrium dendrobatidis or Bd). While surveys in the late 1980s failed to locate T. eungellensis or R. vitellinus, populations of the former were located on a handful of streams surveyed by researchers in the mid-to-late 1990s. Between January 2000 and November 2015, additional surveys targeting these and other wet forest frog species were conducted at 114 sites within Eungella National Park and adjoining areas of State Forest. During these surveys, we located T. eungellensis at many more sites than surveys in the 1990s. Abundances of T. eungellensis at these sites were typically low, however, and well below abundance levels prior to declines in the mid-1980s. As with surveys in the 1990s, T. eungellensis was scarce at high-elevation sites above 600 metres altitude. Numbers of this species do not appear to have increased significantly since the mid-1990s, suggesting recovery of T. eungellensis populations is occurring slowly, at best. In contrast with T. eungellensis, T. liemi was frequently recorded at high-elevation sites, albeit at low densities. As with previous surveys, surveys during 2000–2015 were unsuccessful in locating R. vitellinus. Further frog surveys and monitoring (including disease surveillance) are needed to better assess the status of stream frogs at Eungella, and to understand the influence of Bd on the abundance and distribution of threatened stream-dwelling frogs at Eungella

    Using Flow Specifications of Parameterized Cache Coherence Protocols for Verifying Deadlock Freedom

    Full text link
    We consider the problem of verifying deadlock freedom for symmetric cache coherence protocols. In particular, we focus on a specific form of deadlock which is useful for the cache coherence protocol domain and consistent with the internal definition of deadlock in the Murphi model checker: we refer to this deadlock as a system- wide deadlock (s-deadlock). In s-deadlock, the entire system gets blocked and is unable to make any transition. Cache coherence protocols consist of N symmetric cache agents, where N is an unbounded parameter; thus the verification of s-deadlock freedom is naturally a parameterized verification problem. Parametrized verification techniques work by using sound abstractions to reduce the unbounded model to a bounded model. Efficient abstractions which work well for industrial scale protocols typically bound the model by replacing the state of most of the agents by an abstract environment, while keeping just one or two agents as is. However, leveraging such efficient abstractions becomes a challenge for s-deadlock: a violation of s-deadlock is a state in which the transitions of all of the unbounded number of agents cannot occur and so a simple abstraction like the one above will not preserve this violation. In this work we address this challenge by presenting a technique which leverages high-level information about the protocols, in the form of message sequence dia- grams referred to as flows, for constructing invariants that are collectively stronger than s-deadlock. Efficient abstractions can be constructed to verify these invariants. We successfully verify the German and Flash protocols using our technique

    Deciding Full Branching Time Logic by Program Transformation

    Get PDF
    We present a method based on logic program transformation, for verifying Computation Tree Logic (CTL*) properties of finite state reactive systems. The finite state systems and the CTL* properties we want to verify, are encoded as logic programs on infinite lists. Our verification method consists of two steps. In the first step we transform the logic program that encodes the given system and the given property, into a monadic ω -program, that is, a stratified program defining nullary or unary predicates on infinite lists. This transformation is performed by applying unfold/fold rules that preserve the perfect model of the initial program. In the second step we verify the property of interest by using a proof method for monadic ω-program

    On the Hybrid Extension of CTL and CTL+

    Full text link
    The paper studies the expressivity, relative succinctness and complexity of satisfiability for hybrid extensions of the branching-time logics CTL and CTL+ by variables. Previous complexity results show that only fragments with one variable do have elementary complexity. It is shown that H1CTL+ and H1CTL, the hybrid extensions with one variable of CTL+ and CTL, respectively, are expressively equivalent but H1CTL+ is exponentially more succinct than H1CTL. On the other hand, HCTL+, the hybrid extension of CTL with arbitrarily many variables does not capture CTL*, as it even cannot express the simple CTL* property EGFp. The satisfiability problem for H1CTL+ is complete for triply exponential time, this remains true for quite weak fragments and quite strong extensions of the logic

    Comparison of the effects of exploitation on theoretical long-lived fish species with different life-history strategies and the implications for management

    Get PDF
    This article was originally published by ICES on their website http://www.ices.dk/.A stage-based simulation model is used to investigate the effect of exploitation on theoretical populations representing long-lived elasmobranch and teleost species with different life-history strategies. A comparison is made between the effect of exploitation on the elasmobranch ‘k-strategists’ and other teleost species that are ‘r-strategists’. We demonstrate the effects of stage-based exploitation on a typical long-lived elasmobranch population and discuss the implications of this when designing a management plan to ensure survival of the stock

    Vocal communication in gibbons

    Get PDF
    Many non-human primates use vocal communication referentially and also use simple syntax and grammar. However, their comparative vocal repertoires are disappointingly sparse, with many researchers concluding that they have fixed vocal patterns made up of a limited number of discrete units used in a relatively small array of contexts (see McComb & Semple, 2005 for a review). Furthermore, these vocal patterns seem to be innate, under high genetic control with little evidence for vocal learning – something that humans are masters at (Janik & Slater 1997). This leaves us with some questions. Firstly, how did humans become so adept at producing and learning vocal sounds? And, secondly, are there any extant primate species with vocal behaviours that can be directly compared to our own?

    Inheritance of Temporal Logic Properties

    Full text link
    Abstract. Inheritance is one of the key features for the success of object-oriented languages. Inheritance (or specialisation) supports incremental design and re-use of already written specifications or programs. In a for-mal approach to system design the interest does not only lie in re-use of class definitions but also in re-use of correctness proofs. If a provably correct class is specialised we like to know those correctness properties which are preserved in the subclass. This can avoid re-verification of already proven properties and may thus substantially reduce the verifi-cation effort. In this paper we study the question of inheritance of correctness prop-erties in the context of state-based formalisms, using a temporal logic (CTL) to formalise requirements on classes. Given a superclass and its specialised subclass we develop a technique for computing the set of for-mulas which are preserved in the subclass. For specialisation we allow addition of attributes, modification of existing as well as extension with new methods.

    Efficient Symmetry Reduction and the Use of State Symmetries for Symbolic Model Checking

    Full text link
    One technique to reduce the state-space explosion problem in temporal logic model checking is symmetry reduction. The combination of symmetry reduction and symbolic model checking by using BDDs suffered a long time from the prohibitively large BDD for the orbit relation. Dynamic symmetry reduction calculates representatives of equivalence classes of states dynamically and thus avoids the construction of the orbit relation. In this paper, we present a new efficient model checking algorithm based on dynamic symmetry reduction. Our experiments show that the algorithm is very fast and allows the verification of larger systems. We additionally implemented the use of state symmetries for symbolic symmetry reduction. To our knowledge we are the first who investigated state symmetries in combination with BDD based symbolic model checking

    Extended Computation Tree Logic

    Full text link
    We introduce a generic extension of the popular branching-time logic CTL which refines the temporal until and release operators with formal languages. For instance, a language may determine the moments along a path that an until property may be fulfilled. We consider several classes of languages leading to logics with different expressive power and complexity, whose importance is motivated by their use in model checking, synthesis, abstract interpretation, etc. We show that even with context-free languages on the until operator the logic still allows for polynomial time model-checking despite the significant increase in expressive power. This makes the logic a promising candidate for applications in verification. In addition, we analyse the complexity of satisfiability and compare the expressive power of these logics to CTL* and extensions of PDL
    • …
    corecore