851 research outputs found

    Parameter-Independent Strategies for pMDPs via POMDPs

    Full text link
    Markov Decision Processes (MDPs) are a popular class of models suitable for solving control decision problems in probabilistic reactive systems. We consider parametric MDPs (pMDPs) that include parameters in some of the transition probabilities to account for stochastic uncertainties of the environment such as noise or input disturbances. We study pMDPs with reachability objectives where the parameter values are unknown and impossible to measure directly during execution, but there is a probability distribution known over the parameter values. We study for the first time computing parameter-independent strategies that are expectation optimal, i.e., optimize the expected reachability probability under the probability distribution over the parameters. We present an encoding of our problem to partially observable MDPs (POMDPs), i.e., a reduction of our problem to computing optimal strategies in POMDPs. We evaluate our method experimentally on several benchmarks: a motivating (repeated) learner model; a series of benchmarks of varying configurations of a robot moving on a grid; and a consensus protocol.Comment: Extended version of a QEST 2018 pape

    The quantitative verification benchmark set

    Get PDF
    We present an extensive collection of quantitative models to facilitate the development, comparison, and benchmarking of new verification algorithms and tools. All models have a formal semantics in terms of extensions of Markov chains, are provided in the Jani format, and are documented by a comprehensive set of metadata. The collection is highly diverse: it includes established probabilistic verification and planning benchmarks, industrial case studies, models of biological systems, dynamic fault trees, and Petri net examples, all originally specified in a variety of modelling languages. It archives detailed tool performance data for each model, enabling immediate comparisons between tools and among tool versions over time. The collection is easy to access via a client-side web application at qcomp.org with powerful search and visualisation features. It can be extended via a Git-based submission process, and is openly accessible according to the terms of the CC-BY license

    A Configurable CEGAR Framework with Interpolation-Based Refinements

    Get PDF
    International audienceCorrectness of software components in a distributed system is a key issue to ensure overall reliability. Formal verification techniques such as model checking can show design flaws at early stages of development. Abstraction is a key technique for reducing complexity by hiding information, which is not relevant for verification. Counterexample-Guided Abstraction Refinement (CEGAR) is a verification algorithm that starts from a coarse abstraction and refines it iteratively until the proper precision is obtained. Many abstraction types and refinement strategies exist for systems with different characteristics. In this paper we show how these algorithms can be combined into a configurable CEGAR framework. In our framework we also present a new CEGAR configuration based on a combination of abstractions, being able to perform better for certain models. We demonstrate the use of the framework by comparing several configurations of the algorithms on various problems, identifying their advantages and shortcomings

    In vivo Expansion of NaĂŻve CD4+CD25high FOXP3+ Regulatory T Cells in Patients with Colorectal Carcinoma after IL-2 Administration

    Get PDF
    Regulatory T cells (Treg cells) are increased in context of malignancies and their expansion can be correlated with higher disease burden and decreased survival. Initially, interleukin 2 (IL-2) has been used as T-cell growth factor in clinical vaccination trials. In murine models, however, a role of IL-2 in development, differentiation, homeostasis, and function of Treg cells was established. In IL-2 treated cancer patients a further Treg-cell expansion was described, yet, the mechanism of expansion is still elusive. Here we report that functional Treg cells of a naĂŻve phenotype - as determined by CCR7 and CD45RA expression - are significantly expanded in colorectal cancer patients. Treatment of 15 UICC stage IV colorectal cancer patients with IL-2 in a phase I/II peptide vaccination trial further enlarges the already increased naĂŻve Treg-cell pool. Higher frequencies of T-cell receptor excision circles in naĂŻve Treg cells indicate IL-2 dependent thymic generation of naĂŻve Treg cells as a mechanism leading to increased frequencies of Treg cells post IL-2 treatment in cancer patients. This finding could be confirmed in naĂŻve murine Treg cells after IL-2 administration. These results point to a more complex regulation of Treg cells in context of IL-2 administration. Future strategies therefore might aim at combining IL-2 therapy with novel strategies to circumvent expansion and differentiation of naĂŻve Treg cells

    Effects of water potential on spore germination and viability of Fusarium species

    Get PDF
    Germination of macroconidia and/or microconidia of 24 strains of Fusarium solani, F. chlamydosporum, F. culmorum, F. equiseti, F. verticillioides, F. sambucinum, F. oxysporum and F. proliferatum isolated from fluvial channels and sea beds of the south-eastern coast of Spain, and three control strains (F. oxysporum isolated from affected cultures) was studied in distilled water in response to a range of water potentials adjusted with NaCI. (0, -13.79, -41.79, -70.37, -99.56 and -144.54 bars). The vialibility (UFC/ml) of suspension was also tested in three time periods (0,24 and 48h). Conidia always germinated in distilled water. The pattern of conidial germination obseved of F. verticillioides, F. oxysporum, F. proliferatum, F. chlamydosporum and F. culmorum was similar. A great diminution of spore germination was found in -13.79 bars solutions. Spore germination percentage for F. solani isolates was maximal at 48 h. and -13.79 bars with 21.33% spore germination, 16% higher than germination in distilled water. F. equiseti shows the maximum germination percentage in -144.54 bars solution in 24 h time with 12.36% germination. These results did not agree with those obtained in the viability test where maximum germination was found in distilled water. The viability analysis showed the great capacity of F. verticilloides strains to form viable colonies, even in such extreme conditions as -144,54 bars after 24 h F. proliferatum colony formation was prevented in the range of -70.37 bars. These results show the clear affectation of water potential to conidia germination of Fusaria. The ability of certain species of Fusarium to develop a saprophytic life in the salt water of the Mediterraneam Sea could be certain. Successful germination, even under high salty media conditions, suggests taht Fusarium spp. could have a competitive advantage over other soil fungi in crops irrigated with saline water. In the specific case of F. solani, water potential of -13.79 bars affected germination positively. It could indicate that F. solani has an special physiological mechanism of survival in low water potential environments

    Exploring the role of organizational policies and procedures in promoting research utilization in registered nurses

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Policies and procedures (P&Ps) have been suggested as one possible strategy for moving research evidence into practice among nursing staff in hospitals. Research in the area of P&Ps is limited, however. This paper explores: 1) nurses' use of eight specific research-based practices (RBPs) and RBP overall, 2) nurses' use and understanding of P&Ps, and 3) the role of P&Ps in promoting research utilization.</p> <p>Methods</p> <p>Staff nurses from the eight health regions governing acute care services across the Canadian province of Newfoundland and Labrador completed an anonymous questionnaire regarding their use of eight RBPs and associated P&Ps. Data were also obtained from authorities in six of the eight regions about existing relevant P&Ps. We used descriptive statistics and multivariate regression analysis to assess the relationship between key independent variables and self-reported use of RBP.</p> <p>Results</p> <p>Use of the eight RBPs ranged from 7.8% to 88.6%, depending on the practice. Nurses ranked P&P manuals as their number one source of practice knowledge. Most respondents (84.8%) reported that the main reason they consult the P&P manual is to confirm they are practicing according to agency rules. Multivariate regression analysis identified three significant predictors of being a user versus non-user of RBP overall: awareness, awareness by regular use, and persuasion. Six significant predictors of being a consistent versus less consistent user of RBP overall were also identified: perception of P&P existence, unit, nursing experience, personal experience as a source of practice knowledge, number of existing research-based P&Ps, and lack of time as a barrier to consulting P&P manuals.</p> <p>Conclusion</p> <p>Findings suggest that nurses use P&Ps to guide their practice. However, the mere existence of P&Ps is not sufficient to translate research into nursing practice. Individual and organizational factors related to nurses' understanding and use of P&Ps also play key roles. Thus, moving research evidence into practice will require careful interplay between the organization and the individual. P&Ps may be the interface through which this occurs.</p

    Directed cell migration in the presence of obstacles

    Get PDF
    BACKGROUND: Chemotactic movement is a common feature of many cells and microscopic organisms. In vivo, chemotactic cells have to follow a chemotactic gradient and simultaneously avoid the numerous obstacles present in their migratory path towards the chemotactic source. It is not clear how cells detect and avoid obstacles, in particular whether they need a specialized biological mechanism to do so. RESULTS: We propose that cells can sense the presence of obstacles and avoid them because obstacles interfere with the chemical field. We build a model to test this hypothesis and find that this naturally enables efficient at-a-distance sensing to be achieved with no need for a specific and active obstacle-sensing mechanism. We find that (i) the efficiency of obstacle avoidance depends strongly on whether the chemotactic chemical reacts or remains unabsorbed at the obstacle surface. In particular, it is found that chemotactic cells generally avoid absorbing barriers much more easily than non-absorbing ones. (ii) The typically low noise in a cell's motion hinders the ability to avoid obstacles. We also derive an expression estimating the typical distance traveled by chemotactic cells in a 3D random distribution of obstacles before capture; this is a measure of the distance over which chemotaxis is viable as a means of directing cells from one point to another in vivo. CONCLUSION: Chemotactic cells, in many cases, can avoid obstacles by simply following the spatially perturbed chemical gradients around obstacles. It is thus unlikely that they have developed specialized mechanisms to cope with environments having low to moderate concentrations of obstacles

    Danger Invariants

    Get PDF
    Static analysers search for overapproximating proofs of safety commonly known as safety invariants. Conversely, static bug finders (e.g. Bounded Model Checking) give evidence for the failure of an assertion in the form of a counterexample trace. As opposed to safety invariants, the size of a counterexample is dependent on the depth of the bug, i.e., the length of the execution trace prior to the error state, which also determines the computational effort required to find them. We propose a way of expressing danger proofs that is independent of the depth of bugs. Essentially, such danger proofs constitute a compact representation of a counterexample trace, which we call a danger invariant. Danger invariants summarise sets of traces that are guaranteed to be able to reach an error state. Our conjecture is that such danger proofs will enable the design of bug finding analyses for which the computational effort is independent of the depth of bugs, and thus find deep bugs more efficiently. As an exemplar of an analysis that uses danger invariants, we design a bug finding technique based on a synthesis engine. We implemented this technique and compute danger invariants for intricate programs taken from SV-COMP 2016
    • …
    corecore