15 research outputs found

    Killing spectroscopy of closed timelike curves

    Full text link
    We analyse the existence of closed timelike curves in spacetimes which possess an isometry. In particular we check which discrete quotients of such spaces lead to closed timelike curves. As a by-product of our analysis, we prove that the notion of existence or non-existence of closed timelike curves is a T-duality invariant notion, whenever the direction along which we apply such transformations is everywhere spacelike. Our formalism is straightforwardly applied to supersymmetric theories. We provide some new examples in the context of D-branes and generalized pp-waves.Comment: 1+35 pages, no figures; v2, new references added. Final version to appear in JHE

    Energy-momentum and angular momentum of Goedel universes

    Full text link
    We discuss the Einstein energy-momentum complex and the Bergmann-Thomson angular momentum complex in general relativity and calculate them for space-time homogeneous Goedel universes. The calculations are performed for a dust acausal model and for a scalar-field causal model. It is shown that the Einstein pseudotensor is traceless, not symmetric, the gravitational energy is "density" is negative and the gravitational Poynting vector vanishes. Significantly, the total (gravitational and matter) energy "density" fro the acausal model is zero while for the casual model it is negative.The Bergmann-Thomson angular momentum complex does not vanish for both G\"odel models.Comment: an amended version, 24 pages, accepted to PR

    Exploiting Target Enlargement and Dynamic Abstraction within Mixed BDD and SAT Invariant Checking

    No full text
    In this paper, we propose a methodology to make Binary Decision Diagrams (BDDs) and Boolean Satisfiability (SAT) Solvers cooperate. The underlying idea is simple: We start a verification task with BDDs, we go on with them as long as the problem remains of manageable size, then we switch to SAT, without losing the work done on the BDD domain. We propose target enlargement as an attempt to bring some of the advantages of state set manipulation from BDDs to SAT-based verification. We first, "enlarge" initial and target state sets of a given verification problem by affordable BDD manipulations. This step is carried on with a few breadth-first steps of traversal, or with what we call high-density dynamic abstraction, i.e., a new technique to collect under-approximate reachable state sets. Then, we perform SAT-based verification with the newly computed "enlarged" sets. We experimentally test our methodology within an industrial environment, the Intel BOolean VErifier BOVE. Preliminary results on standard benchmarks (the ISCAS'89, ISCAS'89--addendum, and VIS suites), and industrial ones (the IBM Formal Verification Benchmark Library) are provided. Results show interesting improvements over state-of-the-art techniques: We could decrease CPU time up to a 5x factor, when performing verification with the same depth, or we could increase the verification depth up to 30%, when performing verification within the same time limi

    Symbolic automata constraint solving

    No full text
    Abstract. Constraints over regular and context-free languages are common in the context of string-manipulating programs. Efficient solving of such constraints, often in combination with arithmetic and other theories, has many useful applications in program analysis and testing. We introduce and evaluate a method for symbolically expressing and solving constraints over automata, including subset constraints. Our method uses techniques present in the state-of-the-art SMT solver Z3.

    Reverse Engineering Architectural Feature Models

    Get PDF
    International audienceReverse engineering the variability of an existing system is a challenging activity. The architect knowledge is essential to identify variation points and explicit constraints between features, for instance in feature models (FMs), but the manual creation of FMs is both timeconsuming and error-prone. On a large scale, it is very difficult for an architect to guarantee that the resulting FM ensures a safe composition of the architectural elements when some features are selected. In this paper, we present a comprehensive, tool supported process for reverse engineering architectural FMs. We develop automated techniques to extract and combine different variability descriptions of an architecture. Then, alignment and reasoning techniques are applied to integrate the architect knowledge and reinforce the extracted FM. We illustrate the reverse engineering process when applied to a representative software system, FraSCAti, and we report on our experience in this context
    corecore