44 research outputs found

    The Parametric Ordinal-Recursive Complexity of Post Embedding Problems

    Full text link
    Post Embedding Problems are a family of decision problems based on the interaction of a rational relation with the subword embedding ordering, and are used in the literature to prove non multiply-recursive complexity lower bounds. We refine the construction of Chambart and Schnoebelen (LICS 2008) and prove parametric lower bounds depending on the size of the alphabet.Comment: 16 + vii page

    Reachability of Communicating Timed Processes

    Full text link
    We study the reachability problem for communicating timed processes, both in discrete and dense time. Our model comprises automata with local timing constraints communicating over unbounded FIFO channels. Each automaton can only access its set of local clocks; all clocks evolve at the same rate. Our main contribution is a complete characterization of decidable and undecidable communication topologies, for both discrete and dense time. We also obtain complexity results, by showing that communicating timed processes are at least as hard as Petri nets; in the discrete time, we also show equivalence with Petri nets. Our results follow from mutual topology-preserving reductions between timed automata and (untimed) counter automata.Comment: Extended versio

    Explicit connection actions in multiparty session types

    Get PDF
    This work extends asynchronous multiparty session types (MPST) with explicit connection actions to support protocols with op- tional and dynamic participants. The actions by which endpoints are connected and disconnected are a key element of real-world protocols that is not treated in existing MPST works. In addition, the use cases motivating explicit connections often require a more relaxed form of mul- tiparty choice: these extensions do not satisfy the conservative restric- tions used to ensure safety in standard syntactic MPST. Instead, we de- velop a modelling-based approach to validate MPST safety and progress for these enriched protocols. We present a toolchain implementation, for distributed programming based on our extended MPST in Java, and a core formalism, demonstrating the soundness of our approach. We discuss key implementation issues related to the proposed extensions: a practi- cal treatment of choice subtyping for MPST progress, and multiparty correlation of dynamic binary connections

    On computing fixpoints in well-structured regular model checking, with applications to lossy channel systems

    Full text link
    We prove a general finite convergence theorem for "upward-guarded" fixpoint expressions over a well-quasi-ordered set. This has immediate applications in regular model checking of well-structured systems, where a main issue is the eventual convergence of fixpoint computations. In particular, we are able to directly obtain several new decidability results on lossy channel systems.Comment: 16 page

    On the Completeness of Verifying Message Passing Programs under Bounded Asynchrony

    Get PDF
    We address the problem of verifying message passing programs, defined as a set of parallel processes communicating through unbounded FIFO buffers. We introduce a bounded analysis that explores a special type of computations, called k-synchronous. These computations can be viewed as (unbounded) sequences of interaction phases, each phase allowing at most k send actions (by different processes), followed by a sequence of receives corresponding to sends in the same phase. We give a procedure for deciding k-synchronizability of a program, i.e., whether every computation is equivalent (has the same happens-before relation) to one of its k-synchronous computations. We also show that reachability over k-synchronous computations and checking k-synchronizability are both PSPACE-complete. Furthermore, we introduce a class of programs called {\em flow-bounded} for which the problem of deciding whether there exists a k>0 for which the program is k-synchronizable, is decidable

    The variability of refractivity in the atmospheric boundary layer of a tropical island volcano measured by ground-based interferometric radar

    Get PDF
    For 24 h we measured continuously the variability of atmospheric refractivity over a volcano on the tropical island of Montserrat using a ground-based radar interferometer. We observed variations in phase that we interpret as due to changing water vapour on the propagation path between the radar and the volcano and we present them here in the context of the behaviour of the atmospheric boundary layer over the island. The water vapour behaviour was forced by diurnal processes, the passage of a synoptic-scale system and the presence of a plume of volcanic gas. The interferometer collected images of amplitude and phase every minute. From pairs of phase images, interferograms were calculated and analyzed every minute and averaged hourly, together with contemporaneous measurements of zenith delays estimated from a network of 14 GPS receivers. The standard deviation of phase at two sites on the volcano surface spanned a range of about 1–5 radians, the lowest values occurring at night on the lower slopes and the highest values during the day on the upper slopes. This was also reflected in spatial patterns of variability. Two-dimensional profiles of radar-measured delays were modelled using an atmosphere with water vapour content decreasing upwards and water vapour variability increasing upwards. Estimates of the effect of changing water vapour flux from the volcanic plume indicate that it should contribute only a few percent to this atmospheric variability. A diurnal cycle within the lower boundary layer producing a turbulence-dominated mixed layer during the day and stable layers at night is consistent with the observed refractivity

    Composing Communicating Systems, Synchronously

    Get PDF
    Conference moved to 2021 due to covid-19International audienceCommunicating systems are nowadays part of everyday life, yet programming and analysing them is difficult. One of the many reasons for this difficulty is their size, hence compositional approaches are a need. We discuss how to ensure relevant communication properties such as deadlock freedom in a compositional way. The idea is that communicating systems can be composed by taking two of their participants and transforming them into coupled forwarders connecting the two systems. It has been shown that, for asynchronous communications, if the participants are "compatible" then composition satisfies relevant communication properties provided that the single systems satisfy them. We show that such a result changes considerably for synchronous communications. We also discuss a different form of composition, where a unique forwarder is used

    Choreography Automata

    Get PDF
    Online event due to covidInternational audienceAutomata models are well-established in many areas of computer science and are supported by a wealth of theoretical results including a wide range of algorithms and techniques to specify and analyse systems. We introduce choreography automata for the choreographic modelling of communicating systems. The projection of a choreography automaton yields a system of communicating finite-state machines. We consider both the standard asynchronous semantics of communicating systems and a synchronous variant of it. For both, the projections of well-formed automata are proved to be live as well as lock-and deadlock-free
    corecore