216 research outputs found

    Synthesis and Stochastic Assessment of Cost-Optimal Schedules

    Get PDF
    We present a novel approach to synthesize good schedules for a class of scheduling problems that is slightly more general than the scheduling problem FJm,a|gpr,r_j,d_j|early/tardy. The idea is to prime the schedule synthesizer with stochastic information more meaningful than performance factors with the objective to minimize the expected cost caused by storage or delay. The priming information is obtained by stochastic simulation of the system environment. The generated schedules are assessed again by simulation. The approach is demonstrated by means of a non-trivial scheduling problem from lacquer production. The experimental results show that our approach achieves in all considered scenarios better results than the extended processing times approach

    Discrete-time rewards model-checked

    Get PDF
    This paper presents a model-checking approach for analyzing discrete-time Markov reward models. For this purpose, the temporal logic probabilistic CTL is extended with reward constraints. This allows to formulate complex measures ā€“ involving expected as well as accumulated rewards ā€“ in a precise and succinct way. Algorithms to efficiently analyze such formulae are introduced. The approach is illustrated by model-checking a probabilistic cost model of the IPv4 zeroconf protocol for distributed address assignment in ad-hoc networks

    Immunisation with ā€˜naĆÆve' syngeneic dendritic cells protects mice from tumour challenge

    Get PDF
    Dendritic cells (DCs) ā€˜pulsed' with an appropriate antigen may elicit an antitumour immune response in mouse models. However, while attempting to develop a DC immunotherapy protocol for the treatment of breast cancer based on the tumour-associated MUC1 glycoforms, we found that unpulsed DCs can affect tumour growth. Protection from RMA-MUC1 tumour challenge was achieved in C57Bl/6 MUC1 transgenic mice by immunising with syngeneic DCs pulsed with a MUC1 peptide. However, unpulsed DCs gave a similar level of protection, making it impossible to evaluate the effect of immunisation of mice with DCs pulsed with the specific peptide. Balb/C mice could also be protected from tumour challenge by immunisation with unpulsed DCs prior to challenge with murine mammary tumour cells (410.4) or these cells transfected with MUC1 (E3). Protection was achieved with as few as three injections of 50ā€‰000 naĆÆve DCs per mouse per week, was not dependent on injection route, and was not specific to cell lines expressing human MUC1. However, the use of Rag2-knockout mice demonstrated that the adaptive immune response was required for tumour rejection. Injection of unpulsed DCs into mice bearing the E3 tumour slowed tumour growth. In vitro, production of IFN-Ī³ and IL-4 was increased in splenic cells isolated from mice immunised with DCs. Depleting CD4 T cells in vitro partially decreased cytokine production by splenocytes, but CD8 depletion had no effect. This paper shows that naĆÆve syngeneic DCs may induce an antitumour immune response and has implications for DC immunotherapy preclinical and clinical trials

    Talking quiescence: a rigorous theory that supports parallel composition, action hiding and determinisation

    Get PDF
    The notion of quiescence - the absence of outputs - is vital in both behavioural modelling and testing theory. Although the need for quiescence was already recognised in the 90s, it has only been treated as a second-class citizen thus far. This paper moves quiescence into the foreground and introduces the notion of quiescent transition systems (QTSs): an extension of regular input-output transition systems (IOTSs) in which quiescence is represented explicitly, via quiescent transitions. Four carefully crafted rules on the use of quiescent transitions ensure that our QTSs naturally capture quiescent behaviour. We present the building blocks for a comprehensive theory on QTSs supporting parallel composition, action hiding and determinisation. In particular, we prove that these operations preserve all the aforementioned rules. Additionally, we provide a way to transform existing IOTSs into QTSs, allowing even IOTSs as input that already contain some quiescent transitions. As an important application, we show how our QTS framework simplifies the fundamental model-based testing theory formalised around ioco.Comment: In Proceedings MBT 2012, arXiv:1202.582

    A Hierarchy of Scheduler Classes for Stochastic Automata

    Get PDF
    Stochastic automata are a formal compositional model for concurrent stochastic timed systems, with general distributions and non-deterministic choices. Measures of interest are defined over schedulers that resolve the nondeterminism. In this paper we investigate the power of various theoretically and practically motivated classes of schedulers, considering the classic complete-information view and a restriction to non-prophetic schedulers. We prove a hierarchy of scheduler classes w.r.t. unbounded probabilistic reachability. We find that, unlike Markovian formalisms, stochastic automata distinguish most classes even in this basic setting. Verification and strategy synthesis methods thus face a tradeoff between powerful and efficient classes. Using lightweight scheduler sampling, we explore this tradeoff and demonstrate the concept of a useful approximative verification technique for stochastic automata

    Explicit Model Checking of Very Large MDP using Partitioning and Secondary Storage

    Full text link
    The applicability of model checking is hindered by the state space explosion problem in combination with limited amounts of main memory. To extend its reach, the large available capacities of secondary storage such as hard disks can be exploited. Due to the specific performance characteristics of secondary storage technologies, specialised algorithms are required. In this paper, we present a technique to use secondary storage for probabilistic model checking of Markov decision processes. It combines state space exploration based on partitioning with a block-iterative variant of value iteration over the same partitions for the analysis of probabilistic reachability and expected-reward properties. A sparse matrix-like representation is used to store partitions on secondary storage in a compact format. All file accesses are sequential, and compression can be used without affecting runtime. The technique has been implemented within the Modest Toolset. We evaluate its performance on several benchmark models of up to 3.5 billion states. In the analysis of time-bounded properties on real-time models, our method neutralises the state space explosion induced by the time bound in its entirety.Comment: The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-24953-7_1

    Electric-field-induced alignment of electrically neutral disk-like particles: modelling and calculation

    Get PDF
    This work reveals a torque from electric field to electrically neutral flakes that are suspended in a higher electrical conductive matrix. The torque tends to rotate the particles toward an orientation with its long axis parallel to the electric current flow. The alignment enables the anisotropic properties of tiny particles to integrate together and generate desirable macroscale anisotropic properties. The torque was obtained from thermodynamic calculation of electric current free energy at various microstructure configurations. It is significant even when the electrical potential gradient becomes as low as 100 v/m. The changes of electrical, electroplastic and thermal properties during particles alignment were discussed

    Symbolic Verification and Strategy Synthesis for Linearly-Priced Probabilistic Timed Automata

    Get PDF
    Probabilistic timed automata are a formalism for modelling systems whose dynamics includes probabilistic, nondeterministic and timed aspects including real-time systems. A variety of techniques have been proposed for the analysis of this formalism and successfully employed to analyse, for example, wireless communication protocols and computer security systems. Augmenting the model with prices (or, equivalently, costs or rewards) provides a means to verify more complex quantitative properties, such as the expected energy usage of a device or the expected number of messages sent during a protocolā€™s execution. However, the analysis of these properties on probabilistic timed automata currently relies on a technique based on integer discretisation of real-valued clocks, which can be expensive in some cases. In this paper, we propose symbolic techniques for verification and optimal strategy synthesis for priced probabilistic timed automata which avoid this discretisation. We build upon recent work for the special case of expected time properties, using value iteration over a zone-based abstraction of the model
    • ā€¦
    corecore