259 results on '"Reachability problem"'
Search Results
2. On the power of membrane dissolution in polarizationless P systems with active membranes.
- Author
-
Gazdag, Zsolt and Hajagos, Károly
- Subjects
- *
PROBLEM solving , *UNIFORMITY - Abstract
It is known that dissolution rules are necessary in polarizationless P systems with active membranes to solve problems beyond AC 0 using reasonable tight uniformity conditions (Murphy and Woods, Fundam Inf Series 134:129–152, 2014). On the other hand, no solutions of such problems exist using only dissolution rules. In this paper, we show that the NL -complete reachability problem can be solved in polynomial time by polarizationless P systems with active membranes using only dissolution rules under a suitable uniformity condition. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Continuous One-counter Automata.
- Author
-
BLONDIN, MICHAEL, LEYS, TIM, MAZOWIECKI, FILIP, OFFTERMATT, PHILIP, and PÉREZ, GUILLERMO
- Subjects
POLYNOMIAL time algorithms - Abstract
We study the reachability problem for continuous one-counter automata, COCA for short. In such automata, transitions are guarded by upper- and lower-bound tests against the counter value. Additionally, the counter updates associated with taking transitions can be (non-deterministically) scaled down by a nonzero factor between zero and one. Our three main results are as follows: we prove (1) that the reachability problem for COCA with global upper- and lower-bound tests is in NC²; (2) that, in general, the problem is decidable in polynomial time; and (3) that it is NP-complete for COCA with parametric counter updates and bound tests. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Intrinsic universality in automata networks III: On symmetry versus asynchrony.
- Author
-
Ríos-Wilson, Martín and Theyssier, Guillaume
- Subjects
- *
BOOLEAN networks , *COMPUTATIONAL complexity , *SYMMETRY , *FORECASTING - Abstract
An automata network is a finite assembly of interconnected entities endowed with a set of local maps defined over a common finite alphabet. These relationships are represented through an interaction graph. Together with the local functions, an assignment known as an update scheme directs the evolution of the network by updating specific subsets of entities at discrete time steps. Despite the scrutiny of interaction graphs and update schemes, their profound impact on automata network dynamics remains largely open. This work investigates the intricate interplay between these aspects, with a focus on how update schemes can counterbalance constraints stemming from symmetric local interactions. This paper is the third of a series about intrinsic universality, a notion that assesses both dynamical and computational complexity, encompassing transient behaviors, attractors, and prediction or reachability problems. We consider four update modes—parallel, block-sequential, local clocks, and general periodic— along with several families of symmetric signed conjunctive boolean networks defined by local constraints on signs. Our main result is to show a diagonal complexity leap in this two-dimensional landscape: the stronger the local constraints the higher the level of asynchrony required to obtain intrinsic universality or increase in complexity. We also show how in some cases asynchronism allows to simulate directed interactions from undirected ones with the same local rules. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Intrinsic universality in automata networks I: Families and simulations.
- Author
-
Ríos-Wilson, Martín and Theyssier, Guillaume
- Subjects
- *
STATISTICAL decision making , *CELLULAR automata , *FAMILIES , *COMPUTATIONAL complexity , *ORBITS (Astronomy) - Abstract
An automata network (AN) is a finite graph where each node holds a state from a finite alphabet and is equipped with a local map defining the evolution of the state of the node depending on its neighbors. They are studied both from the dynamical and the computational complexity point of view. Inspired from well-established notions in the context of cellular automata, we develop a theory of intrinsic simulations and universality for families of automata networks. We establish many consequences of intrinsic universality in terms of complexity of orbits (periods of attractors, transients, etc) as well as hardness of the standard well-studied decision problems for automata networks (short/long term prediction, reachability, etc). In the way, we prove orthogonality results for these problems: the hardness of a single one does not imply hardness of the others, while intrinsic universality implies hardness of all of them. We also compare our notions of universality to intrinsic universality of cellular automata. This paper is the first of a series of three: in the second one, we develop a proof technique to establish intrinsic universality based on an operation of glueing; in the third one we study the effect of update schedules on intrinsic universality for concrete symmetric families of automata networks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Robot Arm Reconfiguration to Minimization Moving Parts
- Author
-
A. Nourollah and N. Behzadpour
- Subjects
formal modeling ,robot arm ,linkage reconfiguration ,reachability problem ,computational geometry ,Computer engineering. Computer hardware ,TK7885-7895 ,Science - Abstract
Background and Objectives: This paper presents a new optimization problem in the field of linkage reconfiguration. This is the problem of minimizing moving parts of a given robot arm for positioning the end effector of the given robot arm at the given target point as well as minimizing the movement of the movable parts. Methods: Initially, formal modeling is accomplished by minimizing the movement problem. At this time, a criterion called AM (Arithmetic Measure) is introduced, and this criterion is used to quantify the motion of the linkage. Afterward, it is indicated that the presented problem is an NP-Hard problem. Consequently, a greedy heuristic algorithm is presented to minimize the movement of the robot's moving components. After identifying the moving components and the movement of these parts, an algorithm is provided to determine the final configuration of the robot arm. Results: The results indicate that the discussed model successfully reduced the moving parts of the robot arm. Moreover, the results show that the proposed approach fulfills the goal of minimization of the linkage components. Furthermore, this method leads to erosion of arm, reduces energy consumption and the required parameters and variables for calculating the final configuration of the linkages. Conclusion: The mentioned algorithm solves the problem by mapping the robot arm with an arbitrary number of links to a robot with a single link or two links. The proposed heuristic approach requires O(n2) time using O(n) space.======================================================================================================Copyrights©2018 The author(s). This is an open access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, as long as the original authors and source are cited. No permission is required from the authors or the publishers.======================================================================================================
- Published
- 2018
- Full Text
- View/download PDF
7. Static Analysis and Stochastic Search for Reachability Problem.
- Author
-
Chai, Xinwei, Ribeiro, Tony, Magnin, Morgan, Roux, Olivier, and Inoue, Katsumi
- Subjects
BIOLOGICAL models ,MACHINE theory ,CHECKERS ,STOCHASTIC analysis - Abstract
This paper focuses on a major improvement on the analysis of reachability properties in large-scale dynamical biological models. To tackle such models, where classical model checkers fail due to state space explosion led by exhaustive search. Alternative static analysis approaches have been proposed, but they may also fail in certain cases due to non-exhaustive search. In this paper, we introduce a hybrid approach ASPReach, which combines static analysis and stochastic search to break the limits of both approaches. We tackle this issue on a modeling framework we recently introduced, Asynchronous Binary Automata Network (ABAN). We show that ASPReach is able to analyze efficiently some reachability properties which could not be solved by existing methods. We studied also various cases from biological literature, emphasizing the merits of our approach in terms of conclusiveness and performance. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
8. Fuzzy Pushdown Termination Games.
- Author
-
Pan, Haiyu, Song, Fu, Cao, Yongzhi, and Qian, Junyan
- Subjects
FUZZY systems ,GAMES ,MACHINE theory ,TRIANGULAR norms ,FUZZY sets - Abstract
The computational study on finite/infinite-state systems, probabilistic systems, and finite-state fuzzy systems, has received much attention recently. In contrast, there are very few results for algorithmic analysis of infinite-state fuzzy systems. In this paper, we introduce fuzzy pushdown termination games (FPDTGs), which are an extension of fuzzy pushdown automata with a game feature and can serve as a formal model of infinite-state fuzzy systems. We investigate some computational issues of the games under termination objectives for two players: the goal of player-1 is to maximize the truth value of eventually terminating at some given configurations with the empty stack, while player-2 aims at the opposite. Some interesting results are obtained. For example, we show that both players have optimal memoryless strategies and the same value. The problem of computing the value can be solved in exponential time when the triangular norm is chosen as the minimum one. Furthermore, we present efficient algorithms for computing the values of two special subclasses of FPDTGs. The potential for practical use of our model is demonstrated by a case study on a manufacturing system. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
9. SMPT: A Testbed for Reachability Methods in Generalized Petri Nets
- Author
-
Silvano Dal Zilio, Nicolas Amat, Équipe Verification de Systèmes Temporisés Critiques (LAAS-VERTICS), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), and Université de Toulouse (UT)
- Subjects
FOS: Computer and information sciences ,Model checking ,Reachability problem ,Computer Science - Logic in Computer Science ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,Petri nets ,Logic in Computer Science (cs.LO) - Abstract
SMPT (for Satisfiability Modulo Petri Net) is a model checker for reachability problems in Petri nets. It started as a portfolio of methods to experiment with symbolic model checking, and was designed to be easily extended. Some distinctive features are its ability to benefit from structural reductions and to generate verdict certificates. Our tool is quite mature and performed well compared to other state-of-the-art tools in the Model Checking Contest., FM 2023 - 25th International Symposium on Formal Methods,, Mar 2023, L{\"u}beck, Germany
- Published
- 2023
- Full Text
- View/download PDF
10. Witness Runs for Counter Machines : (Abstract)
- Author
-
Barrett, Clark, Demri, Stéphane, Deters, Morgan, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Goebel, Randy, editor, Siekmann, Jörg, editor, Wahlster, Wolfgang, editor, Galmiche, Didier, editor, and Larchey-Wendling, Dominique, editor
- Published
- 2013
- Full Text
- View/download PDF
11. Teaching Formal Models of Concurrency Specification and Analysis
- Author
-
N. V. Shilov
- Subjects
concurrency and parallelism ,formal methods ,formal models ,petri nets ,calculi for communicating systems ,labeled transition systems ,reachability problem ,temporal logic ,model checking ,Information technology ,T58.5-58.64 - Abstract
There is a widespread and rapidly growing interest to the parallel programming nowadays. This interest is based on availability of supercomputers, computer clusters and powerful graphic processors for computational mathematics and simulation. MPI, OpenMP, CUDA and other technologies provide opportunity to write C and FORTRAN code for parallel speed-up of execution without races for resources. Nevertheless concurrency issues (like races) are still very important for parallel systems in general and distributed systems in particular. Due to this reason, there is a need of research, study and teaching of formal models of concurrency and methods of distributed system verification.The paper presents an individual experience with teaching Formal Models of Concurrency as a graduate elective course for students specializing in high-performance computing. First it sketches course background, objectives, lecture plan and topics. Then the paper presents how to formalize (i.e. specify) a reachability puzzle in semantic, syntactic and logic formal models, namely: in Petri nets, in a dialect of Calculus of Communicating Systems (CCS) and in Computation Tree Logic (CTL). This puzzle is a good educational example to present specifics of different formal notations.The article is published in the author’s wording.
- Published
- 2015
- Full Text
- View/download PDF
12. CPAchecker with Sequential Combination of Explicit-Value Analyses and Predicate Analyses : (Competition Contribution)
- Author
-
Löwe, Stefan, Mandrykin, Mikhail, Wendler, Philipp, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Ábrahám, Erika, editor, and Havelund, Klaus, editor
- Published
- 2014
- Full Text
- View/download PDF
13. Automatic Reconfiguration of Untimed Discrete-Event Systems
- Author
-
W. M. Wonham and Matin Macktoobian
- Subjects
Supervisory control theory ,0209 industrial biotechnology ,Supervisor ,Reachability problem ,Backtracking ,Computer science ,020208 electrical & electronic engineering ,Control reconfiguration ,Systems and Control (eess.SY) ,02 engineering and technology ,Electrical Engineering and Systems Science - Systems and Control ,Dynamic programming ,020901 industrial engineering & automation ,Supervisory control ,Reachability ,Control theory ,FOS: Electrical engineering, electronic engineering, information engineering ,0202 electrical engineering, electronic engineering, information engineering - Abstract
This work introduces a general formulation of the reconfiguration problem for untimed discrete-event systems (DES), which can be treated directly by supervisory control theory (SCT). To model the reconfiguration requirements we introduce the concept of reconfiguration specification (RS); here reconfiguration events (RE) are introduced to force a transition from one system configuration to another. Standard SCT synthesis is employed to obtain a reconfiguration supervisor (RSUP) in which designated states serve as the source states for RE. The reconfiguration problem itself is formulated as that of establishing guaranteed finite reachability of a desired RE source state in RSUP from the current state in RSUP at which a change in configuration is commanded by an external user. The solvability (or otherwise) of this reachability problem is established by backtracking as in standard dynamic programming., 2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)
- Published
- 2022
14. Algorithms of reduced complexity to design control sequences for untimed Petri nets in varying and uncertain environments.
- Author
-
Lefebvre, Dimitri
- Abstract
Petri nets have been widely used for the modelling, analysis, control and optimization of discrete event systems with shared resources in the domains of engineering. This article concerns the design of control sequences for such systems modelled with untimed Petri nets. The aim of the controller is to incrementally compute sequences of transition firings with minimal size. Such sequences aim to move the marking from an initial value to a reference value. The resulting trajectory must avoid some forbidden markings and limit as possible the exploration of non-promising branches. For this purpose, the approach explores a small part of the reachability graph in the neighbourhood of the current marking. Then from the explored markings, it estimates a distance to the reference. The main contributions are (a) to reduce the explored part of the reachability graph according to a double limitation in breadth and in depth in order to provide solutions with a low computational effort; (b) to provide conditions to ensure the converge and optimality of the proposed algorithms and derive necessary and sufficient conditions for reachability; and (c) to include the firing sequence design in a global control schema suitable for reactive scheduling problems in uncertain and perturbed environments. The main application concerns deadlock-free scheduling problems in the domain of flexible manufacturing systems, but the approach is also applicable for systems in computer science and transportation. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
15. A LOAD-BUFFER SEMANTICS FOR TOTAL STORE ORDERING.
- Author
-
ABDULLA, PAROSH AZIZ, ATIG, MOHAMED FAOUZI, BOUAJJANI, AHMED, and TUAN PHONG NGO
- Subjects
SEMANTICS ,CODING theory ,COMPUTER systems ,PARAMETRIC modeling ,AUTOMATIC differentiation - Abstract
We address the problem of verifying safety properties of concurrent programs running over the Total Store Order (TSO) memory model. Known decision procedures for this model are based on complex encodings of store buffers as lossy channels. These procedures assume that the number of processes is fixed. However, it is important in general to prove the correctness of a system/algorithm in a parametric way with an arbitrarily large number of processes. In this paper, we introduce an alternative (yet equivalent) semantics to the classical one for the TSO semantics that is more amenable to efficient algorithmic verification and for the extension to parametric verification. For that, we adopt a dual view where load buffers are used instead of store buffers. The ow of information is now from the memory to load buffers. We show that this new semantics allows (1) to simplify drastically the safety analysis under TSO, (2) to obtain a spectacular gain in efficiency and scalability compared to existing procedures, and (3) to extend easily the decision procedure to the parametric case, which allows obtaining a new decidability result, and more importantly, a verification algorithm that is more general and more efficient in practice than the one for bounded instances. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
16. Mixing Lossy and Perfect Fifo Channels : (Extended Abstract)
- Author
-
Chambart, P., Schnoebelen, Ph., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, van Breugel, Franck, editor, and Chechik, Marsha, editor
- Published
- 2008
- Full Text
- View/download PDF
17. Rewriting Systems with Data : A Framework for Reasoning About Systems with Unbounded Structures over Infinite Data Domains
- Author
-
Bouajjani, Ahmed, Habermehl, Peter, Jurski, Yan, Sighireanu, Mihaela, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Csuhaj-Varjú, Erzsébet, editor, and Ésik, Zoltán, editor
- Published
- 2007
- Full Text
- View/download PDF
18. Reachability-Time Games on Timed Automata : (Extended Abstract)
- Author
-
Jurdziński, Marcin, Trivedi, Ashutosh, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Arge, Lars, editor, Cachin, Christian, editor, Jurdziński, Tomasz, editor, and Tarlecki, Andrzej, editor
- Published
- 2007
- Full Text
- View/download PDF
19. Formal Reachability Analysis for Multi-Agent Reinforcement Learning Systems
- Author
-
Jun Peng, Shuqiu Li, Xiaoyan Wang, and Bing Li
- Subjects
Theoretical computer science ,General Computer Science ,Reachability problem ,Computer science ,Semantics (computer science) ,multi-role strategy logic ,General Engineering ,Solver ,Multi-agent reinforcement learning ,Test case ,Reachability ,Reinforcement learning ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,verification ,Formal verification ,Integer programming ,mixed integer linear program ,lcsh:TK1-9971 - Abstract
Reachability analysis is one of the most basic and challenging problems in verification. We investigate this problem in multi-agent reinforcement learning (MARL) system by transforming the reachability analysis to decision-making problem tackled by mixed integer linear programming (MILP) solver Gurobi. We define syntax and semantics for multi-role strategy logic (mrSL) which is used to describe the reachability specification. The logic mrSL is a variant of SL to express properties, which provide a holistic perspective to describe reachability properties instead of specifying a specific agent reaches a certain state in the MARL system. And the algorithms to translate reachability property into MILP constraints are provided. A tool called MAReachAnalysis is introduced, which uses Gurobi to solve the corresponding reachability problem and evaluate it on the predator-prey task of multi-agent deep deterministic policy gradient (MADDPG) example, discussion of the experimental results obtained on a range of test cases.
- Published
- 2021
20. Towards a Notion of Distributed Time for Petri Nets : Extended Abstract
- Author
-
Nielsen, Mogens, Sassone, Vladimiro, Srba, Jiří, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Colom, José-Manuel, editor, and Koutny, Maciej, editor
- Published
- 2001
- Full Text
- View/download PDF
21. Liveness Verification of Reversal-Bounded Multicounter Machines with a Free Counter : Extended Abstract
- Author
-
Dang, Zhe, Ibarra, Oscar H., Pietro, Pierluigi San, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Hariharan, Ramesh, editor, Vinay, V., editor, and Mukund, Madhavan, editor
- Published
- 2001
- Full Text
- View/download PDF
22. A Measure of the Non-Determinacy of a Dynamic Neighborhood Model.
- Author
-
Shmyrin, Anatoliy and Sedykh, Irina
- Subjects
DYNAMIC models ,DYNAMIC simulation - Abstract
In this paper we define a non-deterministic dynamic neighborhood model. As a special case, a linear neighborhood model is considered. When a non-deterministic neighborhood model functions, it is possible to introduce a restriction on the number of active layers, which will allow the variation of the non-determinism of the model at each moment of time. We give the notion of the non-determinacy measure and prove that it has the properties of a probability measure. We formulate the problem of reachability with partially specified parameters, layer priorities, and the non-determinacy measure. An algorithm for solving the attainability problem for a neighborhood model with variable indeterminacy and layer priorities is presented. An example of its solution is shown, which shows that when the priorities are compared and the measure of non-determinism is used, the solution of the problem can be obtained more quickly than by a method that does not use priorities. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
23. An Algorithm Constructing the Semilinear Post for 2-Dim Reset/Transfer VASS : Extended Abstract
- Author
-
Finkel, A., Sutre, G., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Nielsen, Mogens, editor, and Rovan, Branislav, editor
- Published
- 2000
- Full Text
- View/download PDF
24. Revisiting Reachability in Polynomial Interrupt Timed Automata
- Author
-
Serge Haddad, Béatrice Bérard, Modélisation et Vérification (MoVe), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Laboratoire Spécification et Vérification (LSV), Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Ecole Normale Supérieure Paris-Saclay (ENS Paris Saclay), Laboratoire Méthodes Formelles (LMF), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Ecole Normale Supérieure Paris-Saclay (ENS Paris Saclay), Modeling and Exploitation of Interaction and Concurrency (MEXICO), Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Méthodes Formelles (LMF), and Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Ecole Normale Supérieure Paris-Saclay (ENS Paris Saclay)-CentraleSupélec-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Ecole Normale Supérieure Paris-Saclay (ENS Paris Saclay)
- Subjects
Discrete mathematics ,Polynomial ,Computer science ,Reachability problem ,2-EXPTIME ,020208 electrical & electronic engineering ,EXPSPACE ,020207 software engineering ,02 engineering and technology ,Complexity ,Computer Science Applications ,Theoretical Computer Science ,Cylindrical algebraic decomposition ,Interrupt timed automata ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Reachability ,Computer Science::Logic in Computer Science ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,Interrupt ,Reachability problems ,Computer Science::Formal Languages and Automata Theory ,Information Systems ,PSPACE - Abstract
International audience; Polynomial Interrupt Timed Automata (PolITA) are finite automata with clocks organized along hierarchical levels. These clocks are equipped with an interruption mechanism, well suited to the modeling of real-time operating systems. Moreover, transitions between states contain polynomial guards and updates. The reachability problem in this class is known to be in 2EXPTIME with a decision procedure based on the cylindrical algebraic decomposition. We improve this complexity to EXPSPACE mainly using a combinatorial argument and we include a reduction leading to a PSPACE lower bound.
- Published
- 2022
- Full Text
- View/download PDF
25. Polynomial Time Algorithm for ARRIVAL on Tree-Like Multigraphs
- Author
-
Auger, David, Coucheney, Pierre, and Duhazé, Loric
- Subjects
FOS: Computer and information sciences ,Game Theory ,Computer Science - Computer Science and Game Theory ,Computer Science - Data Structures and Algorithms ,Rotor-routing ,Rotor Walk ,Data Structures and Algorithms (cs.DS) ,Reachability Problem ,Tree-like Multigraph ,F.2.2 ,Mathematics of computing ,Computer Science and Game Theory (cs.GT) ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
A rotor walk in a directed graph can be thought of as a deterministic version of a Markov Chain, where a pebble moves from vertex to vertex following a simple rule until a terminal vertex, or sink, has been reached. The ARRIVAL problem, as defined by Dohrau et al. [Dohrau et al., 2017], consists in determining which sink will be reached. While the walk itself can take an exponential number of steps, this problem belongs to the complexity class NP ∩ co-NP without being known to be in P. In this work, we define a class of directed graphs, namely tree-like multigraphs, which are multigraphs having the global shape of an undirected tree. We prove that in this class, ARRIVAL can be solved in almost linear time, while the number of steps of a rotor walk can still be exponential. Then, we give an application of this result to solve some deterministic analogs of stochastic models (e.g., Markovian decision processes, Stochastic Games)., LIPIcs, Vol. 241, 47th International Symposium on Mathematical Foundations of Computer Science (MFCS 2022), pages 12:1-12:14
- Published
- 2022
- Full Text
- View/download PDF
26. Improved Ackermannian Lower Bound for the Petri Nets Reachability Problem
- Author
-
Lasota, S��awomir
- Subjects
FOS: Computer and information sciences ,Computer Science - Computation and Language ,Formal Languages and Automata Theory (cs.FL) ,vector addition systems ,reachability problem ,Theory of computation ��� Concurrency ,Computer Science - Formal Languages and Automata Theory ,Petri nets ,Theory of computation ��� Verification by model checking ,Theory of computation ��� Logic and verification ,Computation and Language (cs.CL) - Abstract
Petri nets, equivalently presentable as vector addition systems with states, are an established model of concurrency with widespread applications. The reachability problem, where we ask whether from a given initial configuration there exists a sequence of valid execution steps reaching a given final configuration, is the central algorithmic problem for this model. The complexity of the problem has remained, until recently, one of the hardest open questions in verification of concurrent systems. A first upper bound has been provided only in 2015 by Leroux and Schmitz, then refined by the same authors to non-primitive recursive Ackermannian upper bound in 2019. The exponential space lower bound, shown by Lipton already in 1976, remained the only known for over 40 years until a breakthrough non-elementary lower bound by Czerwi��ski, Lasota, Lazic, Leroux and Mazowiecki in 2019. Finally, a matching Ackermannian lower bound announced this year by Czerwi��ski and Orlikowski, and independently by Leroux, established the complexity of the problem. Our primary contribution is an improvement of the former construction, making it conceptually simpler and more direct. On the way we improve the lower bound for vector addition systems with states in fixed dimension (or, equivalently, Petri nets with fixed number of places): while Czerwi��ski and Orlikowski prove F_k-hardness (hardness for kth level in Grzegorczyk Hierarchy) in dimension 6k, our simplified construction yields F_k-hardness already in dimension 3k+2., LIPIcs, Vol. 219, 39th International Symposium on Theoretical Aspects of Computer Science (STACS 2022), pages 46:1-46:15
- Published
- 2022
- Full Text
- View/download PDF
27. Involved VASS Zoo (Invited Talk)
- Author
-
Czerwiński, Wojciech, Klin, Bartek, Lasota, Sławomir, and Muscholl, Anca
- Subjects
vector addition systems ,Theory of computation → Parallel computing models ,reachability problem ,examples ,low dimensions - Abstract
We briefly describe recent advances on understanding the complexity of the reachability problem for vector addition systems (or equivalently for vector addition systems with states - VASSes). We present a zoo of a few involved VASS examples, which illustrate various aspects of hardness of VASSes and various techniques of proving lower complexity bounds., LIPIcs, Vol. 243, 33rd International Conference on Concurrency Theory (CONCUR 2022), pages 5:1-5:13
- Published
- 2022
- Full Text
- View/download PDF
28. Programs with quasi-stable channels are effectively recognizable : Extended Abstract
- Author
-
Cécé, Gérard, Finkel, Alain, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, and Grumberg, Orna, editor
- Published
- 1997
- Full Text
- View/download PDF
29. Better abstractions for timed automata.
- Author
-
Herbreteau, Frédéric, Srivathsan, B., and Walukiewicz, Igor
- Subjects
- *
MACHINE theory , *STANDARD concentrations (Chemistry) , *SIMULATION methods & models , *CONVEX sets , *REACHABLE sets (Set theory) - Abstract
We study the reachability problem for timed automata. A standard solution to this problem involves computing a search tree whose nodes are abstractions of zones. These abstractions preserve underlying simulation relations on the state space of the automaton. For both effectiveness and efficiency reasons, they are parameterized by the maximal lower and upper bounds ( LU -bounds) occurring in the guards of the automaton. One such abstraction is the a ≼ L U abstraction defined by Behrmann et al. Since this abstraction can potentially yield non-convex sets, it has not been used in implementations. Firstly, we prove that a ≼ L U abstraction is the coarsest abstraction with respect to LU -bounds that is sound and complete for reachability. Secondly, we provide an efficient technique to use the a ≼ L U abstraction to solve the reachability problem. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
30. Affine Extensions of Integer Vector Addition Systems with States
- Author
-
Filip Mazowiecki, Michael Blondin, Mikhail Raskin, and Christoph Haase
- Subjects
FOS: Computer and information sciences ,Monoid ,Computer Science - Logic in Computer Science ,Conjecture ,General Computer Science ,Reachability problem ,Computational Complexity (cs.CC) ,Logic in Computer Science (cs.LO) ,ddc ,Theoretical Computer Science ,Decidability ,Undecidable problem ,Combinatorics ,Matrix (mathematics) ,Computer Science - Computational Complexity ,Reachability ,Affine transformation ,Computer Science::Formal Languages and Automata Theory ,Mathematics - Abstract
We study the reachability problem for affine $\mathbb{Z}$-VASS, which are integer vector addition systems with states in which transitions perform affine transformations on the counters. This problem is easily seen to be undecidable in general, and we therefore restrict ourselves to affine $\mathbb{Z}$-VASS with the finite-monoid property (afmp-$\mathbb{Z}$-VASS). The latter have the property that the monoid generated by the matrices appearing in their affine transformations is finite. The class of afmp-$\mathbb{Z}$-VASS encompasses classical operations of counter machines such as resets, permutations, transfers and copies. We show that reachability in an afmp-$\mathbb{Z}$-VASS reduces to reachability in a $\mathbb{Z}$-VASS whose control-states grow linearly in the size of the matrix monoid. Our construction shows that reachability relations of afmp-$\mathbb{Z}$-VASS are semilinear, and in particular enables us to show that reachability in $\mathbb{Z}$-VASS with transfers and $\mathbb{Z}$-VASS with copies is PSPACE-complete. We then focus on the reachability problem for affine $\mathbb{Z}$-VASS with monogenic monoids: (possibly infinite) matrix monoids generated by a single matrix. We show that, in a particular case, the reachability problem is decidable for this class, disproving a conjecture about affine $\mathbb{Z}$-VASS with infinite matrix monoids we raised in a preliminary version of this paper. We complement this result by presenting an affine $\mathbb{Z}$-VASS with monogenic matrix monoid and undecidable reachability relation.
- Published
- 2021
- Full Text
- View/download PDF
31. The Complexity of Reachability in Affine Vector Addition Systems with States
- Author
-
Michael Blondin and Mikhail Raskin
- Subjects
FOS: Computer and information sciences ,Computer Science - Logic in Computer Science ,General Computer Science ,Computational complexity theory ,Reachability problem ,Computer science ,Formal Languages and Automata Theory (cs.FL) ,Parameterized complexity ,Computer Science - Formal Languages and Automata Theory ,0102 computer and information sciences ,02 engineering and technology ,Computational Complexity (cs.CC) ,01 natural sciences ,Theoretical Computer Science ,Reachability ,Computer Science::Logic in Computer Science ,0202 electrical engineering, electronic engineering, information engineering ,Formal verification ,Discrete mathematics ,Undecidable problem ,Decidability ,Logic in Computer Science (cs.LO) ,ddc ,Computer Science - Computational Complexity ,010201 computation theory & mathematics ,Trichotomy (philosophy) ,020201 artificial intelligence & image processing ,Affine transformation ,Computer Science::Formal Languages and Automata Theory ,Integer (computer science) - Abstract
Vector addition systems with states (VASS) are widely used for the formal verification of concurrent systems. Given their tremendous computational complexity, practical approaches have relied on techniques such as reachability relaxations, e.g., allowing for negative intermediate counter values. It is natural to question their feasibility for VASS enriched with primitives that typically translate into undecidability. Spurred by this concern, we pinpoint the complexity of integer relaxations with respect to arbitrary classes of affine operations. More specifically, we provide a trichotomy on the complexity of integer reachability in VASS extended with affine operations (affine VASS). Namely, we show that it is NP-complete for VASS with resets, PSPACE-complete for VASS with (pseudo-)transfers and VASS with (pseudo-)copies, and undecidable for any other class. We further present a dichotomy for standard reachability in affine VASS: it is decidable for VASS with permutations, and undecidable for any other class. This yields a complete and unified complexity landscape of reachability in affine VASS. We also consider the reachability problem parameterized by a fixed affine VASS, rather than a class, and we show that the complexity landscape is arbitrary in this setting.
- Published
- 2021
32. A Measure of the Non-Determinacy of a Dynamic Neighborhood Model
- Author
-
Anatoliy Shmyrin and Irina Sedykh
- Subjects
dynamic neighborhood models ,non-determinism ,non-determinacy measure ,reachability problem ,Systems engineering ,TA168 ,Technology (General) ,T1-995 - Abstract
In this paper we define a non-deterministic dynamic neighborhood model. As a special case, a linear neighborhood model is considered. When a non-deterministic neighborhood model functions, it is possible to introduce a restriction on the number of active layers, which will allow the variation of the non-determinism of the model at each moment of time. We give the notion of the non-determinacy measure and prove that it has the properties of a probability measure. We formulate the problem of reachability with partially specified parameters, layer priorities, and the non-determinacy measure. An algorithm for solving the attainability problem for a neighborhood model with variable indeterminacy and layer priorities is presented. An example of its solution is shown, which shows that when the priorities are compared and the measure of non-determinism is used, the solution of the problem can be obtained more quickly than by a method that does not use priorities.
- Published
- 2017
- Full Text
- View/download PDF
33. Guessing the Buffer Bound for k-Synchronizability
- Author
-
Cinzia Di Giusto, Laetitia Laversa, Etienne Lozes, Constraints and Applications (C&A), Modèles Discrets pour les Systèmes Complexes (Laboratoire I3S - MDSC), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), and COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)
- Subjects
[INFO.INFO-SC]Computer Science [cs]/Symbolic Computation [cs.SC] ,Sequence ,Reachability problem ,0102 computer and information sciences ,02 engineering and technology ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,01 natural sciences ,[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation ,[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL] ,Communicating automata ,Combinatorics ,[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL] ,010201 computation theory & mathematics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM] ,ComputingMilieux_MISCELLANEOUS ,Mathematics - Abstract
A communicating system is \(k\)-synchronizable if all of the message sequence charts representing the executions can be divided into slices of k sends followed by k receptions. It was previously shown that, for a fixed given k, one could decide whether a communicating system is \(k\)-synchronizable. This result is interesting because the reachability problem can be solved for \(k\)-synchronizable systems. However, the decision procedure assumes that the bound k is fixed. In this paper we improve this result and show that it is possible to decide if such a bound k exists.
- Published
- 2021
- Full Text
- View/download PDF
34. Grounds for Suspicion: Physics-based Early Warnings for Stealthy Attacks on Industrial Control Systems
- Author
-
Bashar Nuseibeh, Liliana Pasquale, Gregory Provan, and Mazen Azzam
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Monitoring ,Reachability problem ,Computer science ,Process (engineering) ,Integrated circuits ,Linear systems ,Computer security ,computer.software_genre ,Early warning systems ,Reachability analysis ,Industrial control systems ,Electrical and Electronic Engineering ,Real-time systems ,Soundness ,Measurement ,Cyber-physical systems ,Industrial control system ,Physics based ,Security ,Benchmark (computing) ,Process control ,Metric (unit) ,Evidence collection ,computer ,Cryptography and Security (cs.CR) - Abstract
Stealthy attacks on Industrial Control Systems can cause significant damage while evading detection. In this paper, instead of focusing on the detection of stealthy attacks, we aim to provide early warnings to operators, in order to avoid physical damage and preserve in advance data that may serve as an evidence during an investigation. We propose a framework to provide grounds for suspicion, i.e. preliminary indicators reflecting the likelihood of success of a stealthy attack. We propose two grounds for suspicion based on the behaviour of the physical process: (i) feasibility of a stealthy attack, and (ii) proximity to unsafe operating regions. We propose a metric to measure grounds for suspicion in real-time and provide soundness principles to ensure that such a metric is consistent with the grounds for suspicion. We apply our framework to Linear Time-Invariant (LTI) systems and formulate the suspicion metric computation as a real-time reachability problem. We validate our framework on a case study involving the benchmark Tennessee-Eastman process. We show through numerical simulation that we can provide early warnings well before a potential stealthy attack can cause damage, while incurring minimal load on the network. Finally, we apply our framework on a use case to illustrate its usefulness in supporting early evidence collection.
- Published
- 2021
35. Flat Petri Nets (Invited Talk)
- Author
-
Jérôme Leroux, Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB), and ANR-17-CE40-0028,BRAVAS,IDEAL-BASED ALGORITHMS FOR VASSES AND WELL-STRUCTURED SYSTEMS(2017)
- Subjects
Sequence ,Flat Systems ,Theoretical computer science ,Reachability problem ,Computer science ,Existential quantification ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,Petri net ,16. Peace & justice ,Formal methods ,01 natural sciences ,Formal Methods ,010201 computation theory & mathematics ,Reachability ,[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Computer Science::Logic in Computer Science ,0202 electrical engineering, electronic engineering, information engineering ,Petri Nets ,Representation (mathematics) ,Presburger Arithmetic ,Presburger arithmetic ,Computer Science::Formal Languages and Automata Theory - Abstract
International audience; Vector addition systems with states (VASS for short), or equivalently Petri nets are one of the most popular formal methods for the representation and the analysis of parallel processes. The central algorithmic problem is reachability: whether from a given initial configuration there exists a sequence of valid execution steps that reaches a given final configuration. This paper provides an overview of results about the reachability problem for VASS related to Presburger arithmetic, by presenting 1) a simple algorithm for deciding the reachability problem based on invariants definable in Presburger arithmetic, 2) the class of flat VASS for computing reachability sets in Presburger arithmetic, and 3) complexity results about the reachability problem for flat VASS.
- Published
- 2021
- Full Text
- View/download PDF
36. Using Transition Invariants for Reachability Analysis of Petri Nets
- Author
-
Alexander Kostin
- Subjects
Discrete mathematics ,Combinatorics ,Reduction (recursion theory) ,Computer science ,Reachability problem ,Reachability ,Stochastic Petri net ,Deadlock ,Petri net ,Tree (graph theory) ,Decidability - Abstract
Petri nets are an important formal paradigm for modeling and analysis of discrete event systems. The related areas of application of Petri nets include deadlock avoidance and prevention, supervisory control, forbidden state detection, different aspects of flexible manufacturing systems, and many others (Zhou & DiCesare, 1993; Holloway et al., 1997; Boel et al., 1995). Quite often, given a discrete-event system, the designer is interested in determining whether the system can transit from an initial state to another, target state as a result of some operations from a predefined set. In terms of Petri nets, the answer to this question is obtained as a solution of a reachability problem. The reachability problem in Petri nets is formulated as follows: for any Petri net PN, with an initial marking M0, and for some other marking M, determine whether the relation M ∈ R(PN, M0) is true, where R(PN, M0) is the reachability set of PN for its initial marking M0 (Murata, 1989). The decidability of the reachability problem has been proved for a number of restricted classes of Petri nets, and there are efficient algorithms for such classes as acyclic Petri nets, marked graphs, and others (Kodama & Murata, 1988; Caprotti et al., 1995; Kostin, 1997). It has been shown that the reachability problem is decidable for generalized Petri nets as well (Mayr, 1984). The fundamental contribution of the paper (Mayr, 1984) is in proving that the reachability problem for generalized Petri nets is decidable. However, being highly important theoretically, the practical use of the algorithm described in that paper is limited. Actually, the algorithm creates a series of so called regular constrained refined graphs, each of which is a generalization of the basic coverability tree. As the author admits, the first refined graph would enumerate the whole reachability set of the given Petri net. In practice, two different approaches are used most often to determine the reachability of a marking in Petri nets. The first approach is based on the creation and investigation of a complete or reduced reachability graph. The main drawback of this approach is a state explosion problem. A closely related technique is the use of stubborn sets. The main purpose of the stubborn sets technique is to choose, for each marking of the net, a set of transitions to fire that is large enough to preserve some desired information about the Petri net, but is as small as possible to get a significant reduction of the resulting reachability graph (Varpaaniemi, 1998). Unfortunately, generation of minimal or reduced reachability graphs in finite state systems is known to be an NP-hard problem (Peled, 1993). If Petri net has no
- Published
- 2021
37. An analytic System with a Computable Hyperbolic Sink Whose Basin of Attraction is Non-Computable.
- Author
-
Graça, Daniel and Zhong, Ning
- Subjects
- *
APPLICATION software , *HYPERBOLIC functions , *MATHEMATICAL proofs , *EMBEDDINGS (Mathematics) , *CONTINUOUS time systems - Abstract
In many applications one is interested in finding the stability regions (basins of attraction) of some stationary states (attractors). In this paper we show that one cannot compute, in general, the basins of attraction of even very regular systems, namely analytic systems with hyperbolic asymptotically stable equilibrium points. To prove the main theorems, a new method for embedding a discrete-time system into a continuous-time system is developed. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
38. enImproved Lower Bounds for Reachability in Vector Addition Systems
- Author
-
Czerwiński, Wojciech, Lasota, Sławomir, Orlikowski, Łukasz, Bansal, Nikhil, Merelli, Emanuela, and Worrell, James
- Subjects
vector addition systems ,Theory of computation → Parallel computing models ,reachability problem ,Petri nets - Abstract
We investigate computational complexity of the reachability problem for vector addition systems (or, equivalently, Petri nets), the central algorithmic problem in verification of concurrent systems. Concerning its complexity, after 40 years of stagnation, a non-elementary lower bound has been shown recently: the problem needs a tower of exponentials of time or space, where the height of tower is linear in the input size. We improve on this lower bound, by increasing the height of tower from linear to exponential. As a side-effect, we obtain better lower bounds for vector addition systems of fixed dimension., LIPIcs, Vol. 198, 48th International Colloquium on Automata, Languages, and Programming (ICALP 2021), pages 128:1-128:15
- Published
- 2021
- Full Text
- View/download PDF
39. Deciding Reachability under Persistent x86-TSO
- Author
-
Ahmed Bouajjani, Parosh Aziz Abdulla, Mohamed Faouzi Atig, K. Narayan Kumar, and Prakash Saivasan
- Subjects
010302 applied physics ,Model checking ,Theoretical computer science ,Computer science ,Reachability problem ,Computer Sciences ,persistent memories ,020207 software engineering ,02 engineering and technology ,01 natural sciences ,model checking ,Decidability ,program verification ,Datavetenskap (datalogi) ,Reachability ,Feature (computer vision) ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,x86 ,Architecture ,Safety, Risk, Reliability and Quality ,TSO memory model ,Software - Abstract
We address the problem of verifying the reachability problem in programs running under the formal model Px86 defined recently by Raad et al. in POPL'20 for the persistent Intel x86 architecture. We prove that this problem is decidable. To achieve that, we provide a new formal model that is equivalent to Px86 and that has the feature of being a well structured system. Deriving this new model is the result of a deep investigation of the properties of Px86 and the interplay of its components.
- Published
- 2021
40. Équations d'évolution avec applications à la dynamique des populations
- Author
-
AFFILI, ELISA, STAR, ABES, Centre d'Analyse et de Mathématique sociales (CAMS), École des hautes études en sciences sociales (EHESS)-Centre National de la Recherche Scientifique (CNRS), Sorbonne Université, Università degli studi (Milan, Italie), Luca Rossi, and Enrico Valdinoci
- Subjects
Reachability problem ,[MATH.MATH-DS]Mathematics [math]/Dynamical Systems [math.DS] ,Comportement asymptotique ,Dynamics of populations ,Fractional derivatives ,[MATH.MATH-DS] Mathematics [math]/Dynamical Systems [math.DS] ,Modèles pour les espèces concurrentes ,Dérivées fractionnaires ,Models for competing species ,Line with fast diffusion ,Ligne à diffusion rapide ,Mathematics - Analysis of PDEs ,Mathematics - Classical Analysis and ODEs ,Problème d'accessibilité ,Asymptomatic behaviour ,Classical Analysis and ODEs (math.CA) ,FOS: Mathematics ,Système de réaction-diffusion ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,Dynamique des populations ,Biological mathematics ,Reaction-diffusion system ,Mathématiques biologiques ,[MATH.MATH-AP] Mathematics [math]/Analysis of PDEs [math.AP] ,Analysis of PDEs (math.AP) - Abstract
The main topic of this thesis is the analysis of evolution equations reflecting issues in ecology and population dynamics. In mathematical modelling, the impact of environmental elements and the interaction between species is read into the role of heterogeneity in equations and interactions in coupled systems. In this direction, we investigate three separate problems. The first problem addresses the evolution of a single population living in a periodic medium with a fast diffusion line; this corresponds to the study of a reaction-diffusion system with equations in different dimensions. Result on asymptotic behaviour are derived through the study of some generalised principal eigenvalues. We find that the presence of the road has no impact on the survival chances of the population, despite the deleterious effect expected from fragmentation. The second study regards a model describing the competition between two populations in a situation of asymmetrically aggressive interactions; this consists in a system of two ODEs. The evolution progresses through two possible scenarios, where only one population survives. The interpretation of one of the parameters as the aggressiveness of the attacker naturally raises questions of controllability. We characterise the set of initial conditions leading to the victory of the attacker through a suitable (possibly time-dependant) strategy. The third part of this thesis analyses the time decay of some evolution equations with classical and fractional time derivatives. Depending on the type of derivative and some degree of non-degeneracy of the spatial operator, quantitative polynomial or exponential estimates are entailed., Le sujet principal de cette thèse est l'analyse des équations de l'évolution reflétant les questions d'écologie et de dynamique des populations. Dans la modélisation mathématique, l'impact des éléments environnementaux et l'interaction entre les espèces est lu dans le rôle de l'hétérogénéité dans les équations et les interactions dans les systèmes couplés. Dans cette direction, nous étudions trois problèmes distincts. Le premier traite l'évolution d'une population vivant dans un milieu périodique avec une ligne de diffusion rapide ; cela correspond à l'étude d'un système de réaction-diffusion avec des équations dans différentes dimensions. Nous obtenons des résultats sur le comportement asymptotique par l'étude de quelques valeurs propres principales généralisées. Nous constatons que la route n'a aucun impact sur les chances de survie de la population. La deuxième étude porte sur un modèle décrivant la compétition entre deux populations dans une situation d'interactions asymétriquement agressives ; il s'agit d'un système de deux EDO. L'évolution progresse à travers deux scénarios possibles, où une seule population survit. L'interprétation d'un des paramètres comme étant l'agressivité de l’attaquant soulève naturellement des questions de contrôlabilité. Nous caractérisons l'ensemble des conditions initiales menant à la victoire par une stratégie appropriée (éventuellement dépendante du temps). La troisième partie de cette thèse analyse la décroissance temporelle de certaines équations d'évolution avec des dérivées temporelles classiques et fractionnaires. Selon le type de dérivée et un certain degré de non-dégénérescence de l'opérateur spatial, des estimations quantitatives polynomiales ou exponentielles sont réalisées.
- Published
- 2021
41. Applying H m Heuristics in Petri Nets Reachability Problem.
- Author
-
Kultz, Rene, Künzle, Luis Allan, and Silva, Fabiano
- Abstract
The problem of reachability in Petri nets has several approaches. The technique that produces better results is known as ˵unfolding″. However, the size of the unfolded net can be exponential with respect to the initial Petri net. This work aims to adapt planning heuristics to guide the construction of the unfolding. The article analyzes the use of heuristics, based on a regression of the goal state, in a progressive planner. Several experimental results were generated. They are analyzed and compared with those obtained with other planners already established. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
42. Reachability Analysis of Stochastic Hybrid Systems by Optimal Control.
- Author
-
Bujorianu, Manuela L., Lygeros, John, and Langerak, Rom
- Abstract
For stochastic hybrid systems, the reachability analysis is an important and difficult problem. In this paper, we prove that, under natural assumptions, reachability analysis can be characterised as an optimal stopping problem. In this way, one can apply numerical methods from optimal control to solve the reachability verification problems. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
43. ADJACENT ORDERED MULTI-PUSHDOWN SYSTEMS.
- Author
-
ATIG, MOHAMED FAOUZI, KUMAR, K. NARAYAN, and SAIVASAN, PRAKASH
- Subjects
- *
COMPUTER multitasking , *COMPUTER programming , *TURING (Computer program language) , *APPROXIMATION theory , *ALGORITHMS , *MATHEMATICAL bounds - Abstract
Multi-pushdown systems are formal models of multi-threaded programs. As they are Turing powerful in their full generality, several decidable subclasses, constituting under-approximations of the original system, have been studied in the recent years. Ordered Multi-Pushdown Systems (OMPDSs) impose an order on the stacks and limit pop actions to the lowest non-empty stack. The control state reachability for OMPDSs is 2-ETIME-COMPLETE. We propose a restriction on OMPDSs, called Adjacent OMPDSs (AOMPDS), where values may be pushed only on the lowest non-empty stack or one of its two neighbours. We describe EXPTIME decision procedures for reachability and LTL model-checking and establish matching lower bounds. We demonstrate the utility of this model as an algorithmic tool via optimal reductions from other models. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
44. Budget-bounded model-checking pushdown systems.
- Author
-
Abdulla, Parosh, Atig, Mohamed, Rezine, Othmane, and Stenman, Jari
- Subjects
MATHEMATICAL models ,SIMULATION methods & models ,OPERATIONS research ,SYSTEMS engineering ,COMPUTER simulation - Abstract
We address the verification problem for concurrent programs modeled as multi-pushdown systems (MPDS). In general, MPDS are Turing powerful and hence come along with undecidability of all basic decision problems. Because of this, several subclasses of MPDS have been proposed and studied in the literature (Atig et al. in LNCS, Springer, Berlin, ; La Torre et al. in LICS, IEEE, ; Lange and Lei in Inf Didact 8, ; Qadeer and Rehof in TACAS, LNCS, Springer, Berlin, ). In this paper, we propose the class of bounded-budget MPDS, which are restricted in the sense that each stack can perform an unbounded number of context switches only if its depth is below a given bound, and a bounded number of context switches otherwise. We show that the reachability problem for this subclass is Pspace-complete and that LTL-model-checking is Exptime-complete. Furthermore, we propose a code-to-code translation that inputs a concurrent program $$P$$ and produces a sequential program $$P'$$ such that running $$P$$ under the budget-bounded restriction yields the same set of reachable states as running $$P'$$ . Moreover, detecting (fair) non-terminating executions in $$P$$ can be reduced to LTL-Model-Checking of $$P'$$ . By leveraging standard sequential analysis tools, we have implemented a prototype tool and applied it on a set of benchmarks, showing the feasibility of our translation. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
45. ϵ-Semantics computations on biological systems.
- Author
-
Casagrande, A., Dreossi, T., Fabriková, J., and Piazza, C.
- Subjects
- *
SEMANTICS , *BIOLOGICAL systems , *PRECISION (Information retrieval) , *MATHEMATICAL models , *HYBRID systems - Abstract
Abstract: The assumption of being able to perform infinite precision measurements does not only lead to undecidability, but it also introduces artifacts in the mathematical models that do not correspond to observable behaviours of systems under study. When bounded spatial regions are involved, such issues can be avoided if arbitrarily small sets of points are not definable in the mathematical setting. ϵ-semantics were introduced in this spirit. In this paper we investigate the use of ϵ-semantics deeper, in the context of reachability analysis of hybrid automata. In particular, we focus on two ϵ-semantics and reason about their computability. We then try our approach on biological model analysis to give evidence about the effectiveness of the methodology. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
46. On the Termination Problem for Probabilistic Higher-Order Recursive Programs
- Author
-
Naoki Kobayashi, Ugo Dal Lago, Charles Grellois, Department of Mathematical Informatics (University of Tokyo), The University of Tokyo (UTokyo), University of Bologna/Università di Bologna, Foundations of Component-based Ubiquitous Systems (FOCUS), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Dipartimento di Informatica - Scienza e Ingegneria [Bologna] (DISI), Alma Mater Studiorum Università di Bologna [Bologna] (UNIBO)-Alma Mater Studiorum Università di Bologna [Bologna] (UNIBO), Logique, Interaction, Raisonnement et Inférence, Complexité, Algèbre (LIRICA), Laboratoire d'Informatique et Systèmes (LIS), Aix Marseille Université (AMU)-Université de Toulon (UTLN)-Centre National de la Recherche Scientifique (CNRS)-Aix Marseille Université (AMU)-Université de Toulon (UTLN)-Centre National de la Recherche Scientifique (CNRS), Kobayashi N., Dal Lago U., Grellois C., Dipartimento di Scienze dell'Informazione [Bologna] (DISI), Alma Mater Studiorum Università di Bologna [Bologna] (UNIBO), Université de Toulon (UTLN)-Centre National de la Recherche Scientifique (CNRS)-Aix Marseille Université (AMU)-Université de Toulon (UTLN)-Centre National de la Recherche Scientifique (CNRS)-Aix Marseille Université (AMU), University of Bologna, Aix Marseille Université (AMU), and Episciences
- Subjects
Model checking ,FOS: Computer and information sciences ,Higher-order program ,Computer Science - Logic in Computer Science ,Theoretical computer science ,Computer science ,Reachability problem ,Markov process ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,symbols.namesake ,higher-order programs ,0202 electrical engineering, electronic engineering, information engineering ,Higher-order recursion schemes, probabilistic computation, model-checking ,Recursion ,Computer Science - Programming Languages ,[INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL] ,Markov chain ,Probabilistic logic ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,Extension (predicate logic) ,model checking ,Undecidable problem ,Logic in Computer Science (cs.LO) ,Probabilistic program ,010201 computation theory & mathematics ,symbols ,probabilistic programs ,020201 artificial intelligence & image processing ,termination probabilities ,Programming Languages (cs.PL) - Abstract
Logical Methods in Computer Science ; Volume 16, Issue 4 ; 1860-5974, In the last two decades, there has been much progress on model checking of both probabilistic systems and higher-order programs. In spite of the emergence of higher-order probabilistic programming languages, not much has been done to combine those two approaches. In this paper, we initiate a study on the probabilistic higher-order model checking problem, by giving some first theoretical and experimental results. As a first step towards our goal, we introduce PHORS, a probabilistic extension of higher-order recursion schemes (HORS), as a model of probabilistic higher-order programs. The model of PHORS may alternatively be viewed as a higher-order extension of recursive Markov chains. We then investigate the probabilistic termination problem -- or, equivalently, the probabilistic reachability problem. We prove that almost sure termination of order-2 PHORS is undecidable. We also provide a fixpoint characterization of the termination probability of PHORS, and develop a sound (but possibly incomplete) procedure for approximately computing the termination probability. We have implemented the procedure for order-2 PHORSs, and confirmed that the procedure works well through preliminary experiments that are reported at the end of the article.
- Published
- 2020
- Full Text
- View/download PDF
47. Near-Quadratic Lower Bounds for Two-Pass Graph Streaming Algorithms
- Author
-
Ran Raz and Sepehr Assadi
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Vertex (graph theory) ,Reachability problem ,010102 general mathematics ,Approximation algorithm ,0102 computer and information sciences ,Directed graph ,Computational Complexity (cs.CC) ,01 natural sciences ,Computer Science - Computational Complexity ,010201 computation theory & mathematics ,Shortest path problem ,Computer Science - Data Structures and Algorithms ,Bipartite graph ,Graph (abstract data type) ,Data Structures and Algorithms (cs.DS) ,0101 mathematics ,Streaming algorithm ,Mathematics ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
We prove that any two-pass graph streaming algorithm for the $s-t$ reachability problem in $n$ -vertex directed graphs requires near-quadratic space of $n^{2-o(1)}$ bits. As a corollary, we also obtain near-quadratic space lower bounds for several other fundamental problems including maximum bipartite matching and (approximate) shortest path in undirected graphs. Our results collectively imply that a wide range of graph problems admit essentially no non-trivial streaming algorithm even when two passes over the input is allowed. Prior to our work, such impossibility results were only known for single-pass streaming algorithms, and the best two-pass lower bounds only ruled out $o(n^{7/6})$ space algorithms, leaving open a large gap between (trivial) upper bounds and lower bounds.
- Published
- 2020
48. Reachability in Two-Dimensional Vector Addition Systems with States: One Test is for Free
- Author
-
Leroux, Jérôme, Sutre, Grégoire, Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB), and ANR-17-CE40-0028,BRAVAS,IDEAL-BASED ALGORITHMS FOR VASSES AND WELL-STRUCTURED SYSTEMS(2017)
- Subjects
Reachability problem ,Formal verification ,Computer Science - Logic in Computer Science ,[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL] ,Counter machine ,Vector addition system ,Infinite-state system ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,Computer Science - Formal Languages and Automata Theory ,Theory of computation → Logic and verification ,Computer Science::Formal Languages and Automata Theory - Abstract
Vector addition system with states is an ubiquitous model of computation with extensive applications in computer science. The reachability problem for vector addition systems is central since many other problems reduce to that question. The problem is decidable and it was recently proved that the dimension of the vector addition system is an important parameter of the complexity. In fixed dimensions larger than two, the complexity is not known (with huge complexity gaps). In dimension two, the reachability problem was shown to be PSPACE-complete by Blondin et al. in 2015. We consider an extension of this model, called 2-TVASS, where the first counter can be tested for zero. This model naturally extends the classical model of one counter automata (OCA). We show that reachability is still solvable in polynomial space for 2-TVASS. As in the work Blondin et al., our approach relies on the existence of small reachability certificates obtained by concatenating polynomially many cycles., Comment: Full version of the paper with the same title and authors in the proceedings of CONCUR 2020
- Published
- 2020
- Full Text
- View/download PDF
49. Probabilistic Timed Automata with One Clock and Initialised Clock-Dependent Probabilities
- Author
-
Jeremy Sproston, University of Turin, Alexey Gotsman, Ana Sokolova, TC 6, and WG 6.1
- Subjects
FOS: Computer and information sciences ,0209 industrial biotechnology ,Computer Science - Logic in Computer Science ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,General Computer Science ,Computer science ,Reachability problem ,Interval Markov chains ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Article ,Theoretical Computer Science ,Computer Science::Hardware Architecture ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,020901 industrial engineering & automation ,Reachability ,[INFO]Computer Science [cs] ,Timed automata ,Time complexity ,Probabilistic model checking ,Probabilistic logic ,Undecidable problem ,Automaton ,Logic in Computer Science (cs.LO) ,010201 computation theory & mathematics ,Markov decision process ,Affine transformation ,Algorithm ,Computer Science::Formal Languages and Automata Theory - Abstract
Part 1: Full Papers; International audience; Clock-dependent probabilistic timed automata extend classical timed automata with discrete probabilistic choice, where the probabilities are allowed to depend on the exact values of the clocks. Previous work has shown that the quantitative reachability problem for clock-dependent probabilistic timed automata with at least three clocks is undecidable. In this paper, we consider the subclass of clock-dependent probabilistic timed automata that have one clock, that have clock dependencies described by affine functions, and that satisfy an initialisation condition requiring that, at some point between taking edges with non-trivial clock dependencies, the clock must have an integer value. We present an approach for solving in polynomial time quantitative and qualitative reachability problems of such one-clock initialised clock-dependent probabilistic timed automata. Our results are obtained by a transformation to interval Markov decision processes.
- Published
- 2020
- Full Text
- View/download PDF
50. Decidability of deterministic process equivalence for finitary deduction systems
- Author
-
Fabián Romero, Yannick Chevalier, Centre National de la Recherche Scientifique - CNRS (FRANCE), Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE), Logique, Interaction, Langue et Calcul (IRIT-LILaC), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Toulouse III - Paul Sabatier (UT3), LabEx CIMI 'Centre International de Mathématiques et d’Informatique' : Institut de Mathématiques de Toulouse - IMT et Institut de Recherche en Informatique de Toulouse - IRIT, Masoud, Daneshtalab and Leporati, Francesco and Mikael, and Sjödin
- Subjects
Theoretical computer science ,formal methods ,Computer science ,Reachability problem ,Parameterized complexity ,0102 computer and information sciences ,02 engineering and technology ,Cryptographic protocols ,01 natural sciences ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,0202 electrical engineering, electronic engineering, information engineering ,Finitary ,[INFO]Computer Science [cs] ,Computer Science::Symbolic Computation ,Equivalence (formal languages) ,Computer Science::Cryptography and Security ,pri- vacy analysis ,Index Terms-Cryptographic protocols ,Formal methods ,Cryptographic protocol ,16. Peace & justice ,Decidability ,Privacy analysis ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,010201 computation theory & mathematics ,Cryptographie et sécurité ,020201 artificial intelligence & image processing ,The Symbolic - Abstract
International audience; Deciding privacy-type properties of deterministic cryptographic protocols such as anonymity and strong secrecy can be reduced to deciding the symbolic equivalence of processes, where each process is described by a set of possible symbolic traces. This equivalence is parameterized by a deduction system that describes which actions and observations an intruder can perform on a running system. We present in this paper a notion of finitary deduction systems. For this class of deduction system, we first reduce the problem of the equivalence of processes with no disequations to the resolution of reachability problem on each symbolic trace of one process, and then testing whether each solution found is solution of a related trace in the other process. We then extend this reduction to the case of generic deterministic finite processes in which symbolic traces may contain disequalities.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.