44 results on '"Pierre Wolper"'
Search Results
2. COMPUTING CONVEX HULLS BY AUTOMATA ITERATION
- Author
-
François Cantin, Pierre Wolper, and Axel Legay
- Subjects
Convex hull ,Convex analysis ,Discrete mathematics ,Convex polytope ,Computer Science (miscellaneous) ,Convex set ,Convex combination ,Subderivative ,Absolutely convex set ,Orthogonal convex hull ,Mathematics - Abstract
This paper considers the problem of computing the real convex hull of a finite set of n-dimensional integer vectors. The starting point is a finite-automaton representation of the initial set of vectors. The proposed method consists in computing a sequence of automata representing approximations of the convex hull and using extrapolation techniques to compute the limit of this sequence. The convex hull can then be directly computed from this limit in the form of an automaton-based representation of the corresponding set of real vectors. The technique is quite general and has been implemented.
- Published
- 2009
- Full Text
- View/download PDF
3. On the Use of Automata-based Techniques in Symbolic Model Checking
- Author
-
Pierre Wolper and Axel Legay
- Subjects
Model checking ,Infinite set ,Theoretical computer science ,General Computer Science ,Relation (database) ,Programming language ,Computer science ,Abstraction model checking ,computer.software_genre ,Automaton ,Theoretical Computer Science ,Set (abstract data type) ,Regular language ,Iterated function ,computer ,Computer Science(all) - Abstract
Checking infinite-state systems is frequently done by encoding infinite sets of states as regular languages. Computing such a regular representation of, say, the reachable set of states of a system requires acceleration techniques that can finitely compute the effect of an unbounded number of transitions. Among the acceleration techniques that have been proposed, one finds both specific and generic techniques. Specific techniques exploit the particular type of system being analyzed, e.g. a system manipulating queues or integers, whereas generic techniques only assume that the transition relation is represented by a finite-state transducer, which has to be iterated. In this paper, we survey two generic techniques that have been presented in [B. Boigelot and A. Legay and P. Wolper, Iterating Transducers in the Large, Proc. 15th Int. Conf. on Computer Aided Verification, Boulder, USA, Lecture Notes in Computer Science, volume 2725, year 2003, pages 223-235] and [B. Boigelot and A. Legay and P. Wolper, Omega-Regular Model Checking, Proc. 10th Int. Conf. on Tools and and Algorithms for the Construction and Analysis of Systems, Barcelona, Spain, Lecture Notes in Computer Science, volume 2988, year 2004, pages 561-575]. Those techniques build on earlier work, but exploits a number of new conceptual and algorithmic ideas, often induced with the help of experiments, that give it a broad scope, as well as good performance.
- Published
- 2006
- Full Text
- View/download PDF
4. Handling Liveness Properties in (ω-)Regular Model Checking
- Author
-
Ahmed Bouajjani, Pierre Wolper, and Axel Legay
- Subjects
Model checking ,Theoretical computer science ,General Computer Science ,Computation ,Liveness ,Context (language use) ,Abstraction model checking ,Theoretical Computer Science ,Reachability ,(ω–)Regular Model Checking ,State (computer science) ,Cycle detection ,Computer Science(all) ,Mathematics - Abstract
Since the topic emerged several years ago, work on regular model checking has mostly been devoted to the verification of state reachability and safety properties. Though it was known that liveness properties could also be checked within this framework, little has been done about working out the corresponding details, and experimentally evaluating the approach. This paper addresses these issues in the context of regular model checking based on the encoding of states by finite or infinite words. It works out the exact constructions to be used in both cases, and solves the problem resulting from the fact that infinite computations of unbounded configurations might never contain the same configuration twice, thus making cycle detection problematic. Several experiments showing the applicability of the approach were successfully conducted.
- Published
- 2005
- Full Text
- View/download PDF
5. An effective decision procedure for linear arithmetic over the integers and reals
- Author
-
Sébastien Jodogne, Pierre Wolper, and Bernard Boigelot
- Subjects
Discrete mathematics ,Class (set theory) ,Finite-state machine ,General Computer Science ,Logic ,Theoretical Computer Science ,Automaton ,Algebra ,Computational Mathematics ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Integer ,Linear arithmetic ,Quantum finite automata ,Computer Science::Formal Languages and Automata Theory ,Mathematics - Abstract
This article considers finite-automata-based algorithms for handling linear arithmetic with both real and integer variables. Previous work has shown that this theory can be dealt with by using finite automata on infinite words, but this involves some difficult and delicate to implement algorithms. The contribution of this article is to show, using topological arguments, that only a restricted class of automata on infinite words are necessary for handling real and integer linear arithmetic. This allows the use of substantially simpler algorithms, which have been successfully implemented.
- Published
- 2005
- Full Text
- View/download PDF
6. Module Checking
- Author
-
Orna Kupferman, Moshe Y. Vardi, and Pierre Wolper
- Subjects
Model checking ,Open and closed systems in social science ,Programming language ,Computer science ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,Theoretical Computer Science ,Computer Science Applications ,CTL ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,0202 electrical engineering, electronic engineering, information engineering ,computer ,Information Systems - Abstract
In computer system design, we distinguish between closed and open systems. A closed system is a system whose behavior is completely determined by the state of the system. An open system is a system that interacts with its environment and whose behavior depends on this interaction. The ability of temporal logics to describe an ongoing interaction of a reactive program with its environment makes them particularly appropriate for the specification of open systems. Nevertheless, model-checking algorithms used for the verification of closed systems are not appropriate for the verification of open systems. Correct model checking of open systems should check the system with respect to arbitrary environments and should take into account uncertainty regarding the environment. This is not the case with current model-checking algorithms and tools. In this paper we introduce and examine the problem of model checking of open systems (module checking, for short). We show that while module checking and model checking coincide for the linear-time paradigm, module checking is much harder than model checking for the branching-time paradigm. We prove that the problem of module checking is EXPTIME-complete for specifications in CTL and 2EXPTIME-complete for specifications in CTL*. This bad news is also carried over when we consider the program-complexity of module checking. As good news, we show that for the commonly-used fragment of CTL (universal, possibly, and always possibly properties), current model-checking tools do work correctly, or can be easily adjusted to work correctly, with respect to both closed and open systems.
- Published
- 2001
- Full Text
- View/download PDF
7. An automata-theoretic approach to branching-time model checking
- Author
-
Orna Kupferman, Moshe Y. Vardi, and Pierre Wolper
- Subjects
Structure (mathematical logic) ,Model checking ,Finite-state machine ,Theoretical computer science ,Automaton ,Tree (data structure) ,Linear temporal logic ,Artificial Intelligence ,Hardware and Architecture ,Control and Systems Engineering ,Temporal logic ,Algorithm ,Software ,Information Systems ,Optimal decision ,Mathematics - Abstract
Translating linear temporal logic formulas to automata has proven to be an effective approach for implementing linear-time model-checking, and for obtaining many extensions and improvements to this verification method. On the other hand, for branching temporal logic, automata-theoretic techniques have long been thought to introduce an exponential penalty, making them essentially useless for model-checking. Recently, Bernholtz and Grumberg [1993] have shown that this exponential penalty can be avoided, though they did not match the linear complexity of non-automata-theoretic algorithms. In this paper, we show that alternating tree automata are the key to a comprehensive automata-theoretic framework for branching temporal logics. Not only can they be used to obtain optimal decision procedures, as was shown by Muller et al., but, as we show here, they also make it possible to derive optimal model-checking algorithms. Moreover, the simple combinatorial structure that emerges from the automata-theoretic approach opens up new possibilities for the implementation of branching-time model checking and has enabled us to derive improved space complexity bounds for this long-standing problem.
- Published
- 2000
- Full Text
- View/download PDF
8. Constraint-Generating Dependencies
- Author
-
Pierre Wolper, Marianne Baudinet, and Jan Chomicki
- Subjects
Mathematical optimization ,Dependency (UML) ,Computer Networks and Communications ,Applied Mathematics ,Data domain ,0102 computer and information sciences ,02 engineering and technology ,Join dependency ,Decision problem ,01 natural sciences ,Theoretical Computer Science ,Decidability ,Dependency theory (database theory) ,Constraint (information theory) ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Functional dependency ,Mathematics - Abstract
Traditionally, dependency theory has been developed for uninterpreted data. Specifically, the only assumption that is made about the data domains is that data values can be compared for equality. However, data is often interpreted and there can be advantages in considering data as such, for instance, obtaining more compact representations as is done in constraint databases. This paper considers dependency theory in the context of interpreted data. Specifically, it studies constraint-generating dependencies. These are a generalization of equality-generating dependencies where equality requirements are replaced by constraints on an interpreted domain. The main technical results in the paper are a general decision procedure for the implication and consistency problems for constraint-generating dependencies and complexity results for specific classes of such dependencies over given domains. The decision procedure proceeds by reducing the dependency problem to a decision problem for the constraint theory of interest and is applicable as soon as the underlying constraint theory is decidable. The complexity results are, in some cases, directly lifted from the constraint theory; in other cases, optimal complexity bounds are obtained by taking into account the specific form of the constraint decision problem obtained by reducing the dependency implication problem.
- Published
- 1999
- Full Text
- View/download PDF
9. An algorithmic approach for checking closure properties of temporal logic specifications and ω-regular languages
- Author
-
Doron Peled, Thomas Wilke, and Pierre Wolper
- Subjects
General Computer Science ,Concurrency ,Temporal logic ,Semantics ,Theoretical Computer Science ,Decidability ,Equivalence class (music) ,Algebra ,Closure properties ,Linear temporal logic ,Closure (mathematics) ,Formal language ,Equivalence relation ,Computer Science(all) ,PSPACE ,Mathematics - Abstract
In concurrency theory, there are several examples where the interleaved model of concurrency can distinguish between execution sequences which are not significantly different. One such example is sequences that differ from each other by stuttering, i.e., the number of times a state can adjacently repeat. Another example is executions that differ only by the ordering of independently executed events. Considering these sequences as different is semantically rather meaningless. Nevertheless, specification languages that are based on interleaving semantics, such as linear temporal logic (LTL), can distinguish between them. This situation has led to several attempts to define languages that cannot distinguish between such equivalent sequences. In this paper, we take a different approach to this problem: we develop algorithms for deciding if a property cannot distinguish between equivalent sequences, i.e., is closed under the equivalence relation. We focus on properties represented by regular languages, ω-regular languages, or prepositional LTL formulas and show that for such properties there is a wide class of equivalence relations for which determining closure is decidable, in fact is in PSPACE. Hence, checking the closure of a specification is no more difficult than checking satisfiability of a temporal formula. Among the closure properties we are able to handle, one finds trace closedness, stutter closedness and projective closedness, for all of which we are also able to prove a PSPACE lower bound. Being able to check that a property is closed under an equivalence relation has an immediate application in state-space exploration based verification. Indeed, the knowledge that the specification does not distinguish between equivalent execution sequences allows constructing a reduced state space where it is sufficient that at least one sequence per equivalence class is represented.
- Published
- 1998
- Full Text
- View/download PDF
10. A Direct Symbolic Approach to Model Checking Pushdown Systems (extended abstract)
- Author
-
Bernard Willems, Alain Finkel, and Pierre Wolper
- Subjects
Model checking ,Theoretical computer science ,Nested word ,General Computer Science ,Pushdown automaton ,Embedded pushdown automaton ,Decidability ,Theoretical Computer Science ,Deterministic pushdown automaton ,Set (abstract data type) ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Computer Science::Logic in Computer Science ,Temporal logic ,Computer Science::Formal Languages and Automata Theory ,Mathematics ,Computer Science(all) - Abstract
This paper gives a simple and direct algorithm for computing the always regular set of reachable states of a pushdown system. It then exploits this algorithm for obtaining model checking algorithms for linear-time temporal logic as well as for the logic CTL∗. For the latter, a new technical tool is introduced: pushdown automata with transitions conditioned on regular predicates on the stack content. Finally, this technical tool is also used to establish that CTL∗ model checking remains decidable when the formulas are allowed to include regular predicates on the stack content.
- Published
- 1997
- Full Text
- View/download PDF
11. A Verification-Based Approach to Memory Fence Insertion in PSO Memory Systems
- Author
-
Alexander Linden and Pierre Wolper
- Subjects
Hardware_MEMORYSTRUCTURES ,Finite-state machine ,Series (mathematics) ,Shared memory ,Sequential consistency ,Computer science ,Region-based memory management ,Process (computing) ,Point (geometry) ,Parallel computing ,Memory model ,Algorithm - Abstract
This paper addresses the problem of verifying and correcting programs when they are moved from a sequential consistency execution environment to a relaxed memory context. Specifically, it considers the PSO (Partial Store Order) memory model, which corresponds to the use of a store buffer for each shared variable and each process. We also will consider, as an intermediate step, the TSO (Total Store Order) memory model, which corresponds to the use of one store buffer per process. The proposed approach extends a previously developed verification tool that uses finite automata to symbolically represent the possible contents of the store buffers. Its starting point is a program that is correct for the usual Sequential Consistency (SC) memory model, but that might be incorrect under PSO with respect to safety properties. This program is then first analyzed and corrected for the TSO memory model, and then this TSO-safe program is analyzed and corrected under PSO, producing a PSO-safe program. To obtain a TSO-safe program, only store-load fences (TSO only allows store-load relaxations) are introduced into the program. Finaly, to produce a PSO-safe program, only store-store fences (PSO additionally allows store-store relaxations) are introduced. An advantage of our technique is that the underlying symbolic verification tool makes a full exploration of program behaviors possible even for cyclic programs, which makes our approach broadly applicable. The method has been tested with an experimental implementation and can effectively handle a series of classical examples.
- Published
- 2013
- Full Text
- View/download PDF
12. A Partial Approach to Model Checking
- Author
-
Pierre Wolper and Patrice Godefroid
- Subjects
Model checking ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Theoretical computer science ,Timed automaton ,Büchi automaton ,ω-automaton ,Nonlinear Sciences::Cellular Automata and Lattice Gases ,Mobile automaton ,Theoretical Computer Science ,Computer Science Applications ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational Theory and Mathematics ,Deterministic automaton ,Automata theory ,Two-way deterministic finite automaton ,Algorithm ,Computer Science::Formal Languages and Automata Theory ,Mathematics ,Information Systems - Abstract
A model-checking method for linear-time temporal logic that avoids the state explosion due to the modeling of concurrency by interleaving is presented. The method relies on the concept of the Mazurkiewicz trace as a semantic basis and uses automata-theoretic techniques, including automata that operate on words of ordinality higher than omega . In particular, automata operating on words of length omega *n, n in omega are defined. These automata are studied, and an efficient algorithm to check whether such automata are nonempty is given. It is shown that when it is viewed as an omega *n automaton, the trace automaton can be substituted for the production automaton in linear-time model checking. The efficiency of the method of P. Godefroid (Proc. Workshop on Computer Aided Verification, 1990) is thus fully available for model checking. >
- Published
- 1994
- Full Text
- View/download PDF
13. A Verification-Based Approach to Memory Fence Insertion in Relaxed Memory Systems
- Author
-
Pierre Wolper and Alexander Linden
- Subjects
Hardware_MEMORYSTRUCTURES ,Finite-state machine ,Correctness ,Record locking ,Flat memory model ,Sequential consistency ,Computer science ,Region-based memory management ,Memory model ,Overlay ,Algorithm - Abstract
This paper addresses the problem of verifying and correcting programs when they are moved from a sequential consistency execution environment to a relaxed memory context. Specifically, it considers the TSO (Total Store Order) relaxation, which corresponds to the use of store buffers, and its extension x86-TSO, which in addition allows synchronization and lock operations. The proposed approach uses a previously developed verification tool that uses finite automata to symbolically represent the possible contents of the store buffers. Its starting point is a program that is correct for the usual sequential consistency memory model, but that might be incorrect under x86-TSO. This program is then analyzed for this relaxed memory model and when errors are found (with respect to safety properties), memory fences are inserted in order to avoid these errors. The approach proceeds iteratively and heuristically, inserting memory fences until correctness is obtained, which is guaranteed to happen. An advantage of our technique is that the underlying symbolic verification tool makes a full exploration possible even for cyclic programs, which makes our approach broadly applicable. The method has been tested with an experimental implementation and can effectively handle a series of classical examples.
- Published
- 2011
- Full Text
- View/download PDF
14. Using partial orders for the efficient verification of deadlock freedom and safety properties
- Author
-
Pierre Wolper and Patrice Godefroid
- Subjects
Interleaving ,Computer science ,Distributed computing ,Concurrency ,Parallel computing ,Deadlock ,Theoretical Computer Science ,Safety property ,Hardware and Architecture ,Concurrent computing ,State space ,State (computer science) ,Deadlock prevention algorithms ,Software - Abstract
This paper presents an algorithm for detecting deadlocks in concurrent finite-state systems without incurring most of the state explosion due to the modeling of concurrency by interleaving. For systems that have a high level of concurrency our algorithm can be much more efficient than the classical exploration of the whole state space. Finally, we show that our algorithm can also be used for verifying arbitrary safety properties.
- Published
- 1993
- Full Text
- View/download PDF
15. An Automata-Based Symbolic Approach for Verifying Programs on Relaxed Memory Models
- Author
-
Alexander Linden and Pierre Wolper
- Subjects
Theoretical computer science ,Finite-state machine ,Sequential consistency ,Computer science ,Commit ,Relaxation (approximation) ,Memory model ,Automaton - Abstract
This paper addresses the problem of verifying programs for the relaxed memory models implemented in modern processors. Specifically, it considers the TSO (Total Store Order) relaxation, which corresponds to the use of store buffers. The proposed approach proceeds by using finite automata to symbolically represent the possible contents of the store buffers. Store, load and commit operations then correspond to operations on these finite automata. The advantage of this approach is that it operates on (potentially infinite) sets of buffer contents, rather than on individual buffer configurations. This provides a way to tame the explosion of the number of possible buffer configurations, while preserving the full generality of the analysis. It is thus possible to check even designs that exploit the relaxed memory model in unusual ways. An experimental implementation has been used to validate the feasibility of the approach.
- Published
- 2010
- Full Text
- View/download PDF
16. Memory-efficient algorithms for the verification of temporal properties
- Author
-
Costas Courcoubetis, Moshe Y. Vardi, Mihalis Yannakakis, and Pierre Wolper
- Subjects
Model checking ,Strongly connected component ,Theoretical computer science ,Computer science ,Büchi automaton ,Theoretical Computer Science ,Automaton ,Linear temporal logic ,Hardware and Architecture ,Graph (abstract data type) ,Temporal logic ,Algorithm ,Time complexity ,Computer Science::Formal Languages and Automata Theory ,Software - Abstract
This article addresses the problem of designing memory-efficient algorithms for the verification of temporal properties of finite-state programs. Both the programs and their desired temporal properties are modeled as automata on infinite words (Buchi automata). Verification is then reduced to checking the emptiness of the automaton resulting from the product of the program and the property. This problem is usually solved by computing the strongly connected components of the graph representing the product automaton. Here, we present algorithms that solve the emptiness problem without explicitly constructing the strongly connected components of the product graph. By allowing the algorithms to err with some probability, we can implement them with a randomly accessed memory of size O(n) bits, where n is the number of states of the graph, instead of O(n log n) bits that the presently known algorithms require.
- Published
- 1992
- Full Text
- View/download PDF
17. Computing Convex Hulls by Automata Iteration
- Author
-
François Cantin, Axel Legay, and Pierre Wolper
- Subjects
Convex analysis ,Convex hull ,Computer science ,Regular polygon ,Proper convex function ,Convex set ,Linear matrix inequality ,Extrapolation ,Subderivative ,Choquet theory ,Convex polytope ,Convex combination ,Absolutely convex set ,Convex conjugate ,Finite set ,Algorithm ,Orthogonal convex hull ,Alpha shape - Abstract
This paper considers the problem of computing the real convex hull of a finite set of n-dimensional integer vectors. The starting point is a finite-automaton representation of the initial set of vectors. The proposed method consists in computing a sequence of automata representing approximations of the convex hull and using extrapolation techniques to compute the limit of this sequence. The convex hull can then be directly computed from this limit in the form of an automaton-based representation of the corresponding set of real vectors. The technique is quite general and has been implemented. Also, our result fits in a wider scheme whose objective is to improve the techniques for converting automata-based representation of constraints to formulas.
- Published
- 2008
- Full Text
- View/download PDF
18. On (Omega-)Regular Model Checking
- Author
-
Pierre Wolper and Axel Legay
- Subjects
Model checking ,FOS: Computer and information sciences ,Computer Science - Logic in Computer Science ,Infinite set ,Theoretical computer science ,General Computer Science ,Relation (database) ,Logic ,Computer science ,Transitive closure ,Theoretical Computer Science ,Automaton ,Logic in Computer Science (cs.LO) ,Set (abstract data type) ,Computational Mathematics ,Regular language ,Iterated function ,Algorithm - Abstract
Checking infinite-state systems is frequently done by encoding infinite sets of states as regular languages. Computing such a regular representation of, say, the set of reachable states of a system requires acceleration techniques that can finitely compute the effect of an unbounded number of transitions. Among the acceleration techniques that have been proposed, one finds both specific and generic techniques. Specific techniques exploit the particular type of system being analyzed, for example, a system manipulating queues or integers, whereas generic techniques only assume that the transition relation is represented by a finite-state transducer, which has to be iterated. In this article, we investigate the possibility of using generic techniques in cases where only specific techniques have been exploited so far. Finding that existing generic techniques are often not applicable in cases easily handled by specific techniques, we have developed a new approach to iterating transducers. This new approach builds on earlier work, but exploits a number of new conceptual and algorithmic ideas, often induced with the help of experiments, that give it a broad scope, as well as good performances.
- Published
- 2008
- Full Text
- View/download PDF
19. The meaning of 'formal': from weak to strong formal methods
- Author
-
Pierre Wolper
- Subjects
Computer science ,Programming language ,Formal semantics (linguistics) ,Formality ,Refinement ,Formal methods ,Grammar systems theory ,computer.software_genre ,Formal system ,Epistemology ,Formal specification ,Formal verification ,computer ,Software ,Information Systems - Abstract
This short note reflects on what makes formal methods “formal”. It concludes that there are weak and strong ways of being formal, the latter being linked to the formality of the method being exploitable, and exploited, in software tools.
- Published
- 1997
- Full Text
- View/download PDF
20. Representing periodic temporal information with automata
- Author
-
Pierre Wolper
- Subjects
Theoretical computer science ,Finite-state machine ,Computer science ,Continuous spatial automaton ,Quantum finite automata ,Automata theory ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,ω-automaton ,Computer Science::Databases ,Real number ,Mobile automaton ,Automaton - Abstract
Motivated by issues in temporal databases and in the verification of infinite-state systems, this talk considers the problem of representing periodic dense time information. Doing so requires handling a theory that combines discrete and continuous variables, since discrete variables are essential for representing periodicity. An automata-based approach for dealing with such a combined theory is thus introduced. This approach uses the fact that real numbers can be represented by infinite sequences of digits and hence that sets of real numbers can be viewed as infinite-word languages, which can be recognized by infinite-word finite automata. Since these automata can represent all linear constraints, can express intergerhood, and are closed under the firstorder constructs, the presented approach can handle the full first-order theory of linear constraints over the reals and integers. One problem with using infinite-word automata is that the algorithms for complementing them are especially complicated and difficult to implement effectively. Fortunately, with the help of topological arguments it can be shown that a very restricted and much more tractable class of infiniteword automata are sufficient for the purpose on hand. Background information on the topics presented in this talk can be found in [1, 2, 3, 4].
- Published
- 2005
- Full Text
- View/download PDF
21. Iterating Transducers in the Large
- Author
-
Axel Legay, Bernard Boigelot, and Pierre Wolper
- Subjects
Set (abstract data type) ,Infinite set ,Finite-state machine ,Type theory ,Relation (database) ,Regular language ,Computer science ,Iterated function ,Deterministic automaton ,Algorithm - Abstract
Checking infinite-state systems is frequently done by encoding infinite sets of states as regular languages. Computing such a regular representation of, say, the reachable set of states of a system requires acceleration techniques that can finitely compute the effect of an unbounded number of transitions. Among the acceleration techniques that have been proposed, one finds both specific and generic techniques. Specific techniques exploit the particular type of system being analyzed, e.g. a system manipulating queues or integers, whereas generic techniques only assume that the transition relation is represented by a finite-state transducer, which has to be iterated. In this paper, we investigate the possibility of using generic techniques in cases where only specific techniques have been exploited so far. Finding that existing generic techniques are often not applicable in cases easily handled by specific techniques, we have developed a new approach to iterating transducers. This new approach builds on earlier work, but exploits a number of new conceptual and algorithmic ideas, often induced with the help of experiments, that give it a broad scope, as well as good performance.
- Published
- 2003
- Full Text
- View/download PDF
22. Representing Arithmetic Constraints with Finite Automata: An Overview
- Author
-
Bernard Boigelot and Pierre Wolper
- Subjects
Discrete mathematics ,Set (abstract data type) ,Finite-state machine ,Quadratic integer ,Integer ,Computer science ,A-normal form ,Linear system ,Linear equation ,First-order logic ,Automaton - Abstract
Linear numerical constraints and their first-order theory, whether defined over the reals or the integers, are basic tools that appear in many areas of Computer Science. This paper overviews a set of techniques based on finite automata that lead to decision procedures and other useful algorithms, as well as to a normal form, for the first-order linear theory of the integers, of the reals, and of the integers and reals combined. This approach has led to an implemented tool, which has the so far unique capability of handling the linear first-order theory of the integers and reals combined.
- Published
- 2002
- Full Text
- View/download PDF
23. OASIcs, Volume 3, Trustworthy SW'06, Complete Volume
- Author
-
Serge Autexier and Stephan Merz and Leon van der Torre and Reinhard Wilhelm and Pierre Wolper, Autexier, Serge, Merz, Stephan, van der Torre, Leon, Wilhelm, Reinhard, Wolper, Pierre, Serge Autexier and Stephan Merz and Leon van der Torre and Reinhard Wilhelm and Pierre Wolper, Autexier, Serge, Merz, Stephan, van der Torre, Leon, Wilhelm, Reinhard, and Wolper, Pierre
- Abstract
OASIcs, Volume 3, Trustworthy SW'06, Complete Volume
- Published
- 2012
- Full Text
- View/download PDF
24. On the Construction of Automata from Linear Arithmetic Constraints
- Author
-
Bernard Boigelot and Pierre Wolper
- Subjects
TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Theoretical computer science ,Nested word ,Computer science ,ω-automaton ,Nonlinear Sciences::Cellular Automata and Lattice Gases ,Automaton ,Linear temporal logic ,Deterministic automaton ,Continuous spatial automaton ,Automata theory ,Quantum finite automata ,Temporal logic ,Algorithm ,Computer Science::Formal Languages and Automata Theory - Abstract
This paper presents an overview of algorithms for constructing automata from linear arithmetic constraints. It identifies one case in which the special structure of the automata that are constructed allows a linear-time determinization procedure to be used. Furthermore, it shows through theoretical analysis and experiments that the special structure of the constructed automata does, in quite a general way, render the usual upper bounds on automata operations vastly overpessimistic.
- Published
- 2000
- Full Text
- View/download PDF
25. Verifying systems with infinite but regular state spaces
- Author
-
Pierre Wolper and Bernard Boigelot
- Subjects
Model checking ,Finite-state machine ,Development (topology) ,Theoretical computer science ,Regular language ,Computer science ,State space ,Automata theory ,State (functional analysis) ,Representation (mathematics) ,Formal verification ,Algorithm - Abstract
Thanks to the development of a number of efficiency enhancing techniques, state-space exploration based verification, and in particular model checking, has been quite successful for finite-state systems. This has prompted efforts to apply a similar approach to systems with infinite state spaces. Doing so amounts to developing algorithms for computing a symbolic representation of the infinite state space, as opposed to requiring the user to characterize the state space by assertions. Of course, in most cases, this can only be done at the cost of forgoing any general guarantee of success. The goal of this paper is to survey a number of results in this area and to show that a surprisingly common characteristic of the systems that can be analyzed with this approach is that their state space can be represented as a regular language.
- Published
- 1998
- Full Text
- View/download PDF
26. On the expressiveness of real and integer arithmetic automata
- Author
-
Pierre Wolper, Bernard Boigelot, and Stéphane Rassart
- Subjects
Combinatorics ,Discrete mathematics ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Finite-state machine ,Integer ,Quantum finite automata ,Automata theory ,Base (topology) ,Boolean function ,Presburger arithmetic ,Computer Science::Formal Languages and Automata Theory ,Word (computer architecture) ,Mathematics - Abstract
If read digit by digit, a n-dimensional vector of integers represented in base r can be viewed as a word over the alphabet r n . It has been known for some time that, under this encoding, the sets of integer vectors recognizable by finite automata are exactly those definable in Presburger arithmetic if independence with respect to the base is required, and those definable in a slight extension of Presburger arithmetic if only a specific base is considered.
- Published
- 1998
- Full Text
- View/download PDF
27. Abstracts Collection -- Workshop Trustworthy Software 2006
- Author
-
Serge Autexier and Stephan Merz and Leon van der Torre and Reinhard Wilhelm and Pierre Wolper, Autexier, Serge, Merz, Stephan, van der Torre, Leon, Wilhelm, Reinhard, Wolper, Pierre, Serge Autexier and Stephan Merz and Leon van der Torre and Reinhard Wilhelm and Pierre Wolper, Autexier, Serge, Merz, Stephan, van der Torre, Leon, Wilhelm, Reinhard, and Wolper, Pierre
- Abstract
On 18-19 May 2006, the Saarland University organized a two-day workshop about "Trustworthy Software" in order to present and foster the research competence in the SaarLorLuxWallonie region in the area of developing safe, secure and reliable software, computers and networks. As part of the Interreg III C E-Bird project "Recherches sans fronti\`eres/Forschen ohne Grenzen" it provided an excellent forum especially for young scientists to present and discuss recent results, new ideas and future research directions to a transnational audience from the SaarLorLuxWallonie region. The workshop consisted of 21 regular presentations and one invited talk. Abstracts of all presentations are collected in this paper, including links to extended abstracts or full papers. The first section directs to the preface of the proceedings.
- Published
- 2006
- Full Text
- View/download PDF
28. Preface -- Workshop Trustworthy Software 2006
- Author
-
Serge Autexier and Stephan Merz and Leon van der Torre and Reinhard Wilhelm and Pierre Wolper, Autexier, Serge, Merz, Stephan, van der Torre, Leon, Wilhelm, Reinhard, Wolper, Pierre, Serge Autexier and Stephan Merz and Leon van der Torre and Reinhard Wilhelm and Pierre Wolper, Autexier, Serge, Merz, Stephan, van der Torre, Leon, Wilhelm, Reinhard, and Wolper, Pierre
- Abstract
As part of the Interreg III C/E-Bird project "Recherches sans fronti\`eres/Forschen ohne Grenzen" the Saarland University organized a two-day workshop about "Trustworthy Software" in order to present and foster the research competence in the SaarLorLuxWallonie region in the area of developing safe, secure and reliable software, computers and networks. The workshop especially provided a forum for young scientists to present their research to a transnational audience from the SaarLorLuxWallonie region and consisted of 21 regular presentations and one invited presentation.
- Published
- 2006
- Full Text
- View/download PDF
29. Simple On-the-fly Automatic Verification of Linear Temporal Logic
- Author
-
Rob Gerth, Pierre Wolper, Moshe Y. Vardi, and Doron Peled
- Subjects
Model checking ,Theoretical computer science ,Computation tree logic ,Computer science ,Interval temporal logic ,Multimodal logic ,Büchi automaton ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Linear temporal logic ,Computer Science::Logic in Computer Science ,Temporal logic ,Temporal logic of actions ,Algorithm ,Computer Science::Formal Languages and Automata Theory - Abstract
We present a tableau-based algorithm for obtaining an automaton from a temporal logic formula. The algorithm is geared towards being used in model checking in an “on-the-fly” fashion, that is the automaton can be constructed simultaneously with, and guided by, the generation of the model. In particular, it is possible to detect that a property does not hold by only constructing part of the model and of the automaton. The algorithm can also be used to check the validity of a temporal logic assertion. Although the general problem is PSPACE-complete, experiments show that our algorithm performs quite well on the temporal formulas typically encountered in verification. While basing linear-time temporal logic model-checking upon a transformation to automata is not new, the details of how to do this efficiently, and in “on-the-fly” fashion have never been given.
- Published
- 1996
- Full Text
- View/download PDF
30. An automata-theoretic approach to Presburger arithmetic constraints
- Author
-
Bernard Boigelot and Pierre Wolper
- Subjects
Theoretical computer science ,Finite-state machine ,Inequality ,Computer science ,media_common.quotation_subject ,Binary number ,Satisfiability ,Automaton ,Integer ,Representation (mathematics) ,Integer programming ,Presburger arithmetic ,Algorithm ,Computer Science::Formal Languages and Automata Theory ,media_common - Abstract
This paper introduces a finite-automata based representation of Presburger arithmetic definable sets of integer vectors. The representation consists of concurrent automata operating on the binary encodings of the elements of the represented sets. This representation has several advantages. First, being automata-based it is operational in nature and hence leads directly to algorithms, for instance all usual operations on sets of integer vectors translate naturally to operations on automata. Second, the use of concurrent automata makes it compact. Third, it is insensitive to the representation size of integers. Our representation can be used whenever arithmetic constraints are needed. To illustrate its possibilities we show that it can handle integer programming optimally, and that it leads to a new original algorithm for the satisfiability of arithmetic inequalities.
- Published
- 1995
- Full Text
- View/download PDF
31. An automata-theoretic approach to branching-time model checking (Extended abstract)
- Author
-
Pierre Wolper, Orna Bernholtz, and Moshe Y. Vardi
- Subjects
Model checking ,Computation tree logic ,Theoretical computer science ,Linear temporal logic ,Computer science ,Interval temporal logic ,Kripke structure ,Temporal logic ,Abstraction model checking ,Descriptive complexity theory - Abstract
Translating linear temporal logic formulas to automata has proven to be an effective approach for implementing linear-time model-checking, and for obtaining many extensions and improvements to this verification method. On the other hand, for branching temporal logic, automata-theoretic techniques have long been thought to introduce an exponential penalty, making them essentially useless for model-checking. Recently, Bernholtz and Grumberg have shown that this exponential penalty can be avoided, though they did not match the linear complexity of non-automata-theoretic algorithms. In this paper we show that alternating tree automata are the key to a comprehensive automata-theoretic framework for branching temporal logics. Not only, as was shown by Muller et al., can they be used to obtain optimal decision procedures, but, as we show here, they also make it possible to derive optimal model-checking algorithms. Moreover, the simple combinatorial structure that emerges from the automata-theoretic approach opens up new possibilities for the implementation of branching-time model checking, and has enabled us to derive improved space complexity bounds for this long-standing problem.
- Published
- 1994
- Full Text
- View/download PDF
32. Reliable hashing without collision detection
- Author
-
Denis Leroy and Pierre Wolper
- Subjects
Reduction (complexity) ,Computer science ,Distributed computing ,Hash function ,State space ,Effective method ,Temporal logic ,Collision detection ,Hash table ,Variety (cybernetics) - Abstract
Thanks to a variety of new techniques, state-space exploration is becoming an increasingly effective method for the verification of concurrent programs. One of these techniques, hashing without collision detection, was proposed by Holzmann as a way to vastly reduce the amount of memory needed to store the explored state space. Unfortunately, this reduction in memory use comes at the price of a high probability of ignoring part of the state space and hence of missing existing errors. In this paper, we carefully analyze this method and show that, by using a modified strategy, it is possible to reduce the risk of error to a negligible amount while maintaining the memory use advantage of Holzmann's technique. Our proposed strategy has been implemented and we describe experiments that confirm the excellent expected results.
- Published
- 1993
- Full Text
- View/download PDF
33. Using partial orders for the efficient verification of deadlock freedom and safety properties
- Author
-
Patrice Godefroid and Pierre Wolper
- Published
- 1992
- Full Text
- View/download PDF
34. Verifying properties of large sets of processes with network invariants
- Author
-
Vinciane Lovinfosse and Pierre Wolper
- Subjects
Algebra ,Linear temporal logic ,Computer science ,Temporal logic ,Mutual exclusion ,Invariant (mathematics) - Published
- 1990
- Full Text
- View/download PDF
35. The meaning of 'formal'
- Author
-
Pierre Wolper
- Subjects
General Computer Science ,Computer science ,Object language ,Formal semantics (linguistics) ,Formal epistemology ,Formal methods ,Formal system ,Linguistics ,Theoretical Computer Science - Published
- 1996
- Full Text
- View/download PDF
36. Where is the algorithmic support?
- Author
-
Pierre Wolper
- Subjects
Theoretical computer science ,General Computer Science ,Computer science ,Algorithmic learning theory ,Theoretical Computer Science - Published
- 1996
- Full Text
- View/download PDF
37. The complementation problem for Büchi automata with applications to temporal logic
- Author
-
Pierre Wolper, Moshe Y. Vardi, and A. Prasad Sistla
- Subjects
Discrete mathematics ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Finite-state machine ,General Computer Science ,Interval temporal logic ,Büchi automaton ,Theoretical Computer Science ,Automaton ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Linear temporal logic ,Regular language ,Computer Science::Logic in Computer Science ,Temporal logic ,Computer Science::Formal Languages and Automata Theory ,Computer Science(all) ,Mathematics ,PSPACE - Abstract
The problem of complementing Büchi automata arises when developing decision procedures for temporal logics of programs. Unfortunately, previously known constructions for complementing Büchi automata involve a doubly exponential blow-up in the size of the automaton. We present a construction that involves only an exponential blow-up. We use this construction to prove a polynomial space upper bound for the propositional temporal logic of regular events and to prove a complexity hierarchy result for quantified propositional temporal logic.
- Published
- 1987
- Full Text
- View/download PDF
38. Temporal logic can be more expressive
- Author
-
Pierre Wolper
- Subjects
Predicate logic ,Theoretical computer science ,Computation tree logic ,Grammar ,Computer science ,Interval temporal logic ,media_common.quotation_subject ,Multimodal logic ,General Engineering ,Algebra ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Linear temporal logic ,Computer Science::Logic in Computer Science ,Dynamic logic (modal logic) ,Temporal logic ,Regular expression ,Temporal logic of actions ,Engineering(all) ,media_common - Abstract
It is first proved that there are properties of sequences that are not expressible in temporal logic, even though they are easily expressible using, for instance, regular expressions. Then, it is shown how temporal logic can be extended to express any property definable by a right-linear grammar and hence a regular expression. Finally, a complete axiomatization and a decision procedure for the extended temporal logic are given and the complexity of the extended logic is examined.
- Published
- 1983
- Full Text
- View/download PDF
39. Reasoning about Infinite Computations
- Author
-
Pierre Wolper and Moshe Y. Vardi
- Subjects
Discrete mathematics ,Finite-state machine ,Büchi automaton ,ω-automaton ,Decision problem ,Computer Science Applications ,Theoretical Computer Science ,Automaton ,Algebra ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational Theory and Mathematics ,Computer Science::Logic in Computer Science ,Quantum finite automata ,Temporal logic ,Boolean satisfiability problem ,Computer Science::Formal Languages and Automata Theory ,Information Systems ,Mathematics - Abstract
We investigate extensions of temporal logic by connectives defined by finite automata on infinite words. We consider three different logics, corresponding to three different types of acceptance conditions (finite, looping, and repeating) for the automata. It turns out, however that these logics all have the same expressive power and that their decision problems are all PSPACE-complete. We also investigate connectives defined by alternating automata and show that they do not increase the expressive power of the logic or the complexity of the decision problem.
- Full Text
- View/download PDF
40. Automata-theoretic techniques for modal logics of programs
- Author
-
Pierre Wolper and Moshe Y. Vardi
- Subjects
Discrete mathematics ,Theoretical computer science ,Computer Networks and Communications ,Normal modal logic ,Applied Mathematics ,Classical logic ,Multimodal logic ,Modal μ-calculus ,Intermediate logic ,Theoretical Computer Science ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational Theory and Mathematics ,Computer Science::Logic in Computer Science ,Accessibility relation ,Dynamic logic (modal logic) ,T-norm fuzzy logics ,Mathematics - Abstract
We present a new technique for obtaining decision procedures for modal logics of programs. The technique centers around a new class of finite automata on infinite trees for which the emptiness problem can be solved in polynomial time. The decision procedures then consist of constructing an automaton Af for a given formula f such that Af accepts some tree if and only if f is satisfiable. We illustrate our technique by giving exponential decision procedures for several variants of deterministic propositional dynamic logic.
- Full Text
- View/download PDF
41. Handling Infinite Temporal Data
- Author
-
Pierre Wolper, J.-M. Stevenne, and Froduald Kabanza
- Subjects
Theoretical computer science ,Selection (relational algebra) ,Computer science ,Relational database ,Computer Networks and Communications ,Applied Mathematics ,Extension (predicate logic) ,Relational algebra ,First-order logic ,Temporal database ,Theoretical Computer Science ,Computational Theory and Mathematics ,Tuple ,Temporal information ,Presburger arithmetic ,Computer Science::Databases ,Mathematics - Abstract
In this paper, we present a powerful framework for describing, storing, and reasoning about infinite temporal information. This framework is an extension of classical relational databases. It represents infinite temporal information by generalized tuples defined by linear repeating points and constraints on these points. We characterize the expressiveness of these generalized relations in terms of predicates definable in Presburger arithmetic. Next, we prove that relations formed from generalized tuples are closed under the operations of relational algebra and provide complexity results for the evaluation of first-order queries.
- Full Text
- View/download PDF
42. Realizable and unrealizable specifications of reactive systems
- Author
-
Martín Abadi, Leslie Lamport, and Pierre Wolper
- Subjects
Finite-state machine ,Theoretical computer science ,Computer science ,Programming language ,Realizability ,Transition system ,Liveness ,Temporal logic ,computer.software_genre ,Implementation ,Reactive system ,computer ,Program synthesis - Abstract
A specification is useless if it cannot be realized by any concrete implementation. There are obvious reasons why it might be unrealizable: it might require the computation of a nonrecursive function, or it might be logically inconsistent. A more subtle danger is specifying the behavior of part of the universe outside the implementor’s control. This source of unrealizability is most likely to infect specifications of concurrent systems or reactive systems [HP85]. It is this source of unrealizability that concerns us. Formally, a specification is a set of sequences of states, which represents the set of allowed behaviors of a system. We do not distinguish between specifications and programs; a Pascal program and a temporal logic specification are both specifications, although one is at a lower level than the other. (Some may wonder which is the lower-level one.) A specification S1 is said to implement a specification S2 iff (if and only if) it allows fewer behaviors than S2. We define a class of realizable specifications. It includes all specifications that can be implemented by physically possible systems, but also some that have no real implementations for reasons that do not concern us—for example, because they presume the computation of nonrecursive functions. In general, deciding whether a specification is realizable may be difficult. For a specification that includes only safety properties, determining realizability is easy in principle. A specification is unrealizable iff it constrains the environment. A safety property asserts that something bad does not happen. It constrains the environment iff there is some sequence of states in which the environment makes the bad thing happen. However, for liveness requirements, which assert that something good must eventually happen, it is not easy to determine if they constrain the environment. To study realizability, we consider a specification to be a type of infinite game of perfect information [Mar75], where the system plays against the environment and wins if it produces a correct behavior. Under hypotheses justified
- Published
- 1989
- Full Text
- View/download PDF
43. Yet another process logic
- Author
-
Pierre Wolper and Moshe Y. Vardi
- Subjects
TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Linear temporal logic ,Philosophy of logic ,Computer science ,Computer Science::Logic in Computer Science ,Substructural logic ,Computational logic ,Calculus ,Multimodal logic ,Dynamic logic (modal logic) ,Temporal logic ,Autoepistemic logic - Abstract
We present a process logic that differs from the one introduced by Harel, Kozen and Parikh in several ways. First, we use the extended temporal logic of Wolper for statements about paths. Second, we allow a “repeat” operator in the programs. This allows us to specify programs with infinite computations. However, we limit the interaction between programs and path statements by adopting semantics similar to the ones used by Nishimura. Also, we require atomic programs to be interpreted as binary relations. We argue that this gives us a more appropriate logic. We have obtained an elementary decision procedure for our logic. The time complexity of the decision procedure is four exponentials in the general case and two exponentials if the logic is restricted to finite paths.
- Published
- 1984
- Full Text
- View/download PDF
44. An Operator-based Approach to Incremental Development of Conform Protocol State Machines
- Author
-
Lanoix, Arnaud, Okalas Ossami, Dieu Donné, Souquières, Jeanine, Development of specifications (DEDALE), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS), Serge Autexier and Stephan Merz and Leendert W. N. van der Torre and Reinhard Wilhelm and Pierre Wolper, and Lanoix, Arnaud
- Subjects
Protocol state machine ,000 Computer science, knowledge, general works ,plugin conformance ,[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE] ,020207 software engineering ,exact conformance ,partial conformance ,02 engineering and technology ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,incremental development ,Computer Science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,development operator - Abstract
http://drops.dagstuhl.de/opus/volltexte/2006/695/ ISBN : 978-3-939897-02-6; International audience; An incremental development framework which supports a conform construction of Protocol State Machines (PSMs) is presented. We capture design concepts and strategies of PSM construction by sequentially applying some development operators: each operator makes evolve the current PSM to another one. To ensure a conform construction, we introduce three conformance relations, inspired by the specification refinement and specification matchings supported by formal methods. Conformance relations preserve some global behavioral properties. Our purpose is illustrated by some development steps of the card service interface of an electronic purse: for each step, we introduce the idea of the development, we propose an operator and we give the new specification state obtained by the application of this operator and the property of this state relatively to the previous one in terms of conformance relation.
- Published
- 2006
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.