115 results on '"SAIVASAN, PRAKASH"'
Search Results
2. Equivalence of Deterministic Weighted Real-time One-Counter Automata
- Author
-
Mathew, Prince, Penelle, Vincent, Saivasan, Prakash, and Sreejith, A. V.
- Subjects
Computer Science - Formal Languages and Automata Theory ,F.1.1 - Abstract
This paper introduces deterministic weighted real-time one-counter automaton (DWROCA). A DWROCA is a deterministic real-time one-counter automaton whose transitions are assigned a weight from a field. Two DWROCAs are equivalent if every word accepted by one is accepted by the other with the same weight. DWROCA is a sub-class of weighted one-counter automata with counter-determinacy. It is known that the equivalence problem for this model is in P. This paper gives a simpler proof and a better polynomial-time algorithm for checking the equivalence of two DWROCAs., Comment: 14 pages, 4 figures
- Published
- 2024
3. Separability and Non-Determinizability of WSTS
- Author
-
Czerwiński, Wojciech, Keskin, Eren, Lasota, Sławomir, Meyer, Roland, Muskalla, Sebastian, Kumar, K Narayan, and Saivasan, Prakash
- Subjects
Computer Science - Formal Languages and Automata Theory - Abstract
We study the languages recognized by well-structured transition systems (WSTS) with upward and downward compatibility. Our first result shows that every pair of disjoint WSTS languages is regularly separable: there is a regular language containing one of them while being disjoint from the other. As a consequence, if a language as well as its complement are both recognized by WSTS, then they are necessarily regular. Our second result shows that the languages recognized by deterministic WSTS form a strict subclass of the languages recognized by all WSTS: we give a non-deterministic WSTS language that we prove cannot be recognized by a deterministic WSTS. The proof relies on a novel characterization of the languages accepted by deterministic WSTS., Comment: This paper is the journal version of the CONCUR23 paper "Separability and Non-Determinizability of WSTS'', which can be found in the previous version of this arxiv document. It covers both papers about regular separability in WSTS: the CONCUR23 paper and its predecessor the CONCUR18 paper. As this version does not contain an appendix, please refer to the previous version for missing proofs
- Published
- 2023
4. Weighted One-Deterministic-Counter Automata
- Author
-
Mathew, Prince, Penelle, Vincent, Saivasan, Prakash, and Sreejith, A. V.
- Subjects
Computer Science - Formal Languages and Automata Theory - Abstract
We introduce weighted one-deterministic-counter automata (ODCA). These are weighted one-counter automata (OCA) with the property of counter-determinacy, meaning that all paths labelled by a given word starting from the initial configuration have the same counter-effect. Weighted ODCAs are a strict extension of weighted visibly OCAs, which are weighted OCAs where the input alphabet determines the actions on the counter. We present a novel problem called the co-VS (complement to a vector space) reachability problem for weighted ODCAs over fields, which seeks to determine if there exists a run from a given configuration of a weighted ODCA to another configuration whose weight vector lies outside a given vector space. We establish two significant properties of witnesses for co-VS reachability: they satisfy a pseudo-pumping lemma, and the lexicographically minimal witness has a special form. It follows that the co-VS reachability problem is in P. These reachability problems help us to show that the equivalence problem of weighted ODCAs over fields is in P by adapting the equivalence proof of deterministic real-time OCAs by B\"ohm et al. This is a step towards resolving the open question of the equivalence problem of weighted OCAs. Furthermore, we demonstrate that the regularity problem, the problem of checking whether an input weighted ODCA over a field is equivalent to some weighted automaton, is in P. Finally, we show that the covering and coverable equivalence problems for uninitialised weighted ODCAs are decidable in polynomial time. We also consider boolean ODCAs and show that the equivalence problem for (non-deterministic) boolean ODCAs is in PSPACE, whereas it is undecidable for (non-deterministic) boolean OCAs., Comment: 36 pages, 11 figures
- Published
- 2023
5. A Framework for Consistency Algorithms
- Author
-
Chini, Peter and Saivasan, Prakash
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Computational Complexity ,Computer Science - Logic in Computer Science - Abstract
We present a framework that provides deterministic consistency algorithms for given memory models. Such an algorithm checks whether the executions of a shared-memory concurrent program are consistent under the axioms defined by a model. For memory models like SC and TSO, checking consistency is NP-complete. Our framework shows, that despite the hardness, fast deterministic consistency algorithms can be obtained by employing tools from fine-grained complexity. The framework is based on a universal consistency problem which can be instantiated by different memory models. We construct an algorithm for the problem running in time O*(2^k), where k is the number of write accesses in the execution that is checked for consistency. Each instance of the framework then admits an O*(2^k)-time consistency algorithm. By applying the framework, we obtain corresponding consistency algorithms for SC, TSO, PSO, and RMO. Moreover, we show that the obtained algorithms for SC, TSO, and PSO are optimal in the fine-grained sense: there is no consistency algorithm for these running in time 2^o(k) unless the exponential time hypothesis fails.
- Published
- 2020
6. Complexity of Liveness in Parameterized Systems
- Author
-
Chini, Peter, Meyer, Roland, and Saivasan, Prakash
- Subjects
Computer Science - Formal Languages and Automata Theory ,Computer Science - Computational Complexity - Abstract
We investigate the fine-grained complexity of liveness verification for leader contributor systems. These consist of a designated leader thread and an arbitrary number of identical contributor threads communicating via a shared memory. The liveness verification problem asks whether there is an infinite computation of the system in which the leader reaches a final state infinitely often. Like its reachability counterpart, the problem is known to be NP-complete. Our results show that, even from a fine-grained point of view, the complexities differ only by a polynomial factor. Liveness verification decomposes into reachability and cycle detection. We present a fixed point iteration solving the latter in polynomial time. For reachability, we reconsider the two standard parameterizations. When parameterized by the number of states of the leader L and the size of the data domain D, we show an (L + D)^O(L + D)-time algorithm. It improves on a previous algorithm, thereby settling an open problem. When parameterized by the number of states of the contributor C, we reuse an O*(2^C)-time algorithm. We show how to connect both algorithms with the cycle detection to obtain algorithms for liveness verification. The running times of the composed algorithms match those of reachability, proving that the fine-grained lower bounds for liveness verification are met.
- Published
- 2019
7. Liveness in Broadcast Networks
- Author
-
Chini, Peter, Meyer, Roland, and Saivasan, Prakash
- Subjects
Computer Science - Formal Languages and Automata Theory - Abstract
We study liveness and model checking problems for broadcast networks, a system model of identical clients communicating via message passing. The first problem that we consider is Liveness Verification. It asks whether there is a computation such that one of the clients visits a final state infinitely often. The complexity of the problem has been open since 2010 when it was shown to be P-hard and solvable in EXPSPACE. We close the gap by a polynomial-time algorithm. The algorithm relies on a characterization of live computations in terms of paths in a suitable graph, combined with a fixed-point iteration to efficiently check the existence of such paths. The second problem is Fair Liveness Verification. It asks for a computation where all participating clients visit a final state infinitely often. We adjust the algorithm to also solve fair liveness in polynomial time. Both problems can be instrumented to answer model checking questions for broadcast networks against linear time temporal logic specifications. The first problem in this context is Fair Model Checking. It demands that for all computations of a broadcast network, all participating clients satisfy the specification. We solve the problem via the Vardi-Wolper construction and a reduction to Liveness Verification. The second problem is Sparse Model Checking. It asks whether each computation has a participating client that satisfies the specification. We reduce the problem to Fair Liveness Verification.
- Published
- 2019
8. Liveness in broadcast networks
- Author
-
Chini, Peter, Meyer, Roland, and Saivasan, Prakash
- Published
- 2022
- Full Text
- View/download PDF
9. Consistency and Persistency in Program Verification: Challenges and Opportunities
- Author
-
Abdulla, Parosh Aziz, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Jonsson, Bengt, Kumar, K. Narayan, Saivasan, Prakash, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Raskin, Jean-François, editor, Chatterjee, Krishnendu, editor, Doyen, Laurent, editor, and Majumdar, Rupak, editor
- Published
- 2022
- Full Text
- View/download PDF
10. Verifying Reachability for TSO Programs with Dynamic Thread Creation
- Author
-
Abdulla, Parosh Aziz, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., Saivasan, Prakash, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Koulali, Mohammed-Amine, editor, and Mezini, Mira, editor
- Published
- 2022
- Full Text
- View/download PDF
11. Fast Witness Counting
- Author
-
Chini, Peter, Massoud, Rehab, Meyer, Roland, and Saivasan, Prakash
- Subjects
Computer Science - Computational Complexity ,Computer Science - Discrete Mathematics - Abstract
We study the witness-counting problem: given a set of vectors $V$ in the $d$-dimensional vector space over $\mathbb{F}_2$, a target vector $t$, and an integer $k$, count all ways to sum-up exactly $k$ different vectors from $V$ to reach $t$. The problem is well-known in coding theory and received considerable attention in complexity theory. Recently, it appeared in the context of hardware monitoring. Our contribution is an algorithm for witness counting that is optimal in the sense of fine-grained complexity. It runs in time $\mathcal{O}^*(2^d)$ with only a logarithmic dependence on $m=|V|$. The algorithm makes use of the Walsh-Hadamard transform to compute convolutions over $\mathbb{F}_2^d$. The transform, however, overcounts the solutions. Inspired by the inclusion-exclusion principle, we introduce correction terms. The correction leads to a recurrence that we show how to solve efficiently. The correction terms are obtained from equivalence relations over $\mathbb{F}_2^d$. We complement our upper bound with two lower bounds on the problem. The first relies on $\# ETH$ and prohibits an $2^{o(d)}$-time algorithm. The second bound states the non-existence of a polynomial kernel for the decision version of the problem.
- Published
- 2018
12. Fine-Grained Complexity of Safety Verification
- Author
-
Chini, Peter, Meyer, Roland, and Saivasan, Prakash
- Subjects
Computer Science - Logic in Computer Science ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Data Structures and Algorithms - Abstract
We study the fine-grained complexity of Leader Contributor Reachability (LCR) and Bounded-Stage Reachability (BSR), two variants of the safety verification problem for shared memory concurrent programs. For both problems, the memory is a single variable over a finite data domain. Our contributions are new verification algorithms and lower bounds. The latter are based on the Exponential Time Hypothesis (ETH), the problem Set Cover, and cross-compositions. LCR is the question whether a designated leader thread can reach an unsafe state when interacting with a certain number of equal contributor threads. We suggest two parameterizations: (1) By the size of the data domain D and the size of the leader L, and (2) by the size of the contributors C. We present algorithms for both cases. The key techniques are compact witnesses and dynamic programming. The algorithms run in O*((L(D+1))^(LD) * D^D) and O*(2^C) time, showing that both parameterizations are fixed-parameter tractable. We complement the upper bounds by (matching) lower bounds based on ETH and Set Cover. Moreover, we prove the absence of polynomial kernels. For BSR, we consider programs involving t different threads. We restrict the analysis to computations where the write permission changes s times between the threads. BSR asks whether a given configuration is reachable via such an s-stage computation. When parameterized by P, the maximum size of a thread, and t, the interesting observation is that the problem has a large number of difficult instances. Formally, we show that there is no polynomial kernel, no compression algorithm that reduces the size of the data domain D or the number of stages s to a polynomial dependence on P and t. This indicates that symbolic methods may be harder to find for this problem.
- Published
- 2018
13. Regular Separability of Well Structured Transition Systems
- Author
-
Czerwiński, Wojciech, Lasota, Sławomir, Meyer, Roland, Muskalla, Sebastian, Kumar, K Narayan, and Saivasan, Prakash
- Subjects
Computer Science - Formal Languages and Automata Theory - Abstract
We investigate the languages recognized by well-structured transition systems (WSTS) with upward and downward compatibility. Our first result shows that, under very mild assumptions, every two disjoint WSTS languages are regular separable: There is a regular language containing one of them and being disjoint from the other. As a consequence, if a language as well as its complement are both recognized by WSTS, then they are necessarily regular. In particular, no subclass of WSTS languages beyond the regular languages is closed under complement. Our second result shows that for Petri nets, the complexity of the backwards coverability algorithm yields a bound on the size of the regular separator. We complement it by a lower bound construction.
- Published
- 2017
14. On the Upward/Downward Closures of Petri Nets
- Author
-
Atig, Mohamed Faouzi, Meyer, Roland, Muskalla, Sebastian, and Saivasan, Prakash
- Subjects
Computer Science - Formal Languages and Automata Theory ,Computer Science - Logic in Computer Science ,F.1.1 - Abstract
We study the size and the complexity of computing finite state automata (FSA) representing and approximating the downward and the upward closure of Petri net languages with coverability as the acceptance condition. We show how to construct an FSA recognizing the upward closure of a Petri net language in doubly-exponential time, and therefore the size is at most doubly exponential. For downward closures, we prove that the size of the minimal automata can be non-primitive recursive. In the case of BPP nets, a well-known subclass of Petri nets, we show that an FSA accepting the downward/upward closure can be constructed in exponential time. Furthermore, we consider the problem of checking whether a simple regular language is included in the downward/upward closure of a Petri net/BPP net language. We show that this problem is EXPSPACE-complete (resp. NP-complete) in the case of Petri nets (resp. BPP nets). Finally, we show that it is decidable whether a Petri net language is upward/downward closed. To this end, we prove that one can decide whether a given regular language is a subset of a Petri net coverability language., Comment: The conference version of this paper has been published in the proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017
- Published
- 2017
15. On the Complexity of Bounded Context Switching
- Author
-
Chini, Peter, Kolberg, Jonathan, Krebs, Andreas, Meyer, Roland, and Saivasan, Prakash
- Subjects
Computer Science - Formal Languages and Automata Theory ,Computer Science - Logic in Computer Science - Abstract
Bounded context switching (BCS) is an under-approximate method for finding violations to safety properties in shared memory concurrent programs. Technically, BCS is a reachability problem that is known to be NP-complete. Our contribution is a parameterized analysis of BCS. The first result is an algorithm that solves BCS when parameterized by the number of context switches (cs) and the size of the memory (m) in O*(m^(cs)2^(cs)). This is achieved by creating instances of the easier problem Shuff which we solve via fast subset convolution. We also present a lower bound for BCS of the form m^o(cs / log(cs)), based on the exponential time hypothesis. Interestingly, closing the gap means settling a conjecture that has been open since FOCS'07. Further, we prove that BCS admits no polynomial kernel. Next, we introduce a measure, called scheduling dimension, that captures the complexity of schedules. We study BCS parameterized by the scheduling dimension (sdim) and show that it can be solved in O*((2m)^(4sdim)4^t)$, where t is the number of threads. We consider variants of the problem for which we obtain (matching) upper and lower bounds.
- Published
- 2016
16. Nested Words for Order-2 Pushdown Systems
- Author
-
Aiswarya, C., Gastin, Paul, and Saivasan, Prakash
- Subjects
Computer Science - Formal Languages and Automata Theory ,Computer Science - Logic in Computer Science - Abstract
We study linear time model checking of collapsible higher-order pushdown systems (CPDS) of order 2 (manipulating stack of stacks) against MSO and PDL (propositional dynamic logic with converse and loop) enhanced with push/pop matching relations. To capture these linear time behaviours with matchings, we propose order-2 nested words. These graphs consist of a word structure augmented with two binary matching relations, one for each order of stack, which relate a push with matching pops (or collapse) on the respective stack. Due to the matching relations, satisfiability and model checking are undecidable. Hence we propose an under-approximation, bounding the number of times an order-1 push can be popped. With this under-approximation, which still allows unbounded stack height, we get decidability for satisfiability and model checking of both MSO and PDL. The problems are ExpTime-Complete for PDL.
- Published
- 2016
17. Complexity of regular abstractions of one-counter languages
- Author
-
Atig, Mohamed Faouzi, Chistikov, Dmitry, Hofman, Piotr, Kumar, K Narayan, Saivasan, Prakash, and Zetzsche, Georg
- Subjects
Computer Science - Formal Languages and Automata Theory ,Computer Science - Logic in Computer Science - Abstract
We study the computational and descriptional complexity of the following transformation: Given a one-counter automaton (OCA) A, construct a nondeterministic finite automaton (NFA) B that recognizes an abstraction of the language L(A): its (1) downward closure, (2) upward closure, or (3) Parikh image. For the Parikh image over a fixed alphabet and for the upward and downward closures, we find polynomial-time algorithms that compute such an NFA. For the Parikh image with the alphabet as part of the input, we find a quasi-polynomial time algorithm and prove a completeness result: we construct a sequence of OCA that admits a polynomial-time algorithm iff there is one for all OCA. For all three abstractions, it was previously unknown if appropriate NFA of sub-exponential size exist.
- Published
- 2016
18. Verifying Reachability for TSO Programs with Dynamic Thread Creation
- Author
-
Abdulla, Parosh Aziz, primary, Atig, Mohamed Faouzi, additional, Bouajjani, Ahmed, additional, Narayan Kumar, K., additional, and Saivasan, Prakash, additional
- Published
- 2022
- Full Text
- View/download PDF
19. Verification under Intel-x86 with Persistency
- Author
-
Abdulla, Parosh, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, Saivasan, Prakash, Abdulla, Parosh, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, and Saivasan, Prakash
- Abstract
The full semantics of the Intel-x86 architecture has been defined by Raad et al in POPL 2022, extending the earlier formalization based on the TSO memory model incorporating persistency. This new semantics involves an intricate combination of the SC, TSO, and PSO models to account for the diverse features of the enlarged instruction set. In this paper we investigate the reachability problem under this semantics, including both its consistency and persistency aspects each of which requires reasoning about unbounded operation reorderings. Our first contribution is to show that reachability under this model can be reduced to reachability under a model without the persistency component. This is achieved by showing that the persistency semantics can be simulated by a finite-state protocol running in parallel with the program. Our second contribution is to prove that reachability under the consistency model of Intel-x86 (even without crashes and persistency) is undecidable. Undecidability is obtained as soon as one thread in the program is allowed to use both TSO variables and two PSO variables. The third contribution is showing that for any fixed bound on the alternation between TSO writes (write-backs), and PSO writes (non-temporal writes), the reachability problem is decidable. This defines a complete parametrized schema for under-approximate analysis that can be used for bug finding.
- Published
- 2024
- Full Text
- View/download PDF
20. Satisfiability of Context-free String Constraints with Subword-ordering and Transducers
- Author
-
Aiswarya, C, Mal, Soumodev, Saivasan, Prakash, Aiswarya, C, Mal, Soumodev, and Saivasan, Prakash
- Abstract
We study the satisfiability of string constraints where context-free membership constraints may be imposed on variables. Additionally a variable may be constrained to be a subword of a word obtained by shuffling variables and their transductions. The satisfiability problem is known to be undecidable even without rational transductions. It is known to be NExptime-complete without transductions, if the subword relations between variables do not have a cyclic dependency between them. We show that the satisfiability problem stays decidable in this fragment even when rational transductions are added. It is 2NExptime-complete with context-free membership, and NExptime-complete with only regular membership. For the lower bound we prove a technical lemma that is of independent interest: The length of the shortest word in the intersection of a pushdown automaton (of size $O(n)$) and $n$ finite-state automata (each of size $O(n)$) can be double exponential in $n$.
- Published
- 2024
21. Fine-Grained Complexity of Safety Verification
- Author
-
Chini, Peter, Meyer, Roland, and Saivasan, Prakash
- Published
- 2020
- Full Text
- View/download PDF
22. Model checking Branching-Time Properties of Multi-Pushdown Systems is Hard
- Author
-
Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, and Saivasan, Prakash
- Subjects
Computer Science - Logic in Computer Science ,Computer Science - Formal Languages and Automata Theory ,Computer Science - Computer Science and Game Theory - Abstract
We address the model checking problem for shared memory concurrent programs modeled as multi-pushdown systems. We consider here boolean programs with a finite number of threads and recursive procedures. It is well-known that the model checking problem is undecidable for this class of programs. In this paper, we investigate the decidability and the complexity of this problem under the assumption of bounded context-switching defined by Qadeer and Rehof, and of phase-boundedness proposed by La Torre et al. On the model checking of such systems against temporal logics and in particular branching time logics such as the modal $\mu$-calculus or CTL has received little attention. It is known that parity games, which are closely related to the modal $\mu$-calculus, are decidable for the class of bounded-phase systems (and hence for bounded-context switching as well), but with non-elementary complexity (Seth). A natural question is whether this high complexity is inevitable and what are the ways to get around it. This paper addresses these questions and unfortunately, and somewhat surprisingly, it shows that branching model checking for MPDSs is inherently an hard problem with no easy solution. We show that parity games on MPDS under phase-bounding restriction is non-elementary. Our main result shows that model checking a $k$ context bounded MPDS against a simple fragment of CTL, consisting of formulas that whose temporal operators come from the set ${\EF, \EX}$, has a non-elementary lower bound.
- Published
- 2012
23. Parity Games on Bounded Phase Multi-pushdown Systems
- Author
-
Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., Saivasan, Prakash, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, El Abbadi, Amr, editor, and Garbinato, Benoît, editor
- Published
- 2017
- Full Text
- View/download PDF
24. Acceleration in Multi-PushDown Systems
- Author
-
Atig, Mohamed Faouzi, Narayan Kumar, K., Saivasan, Prakash, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Chechik, Marsha, editor, and Raskin, Jean-François, editor
- Published
- 2016
- Full Text
- View/download PDF
25. Liveness in Broadcast Networks
- Author
-
Chini, Peter, primary, Meyer, Roland, additional, and Saivasan, Prakash, additional
- Published
- 2019
- Full Text
- View/download PDF
26. Fine-Grained Complexity of Safety Verification
- Author
-
Chini, Peter, primary, Meyer, Roland, additional, and Saivasan, Prakash, additional
- Published
- 2018
- Full Text
- View/download PDF
27. One Deterministic-Counter Automata
- Author
-
Mathew, Prince, Penelle, Vincent, Saivasan, Prakash, and Sreejith, A. V.
- Subjects
FOS: Computer and information sciences ,Formal Languages and Automata Theory (cs.FL) ,Computer Science - Formal Languages and Automata Theory - Abstract
We introduce one deterministic-counter automata (ODCA), which are one-counter automata where all runs labelled by a given word have the same counter effect, a property we call counter-determinacy. ODCAs are an extension of visibly one-counter automata - one-counter automata (OCA), where the input alphabet determines the actions on the counter. They are a natural way to introduce non-determinism/weights to OCAs while maintaining the decidability of crucial problems, that are undecidable on general OCAs. For example, the equivalence problem is decidable for deterministic OCAs whereas it is undecidable for non-deterministic OCAs. We consider both non-deterministic and weighted ODCAs. This work shows that the equivalence problem is decidable in polynomial time for weighted ODCAs over a field and polynomial space for non-deterministic ODCAs. As a corollary, we get that the regularity problem, i.e., the problem of checking whether an input weighted ODCA is equivalent to some weighted automaton, is also in polynomial time. Furthermore, we show that the covering and coverable equivalence problems for uninitialised weighted ODCAs are decidable in polynomial time. We also introduce a few reachability problems that are of independent interest and show that they are in P. These reachability problems later help in solving the equivalence problem., 35 pages
- Published
- 2023
28. Adjacent Ordered Multi-Pushdown Systems
- Author
-
Atig, Mohamed Faouzi, Narayan Kumar, K., Saivasan, Prakash, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Béal, Marie-Pierre, editor, and Carton, Olivier, editor
- Published
- 2013
- Full Text
- View/download PDF
29. Linear-Time Model-Checking for Multithreaded Programs under Scope-Bounding
- Author
-
Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., Saivasan, Prakash, Chakraborty, Supratik, editor, and Mukund, Madhavan, editor
- Published
- 2012
- Full Text
- View/download PDF
30. Parity Games on Bounded Phase Multi-pushdown Systems
- Author
-
Atig, Mohamed Faouzi, primary, Bouajjani, Ahmed, additional, Narayan Kumar, K., additional, and Saivasan, Prakash, additional
- Published
- 2017
- Full Text
- View/download PDF
31. On the Satisfiability of Context-free String Constraints with Subword-Ordering
- Author
-
Aiswarya, C., primary, Mal, Soumodev, additional, and Saivasan, Prakash, additional
- Published
- 2022
- Full Text
- View/download PDF
32. Verifying Reachability for TSO Programs with Dynamic Thread Creation
- Author
-
Abdulla, Parosh, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, Saivasan, Prakash, Abdulla, Parosh, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, and Saivasan, Prakash
- Abstract
The verification of reachability properties for programs under weak memory models is a hard problem, even undecidable in some cases. The decidability of this problem has been investigated so far in the case of static programs where the number of threads does not change during execution. However, dynamic thread creation is crucial in asynchronous concurrent programming. In this paper, we address the decidability of the reachability problem for dynamic concurrent programs running under TSO. An important issue when considering a TSO model in this case is maintaining causality precedence between operations issued by threads and those issued by their children. We propose a general TSO model that respects causality and prove that the reachability problem for programs with dynamic creation of threads is decidable.
- Published
- 2022
- Full Text
- View/download PDF
33. Consistency and Persistency in Program Verification : Challenges and Opportunities
- Author
-
Abdulla, Parosh, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Jonsson, Bengt, Kumar, K. Narayan, Saivasan, Prakash, Abdulla, Parosh, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Jonsson, Bengt, Kumar, K. Narayan, and Saivasan, Prakash
- Abstract
We consider the verification of concurrent programs and, in particular, the challenges that arise because modern platforms only guarantee weak semantics, i.e., semantics that are weaker than the classical Sequential Consistency (SC). We describe two architectural concepts that give rise to weak semantics, namely weak consistency and weak persistency. The former defines the order in which operations issued by a given process become visible to the rest of the processes. The latter prescribes the order in which data becomes persistent. To deal with the extra complexity in program behaviors that arises due to weak semantics, we propose translating the program verification problem under weak semantics to SC. The main principle is to augment the program with a set of (unbounded) data structures that guarantee the equivalence of the source program’s behavior under the weak semantics with the augmented program’s behavior under the SC semantics. Such an equivalence opens the door to leverage, albeit in a non-trivial manner, the rich set of techniques that we have developed over the years for program verification under the SC semantics. We illustrate the framework’s potential by considering the persistent version of the well-known Total Store Order semantics. We show that we can capture the program behaviors on such a platform using a finite set of unbounded monotone FIFO buffers. The use of monotone FIFO buffers allows the use of the well-structured-systems framework to prove the decidability of the reachability problem.
- Published
- 2022
- Full Text
- View/download PDF
34. Acceleration in Multi-PushDown Systems
- Author
-
Atig, Mohamed Faouzi, primary, Narayan Kumar, K., additional, and Saivasan, Prakash, additional
- Published
- 2016
- Full Text
- View/download PDF
35. Super Exponential Groebner Basis Under Lexicographic Order
- Author
-
Morye, Archana Subhash, primary, S B, Sreenanda, additional, and Saivasan, Prakash, additional
- Published
- 2022
- Full Text
- View/download PDF
36. Liveness in broadcast networks
- Author
-
Chini, Peter, primary, Meyer, Roland, additional, and Saivasan, Prakash, additional
- Published
- 2021
- Full Text
- View/download PDF
37. Deciding Reachability under Persistent x86-TSO
- Author
-
Abdulla, Parosh, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, Saivasan, Prakash, Abdulla, Parosh, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, and Saivasan, Prakash
- Abstract
We address the problem of verifying the reachability problem in programs running under the formal model Px86 defined recently by Raad et al. in POPL'20 for the persistent Intel x86 architecture. We prove that this problem is decidable. To achieve that, we provide a new formal model that is equivalent to Px86 and that has the feature of being a well structured system. Deriving this new model is the result of a deep investigation of the properties of Px86 and the interplay of its components.
- Published
- 2021
- Full Text
- View/download PDF
38. Adjacent Ordered Multi-Pushdown Systems
- Author
-
Atig, Mohamed Faouzi, primary, Narayan Kumar, K., additional, and Saivasan, Prakash, additional
- Published
- 2013
- Full Text
- View/download PDF
39. Deciding reachability under persistent x86-TSO
- Author
-
Abdulla, Parosh Aziz, primary, Atig, Mohamed Faouzi, additional, Bouajjani, Ahmed, additional, Kumar, K. Narayan, additional, and Saivasan, Prakash, additional
- Published
- 2021
- Full Text
- View/download PDF
40. Linear-Time Model-Checking for Multithreaded Programs under Scope-Bounding
- Author
-
Atig, Mohamed Faouzi, primary, Bouajjani, Ahmed, additional, Narayan Kumar, K., additional, and Saivasan, Prakash, additional
- Published
- 2012
- Full Text
- View/download PDF
41. Complexity of Liveness in Parameterized Systems
- Author
-
Peter Chini and Roland Meyer and Prakash Saivasan, Chini, Peter, Meyer, Roland, Saivasan, Prakash, Peter Chini and Roland Meyer and Prakash Saivasan, Chini, Peter, Meyer, Roland, and Saivasan, Prakash
- Abstract
We investigate the fine-grained complexity of liveness verification for leader contributor systems. These consist of a designated leader thread and an arbitrary number of identical contributor threads communicating via a shared memory. The liveness verification problem asks whether there is an infinite computation of the system in which the leader reaches a final state infinitely often. Like its reachability counterpart, the problem is known to be NP-complete. Our results show that, even from a fine-grained point of view, the complexities differ only by a polynomial factor. Liveness verification decomposes into reachability and cycle detection. We present a fixed point iteration solving the latter in polynomial time. For reachability, we reconsider the two standard parameterizations. When parameterized by the number of states of the leader L and the size of the data domain D, we show an (L + D)^O(L + D)-time algorithm. It improves on a previous algorithm, thereby settling an open problem. When parameterized by the number of states of the contributor C, we reuse an O^*(2^C)-time algorithm. We show how to connect both algorithms with the cycle detection to obtain algorithms for liveness verification. The running times of the composed algorithms match those of reachability, proving that the fine-grained lower bounds for liveness verification are met.
- Published
- 2019
- Full Text
- View/download PDF
42. Regular Separability of Well-Structured Transition Systems
- Author
-
Czerwinski, Wojciech, Lasota, Slawomir, Meyer, Roland, Muskalla, Sebastian, Narayan Kumar, K., and Saivasan, Prakash
- Subjects
000 Computer science, knowledge, general works ,Computer Science ,Computer Science::Programming Languages ,Computer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing) - Abstract
We investigate the languages recognized by well-structured transition systems (WSTS) with upward and downward compatibility. Our first result shows that, under very mild assumptions, every two disjoint WSTS languages are regular separable: There is a regular language containing one of them and being disjoint from the other. As a consequence, if a language as well as its complement are both recognized by WSTS, then they are necessarily regular. In particular, no subclass of WSTS languages beyond the regular languages is closed under complement. Our second result shows that for Petri nets, the complexity of the backwards coverability algorithm yields a bound on the size of the regular separator. We complement it by a lower bound construction.
- Published
- 2018
- Full Text
- View/download PDF
43. Verification of Asynchronous Programs with Nested Locks
- Author
-
Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., and Saivasan, Prakash
- Subjects
000 Computer science, knowledge, general works ,020204 information systems ,Computer Science ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,02 engineering and technology - Abstract
In this paper, we consider asynchronous programs consisting of multiple recursive threads running in parallel. Each of the threads is equipped with a multi-set. The threads can create tasks and post them onto the multi-sets or read a task from their own. In addition, they can synchronise through a finite set of locks. In this paper, we show that the reachability problem for such class of asynchronous programs is undecidable even under the nested locking policy. We then show that the reachability problem becomes decidable (Exp-space-complete) when the locks are not allowed to be held across tasks. Finally, we show that the problem is NP-complete when in addition to previous restrictions, threads always read tasks from the same state.
- Published
- 2018
- Full Text
- View/download PDF
44. Verifying Quantitative Temporal Properties of Procedural Programs
- Author
-
Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., and Saivasan, Prakash
- Subjects
000 Computer science, knowledge, general works ,Computer Science - Abstract
We address the problem of specifying and verifying quantitative properties of procedural programs. These properties typically involve constraints on the relative cumulated costs of executing various tasks (by invoking for instance some particular procedures) within the scope of the execution of some particular procedure. An example of such properties is "within the execution of each invocation of procedure P, the time spent in executing invocations of procedure Q is less than 20 % of the total execution time". We introduce specification formalisms, both automata-based and logic-based, for expressing such properties, and we study the links between these formalisms and their application in model-checking. On one side, we define Constrained Pushdown Systems (CPDS), an extension of pushdown systems with constraints, expressed in Presburger arithmetics, on the numbers of occurrences of each symbol in the alphabet within invocation intervals (subcomputations between matching pushes and pops), and on the other side, we introduce a higher level specification language that is a quantitative extension of CaRet (the Call-Return temporal logic) called QCaRet where nested quantitative constraints over procedure invocation intervals are expressible using Presburger arithmetics. Then, we investigate (1) the decidability of the reachability and repeated reachability problems for CPDS, and (2) the effective reduction of the model-checking problem of procedural programs (modeled as visibly pushdown systems) against QCaRet formulas to these problems on CPDS.
- Published
- 2018
- Full Text
- View/download PDF
45. Temporal Tracing of On-Chip Signals using Timeprints
- Author
-
Massoud, Rehab, primary, Le, Hoang M., additional, Chini, Peter, additional, Saivasan, Prakash, additional, Meyer, Roland, additional, and Drechsler, Rolf, additional
- Published
- 2019
- Full Text
- View/download PDF
46. Regular Separability of Well-Structured Transition Systems
- Author
-
Wojciech Czerwinski and Slawomir Lasota and Roland Meyer and Sebastian Muskalla and K. Narayan Kumar and Prakash Saivasan, Czerwinski, Wojciech, Lasota, Slawomir, Meyer, Roland, Muskalla, Sebastian, Narayan Kumar, K., Saivasan, Prakash, Wojciech Czerwinski and Slawomir Lasota and Roland Meyer and Sebastian Muskalla and K. Narayan Kumar and Prakash Saivasan, Czerwinski, Wojciech, Lasota, Slawomir, Meyer, Roland, Muskalla, Sebastian, Narayan Kumar, K., and Saivasan, Prakash
- Abstract
We investigate the languages recognized by well-structured transition systems (WSTS) with upward and downward compatibility. Our first result shows that, under very mild assumptions, every two disjoint WSTS languages are regular separable: There is a regular language containing one of them and being disjoint from the other. As a consequence, if a language as well as its complement are both recognized by WSTS, then they are necessarily regular. In particular, no subclass of WSTS languages beyond the regular languages is closed under complement. Our second result shows that for Petri nets, the complexity of the backwards coverability algorithm yields a bound on the size of the regular separator. We complement it by a lower bound construction.
- Published
- 2018
- Full Text
- View/download PDF
47. Verifying Quantitative Temporal Properties of Procedural Programs
- Author
-
Mohamed Faouzi Atig and Ahmed Bouajjani and K. Narayan Kumar and Prakash Saivasan, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., Saivasan, Prakash, Mohamed Faouzi Atig and Ahmed Bouajjani and K. Narayan Kumar and Prakash Saivasan, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., and Saivasan, Prakash
- Abstract
We address the problem of specifying and verifying quantitative properties of procedural programs. These properties typically involve constraints on the relative cumulated costs of executing various tasks (by invoking for instance some particular procedures) within the scope of the execution of some particular procedure. An example of such properties is "within the execution of each invocation of procedure P, the time spent in executing invocations of procedure Q is less than 20 % of the total execution time". We introduce specification formalisms, both automata-based and logic-based, for expressing such properties, and we study the links between these formalisms and their application in model-checking. On one side, we define Constrained Pushdown Systems (CPDS), an extension of pushdown systems with constraints, expressed in Presburger arithmetics, on the numbers of occurrences of each symbol in the alphabet within invocation intervals (subcomputations between matching pushes and pops), and on the other side, we introduce a higher level specification language that is a quantitative extension of CaRet (the Call-Return temporal logic) called QCaRet where nested quantitative constraints over procedure invocation intervals are expressible using Presburger arithmetics. Then, we investigate (1) the decidability of the reachability and repeated reachability problems for CPDS, and (2) the effective reduction of the model-checking problem of procedural programs (modeled as visibly pushdown systems) against QCaRet formulas to these problems on CPDS.
- Published
- 2018
- Full Text
- View/download PDF
48. Verification of Asynchronous Programs with Nested Locks
- Author
-
Mohamed Faouzi Atig and Ahmed Bouajjani and K. Narayan Kumar and Prakash Saivasan, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., Saivasan, Prakash, Mohamed Faouzi Atig and Ahmed Bouajjani and K. Narayan Kumar and Prakash Saivasan, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Narayan Kumar, K., and Saivasan, Prakash
- Abstract
In this paper, we consider asynchronous programs consisting of multiple recursive threads running in parallel. Each of the threads is equipped with a multi-set. The threads can create tasks and post them onto the multi-sets or read a task from their own. In addition, they can synchronise through a finite set of locks. In this paper, we show that the reachability problem for such class of asynchronous programs is undecidable even under the nested locking policy. We then show that the reachability problem becomes decidable (Exp-space-complete) when the locks are not allowed to be held across tasks. Finally, we show that the problem is NP-complete when in addition to previous restrictions, threads always read tasks from the same state.
- Published
- 2018
- Full Text
- View/download PDF
49. Temporal Tracing of On-Chip Signals using Timeprints.
- Author
-
Massoud, Rehab, Hoang M. Le, Chini, Peter, Saivasan, Prakash, Meyer, Roland, and Drechsler, Rolf
- Subjects
ELECTRONIC data processing ,TELEMATICS ,DEBUGGING ,DATA logging ,DATA encryption - Abstract
This paper introduces a new method to trace cycle-accurately the temporal behavior of on-chip signals while operating in-field. Current cycle-accurate schemes incur unacceptable amounts of data for logging, storage and processing. Our key idea to enable efficient yet cycle-accurate tracing, is to bring timing to the front as a main traced artifact. We split the signal tracing into consecutive (back-to-back) finite trace-cycles. Within a trace-cycle, a signal's value-change instance gets assigned an encoded timestamp. At the end of each trace-cycle, these encoded timestamps are aggregated into a logged timeprint, which summarizes the temporal behavior over the trace-cycle. To retrieve the accurate timing, we reconstruct the exact instances from a timeprint via a SAT query. The experiments demonstrate how unprecedented lightweight tracing can be applied, and how timeprints enable the verification of cycle-accurate properties and the detection of sporadic temperature effects. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
50. Verification of Asynchronous Programs with Nested Locks
- Author
-
Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, Saivasan, Prakash, Atig, Mohamed Faouzi, Bouajjani, Ahmed, Kumar, K. Narayan, and Saivasan, Prakash
- Abstract
In this paper, we consider asynchronous programs consisting of multiple recursive threads running in parallel. Each of the threads is equipped with a multi-set. The threads can create tasks and post them onto the multi-sets or read a task from their own. In addition, they can synchronise through a finite set of locks. In this paper, we show that the reachability problem for such class of asynchronous programs is undecidable even under the nested locking policy. We then show that the reachability problem becomes decidable (Exp-space-complete) when the locks are not allowed to be held across tasks. Finally, we show that the problem is NP-complete when in addition to previous restrictions, threads always read tasks from the same state., UPMARC
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.