SlideShare a Scribd company logo
1 of 17
Compatibility between shared
variable valuations in
timed automaton network modelchecking
Zhao Jianhua, Zhou Xiuyi,
Li Xuandong, Zheng Guoliang
Presented by ZHAO Jianhua
Background (Time Automata)
♦ A timed automaton can be viewed as a

conventional finite state automaton plus some
clock variables , which are used to
constraint time distances between events.
Clocks: x, y
E1:x < 5, y := 0
x<5
A

y<8
B
E2: y < 8, x := 0
Background
(timed automaton network)
♦ A timed automaton network is a finite set of

timed automata which interact with each
other.
♦ These timed automata may interact with
each other through a finite set of shared
variables.
♦ For each timed automaton network, an
equivalent timed automaton can be built.
Background
(timed automaton network)
♦ An example:
Clocks: x

Clocks: y
E11:x < 5, x:=0

x<5
A

v:=1

E21:y < 8, y:=0

x<8
B

E12: x < 8, x := 0
v==0

v==1

1
y<8

y<3
2

E12: y < 3, y := 0
v:=0
Background
(reachability analysis 1)
♦ Many interesting properties (for example,

safety) can be expressed as reachability of
locations of timed automata.
♦ Because the state spaces of timed automata
are infinite, model checking techniques can
not be applied to timed automaton directly.
– Symbolic representation of states are used in
automatically reachability analysis.
Background
(Symbolic States)
♦ A symbolic state of a timed automaton network is

a tuple (l,s, D)

– l is the global location of the network.
– s is the valuation of the set of shared variables.
– D is a conjunction of formulas like x-y<c.

♦ A symbolic state (l,s, D ) represents a set of

concrete states (l,s,v), where v satisfies D.
♦ Given a symbolic state S, the set of concrete states
which are reachable from a concrete state in S
through a given transition t can also be represented
as a symbolic state. We call it as the successor of S
w.r.t. t.
Background (Basic reachability
analysis algorithm 1)
Wait = { S0}, Passed = {}, where S0 is the initial symbolic state
while (Wait != {} ) do
{ S = a symbolic state in Wait;
Wait = Wait – {S}
for each transition t leaving S do
{ S’ = successor of S w.r.t. t;
if (S’!= Φ and S’ is not contained by any state in Passed)
Wait = Wait + {S’}
if (the location of S’ is the target location)
return true;
}
Passed = Passed + {S}
}
Background (Basic reachability
analysis algorithm 2)
♦ The algorithm explores the state space by

generating successors of generated states
continuously.
♦ The algorithm will not generated the successors of
a generated symbolic state (l,s, D1 ) only if
– another symbolic state (l, s, D2 ) containing (l,s, D1 ) has
already been generated.
– a symbolic state S1 contains another one S2, if the set of
concrete states represented by S1 contains the one
represented by S2.
Compatibility between shared
variable valuations
♦ A shared variable valuations s1 is compatible with s2

on a tuple (l,D) if for each transition e leaving l,
one of the following conditions holds.

– s1 and s2 are identical.
– The conjunction of D and g is false, where g is the time
guard of e.
– Neither s1 nor s2 satisfies the shared variable guards of e.
– The variable guard of e is satisfied by s1, and the
transition e sets s1 and s2 to two compatible variable
valuations.
An example of Compatibility
Shared variables: v1, v2
Clocks: y

Clocks: x
e11 : x > 5; v2 = 3
x:=0, v1:=0

B

A
e12 : x < 3; v1 = 3
x:=0, v1:=v1+1

M

e21 : y < 10;
v1:=v2+1, y:= 0

N

C

♦ (v1 = 3;v2 = 3) is compatible with (v1

= 2;v2 = 3) on ((A,M), (x>3 ^y<10))
Compatibility contain
♦ Definition 3. Let (l,s1,D1) and (l,s2,D2) be

two symbolic states of a timed
automaton network. We say (l,s1,D1)
compatibility contains (l,s2,D2)
– if s1 is compatible with s2 on (l, D1) and
– D1 contains D2.
A lemma about the compatibility
contain

♦ Lemma
– Let S1,and S2 be two symbolic states of a timed
automaton network. We have that all the locations
reachable from S2 are also reachable from S1 if S1
compatibilitycontainsS2.
♦ Intuitively, (l,s1,D1) is more like to reach the

target location than (l,s2,D2) is.
♦ The algorithm can avoid generating successors of
a generated symbolic state (l, s, D1 ) if
– another symbolic state which compatibility-contains (l,
s, D) has already been generated.

♦ This condition is weaker than the basic one.
Find the compatible valuations
♦ During the reachability analysis, if a symbolic state (l,s,D)

is generated, an algorithm can be used to find valuations
with which s is compatible on (l,D).
♦ This algorithm uses a backward propagation method to
compute such valuations based on the definition of
compatibility.
♦ All these valuations are recorded in valuation sets attached
to the generated states.
♦ For each generated state (l, s’,D’), it is compatibility
contained by (l,s,D) if D’ is contained by D and s is found
to be compatible with s’.
A compact data structure
♦ Let v1, v2, …, vn be a set of shared variables.

We proved that the attached valuation sets
can be represented as Cartesian products
s1× s2 × … × sn
♦ This observation leads to a compact data

structure to record the compatible shared
variable valuations.
The optimization
♦ The algorithm is optimized as follows
– A shared variable valuation set is attached to
each generated state. (using the compact data
structure)
– Avoid generating successor of (l,s,D) if there
is another generated state (l, s’, D’) such that s
is in the attached set of (l, s’, D’) and D’
contains D
– During the reachability analysis, the attached
sets are continuously expanded by backward
propagation.
The performance (1)
(The bounded retransmission protocol)
The performance (2)
(the Bang&Olufsion audio protocol)
♦ The optimized algorithm uses only about

40% memories as the original one does.

More Related Content

What's hot

4 linear regeression with multiple variables
4 linear regeression with multiple variables4 linear regeression with multiple variables
4 linear regeression with multiple variablesTanmayVijay1
 
Eigenvalues and Eigenvector
Eigenvalues and EigenvectorEigenvalues and Eigenvector
Eigenvalues and EigenvectorMuhammad Hamza
 
Eigen values and eigen vectors
Eigen values and eigen vectorsEigen values and eigen vectors
Eigen values and eigen vectorstirath prajapati
 
State table and characteristic equation for sequential circuit
State table and characteristic equation for sequential circuitState table and characteristic equation for sequential circuit
State table and characteristic equation for sequential circuitPreet_patel
 
LYAPUNOV STABILITY PROBLEM SOLUTION
LYAPUNOV STABILITY PROBLEM SOLUTIONLYAPUNOV STABILITY PROBLEM SOLUTION
LYAPUNOV STABILITY PROBLEM SOLUTIONrohit kumar
 
Eigenvalue problems .ppt
Eigenvalue problems .pptEigenvalue problems .ppt
Eigenvalue problems .pptSelf-employed
 

What's hot (10)

4 linear regeression with multiple variables
4 linear regeression with multiple variables4 linear regeression with multiple variables
4 linear regeression with multiple variables
 
Eigenvalues and Eigenvector
Eigenvalues and EigenvectorEigenvalues and Eigenvector
Eigenvalues and Eigenvector
 
Lyapunov stability
Lyapunov stability Lyapunov stability
Lyapunov stability
 
Eigen values and eigen vectors
Eigen values and eigen vectorsEigen values and eigen vectors
Eigen values and eigen vectors
 
State table and characteristic equation for sequential circuit
State table and characteristic equation for sequential circuitState table and characteristic equation for sequential circuit
State table and characteristic equation for sequential circuit
 
LYAPUNOV STABILITY PROBLEM SOLUTION
LYAPUNOV STABILITY PROBLEM SOLUTIONLYAPUNOV STABILITY PROBLEM SOLUTION
LYAPUNOV STABILITY PROBLEM SOLUTION
 
Eigen vector
Eigen vectorEigen vector
Eigen vector
 
Eigenvalue problems .ppt
Eigenvalue problems .pptEigenvalue problems .ppt
Eigenvalue problems .ppt
 
Logistic map
Logistic mapLogistic map
Logistic map
 
7 regularization
7 regularization7 regularization
7 regularization
 

Viewers also liked

BYOD: Ready for Rigor
BYOD: Ready for RigorBYOD: Ready for Rigor
BYOD: Ready for Rigorccaviness
 
Mercy Medical Center Flood of June 2008-Lessons Learned by Nurse Joanie
Mercy Medical Center Flood of  June 2008-Lessons Learned by Nurse JoanieMercy Medical Center Flood of  June 2008-Lessons Learned by Nurse Joanie
Mercy Medical Center Flood of June 2008-Lessons Learned by Nurse JoanieJoanie McMahon MS,BSN,RN
 
pasowanie na czytelnika.ppt
pasowanie na czytelnika.pptpasowanie na czytelnika.ppt
pasowanie na czytelnika.pptanyzarg9473
 
A theoretical discovery and development of an anti-ebola drug
A theoretical discovery and development of an anti-ebola drugA theoretical discovery and development of an anti-ebola drug
A theoretical discovery and development of an anti-ebola drugGayathri Vijayakumar
 
Delivering Impactful Messaging and Positioning in Under One Minute
Delivering Impactful Messaging and Positioning in Under One MinuteDelivering Impactful Messaging and Positioning in Under One Minute
Delivering Impactful Messaging and Positioning in Under One MinuteiFactory
 
HiringForce Overview
HiringForce OverviewHiringForce Overview
HiringForce OverviewRob Burns
 
картофель фри (антиреклама)
картофель фри (антиреклама)картофель фри (антиреклама)
картофель фри (антиреклама)scooll59
 
New technology
New technologyNew technology
New technologygklyons
 
אמנות נשים והומור בד בבד ב
אמנות נשים והומור בד בבד באמנות נשים והומור בד בבד ב
אמנות נשים והומור בד בבד בHadassa Gorohovski
 

Viewers also liked (14)

WordPress in 90 minutes
WordPress in 90 minutesWordPress in 90 minutes
WordPress in 90 minutes
 
Parker
ParkerParker
Parker
 
OPPS Portfolio
OPPS PortfolioOPPS Portfolio
OPPS Portfolio
 
BYOD: Ready for Rigor
BYOD: Ready for RigorBYOD: Ready for Rigor
BYOD: Ready for Rigor
 
Muskrats
MuskratsMuskrats
Muskrats
 
Mercy Medical Center Flood of June 2008-Lessons Learned by Nurse Joanie
Mercy Medical Center Flood of  June 2008-Lessons Learned by Nurse JoanieMercy Medical Center Flood of  June 2008-Lessons Learned by Nurse Joanie
Mercy Medical Center Flood of June 2008-Lessons Learned by Nurse Joanie
 
pasowanie na czytelnika.ppt
pasowanie na czytelnika.pptpasowanie na czytelnika.ppt
pasowanie na czytelnika.ppt
 
A theoretical discovery and development of an anti-ebola drug
A theoretical discovery and development of an anti-ebola drugA theoretical discovery and development of an anti-ebola drug
A theoretical discovery and development of an anti-ebola drug
 
Delivering Impactful Messaging and Positioning in Under One Minute
Delivering Impactful Messaging and Positioning in Under One MinuteDelivering Impactful Messaging and Positioning in Under One Minute
Delivering Impactful Messaging and Positioning in Under One Minute
 
HiringForce Overview
HiringForce OverviewHiringForce Overview
HiringForce Overview
 
картофель фри (антиреклама)
картофель фри (антиреклама)картофель фри (антиреклама)
картофель фри (антиреклама)
 
Similies
SimiliesSimilies
Similies
 
New technology
New technologyNew technology
New technology
 
אמנות נשים והומור בד בבד ב
אמנות נשים והומור בד בבד באמנות נשים והומור בד בבד ב
אמנות נשים והומור בד בבד ב
 

Similar to Zhao

Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using NmOptimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using NmAshish Khetan
 
Machine learning (13)
Machine learning (13)Machine learning (13)
Machine learning (13)NYversity
 
Modern Control System (BE)
Modern Control System (BE)Modern Control System (BE)
Modern Control System (BE)PRABHAHARAN429
 
An executable model for an Intelligent Vehicle Control System
An executable model for an Intelligent Vehicle Control SystemAn executable model for an Intelligent Vehicle Control System
An executable model for an Intelligent Vehicle Control Systeminfopapers
 
Fault tolerant process control
Fault tolerant process controlFault tolerant process control
Fault tolerant process controlSpringer
 
Differential kinematics robotic
Differential kinematics  roboticDifferential kinematics  robotic
Differential kinematics roboticdahmane sid ahmed
 
Cs229 notes12
Cs229 notes12Cs229 notes12
Cs229 notes12VuTran231
 
International Publication - (Calcolo)
International Publication - (Calcolo)International Publication - (Calcolo)
International Publication - (Calcolo)Alberto Auricchio
 
An AsmL model for an Intelligent Vehicle Control System
An AsmL model for an Intelligent Vehicle Control SystemAn AsmL model for an Intelligent Vehicle Control System
An AsmL model for an Intelligent Vehicle Control Systeminfopapers
 
Cs229 notes9
Cs229 notes9Cs229 notes9
Cs229 notes9VuTran231
 
Proyecto grupal algebra parcial ii
Proyecto grupal algebra parcial iiProyecto grupal algebra parcial ii
Proyecto grupal algebra parcial iiJHANDRYALCIVARGUAJAL
 
Corr-and-Regress (1).ppt
Corr-and-Regress (1).pptCorr-and-Regress (1).ppt
Corr-and-Regress (1).pptMuhammadAftab89
 
Cr-and-Regress.ppt
Cr-and-Regress.pptCr-and-Regress.ppt
Cr-and-Regress.pptRidaIrfan10
 
Corr-and-Regress.ppt
Corr-and-Regress.pptCorr-and-Regress.ppt
Corr-and-Regress.pptkrunal soni
 

Similar to Zhao (20)

Optimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using NmOptimization Of Fuzzy Bexa Using Nm
Optimization Of Fuzzy Bexa Using Nm
 
Machine learning (13)
Machine learning (13)Machine learning (13)
Machine learning (13)
 
Signals and Systems Assignment Help
Signals and Systems Assignment HelpSignals and Systems Assignment Help
Signals and Systems Assignment Help
 
Modern Control System (BE)
Modern Control System (BE)Modern Control System (BE)
Modern Control System (BE)
 
An executable model for an Intelligent Vehicle Control System
An executable model for an Intelligent Vehicle Control SystemAn executable model for an Intelligent Vehicle Control System
An executable model for an Intelligent Vehicle Control System
 
project report(1)
project report(1)project report(1)
project report(1)
 
Fault tolerant process control
Fault tolerant process controlFault tolerant process control
Fault tolerant process control
 
Differential kinematics robotic
Differential kinematics  roboticDifferential kinematics  robotic
Differential kinematics robotic
 
alt klausur
alt klausuralt klausur
alt klausur
 
Cs229 notes12
Cs229 notes12Cs229 notes12
Cs229 notes12
 
International Publication - (Calcolo)
International Publication - (Calcolo)International Publication - (Calcolo)
International Publication - (Calcolo)
 
An AsmL model for an Intelligent Vehicle Control System
An AsmL model for an Intelligent Vehicle Control SystemAn AsmL model for an Intelligent Vehicle Control System
An AsmL model for an Intelligent Vehicle Control System
 
Corr And Regress
Corr And RegressCorr And Regress
Corr And Regress
 
Cs229 notes9
Cs229 notes9Cs229 notes9
Cs229 notes9
 
Proyecto grupal algebra parcial ii
Proyecto grupal algebra parcial iiProyecto grupal algebra parcial ii
Proyecto grupal algebra parcial ii
 
Hmm and neural networks
Hmm and neural networksHmm and neural networks
Hmm and neural networks
 
Corr-and-Regress (1).ppt
Corr-and-Regress (1).pptCorr-and-Regress (1).ppt
Corr-and-Regress (1).ppt
 
Corr-and-Regress.ppt
Corr-and-Regress.pptCorr-and-Regress.ppt
Corr-and-Regress.ppt
 
Cr-and-Regress.ppt
Cr-and-Regress.pptCr-and-Regress.ppt
Cr-and-Regress.ppt
 
Corr-and-Regress.ppt
Corr-and-Regress.pptCorr-and-Regress.ppt
Corr-and-Regress.ppt
 

Recently uploaded

Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607dollysharma2066
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证nhjeo1gg
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
Navigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and HiringNavigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and Hiringkaran651042
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...nitagrag2
 
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfMost Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfTheKnowledgeReview2
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作ss846v0c
 
Back on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveBack on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveMarharyta Nedzelska
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3Ajumarkdiezmo1
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一lvtagr7
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfaae4149584
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024Bruce Bennett
 

Recently uploaded (20)

Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
Navigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and HiringNavigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and Hiring
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
 
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfMost Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作
 
Students with Oppositional Defiant Disorder
Students with Oppositional Defiant DisorderStudents with Oppositional Defiant Disorder
Students with Oppositional Defiant Disorder
 
Back on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveBack on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental Leave
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
Jumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3AJumark Morit Diezmo- Career portfolio- BPED 3A
Jumark Morit Diezmo- Career portfolio- BPED 3A
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdf
 
LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024LinkedIn Strategic Guidelines April 2024
LinkedIn Strategic Guidelines April 2024
 

Zhao

  • 1. Compatibility between shared variable valuations in timed automaton network modelchecking Zhao Jianhua, Zhou Xiuyi, Li Xuandong, Zheng Guoliang Presented by ZHAO Jianhua
  • 2. Background (Time Automata) ♦ A timed automaton can be viewed as a conventional finite state automaton plus some clock variables , which are used to constraint time distances between events. Clocks: x, y E1:x < 5, y := 0 x<5 A y<8 B E2: y < 8, x := 0
  • 3. Background (timed automaton network) ♦ A timed automaton network is a finite set of timed automata which interact with each other. ♦ These timed automata may interact with each other through a finite set of shared variables. ♦ For each timed automaton network, an equivalent timed automaton can be built.
  • 4. Background (timed automaton network) ♦ An example: Clocks: x Clocks: y E11:x < 5, x:=0 x<5 A v:=1 E21:y < 8, y:=0 x<8 B E12: x < 8, x := 0 v==0 v==1 1 y<8 y<3 2 E12: y < 3, y := 0 v:=0
  • 5. Background (reachability analysis 1) ♦ Many interesting properties (for example, safety) can be expressed as reachability of locations of timed automata. ♦ Because the state spaces of timed automata are infinite, model checking techniques can not be applied to timed automaton directly. – Symbolic representation of states are used in automatically reachability analysis.
  • 6. Background (Symbolic States) ♦ A symbolic state of a timed automaton network is a tuple (l,s, D) – l is the global location of the network. – s is the valuation of the set of shared variables. – D is a conjunction of formulas like x-y<c. ♦ A symbolic state (l,s, D ) represents a set of concrete states (l,s,v), where v satisfies D. ♦ Given a symbolic state S, the set of concrete states which are reachable from a concrete state in S through a given transition t can also be represented as a symbolic state. We call it as the successor of S w.r.t. t.
  • 7. Background (Basic reachability analysis algorithm 1) Wait = { S0}, Passed = {}, where S0 is the initial symbolic state while (Wait != {} ) do { S = a symbolic state in Wait; Wait = Wait – {S} for each transition t leaving S do { S’ = successor of S w.r.t. t; if (S’!= Φ and S’ is not contained by any state in Passed) Wait = Wait + {S’} if (the location of S’ is the target location) return true; } Passed = Passed + {S} }
  • 8. Background (Basic reachability analysis algorithm 2) ♦ The algorithm explores the state space by generating successors of generated states continuously. ♦ The algorithm will not generated the successors of a generated symbolic state (l,s, D1 ) only if – another symbolic state (l, s, D2 ) containing (l,s, D1 ) has already been generated. – a symbolic state S1 contains another one S2, if the set of concrete states represented by S1 contains the one represented by S2.
  • 9. Compatibility between shared variable valuations ♦ A shared variable valuations s1 is compatible with s2 on a tuple (l,D) if for each transition e leaving l, one of the following conditions holds. – s1 and s2 are identical. – The conjunction of D and g is false, where g is the time guard of e. – Neither s1 nor s2 satisfies the shared variable guards of e. – The variable guard of e is satisfied by s1, and the transition e sets s1 and s2 to two compatible variable valuations.
  • 10. An example of Compatibility Shared variables: v1, v2 Clocks: y Clocks: x e11 : x > 5; v2 = 3 x:=0, v1:=0 B A e12 : x < 3; v1 = 3 x:=0, v1:=v1+1 M e21 : y < 10; v1:=v2+1, y:= 0 N C ♦ (v1 = 3;v2 = 3) is compatible with (v1 = 2;v2 = 3) on ((A,M), (x>3 ^y<10))
  • 11. Compatibility contain ♦ Definition 3. Let (l,s1,D1) and (l,s2,D2) be two symbolic states of a timed automaton network. We say (l,s1,D1) compatibility contains (l,s2,D2) – if s1 is compatible with s2 on (l, D1) and – D1 contains D2.
  • 12. A lemma about the compatibility contain ♦ Lemma – Let S1,and S2 be two symbolic states of a timed automaton network. We have that all the locations reachable from S2 are also reachable from S1 if S1 compatibilitycontainsS2. ♦ Intuitively, (l,s1,D1) is more like to reach the target location than (l,s2,D2) is. ♦ The algorithm can avoid generating successors of a generated symbolic state (l, s, D1 ) if – another symbolic state which compatibility-contains (l, s, D) has already been generated. ♦ This condition is weaker than the basic one.
  • 13. Find the compatible valuations ♦ During the reachability analysis, if a symbolic state (l,s,D) is generated, an algorithm can be used to find valuations with which s is compatible on (l,D). ♦ This algorithm uses a backward propagation method to compute such valuations based on the definition of compatibility. ♦ All these valuations are recorded in valuation sets attached to the generated states. ♦ For each generated state (l, s’,D’), it is compatibility contained by (l,s,D) if D’ is contained by D and s is found to be compatible with s’.
  • 14. A compact data structure ♦ Let v1, v2, …, vn be a set of shared variables. We proved that the attached valuation sets can be represented as Cartesian products s1× s2 × … × sn ♦ This observation leads to a compact data structure to record the compatible shared variable valuations.
  • 15. The optimization ♦ The algorithm is optimized as follows – A shared variable valuation set is attached to each generated state. (using the compact data structure) – Avoid generating successor of (l,s,D) if there is another generated state (l, s’, D’) such that s is in the attached set of (l, s’, D’) and D’ contains D – During the reachability analysis, the attached sets are continuously expanded by backward propagation.
  • 16. The performance (1) (The bounded retransmission protocol)
  • 17. The performance (2) (the Bang&Olufsion audio protocol) ♦ The optimized algorithm uses only about 40% memories as the original one does.