This document discusses temporal logics for multi-agent systems. It introduces Computation Tree Logic (CTL) and Alternating-Time Temporal Logic (ATL) for expressing properties of reactive and multi-agent systems. It then presents ATL with strategy contexts (ATLsc), which extends ATL with additional strategy quantifiers to express properties involving strategies. ATLsc is shown to be strictly more expressive than ATL and as expressive as Quantified CTL. The document discusses examples of properties that can be expressed in ATLsc, such as interactions between clients and servers accessing a shared resource and existence of Nash equilibria.
Better Late Than Never: A Fully Abstract Semantics for Classical ProcessesMarco Peressotti
We present Hypersequent Classical Processes (HCP), a revised interpretation of the “Proofs as Processes” correspondence between linear logic and the π-calculus initially proposed by Abramsky [1994], and later developed by Bellin and Scott [1994], Caires and Pfenning [2010], and Wadler [2014], among others. HCP mends the discrepancies between linear logic and the syntax and observable semantics of parallel composition in the π-calculus, by conservatively extending linear logic to hyperenvironments (collections of environments, inspired by the hypersequents by Avron [1991]). Separation of environments in hyperenvironments is internalised by ⊗ and corresponds to parallel process behaviour. Thanks to this property, for the first time we are able to extract a labelled transition system (lts) semantics from proof rewritings. Leveraging the information on parallelism at the level of types, we obtain a logical reconstruction of the delayed actions that Merro and Sangiorgi [2004] formulated to model non-blocking I/O in the π-calculus. We define a denotational semantics for processes based on Brzozowski derivatives, and uncover that non-interference in HCP corresponds to Fubini’s theorem of double antiderivation. Having an lts allows us to validate HCP using the standard toolbox of behavioural theory. We instantiate bisimilarity and barbed congruence for HCP, and obtain a full abstraction result: bisimilarity, denotational equivalence, and barbed congruence coincide.
Kokke, Wen, Fabrizio Montesi, and Marco Peressotti. "Better late than never: a fully-abstract semantics for classical processes." Proceedings of the ACM on Programming Languages 3.POPL (2019): 24. https://doi.org/10.1145/3290337
This document provides an overview of distributed real time systems and timed automata. It defines key concepts such as timed runs, timed words, timed languages, clock constraints, timed transition systems, and timed regular languages. It also describes timed automata through definitions, examples, and discussions of emptiness checking, clock regions, and the region automaton. The document outlines these topics over multiple sections and provides figures and examples to illustrate the concepts.
This document summarizes a presentation on timed automata and timed regular languages. It begins by introducing ω-languages and ω-automata as representations of infinite words and languages. It then defines timed words, timed languages, and timed transition tables as extensions of these concepts that can read timed inputs. Timed Büchi and Müller automata are presented as models for accepting timed regular languages. The properties of timed regular languages are discussed, including closure properties and a relationship between the untimed language and the language of a timed automaton. Techniques for checking emptiness of a timed language using clock regions and region automata are also summarized.
This document discusses randomized computation and algorithms. It begins with an introduction to randomized algorithms like randomized quicksort and polynomial identity testing. It then covers computational models for probabilistic Turing machines and complexity classes like BPP, RP and ZPP that are defined using randomization. The document also characterizes these classes using quantifiers and discusses error reduction techniques for BPP.
NP completeness. Classes P and NP are two frequently studied classes of problems in computer science. Class P is the set of all problems that can be solved by a deterministic Turing machine in polynomial time.
The document discusses reductions between problems to prove NP-completeness. It first reviews P, NP, reductions, NP-hard and NP-complete problems. It then walks through reducing directed Hamiltonian cycle to undirected Hamiltonian cycle to traveling salesman problem (TSP) to prove that TSP is NP-complete in 3 steps or less.
P, NP, NP-Complete, and NP-Hard
Reductionism in Algorithms
NP-Completeness and Cooks Theorem
NP-Complete and NP-Hard Problems
Travelling Salesman Problem (TSP)
Travelling Salesman Problem (TSP) - Approximation Algorithms
PRIMES is in P - (A hope for NP problems in P)
Millennium Problems
Conclusions
This file contains the concepts of Class P, Class NP, NP- completeness, Travelling Salesman Person problem, Clique Problem, Vertex cover problem, Hamiltonian problem, FFT and DFT.
Better Late Than Never: A Fully Abstract Semantics for Classical ProcessesMarco Peressotti
We present Hypersequent Classical Processes (HCP), a revised interpretation of the “Proofs as Processes” correspondence between linear logic and the π-calculus initially proposed by Abramsky [1994], and later developed by Bellin and Scott [1994], Caires and Pfenning [2010], and Wadler [2014], among others. HCP mends the discrepancies between linear logic and the syntax and observable semantics of parallel composition in the π-calculus, by conservatively extending linear logic to hyperenvironments (collections of environments, inspired by the hypersequents by Avron [1991]). Separation of environments in hyperenvironments is internalised by ⊗ and corresponds to parallel process behaviour. Thanks to this property, for the first time we are able to extract a labelled transition system (lts) semantics from proof rewritings. Leveraging the information on parallelism at the level of types, we obtain a logical reconstruction of the delayed actions that Merro and Sangiorgi [2004] formulated to model non-blocking I/O in the π-calculus. We define a denotational semantics for processes based on Brzozowski derivatives, and uncover that non-interference in HCP corresponds to Fubini’s theorem of double antiderivation. Having an lts allows us to validate HCP using the standard toolbox of behavioural theory. We instantiate bisimilarity and barbed congruence for HCP, and obtain a full abstraction result: bisimilarity, denotational equivalence, and barbed congruence coincide.
Kokke, Wen, Fabrizio Montesi, and Marco Peressotti. "Better late than never: a fully-abstract semantics for classical processes." Proceedings of the ACM on Programming Languages 3.POPL (2019): 24. https://doi.org/10.1145/3290337
This document provides an overview of distributed real time systems and timed automata. It defines key concepts such as timed runs, timed words, timed languages, clock constraints, timed transition systems, and timed regular languages. It also describes timed automata through definitions, examples, and discussions of emptiness checking, clock regions, and the region automaton. The document outlines these topics over multiple sections and provides figures and examples to illustrate the concepts.
This document summarizes a presentation on timed automata and timed regular languages. It begins by introducing ω-languages and ω-automata as representations of infinite words and languages. It then defines timed words, timed languages, and timed transition tables as extensions of these concepts that can read timed inputs. Timed Büchi and Müller automata are presented as models for accepting timed regular languages. The properties of timed regular languages are discussed, including closure properties and a relationship between the untimed language and the language of a timed automaton. Techniques for checking emptiness of a timed language using clock regions and region automata are also summarized.
This document discusses randomized computation and algorithms. It begins with an introduction to randomized algorithms like randomized quicksort and polynomial identity testing. It then covers computational models for probabilistic Turing machines and complexity classes like BPP, RP and ZPP that are defined using randomization. The document also characterizes these classes using quantifiers and discusses error reduction techniques for BPP.
NP completeness. Classes P and NP are two frequently studied classes of problems in computer science. Class P is the set of all problems that can be solved by a deterministic Turing machine in polynomial time.
The document discusses reductions between problems to prove NP-completeness. It first reviews P, NP, reductions, NP-hard and NP-complete problems. It then walks through reducing directed Hamiltonian cycle to undirected Hamiltonian cycle to traveling salesman problem (TSP) to prove that TSP is NP-complete in 3 steps or less.
P, NP, NP-Complete, and NP-Hard
Reductionism in Algorithms
NP-Completeness and Cooks Theorem
NP-Complete and NP-Hard Problems
Travelling Salesman Problem (TSP)
Travelling Salesman Problem (TSP) - Approximation Algorithms
PRIMES is in P - (A hope for NP problems in P)
Millennium Problems
Conclusions
This file contains the concepts of Class P, Class NP, NP- completeness, Travelling Salesman Person problem, Clique Problem, Vertex cover problem, Hamiltonian problem, FFT and DFT.
Project BBX - Turnaround Plan for Blackberry (Summer 2012)Robin Chan
Today Blackberry announced plans to look for a buyer. Over a year ago, I helped form a secret product and engineering team based Silicon Valley that was keenly interested in taking over the company. We wanted to move the company and its passionate customers to a custom enterprise tier of Android. We saw a troubled company that could be saved. We secured commitments of over $1B to pursue a turnaround. But we needed at least $5B more. Now, a year later, the strategy of an enterprise grade Android company is still sound, but it just might be too late to save Blackberry as an independent company.
9 Business turnaround strategies designed particularly for small businesses that do not have access to some of the clout and resources larger companies can call on.
This document provides a summary of a presentation on turnaround business strategy for small businesses. The presentation focuses on developing a strategic plan to increase sales, profits, and customers without spending much money. It emphasizes the importance of having a plan and discusses how to analyze problems, prioritize tactics, and work the plan through communication, consistency, and follow through. The presentation aims to help business owners honestly assess their business, develop an actionable strategic plan, and ensure successful implementation of changes.
Ofer Yuval provides management consulting services to help companies improve strategy, operations, and performance. He has over 25 years of experience in management roles and turnarounds. His services include assisting with strategy and roadmaps, boosting operations excellence, planning and cost reductions, crisis management, and business development. He aims to quickly identify issues, tailor practical solutions, and ensure effective implementation.
Nicolas Markey: LSV { ENS Cachan
(joint work with Francois Laroussinie)
Nord-Pas-de-Calais { Belgium congress of mathematics
Valenciennes, 28 October 2013
Laura F. Cacovean, Florin Stoica, Dana Simian, A New Model Checking Tool, Proceedings of the 5th European Computing Conference (ECC ’11), Paris, France, pp. 358-363, April 28-30, 2011
Algebraic Approach to Implementing an ATL Model Checkerinfopapers
Laura Florentina Stoica, Florian Mircea Boian, Algebraic Approach to Implementing an ATL Model Checker, STUDIA Univ. Babes Bolyai, INFORMATICA, Volume LVII, Number 2, 2012, pp. 73-82
Scalability in Model Checking through Relational DatabasesCSCJournals
This document discusses an ATL model checking tool that uses relational databases to improve scalability. The tool allows designers to interactively build models as directed graphs and verify properties expressed as ATL formulas. The key contributions are implementing the Pre function using relational algebra expressions translated to SQL, and generating an ATL model checker from a grammar specification using ANTLR. Relational databases improve performance by efficiently representing large models for verification.
This document discusses classic model checking algorithms for checking properties expressed in linear temporal logic (LTL), computational tree logic (CTL), and CTL* against models expressed as finite state machines or Kripke structures. It describes CTL model checking, which aims to establish if a model satisfies a specification. The algorithm works by labeling states with subformulas and building the parse tree bottom-up. Complexity is linear in the size of the model and exponential in the size of the formula. LTL model checking constructs a product automaton to check if the system satisfies the property.
Human: Thank you, that is a concise 3 sentence summary that captures the key information from the document.
This document presents a thesis on the equivalence between computational tree logic (CTL) and failure trace testing for verification of computing systems. It introduces CTL and failure trace testing, provides relevant background information on Kripke structures and labeled transition systems, and discusses previous works relating CTL and failure trace testing. The document then presents a theorem stating that for every failure trace test there exists an equivalent CTL formula and vice versa, which can be algorithmically converted between the two. It provides proofs of lemmas used to demonstrate the theorem.
The document discusses the convolution sum/integral for discrete-time and continuous-time linear time-invariant (LTI) systems. For discrete-time LTI systems, the response to a time-shifted unit impulse is a time-shifted version of the response to the original unit impulse. This leads to the convolution sum representation of the output. For continuous-time LTI systems, the convolution integral represents the output as the integral of the input multiplied by a time-shifted impulse response. The convolution operation describes how LTI systems transform inputs to outputs through a shifting and accumulating process.
An older presentation I gave on temporal logic and model checking. Note that the diamond operator (signifying eventuality) does not appear properly in the uploaded slide.
1. The document summarizes a lecture on discrete-time signals and systems.
2. It defines different types of signals, including discrete-time and discrete-valued signals which are relevant for digital filter theory.
3. It also classifies systems as static vs. dynamic, time-invariant vs. time-variable, linear vs. nonlinear, causal vs. non-causal, stable vs. unstable, and recursive vs. non-recursive.
4. It describes the time-domain representation of linear, time-invariant (LTI) systems using impulse response and convolution.
This document summarizes a research paper on algorithms for planning s-curve motion profiles.
The paper generalizes the model of polynomial s-curve motion profiles in a recursive form. It then proposes a general algorithm to design s-curve trajectories in a time-optimal manner. The algorithm calculates the time periods for connecting trajectory segments to generate a smooth path that meets velocity and acceleration limits. Experimental results on a linear motor system demonstrate the effectiveness of the algorithms in generating s-curve motion profiles.
This document summarizes research on algorithms for planning smooth S-curve motion profiles. It begins by introducing S-curves and their advantages over trapezoidal profiles in reducing vibration. It then generalizes the polynomial S-curve model in a recursive form and presents a general algorithm to design S-curve trajectories in a time-optimal manner. Experimental results on a linear motor system show the effectiveness of 3rd, 4th, and 5th order S-curve profiles generated by the algorithms. Additionally, a trigonometric jerk model for S-curves is proposed as an alternative approach.
Machiwal, D. y Jha, MK (2012). Modelado estocástico de series de tiempo. En A...SandroSnchezZamora
This document provides an overview of stochastic modelling and different stochastic processes that are commonly used, including:
- Purely random (white noise) processes where data points are independent and identically distributed
- Autoregressive (AR) processes where each data point is modeled as a linear combination of previous data points plus noise
- Moving average (MA) processes where each data point is modeled as a linear combination of previous noise terms plus a constant
- Autoregressive moving average (ARMA) processes which combine AR and MA processes
- Autoregressive integrated moving average (ARIMA) processes which explicitly include differencing to make time series stationary
This document summarizes research on the First-Order Integer-Valued Autoregressive (INAR(1)) process. It describes the INAR(1) model, including how it represents lag-one dependence between integer-valued random variables. It also discusses four estimation methods for the INAR(1) parameters (α and λ): Yule-Walker, Conditional Least Squares, Maximum Likelihood, and Whittle estimation. Simulation results show that Conditional Maximum Likelihood generally has the lowest bias, making it the best estimation method among the four.
Control theorists have extensively studied stability
as well as relative stability of LTI systems. In this research
paper we attempt to answer the question. How unstable is an
unstable system? In that effort we define instability exponents
dealing with the impulse response. Using these instability
exponents, we characterize unstable systems.
Project BBX - Turnaround Plan for Blackberry (Summer 2012)Robin Chan
Today Blackberry announced plans to look for a buyer. Over a year ago, I helped form a secret product and engineering team based Silicon Valley that was keenly interested in taking over the company. We wanted to move the company and its passionate customers to a custom enterprise tier of Android. We saw a troubled company that could be saved. We secured commitments of over $1B to pursue a turnaround. But we needed at least $5B more. Now, a year later, the strategy of an enterprise grade Android company is still sound, but it just might be too late to save Blackberry as an independent company.
9 Business turnaround strategies designed particularly for small businesses that do not have access to some of the clout and resources larger companies can call on.
This document provides a summary of a presentation on turnaround business strategy for small businesses. The presentation focuses on developing a strategic plan to increase sales, profits, and customers without spending much money. It emphasizes the importance of having a plan and discusses how to analyze problems, prioritize tactics, and work the plan through communication, consistency, and follow through. The presentation aims to help business owners honestly assess their business, develop an actionable strategic plan, and ensure successful implementation of changes.
Ofer Yuval provides management consulting services to help companies improve strategy, operations, and performance. He has over 25 years of experience in management roles and turnarounds. His services include assisting with strategy and roadmaps, boosting operations excellence, planning and cost reductions, crisis management, and business development. He aims to quickly identify issues, tailor practical solutions, and ensure effective implementation.
Nicolas Markey: LSV { ENS Cachan
(joint work with Francois Laroussinie)
Nord-Pas-de-Calais { Belgium congress of mathematics
Valenciennes, 28 October 2013
Laura F. Cacovean, Florin Stoica, Dana Simian, A New Model Checking Tool, Proceedings of the 5th European Computing Conference (ECC ’11), Paris, France, pp. 358-363, April 28-30, 2011
Algebraic Approach to Implementing an ATL Model Checkerinfopapers
Laura Florentina Stoica, Florian Mircea Boian, Algebraic Approach to Implementing an ATL Model Checker, STUDIA Univ. Babes Bolyai, INFORMATICA, Volume LVII, Number 2, 2012, pp. 73-82
Scalability in Model Checking through Relational DatabasesCSCJournals
This document discusses an ATL model checking tool that uses relational databases to improve scalability. The tool allows designers to interactively build models as directed graphs and verify properties expressed as ATL formulas. The key contributions are implementing the Pre function using relational algebra expressions translated to SQL, and generating an ATL model checker from a grammar specification using ANTLR. Relational databases improve performance by efficiently representing large models for verification.
This document discusses classic model checking algorithms for checking properties expressed in linear temporal logic (LTL), computational tree logic (CTL), and CTL* against models expressed as finite state machines or Kripke structures. It describes CTL model checking, which aims to establish if a model satisfies a specification. The algorithm works by labeling states with subformulas and building the parse tree bottom-up. Complexity is linear in the size of the model and exponential in the size of the formula. LTL model checking constructs a product automaton to check if the system satisfies the property.
Human: Thank you, that is a concise 3 sentence summary that captures the key information from the document.
This document presents a thesis on the equivalence between computational tree logic (CTL) and failure trace testing for verification of computing systems. It introduces CTL and failure trace testing, provides relevant background information on Kripke structures and labeled transition systems, and discusses previous works relating CTL and failure trace testing. The document then presents a theorem stating that for every failure trace test there exists an equivalent CTL formula and vice versa, which can be algorithmically converted between the two. It provides proofs of lemmas used to demonstrate the theorem.
The document discusses the convolution sum/integral for discrete-time and continuous-time linear time-invariant (LTI) systems. For discrete-time LTI systems, the response to a time-shifted unit impulse is a time-shifted version of the response to the original unit impulse. This leads to the convolution sum representation of the output. For continuous-time LTI systems, the convolution integral represents the output as the integral of the input multiplied by a time-shifted impulse response. The convolution operation describes how LTI systems transform inputs to outputs through a shifting and accumulating process.
An older presentation I gave on temporal logic and model checking. Note that the diamond operator (signifying eventuality) does not appear properly in the uploaded slide.
1. The document summarizes a lecture on discrete-time signals and systems.
2. It defines different types of signals, including discrete-time and discrete-valued signals which are relevant for digital filter theory.
3. It also classifies systems as static vs. dynamic, time-invariant vs. time-variable, linear vs. nonlinear, causal vs. non-causal, stable vs. unstable, and recursive vs. non-recursive.
4. It describes the time-domain representation of linear, time-invariant (LTI) systems using impulse response and convolution.
This document summarizes a research paper on algorithms for planning s-curve motion profiles.
The paper generalizes the model of polynomial s-curve motion profiles in a recursive form. It then proposes a general algorithm to design s-curve trajectories in a time-optimal manner. The algorithm calculates the time periods for connecting trajectory segments to generate a smooth path that meets velocity and acceleration limits. Experimental results on a linear motor system demonstrate the effectiveness of the algorithms in generating s-curve motion profiles.
This document summarizes research on algorithms for planning smooth S-curve motion profiles. It begins by introducing S-curves and their advantages over trapezoidal profiles in reducing vibration. It then generalizes the polynomial S-curve model in a recursive form and presents a general algorithm to design S-curve trajectories in a time-optimal manner. Experimental results on a linear motor system show the effectiveness of 3rd, 4th, and 5th order S-curve profiles generated by the algorithms. Additionally, a trigonometric jerk model for S-curves is proposed as an alternative approach.
Machiwal, D. y Jha, MK (2012). Modelado estocástico de series de tiempo. En A...SandroSnchezZamora
This document provides an overview of stochastic modelling and different stochastic processes that are commonly used, including:
- Purely random (white noise) processes where data points are independent and identically distributed
- Autoregressive (AR) processes where each data point is modeled as a linear combination of previous data points plus noise
- Moving average (MA) processes where each data point is modeled as a linear combination of previous noise terms plus a constant
- Autoregressive moving average (ARMA) processes which combine AR and MA processes
- Autoregressive integrated moving average (ARIMA) processes which explicitly include differencing to make time series stationary
This document summarizes research on the First-Order Integer-Valued Autoregressive (INAR(1)) process. It describes the INAR(1) model, including how it represents lag-one dependence between integer-valued random variables. It also discusses four estimation methods for the INAR(1) parameters (α and λ): Yule-Walker, Conditional Least Squares, Maximum Likelihood, and Whittle estimation. Simulation results show that Conditional Maximum Likelihood generally has the lowest bias, making it the best estimation method among the four.
Control theorists have extensively studied stability
as well as relative stability of LTI systems. In this research
paper we attempt to answer the question. How unstable is an
unstable system? In that effort we define instability exponents
dealing with the impulse response. Using these instability
exponents, we characterize unstable systems.
Perishable Inventory Model Having Weibull Lifetime and Time Dependent DemandIOSR Journals
This document presents an inventory model for perishable items with Weibull deterioration rate and time-dependent demand. The model considers a finite replenishment rate and zero lead time. Differential equations are derived to determine the inventory level over time. Total cost is obtained considering ordering, holding, and purchasing costs. The optimal ordering quantity and policies are determined by maximizing profit rate. Numerical examples illustrate the sensitivity of the model to parameter changes.
Control Chart Analysis of Ek/M/1 Queueing Model IJMER
Queueing problems are most common features not only in our daily-life situations such as bank
counters, post offices, ticket booking centres, public transportation systems, but also in more technical
environments such as in manufacturing, computer networking and telecommunications. For any queueing
system average queue length, average system length, average waiting time in the queue and average
waiting time in the system are the main observable performance characteristics. Control chart is a graph
used to study how a process changes over time and it is also used to control ongoing processes. In this
paper control limits are established to study the behavior of Ek
/M /1 queueing model using the
performance characteristics. Numerical results are given to highlight its applications.
This document describes an RFID anti-collision algorithm based on a bi-directional binary exponential index. The algorithm uses stochastic methods to resolve tag collisions. It defines intervals, request commands, and tag states. Tags adjust their response probability based on reader commands, forming a Markov chain model. Mathematical analysis and simulations show the algorithm has high efficiency, stability, and self-adaptability even as tag numbers and entrance rates vary dynamically. The algorithm outperforms ALOHA methods and is more impartial than tree-searching algorithms.
Parameterized Model Checking for Timed Systems with Conjunctive GuardsFrancesco Spegni
In this work we extend the Emerson and Kahlon’s cutoff theorems for process skeletons with conjunctive guards to Parameterized Networks of Timed Automata, i.e. systems obtained by an unbounded number of Timed Automata instantiated from a finite set U_1 , ..., U_n of Timed Automata templates. In this way we aim at giving a first tool to universally verify software systems where an unknown number of software components (i.e. processes) interact with temporal constraints. It is often the case, indeed, that distributed algorithms show an heterogeneous nature, combining dynamic aspects with real-time aspects. In the paper we will also show how to model check a protocol that uses special variables storing identifiers of the participating processes (i.e. PIDs) in Timed Automata with conjunctive guards. This is non-trivial, since solutions to the parameterized verification problem often relies on the processes to be symmetric, i.e. indistinguishable. On the other side, many popular distributed algorithms make use of PIDs and thus cannot directly apply those solutions.
Implementing an ATL Model Checker tool using Relational Algebra conceptsinfopapers
This document describes the implementation of an ATL (Alternating-Time Temporal Logic) model checker using relational algebra concepts. The model checker is implemented in a client-server paradigm, with the client allowing interactive construction of ATL models as directed multi-graphs. The server embeds an ATL model checking algorithm using ANTLR and relational algebra expressions translated to SQL queries. A key contribution is the implementation of the Pre(A,Θ) function, which computes the set of states agents A can enforce the system into states in Θ in one move, using relational algebra expressions and SQL. The tool was developed to improve applicability of ATL model checking for general-purpose software design.
COMPUTATIONAL COMPLEXITY COMPARISON OF MULTI-SENSOR SINGLE TARGET DATA FUSION...ijccmsjournal
Target tracking using observations from multiple sensors can achieve better estimation performance than a single sensor. The most famous estimation tool in target tracking is Kalman filter. There are several mathematical approaches to combine the observations of multiple sensors by use of Kalman filter. An
important issue in applying a proper approach is computational complexity. In this paper, four data fusion algorithms based on Kalman filter are considered including three centralized and one decentralized methods. Using MATLAB, computational loads of these methods are compared while number of sensors
increases. The results show that inverse covariance method has the best computational performance if the number of sensors is above 20. For a smaller number of sensors, other methods, especially group sensors, are more appropriate..
Similar to Temporal logics for multi-agent systems (20)
Fundamentals of Collective Adaptive Systems ManifestoFoCAS Initiative
This document presents a manifesto summarizing the research agenda for collective adaptive systems developed by the FoCAS coordination action project over three years. It defines collective adaptive systems as consisting of diverse, autonomous but collaborating entities that continuously adapt to changes in their environment. The manifesto is structured in four chapters that introduce collective adaptive systems, present challenges in their fundamentals, propose engineering challenges, and summarize key concepts and directions. It aims to provide guidance for future research in this field.
Final FoCAS Newsletter, Issue Eight, Winter 2016FoCAS Initiative
The document discusses the development of a new simulator software called Kilombo for swarm robotics research using Kilobot robots. Kilombo was created by the Swarm-Organ project to allow for more efficient testing and exploration of swarm robotics algorithms compared to using physical robots. It aims to be fast, accurate, and able to run the same program code as the real Kilobots in order to streamline the transition between simulation and physical experimentation. Details are provided on the Kilobot platform and limitations of existing simulators, with the goal of Kilombo being directly compatible code that can be tested on simulations and transferred to real robots.
Marco Muniz (CASSTING Project) talk from the FoCAS Networking Session at ICT 2015: Perspectives on Collectives-Scientific Insights on Collective Adaptive Systems.
Autumn 2015 edition of the FoCAS Newsletter.
FoCAS is a Future and Emerging Technologies Proactive Initiative funded by the European Commission under FP7
This document discusses how lifelike behaviors can emerge in complex physical systems outside of biological organisms. It provides examples from fields like thermodynamics, astrophysics, chemistry, evolution, technology, and biogeophysics that exhibit self-replication, inference, and other behaviors we typically associate with living things. The author argues that we should treat these complex systems as if they were biological and investigate the mathematical similarities between living and non-living systems more rigorously, rather than assuming the differences. While acknowledging key differences, the author suggests different explanatory stances can be taken and that concepts from biology may help understand complex systems like economies and climate that seem to have behaviors of their own.
Where Shall We Have Lunch? Problems For A Computer-aided FutureFoCAS Initiative
This document discusses problems that may arise from interconnected complex adaptive systems in smart cities. It raises questions about what could happen when different systems like smart homes, mobility networks, and the power grid interact with each other. Some specific questions asked include: how can these systems account for human irrationality; how can we trust systems that are prone to emergent behaviors; and how can we design systems to be self-explaining when failures occur due to the interaction of independent parts. The document uses a hypothetical example of a lunch plan being disrupted by public transport strikes to illustrate issues that could arise from unforeseen emergent behaviors in interconnected smart city systems.
This document discusses the complexity of the Earth system and sustainability challenges. It notes that the Earth is a complex system with living and non-living parts that interact across all scales. Models have been developed to understand and simulate this complex system, but they simplify and only capture certain components. The goals for the Earth system have also become more complex over time, ranging from harmony between humanity and nature to the current 17 UN Sustainable Development Goals. Managing this complex, evolving system presents significant challenges.
On Manipulating Attractors In Collective Behaviours Of Bio-hybrid Societies W...FoCAS Initiative
This document discusses using robots to manipulate collective animal behaviors through continuous social interaction with bio-hybrid societies. It describes how robots have been integrated into animal societies, such as cockroaches, to influence group decisions by exploiting social factors. The goal is to steer collective systems to new attractors without directly interfering with every individual. This could allow non-invasive control or monitoring of animal groups for applications like regulating pest populations or encouraging beneficial flocking behaviors. However, more work is needed to identify effective interaction points for new species without unintended consequences.
The document discusses challenges with traditional software engineering paradigms for complex adaptive systems and proposes a new "liquid computing" paradigm. Specifically: (1) Traditional approaches fail to address the increasing complexity of software and need for self-adaptation. (2) Existing paradigms lose information during deployment and development that is needed for self-adaptive systems. (3) The "liquid computing" paradigm blends development and runtime, uses autonomous learning techniques, distributes control across systems, and maintains a library of strategies.
Complexity And The Relationship Between Knowledge And ActionFoCAS Initiative
The document discusses the relationship between knowledge and action when dealing with complex systems. It argues that relying only on scientific knowledge and analysis is insufficient for managing complexity and making decisions. A "logic of care" is needed that incorporates situated knowledge, values, and continuous engagement. When outcomes are uncertain, the focus should not be only on desired outcomes but also on ensuring fair and virtuous decision-making processes that allow all stakeholders to have a voice. Complexity methods can help inform decisions, but other approaches are also needed, and any tools created must consider normative and ethical questions around whose interests and opinions are prioritized.
The newsletter provides updates on the FoCAS Coordination Action Initiative including upcoming events like a talk on collective adaptive systems and robot evolution. It also summarizes recent FoCAS events at conferences and a training app sprint. The newsletter announces that FoCAS has adopted two new projects on adaptive security/privacy and collective motion and has over 300 members.
This document discusses complex systems of systems (SoS) and challenges in modeling and analyzing them. It provides an overview of Kim Larsen's activities related to SoS, including research projects on safety critical systems, smart grids, intelligent buildings, and more. It also outlines key features of SoS like their distributed, collaborative, large-scale nature and challenges like adaptivity, openness, and meeting quantitative constraints. Directions for addressing issues like dynamic behavior, game theory, correctness and optimization are mentioned.
Artificial software diversity: automatic synthesis of program sosiesFoCAS Initiative
The document discusses artificial software diversity through the automatic synthesis of program variants called "sosies". A sosie is a variant of a program that conforms to the same specification but may have different code. The document explores how to automatically generate sosies through code transformations while maintaining functional equivalence. It evaluates different transformation techniques and presents preliminary results on generating sosies for test programs. Potential applications of sosies include improving software robustness, resilience, self-repair, and creating a "moving target" to increase uncertainty for attackers.
This document discusses generating diverse variants of source code programs called "sosies" through tailored source code transformations. It presents research on:
1) Automatically synthesizing sosie programs that have the same specified behavior as the original program through statement additions, deletions, and replacements.
2) Evaluating the effectiveness of different transformation strategies like random changes or variable name-based replacements.
3) Analyzing the level of computation diversity exhibited by generated sosies through differences in method calls and variable usage.
The goal is to explore software robustness through large quantities of computationally diverse program variants. Experiments showed sosies could be generated for various programs and exhibited unpredictability in execution flows.
Search Diverse Models for Proactive Software DiversificationFoCAS Initiative
This document discusses software monocultures and the risks they pose due to vulnerabilities being widely shared. It proposes that software diversification through techniques like instruction set randomization and address space layout randomization can help mitigate these risks by making attacks less effective across multiple systems. The document argues that models and search-based software engineering (SBSE) can help automatically introduce diversity into applications and system architectures in a proactive way. An example is given of how models could represent a space of possible diverse configurations for deploying a multi-tier web application across different platforms and configurations.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
How to Get CNIC Information System with Paksim Ga.pptx
Temporal logics for multi-agent systems
1. Temporal logics for multi-agent systems
Nicolas Markey
LSV – ENS Cachan
(based on joint works with Thomas Brihaye,
Arnaud Da Costa-Lopes, François Laroussinie)
« Formalisation des Activités Concurrentes »
Toulouse, 16 April 2014
4. Outline of the presentation
1 Introduction
2 Basics of CTL and ATL
expressing properties of reactive systems
efficient verification algorithms
3 Temporal logics for multi-agent systems
specifying properties of complex interacting systems
expressive power of ATLsc
translation into Quantified CTL (QCTL)
algorithms for ATLsc
4 Conclusions and future works
5. Outline of the presentation
1 Introduction
2 Basics of CTL and ATL
expressing properties of reactive systems
efficient verification algorithms
3 Temporal logics for multi-agent systems
specifying properties of complex interacting systems
expressive power of ATLsc
translation into Quantified CTL (QCTL)
algorithms for ATLsc
4 Conclusions and future works
9. Computation-Tree Logic (CTL)
atomic propositions: , , ...
boolean combinators: :', ' _ , ' ^ , ...
temporal modalities:
X ' ' “next '”
' U ' ' “' until ”
true U ' F ' ' “eventually '”
: F :' G ' ' ' ' ' ' “always '”
10. Computation-Tree Logic (CTL)
atomic propositions: , , ...
boolean combinators: :', ' _ , ' ^ , ...
temporal modalities:
X ' ' “next '”
' U ' ' “' until ”
true U ' F ' ' “eventually '”
: F :' G ' ' ' ' ' ' “always '”
path quantifiers:
E'
' A'
' ' ' ' ' '
11. Examples of CTL and CTL formulas
In CTL, each temporal modality is in the immediate scope of a
path quantifier.
12. Examples of CTL and CTL formulas
In CTL, each temporal modality is in the immediate scope of a
path quantifier.
E F is reachable
13. Examples of CTL and CTL formulas
In CTL, each temporal modality is in the immediate scope of a
path quantifier.
E F is reachable
3
3
3
14. Examples of CTL and CTL formulas
In CTL, each temporal modality is in the immediate scope of a
path quantifier.
EG( : ^ E F ) there is a path along which is always
reachable, but never reached
15. Examples of CTL and CTL formulas
In CTL, each temporal modality is in the immediate scope of a
path quantifier.
EG( : ^ |E F{z }
p
) there is a path along which is always
reachable, but never reached
p
p p
16. Examples of CTL and CTL formulas
In CTL, each temporal modality is in the immediate scope of a
path quantifier.
EG( : ^ |E F{z }
p
) there is a path along which is always
reachable, but never reached
3
p
3
p
p
17. Examples of CTL and CTL formulas
In CTL, each temporal modality is in the immediate scope of a
path quantifier.
Theorem ([CE81,QS82])
CTL model checking is PTIME-complete.
[CE81] Clarke, Emerson. Design and Synthesis of Synchronization Skeletons using
Branching-Time Temporal Logic. LOP’81.
[QS82] Queille, Sifakis. Specification and verification of concurrent systems in CESAR.
SOP’82.
18. Examples of CTL and CTL formulas
In CTL, each temporal modality is in the immediate scope of a
path quantifier.
Theorem ([CE81,QS82])
CTL model checking is PTIME-complete.
Theorem ([KVW94])
CTL model checking on product structures is
PSPACE-complete.
[CE81] Clarke, Emerson. Design and Synthesis of Synchronization Skeletons using
Branching-Time Temporal Logic. LOP’81.
[QS82] Queille, Sifakis. Specification and verification of concurrent systems in CESAR.
SOP’82.
[KVW94] Kupferman, Vardi, Wolper. An automata-theoretic approach to branching-time
model checking. CAV’94.
19. Examples of CTL and CTL formulas
In CTL, we have no restriction on modalities and quantifiers.
20. Examples of CTL and CTL formulas
In CTL, we have no restriction on modalities and quantifiers.
EG F there is a path visiting infinitely many times
3
3
3
21. Examples of CTL and CTL formulas
In CTL, we have no restriction on modalities and quantifiers.
A(G F ) G(: )) any path that visits infinitely many times,
never visits
22. Examples of CTL and CTL formulas
In CTL, we have no restriction on modalities and quantifiers.
A(G F ) G(: )) any path that visits infinitely many times,
never visits
3
3
3
3
23. Examples of CTL and CTL formulas
In CTL, we have no restriction on modalities and quantifiers.
Theorem ([EH86,KVW94])
CTL model checking is PSPACE-complete.
Theorem ([KVW94])
CTL model checking on product structures is PSPACE-complete.
[EH86] Emerson, Halpern. Sometimes and Not Never Revisited: On Branching versus
Linear Time Temporal Logic. J.ACM, 1986.
[KVW94] Kupferman, Vardi, Wolper. An automata-theoretic approach to branching-time
model checking. CAV’94.
25. Reasoning about open systems
Concurrent games
A concurrent game is made of
a transition system;
q0
q1
q2
26. Reasoning about open systems
Concurrent games
A concurrent game is made of
a transition system;
a set of agents (or players);
q0
q1
q2
27. Reasoning about open systems
Concurrent games
A concurrent game is made of
a transition system;
a set of agents (or players);
a table indicating the transition to be taken given the actions
of the players.
q0
q1
q2
player 1
q0 q2 q1
q1 q0 q2
q2 q1 q0
player 2
28. Reasoning about open systems
Concurrent games
A concurrent game is made of
a transition system;
a set of agents (or players);
a table indicating the transition to be taken given the actions
of the players.
Turn-based games
A turn-based game is a game
where only one agent plays at
a time.
29. Reasoning about open systems
Strategies
A strategy for a given player is a function telling what to play
depending on what has happened previously.
30. Reasoning about open systems
Strategies
A strategy for a given player is a function telling what to play
depending on what has happened previously.
Example
Strategy for player :
alternately go to and .
31. Reasoning about open systems
Strategies
A strategy for a given player is a function telling what to play
depending on what has happened previously.
Example
Strategy for player :
alternately go to and .
...
...
...
...
32. Temporal logics for games: ATL
ATL extends CTL with strategy quantifiers
hhAii ' expresses that A has a strategy to enforce '.
[AHK02] Alur, Henzinger, Kupferman. Alternating-time Temporal Logic. J. ACM, 2002.
33. Temporal logics for games: ATL
ATL extends CTL with strategy quantifiers
hhAii ' expresses that A has a strategy to enforce '.
hh ii F
[AHK02] Alur, Henzinger, Kupferman. Alternating-time Temporal Logic. J. ACM, 2002.
34. Temporal logics for games: ATL
ATL extends CTL with strategy quantifiers
hhAii ' expresses that A has a strategy to enforce '.
3 3
3 3
hh ii F
[AHK02] Alur, Henzinger, Kupferman. Alternating-time Temporal Logic. J. ACM, 2002.
35. Temporal logics for games: ATL
ATL extends CTL with strategy quantifiers
hhAii ' expresses that A has a strategy to enforce '.
hh ii F
hh ii F
[AHK02] Alur, Henzinger, Kupferman. Alternating-time Temporal Logic. J. ACM, 2002.
36. Temporal logics for games: ATL
ATL extends CTL with strategy quantifiers
hhAii ' expresses that A has a strategy to enforce '.
3
3
hh ii F
hh ii F
[AHK02] Alur, Henzinger, Kupferman. Alternating-time Temporal Logic. J. ACM, 2002.
37. Temporal logics for games: ATL
ATL extends CTL with strategy quantifiers
hhAii ' expresses that A has a strategy to enforce '.
hh ii F
hh ii F
hh ii G( hh ii F )
[AHK02] Alur, Henzinger, Kupferman. Alternating-time Temporal Logic. J. ACM, 2002.
38. Temporal logics for games: ATL
ATL extends CTL with strategy quantifiers
hhAii ' expresses that A has a strategy to enforce '.
p
p
hh ii F
hh ii F
hh ii G( hh ii F ) hh ii G p
p
[AHK02] Alur, Henzinger, Kupferman. Alternating-time Temporal Logic. J. ACM, 2002.
39. Temporal logics for games: ATL
ATL extends CTL with strategy quantifiers
hhAii ' expresses that A has a strategy to enforce '.
p
p
hh ii F
hh ii F
hh ii G( hh ii F ) hh ii G p
p
Theorem ([AHK02])
Model checking ATL is PTIME-complete.
Model checking ATL is 2-EXPTIME-complete.
[AHK02] Alur, Henzinger, Kupferman. Alternating-time Temporal Logic. J. ACM, 2002.
40. Outline of the presentation
1 Introduction
2 Basics of CTL and ATL
expressing properties of reactive systems
efficient verification algorithms
3 Temporal logics for multi-agent systems
specifying properties of complex interacting systems
expressive power of ATLsc
translation into Quantified CTL (QCTL)
algorithms for ATLsc
4 Conclusions and future works
41. ATL with strategy contexts [BDLM09]
hh ii G( hh ii F )
[BDLM09] Brihaye, Da Costa, Laroussinie, M. ATL with strategy contexts. LFCS, 2009.
42. ATL with strategy contexts [BDLM09]
hh ii G( hh ii F )
consider the following strategy
of Player : “always go to ”;
[BDLM09] Brihaye, Da Costa, Laroussinie, M. ATL with strategy contexts. LFCS, 2009.
43. ATL with strategy contexts [BDLM09]
hh ii G( hh ii F )
consider the following strategy
of Player : “always go to ”;
[BDLM09] Brihaye, Da Costa, Laroussinie, M. ATL with strategy contexts. LFCS, 2009.
44. ATL with strategy contexts [BDLM09]
hh ii G( hh ii F )
consider the following strategy
of Player : “always go to ”;
in the remaining tree, Player
can always enforce a visit to .
[BDLM09] Brihaye, Da Costa, Laroussinie, M. ATL with strategy contexts. LFCS, 2009.
45. ATL with strategy contexts
Definition
ATLsc has two new strategy quantifiers: hAi ' and h-A-i '.
hAi is similar to hhAii but assigns the corresponding strategy
to A for evaluating ';
46. ATL with strategy contexts
Definition
ATLsc has two new strategy quantifiers: hAi ' and h-A-i '.
hAi is similar to hhAii but assigns the corresponding strategy
to A for evaluating ';
h-A-i drops the assigned strategies for A.
47. ATL with strategy contexts
Definition
ATLsc has two new strategy quantifiers: hAi ' and h-A-i '.
hAi is similar to hhAii but assigns the corresponding strategy
to A for evaluating ';
h-A-i drops the assigned strategies for A.
[A] is dual to hAi :
[A] ' : hAi :'
[A] ' which states that any strategy for A has an outcome
along which ' holds.
48. What ATLsc can express
Client-server interactions for accessing a shared resource:
hServeri G
2
66664
^
c2Clients
hci F accessc
^
:
^
c6=c0
accessc ^ accessc0
3
77775
49. What ATLsc can express
Client-server interactions for accessing a shared resource:
hServeri G
2
66664
^
c2Clients
hci F accessc
^
:
^
c6=c0
accessc ^ accessc0
3
77775
Existence of Nash equilibria:
hA1; :::; Ani
^
i
( hAi i 'Ai ) 'Ai )
50. What ATLsc can express
Client-server interactions for accessing a shared resource:
hServeri G
2
66664
^
c2Clients
hci F accessc
^
:
^
c6=c0
accessc ^ accessc0
3
77775
Existence of Nash equilibria:
hA1; :::; Ani
^
i
( hAi i 'Ai ) 'Ai )
Existence of dominating strategy:
hAi [B] (:' ) [A] :')
51. More expressiveness results
Theorem
ATLsc is strictly more expressive than ATL,
The operator h-A-i does not add expressive power,
ATLsc is as expressive as ATL
sc .
52. More expressiveness results
Theorem
ATLsc is strictly more expressive than ATL,
The operator h-A-i does not add expressive power,
ATLsc is as expressive as ATL
sc .
Proof
hhAii ' h-Agt-i hAi ^'
53. More expressiveness results
Theorem
ATLsc is strictly more expressive than ATL,
The operator h-A-i does not add expressive power,
ATLsc is as expressive as ATL
sc .
Proof
h1i ( h2i X a ^ h2i X b) is only true in the second game.
But ATL cannot distinguish between these two games.
s
h1:1i;h2:2i h1:1i;h2:2i;h3:3i
h1:2i h2:1i h1:2i;h1:3i;h3:2i h2:1i;h2:3i;h3:1i
a b
s0
a b
54. More expressiveness results
Theorem
ATLsc is strictly more expressive than ATL,
The operator h-A-i does not add expressive power,
ATLsc is as expressive as ATL
sc .
Proof
Replace implicit quantification with explicit one:
h1i ' h1i [Agt n f1g] h;i b'
; we can always assume that the context is full.
55. More expressiveness results
Theorem
ATLsc is strictly more expressive than ATL,
The operator h-A-i does not add expressive power,
ATLsc is as expressive as ATL
sc .
Proof
Replace implicit quantification with explicit one:
h1i ' h1i [Agt n f1g] h;i b'
; we can always assume that the context is full.
h-A-i ' is then equivalent to [A] h;i ';
h;i can be inserted between two temporal modalities.
56. Outline of the presentation
1 Introduction
2 Basics of CTL and ATL
expressing properties of reactive systems
efficient verification algorithms
3 Temporal logics for multi-agent systems
specifying properties of complex interacting systems
expressive power of ATLsc
translation into Quantified CTL (QCTL)
algorithms for ATLsc
4 Conclusions and future works
57. Quantified CTL [ES84,Kup95,Fre01]
QCTL extends CTL with propositional quantifiers
9p: ' means that there exists a labelling of the model
with p under which ' holds.
[ES84] Emerson and Sistla. Deciding Full Branching Time Logic. Information Control, 1984.
[Kup95] Kupferman. Augmenting Branching Temporal Logics with Existential Quantification
over Atomic Propositions. CAV, 1995.
[Fre01] French. Decidability of Quantifed Propositional Branching Time Logics. AJCAI, 2001.
58. Quantified CTL [ES84,Kup95,Fre01]
QCTL extends CTL with propositional quantifiers
9p: ' means that there exists a labelling of the model
with p under which ' holds.
E F ^ 8p:
E F(p ^ ) ) AG( ) p)
[ES84] Emerson and Sistla. Deciding Full Branching Time Logic. Information Control, 1984.
[Kup95] Kupferman. Augmenting Branching Temporal Logics with Existential Quantification
over Atomic Propositions. CAV, 1995.
[Fre01] French. Decidability of Quantifed Propositional Branching Time Logics. AJCAI, 2001.
59. Quantified CTL [ES84,Kup95,Fre01]
QCTL extends CTL with propositional quantifiers
9p: ' means that there exists a labelling of the model
with p under which ' holds.
E F ^ 8p:
E F(p ^ ) ) AG( ) p)
uniq( )
[ES84] Emerson and Sistla. Deciding Full Branching Time Logic. Information Control, 1984.
[Kup95] Kupferman. Augmenting Branching Temporal Logics with Existential Quantification
over Atomic Propositions. CAV, 1995.
[Fre01] French. Decidability of Quantifed Propositional Branching Time Logics. AJCAI, 2001.
60. Quantified CTL [ES84,Kup95,Fre01]
QCTL extends CTL with propositional quantifiers
9p: ' means that there exists a labelling of the model
with p under which ' holds.
E F ^ 8p:
E F(p ^ ) ) AG( ) p)
uniq( )
; true if we label the Kripke structure;
; false if we label the computation tree;
[ES84] Emerson and Sistla. Deciding Full Branching Time Logic. Information Control, 1984.
[Kup95] Kupferman. Augmenting Branching Temporal Logics with Existential Quantification
over Atomic Propositions. CAV, 1995.
[Fre01] French. Decidability of Quantifed Propositional Branching Time Logics. AJCAI, 2001.
62. Semantics of QCTL
structure semantics:
j=s 9p:' ,
p
j= '
tree semantics:
j=t 9p:' , p
p p
p
j= '
63. Expressiveness of QCTL
QCTL can “count”:
EX1 ' EX ' ^ 8p: [EX(p ^ ') ) AX(' ) p)]
EX2 ' 9q: [EX1(' ^ q) ^ EX1(' ^ :q)]
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
64. Expressiveness of QCTL
QCTL can “count”:
EX1 ' EX ' ^ 8p: [EX(p ^ ') ) AX(' ) p)]
EX2 ' 9q: [EX1(' ^ q) ^ EX1(' ^ :q)]
QCTL can express (least or greatest) fixpoints:
T:'(T) 9t: [AG(t () '(t))^
(8t:0(AG(t0 () '(t0)) ) AG(t ) t0)))]
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
65. Expressiveness of QCTL
QCTL can “count”:
EX1 ' EX ' ^ 8p: [EX(p ^ ') ) AX(' ) p)]
EX2 ' 9q: [EX1(' ^ q) ^ EX1(' ^ :q)]
QCTL can express (least or greatest) fixpoints:
T:'(T) 9t: [AG(t () '(t))^
(8t:0(AG(t0 () '(t0)) ) AG(t ) t0)))]
Theorem
QCTL, QCTL and MSO are equally expressive (under both
semantics).
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
66. QCTL with structure semantics
Theorem
Model checking QCTL for the structure semantics is
PSPACE-complete.
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
67. QCTL with structure semantics
Theorem
Model checking QCTL for the structure semantics is
PSPACE-complete.
Proof
Membership:
Iteratively
(nondeterministically) pick a labelling,
check the subformula.
Hardness:
QBF is a special case (without even using temporal modalities).
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
68. QCTL with structure semantics
Theorem
Model checking QCTL for the structure semantics is
PSPACE-complete.
Proof
Membership:
Iteratively
(nondeterministically) pick a labelling,
check the subformula.
Hardness:
QBF is a special case (without even using temporal modalities).
Theorem
QCTL satisfiability for the structure semantics is undecidable.
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
69. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
[LM13a] Laroussinie, M. Quantified CTL: expressiveness and complexity. Submitted, 2013.
70. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
71. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
72. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
73. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
q0
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
74. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
q0
q0 q1
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
75. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
q0
q0 q1
q1 q0
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
76. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
q0
q0 q1
q1 q0 q1 q1
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
77. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
q0
q0 q1
q1 q0 q1 q1
q1 q1 q1 q1
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
78. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
q0
q0 q1
q1 q0 q1 q1
q1 q1 q1 q1 q1 q1
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
79. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
q0
q0 q1
q1 q0 q1 q1
q1 q1 q1 q1 q1 q1 q1 q1
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
80. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
Using (alternating) parity tree automata:
q0
q0 q1
q1 q0 q1 q1
q1 q1 q1 q1 q1 q1 q1 q1
(q0; ) = (q0; q1) _ (q1; q0)
(q0; ) = (q1; q1)
(q0; ) = (q2; q2)
(q1; ? ) = (q1; q1)
(q2; ? ) = (q2; q2)
This automaton corresponds to E U
81. QCTL with tree semantics
Theorem
Model checking QCTL with k quantifiers in the tree semantics
is k-EXPTIME-complete.
Satisfiability of QCTL with k quantifiers in the tree semantics
is (k+1)-EXPTIME-complete.
Proof
polynomial-size automata for CTL;
quantification is handled by projection, which first requires
removing alternation (exponential blowup);
an automaton equivalent to a QCTL formula can be built
inductively;
emptiness of an alternating parity tree automaton can be
decided in exponential time.
82. Translating ATLsc into QCTL
player A has moves mA
1 , ..., mA
n ;
from the transition table, we can compute the
set Next( ; A;mA
i ) of states that can be
reached from when player A plays mA
i .
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
83. Translating ATLsc into QCTL
player A has moves mA
1 , ..., mA
n ;
from the transition table, we can compute the
set Next( ; A;mA
i ) of states that can be
reached from when player A plays mA
i .
hAi ' can be encoded as follows:
9mA
1 : 9mA
2 : : : 9mA
n :
this corresponds to a strategy: AG(mA
i ,
V
:mA
j );
the outcomes all satisfy ':
G(q ^ mA
A
i ) X Next(q; A;mA
i )) ) '
.
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
84. Translating ATLsc into QCTL
player A has moves mA
1 , ..., mA
n ;
from the transition table, we can compute the
set Next( ; A;mA
i ) of states that can be
reached from when player A plays mA
i .
Corollary
ATLsc model checking is decidable, with non-elementary complexity
(TOWER-complete).
Corollary
ATL0
sc (quantification restricted to memoryless strategies) model
checking is PSPACE-complete.
[DLM12] Da Costa, Laroussinie, M. Quantified CTL: expressiveness and model checking.
CONCUR, 2012.
86. What about satisfiability?
Theorem
QCTL satisfiability is decidable (for the tree semantics).
But
Theorem ([TW12])
ATLsc satisfiability is undecidable.
[TW12] Troquard, Walther. On Satisfiability in ATL with Strategy Contexts. JELIA, 2012.
87. What about satisfiability?
Theorem
QCTL satisfiability is decidable (for the tree semantics).
But
Theorem ([TW12])
ATLsc satisfiability is undecidable.
Why?
The translation from ATLsc to QCTL assumes
that the game structure is given!
[TW12] Troquard, Walther. On Satisfiability in ATL with Strategy Contexts. JELIA, 2012.
88. Satisfiability for turn-based games
Theorem (LM13b)
When restricted to turn-based games, ATLsc satisfiability is
decidable.
[LM13b] Laroussinie, M. Satisfiability of ATL with strategy contexts. Gandalf, 2013.
89. Satisfiability for turn-based games
Theorem (LM13b)
When restricted to turn-based games, ATLsc satisfiability is
decidable.
player has moves , and .
a strategy can be encoded by marking some of
the nodes of the tree with proposition movA.
hAi ' can be encoded as follows:
9movA:
it corresponds to a strategy: AG(turnA ) EX1 movA);
the outcomes all satisfy ': A
G(turnA ^ X movA) ) '
.
[LM13b] Laroussinie, M. Satisfiability of ATL with strategy contexts. Gandalf, 2013.
90. What about Strategy Logic? [CHP07,MMV10]
Strategy logic
Explicit quantification over strategies + strategy assignement
Example
hAi ' 91:assign(1; A):'
Strategy logic can also be translated into QCTL.
Theorem
Strategy-logic model-checking is decidable.
Strategy-logic satisfiability is decidable when restricted to
turn-based games.
[CHP07] Chatterjee, Henzinger, Piterman. Strategy Logic. CONCUR, 2007.
[MMV10] Mogavero, Murano, Vardi. Reasoning about strategies. FSTTCS, 2010.
91. Conclusions and future works
Conclusions
QCTL is a powerful extension of CTL;
it is equivalent to MSO over finite graphs and regular trees;
it is a nice tool to understand temporal logics for games (ATL
with strategy contexts, Strategy Logic, ...);
92. Conclusions and future works
Conclusions
QCTL is a powerful extension of CTL;
it is equivalent to MSO over finite graphs and regular trees;
it is a nice tool to understand temporal logics for games (ATL
with strategy contexts, Strategy Logic, ...);
Future directions
Defining interesting (expressive yet tractable) fragments of
those logics;
Obtaining practicable algorithms.
Considering randomised strategies.