School of Computer Science, The University of Adelaide© The University of Adelaide, 2005. Australian Computer Science Week 2005 Selected papers from: ACSC.

Slides:



Advertisements
Similar presentations
1 Verification by Model Checking. 2 Part 1 : Motivation.
Advertisements

1 Verification of Parameterized Systems Reducing Model Checking of the Few to the One. E. Allen Emerson, Richard J. Trefler and Thomas Wahl Junaid Surve.
CS 336 March 19, 2012 Tandy Warnow.
Representing Boolean Functions for Symbolic Model Checking Supratik Chakraborty IIT Bombay.
M ODEL CHECKING -Vasvi Kakkad University of Sydney.
Introduction to Computer Science 2 Lecture 7: Extended binary trees
Automatic Verification Book: Chapter 6. What is verification? Traditionally, verification means proof of correctness automatic: model checking deductive:
An Introduction to the Model Verifier verds Wenhui Zhang September 15 th, 2010.
Game-theoretic approach to the simulation checking problem Peter Bulychev Vladimir Zakharov Lomonosov Moscow State University.
© Chinese University, CSE Dept. Software Engineering / Software Engineering Topic 1: Software Engineering: A Preview Your Name: ____________________.
22C:19 Discrete Structures Trees Spring 2014 Sukumar Ghosh.
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
Run Time Monitoring of Reactive System Models Mikhail Auguston Naval Postgraduate School Mark Trakhtenbrot Holon Academic Institute of.
Introductory Lecture. What is Discrete Mathematics? Discrete mathematics is the part of mathematics devoted to the study of discrete (as opposed to continuous)
1 Formal Methods in SE Qaisar Javaid Assistant Professor Lecture 05.
An Automata-based Approach to Testing Properties in Event Traces H. Hallal, S. Boroday, A. Ulrich, A. Petrenko Sophia Antipolis, France, May 2003.
Tries Standard Tries Compressed Tries Suffix Tries.
Last time: terminology reminder w Simple graph Vertex = node Edge Degree Weight Neighbours Complete Dual Bipartite Planar Cycle Tree Path Circuit Components.
Xyleme A Dynamic Warehouse for XML Data of the Web.
28/6/05 ICFI05 1 A generic approach for the automatic verification of featured, parameterised systems Alice Miller and Muffy Calder University of Glasgow.
Lecture 4&5: Model Checking: A quick introduction Professor Aditya Ghose Director, Decision Systems Lab School of IT and Computer Science University of.
Categories of Aspects Shmuel Katz Computer Science Department The Technion Haifa, Israel.
Embedded Systems Laboratory Department of Computer and Information Science Linköping University Sweden Formal Verification and Model Checking Traian Pop.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
School of Computer ScienceG53FSP Formal Specification1 Dr. Rong Qu Introduction to Formal Specification
272: Software Engineering Fall 2012 Instructor: Tevfik Bultan Lecture 4: SMT-based Bounded Model Checking of Concurrent Software.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Kernel Bounds for Structural Parameterizations of Pathwidth Bart M. P. Jansen Joint work with Hans L. Bodlaender & Stefan Kratsch July 6th 2012, SWAT 2012,
Model-based Methods for Web Service Verification.
1 Treewidth, partial k-tree and chordal graphs Delpensum INF 334 Institutt fo informatikk Pinar Heggernes Speaker:
Theory of Computation, Feodor F. Dragan, Kent State University 1 NP-Completeness P: is the set of decision problems (or languages) that are solvable in.
Copyright 2001, Matt Dwyer, John Hatcliff, and Radu Iosif. The syllabus and all lectures for this course are copyrighted materials and may not be used.
Survey on Trace Analyzer (2) Hong, Shin /34Survey on Trace Analyzer (2) KAIST.
Discrete Structures for Computing
Automatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specifications 1.
CSCI 2670 Introduction to Theory of Computing Instructor: Shelby Funk.
Generic API Test tool By Moshe Sapir Almog Masika.
On Reducing the Global State Graph for Verification of Distributed Computations Vijay K. Garg, Arindam Chakraborty Parallel and Distributed Systems Laboratory.
Formal Verification Lecture 9. Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems.
Chapter 10 Analysis and Design Discipline. 2 Purpose The purpose is to translate the requirements into a specification that describes how to implement.
CSE332: Data Abstractions Lecture 24.5: Interlude on Intractability Dan Grossman Spring 2012.
Theory of Computation, Feodor F. Dragan, Kent State University 1 TheoryofComputation Spring, 2015 (Feodor F. Dragan) Department of Computer Science Kent.
ICS 253: Discrete Structures I Induction and Recursion King Fahd University of Petroleum & Minerals Information & Computer Science Department.
Verification & Validation By: Amir Masoud Gharehbaghi
Reasoning about the Behavior of Semantic Web Services with Concurrent Transaction Logic Presented By Dumitru Roman, Michael Kifer University of Innsbruk,
Concepts and Realization of a Diagram Editor Generator Based on Hypergraph Transformation Author: Mark Minas Presenter: Song Gu.
Static Techniques for V&V. Hierarchy of V&V techniques Static Analysis V&V Dynamic Techniques Model Checking Simulation Symbolic Execution Testing Informal.
1 CSEP590 – Model Checking and Automated Verification Lecture outline for July 9, 2003.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
Quality Assurance in the Presence of Variability Kim Lauenroth, Andreas Metzger, Klaus Pohl Institute for Computer Science and Business Information Systems.
From Natural Language to LTL: Difficulties Capturing Natural Language Specification in Formal Languages for Automatic Analysis Elsa L Gunter NJIT.
1 P and NP. 2 Introduction The Traveling Salesperson problem and thousands of other problems are equally hard in the sense that if we had an efficient.
6/12/20161 a.a.2015/2016 Prof. Anna Labella Formal Methods in software development.
Introductory Lecture. What is Discrete Mathematics? Discrete mathematics is the part of mathematics devoted to the study of discrete (as opposed to continuous)
Ning Jin, Wei Wang ICDE 2011 LTS: Discriminative Subgraph Mining by Learning from Search History.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
Trees.
Complexity of Compositional Model Checking of Computation Tree Logic on Simple Structures Krishnendu Chatterjee Pallab Dasgupta P.P. Chakrabarti IWDC 2004,
Sub-fields of computer science. Sub-fields of computer science.
P & NP.
Introduction to Randomized Algorithms and the Probabilistic Method
CIS 842: Specification and Verification of Reactive Systems
Computing Connected Components on Parallel Computers
Computer Science Department
Structural graph parameters Part 2: A hierarchy of parameters
Aspect Validation: Connecting Aspects and Formal Methods
CSCI1600: Embedded and Real Time Software
Sub-system interfaces
Proofs of Space 徐昊 2017/5/31.
Presentation transcript:

School of Computer Science, The University of Adelaide© The University of Adelaide, Australian Computer Science Week 2005 Selected papers from: ACSC CATS

School of Computer Science, The University of Adelaide© The University of Adelaide, Bounded Persistence Pathwidth R. Downey and C. McCartin — Pgs ACSC Background — Graph width metrics  Treewidth, pathwidth, cliquewidth  Restricting width parameter can lead to efficient algorithms — E.g. treewidth – gives a measure of how tree-like a graph is Persistence — New parameter for graphs

School of Computer Science, The University of Adelaide© The University of Adelaide, Treewidth and tree decomposition A graph G has treewidth k if we can associate a tree T such that — Each node of T represents a subgraph of G with at most k+1 vertices — All edges and vertices of G are in at least one of the nodes of T — For each vertex v in G the nodes of T where v is represented is a subtree of T Such a tree is called a tree decomposition of G

School of Computer Science, The University of Adelaide© The University of Adelaide, Pathwidth A path decomposition of a graph G is a tree decomposition, where the tree is a path The pathwidth of G is the minimum width over all possible path decompositions of G — Path decomp is also a tree decomp of G — Pathwidth is greater than or equal to treewidth E.g. for a complete binary tree of height k — Pathwidth = k — Treewidth = 1

School of Computer Science, The University of Adelaide© The University of Adelaide, Bounded persistence pathwidth Pathwidth doesn’t always give a true indication of the pathlike nature of a graph — There are some pathological cases — Introduce persistence to deal with this A path decomposition of width k in which every vertex belongs to at most l nodes of the path has pathwidth k and persistence l — Graphs with low width and low persistence are pathlike — Graphs with low width and high persistence are unnatural BUT: determining bounded persistence pathwidth is W[t]-hard

School of Computer Science, The University of Adelaide© The University of Adelaide, Factorising temporal specifications Huisman and Trentelman CATS pgs Verification of multi-threaded programs Aim to lighten the burden of proof Show there exists a group of threads that establish the property while the others do not affect it

School of Computer Science, The University of Adelaide© The University of Adelaide, Programs and specifications Programs — Labelled transition systems (LTS) — Composition of threads T1 || T2 — Traces Temporal specifications — Represented using specification patterns — Semantics defined by mapping patterns to LTL — Defined in Isabelle/HOL

School of Computer Science, The University of Adelaide© The University of Adelaide, Specification patterns Describe most of the common constructs in temporal logics (e.g. LTL, CTL, …) For each pattern a mapping into different logics can be defined Each pattern describes a property that holds in a certain scope — Globally, After, Before, Between, AfterUntil Two kinds of properties Occurrence — Absent, Universal, Exists Order — RespondsTo, Precedes

School of Computer Science, The University of Adelaide© The University of Adelaide, Factorisation rules Factorisation rules are defined for the different temporal properties E.g. ….

School of Computer Science, The University of Adelaide© The University of Adelaide, Agent-based distributed software verification Hunter, Robinson & Strooper ACSC pgs Techniques have been developed for verifying imperative programs BUT : Cost of developing proofs is too expensive — By hand is tedious and error prone — Use interactive provers instead  Manual steps for hard bits  Automatic proof construction for easy bits — But still too expensive

School of Computer Science, The University of Adelaide© The University of Adelaide, Distributed interactive theorem proving Increase cost-effectiveness — Execution of tactics in the background — Manual proof construction in the foreground — Active communication between these tasks

School of Computer Science, The University of Adelaide© The University of Adelaide, Architecture User Proof Agent User Broker Personal Assistant Proof Agent

School of Computer Science, The University of Adelaide© The University of Adelaide, Architecture (cont) Personal assistant — Monitor proof — Use proof agents to construct parts of proof — Interface to help user complete problematic subproofs Proof agents — Automated reasoning capabilities — Encapsulate particular reasoning style, search strategy or domain — Provide estimate of its chance of satisfying particular goal Broker — Puts agents in touch with each other

School of Computer Science, The University of Adelaide© The University of Adelaide, Stemming Indonesian Asian, Williams & Tahaghoghi ACSC pgs Stemming used in information retrieval, web browsing etc. — Involves finding the root of a word — E.g. stemming, stemmer and stems have root word stem — The problem is addressed fairly well in English — Root word is usually a prefix — Other languages not so easy

School of Computer Science, The University of Adelaide© The University of Adelaide, Stemming Indonesian (cont) Indonesian has a more complex class of affixes — Prefixes — Suffixes — Infixes — Confixes E.g. the word “pemerintah” (meaning government) has the root “perintah” (meaning govern) The authors compare 5 stemming algorithms for Indonesian — A best algorithm is found — Improvements are proposed to increase accuracy

School of Computer Science, The University of Adelaide© The University of Adelaide, Other papers When are two workflows the same? — CATS Pgs 3-11 Concurrent program design in the extended theory of Owicki and Gries — CATS pgs A two-pronged attack on the dragon of intractability — ACSC pgs — Another parameterised complexity paper