On Satisfiability Checking for Difference Logic

Total Page:16

File Type:pdf, Size:1020Kb

On Satisfiability Checking for Difference Logic UNIVERSITE´ JOSEPH FOURIER – GRENOBLE 1 SCIENCES, TECHNOLOGIE ET MEDECINE´ THESE` pour obtenir le grade de DOCTEUR DE L’UNIVERSITE´ JOSEPH FOURIER en Informatique pr´epar´ee au laboratoire VERIMAG pr´esent´ee et soutenue publiquement par Moez MAHFOUDH le 27 Mai 2003 Sur la V´erification de la Satisfaction pour la Logique des Diff´erences Directeur de th`ese : Oded MALER Membres du jury : Anatoli IOUDITSKI, Pr´esident Karem A. SAKALLAH, Rapporteur Henrik Reif ANDERSEN, Rapporteur Oded MALER, Directeur de th`ese Alessandro CIMATTI, Examinateur Eug`ene ASARIN, Examinateur Peter NIEBERT, Examinateur Amam`` ere, `amonp`ere, `amasœur... Remerciements Je tiens `a remercier Anatoli Iouditski, Professeura ` l’Universit´e Joseph Fourier, pour avoir pr´esid´e le jury de cette th`ese. Je remercie aussi messieurs Karem A. Sakallah, Professeura ` l’Universit´e du Michigan, Henrik Reif Andersen, Pro- fesseur `a IT University of Copenhagen, et Alessandro Cimatti, chercheura ` l’Instituto per la Ricerca Scientifica e Tecnologicaa ` Trento, Italie, pour avoir accept´e de juger ce travail avec beaucoup d’int´erˆet et pour avoir particip´eau jury de cette th`ese. Je remercie aussi Eug`ene Asarin, Professeura ` l’Universit´e Joseph Fourier et chercheur au laboratoire VERIMAG, pour avoir toujours ´et´e disponible pour des discussions, souvent longues, concernant mes recherches, et pour avoir fait partie du jury. De mˆeme, je remercie Peter Niebert, Maˆıtre de conf´erence `a l’Universit´ede Provence, pour sa participation au jury. Il a ´et´e la source dinspiration premi`ere de ce travail : Il a jet´e ses bases alors qu’il ´etait encore `aVERIMAGeta continu´e`a suivre son avancement apr`es son d´epart et ce malgr´el’´eloignement g´eographique. Je voudrais aussi exprimer ma gratitudea ` Oded Maler, Directeur de recherche au CNRS et chercheur au laboratoire VERIMAG, qui m’a permis de faire cette th`ese. J’ai appr´eci´e son encadrement lib´eral et l’autonomie qu’il m’a accord´ee pour faire mes recherches. J’aurai toujours le souvenir de nos discus- sions o`u nous confrontions nos visions, souvent diam´etralement oppos´ees, sur l’informatique, les sciences, le monde et la vie. Merci Oded, merci pour tout. Je tiens aussi `a remercier tous les chercheurs de VERIMAG et plus sp´ecia- lement le directeur du laboratoire, Joseph Sifakis, ainsi que Yassine Lakhnech, Marius Bozga, Sergio Yovine, Stavros Tripakis, Saddek Bensalem, et Nicolas Halbwachs, pour leurs aides administratives ou scientifiques. Un grand merci aussi au personnel administratif de VERIMAG et plus sp´ecifiquement `a Jeanne-Marie Colle pour ses conseils et son aide lors de mon installationa ` Grenoble. Je remercie Riadh Robbana, Maˆıtre assistant `a l’Universit´e de Carthage, qui m’a permis d’´etablir le lien initial avec VERIMAG lorsque j’´etais encore ´el`eve-ing´enieur `a l’Ecole Polytechnique de Tunisie. Je remercie Yasmina, Thao, Gordon, Christos, Radu, (ex)membres de VER- IMAG,pourleuramiti´esinc`ere et nos longues discussions dans les caf´es de la ville o`usemˆelaient culture, cin´ema et gamineries. Je remercie Chaker, Ramzi, Cyril, David, Alexandre et Karim, ´etudiantsa ` VERIMAG, avec qui je partageais mes pauses et des discussions sur la vie et la v m´et´eo. Merci aussi `a Marcello pour les pauses caf´e et son aide tr`es appr´eciable lors la pr´eparation de ma soutenance de th`ese. Merci `a mes amis de Grenoble, sp´ecialement Walid Dkhil et Walid Hasni, pour leur soutien et pour nos sorties en ville o`u nous tentions de nous changer les id´ees en oubliant le stress des ´etudes et des th`eses. Merci `a mes amis et anciens de l’Ecole Polytechnique de Tunisie, et plus particuli`erement merci `a Firaz, Olfa, Anis, Amin, Hakim, Fadhel, qui ont su me rendre la vie plus agr´eable durant leurs s´ejours `a Grenoble. Merci aussi `a mes amis de toujours, Badii, Karim, et Helmi, que j’ai connus sur les bancs du coll`ege (et mˆeme bien avant) et qui, bien que vivanta ` Tunis, m’ont toujours fait sentir que je n’´etais pas si ´eloign´e d’eux avec leurs coup de fils, leurs emails et leurs messages. Merci pour votre amiti´e et pour vos encouragements. Finalement, je remercie ma m`ere, Nebiha, mon p`ere, Mohamed, ma sœur, Asma, et tous les membres de ma famille, pour leur amour, leur soutien ind´efectible et leur aide. Ce travail a ´et´e fait en pensant `a vous, il vous est naturellement d´edi´e. Merci pour tout. Que Dieu vous b´enisse. Contents 1 Introduction 1 1.1Motivation.............................. 1 1.2RelatedWork............................. 2 1.3ThesisOutline............................ 3 2 Timed Formalisms 5 2.1 Difference Logic ............................ 5 2.2 Satisfiability . ............................ 6 2.3 Conjunctive Normal Form . .................... 7 2.4TranslatingfromDLtoMX-CNF.................. 8 2.4.1 Trivialtranslation...................... 8 2.4.2 Tseitin’stranslation..................... 9 2.4.3 Wilson’stranslation..................... 12 2.5 Conjunctions of Difference Constraints . ............ 14 2.5.1 Convextimedpolyhedra................... 14 2.5.2 Bounds ............................ 14 2.5.3 RepresentingconvextimedpolyhedrausingDBMs.... 16 2.5.4 CanonicalrepresentationofDBMs............. 17 2.5.5 Conjunction of DBMs .................... 21 3SATSolvers 23 3.1 Overview . ............................ 23 3.2History................................ 24 3.2.1 Before 1960 . ........................ 24 3.2.2 From 1960 to 1990 . .................... 24 3.2.3 From 1990 . ........................ 25 3.3BasicAlgorithm........................... 25 3.3.1 Description.......................... 25 3.3.2 Improvementstothebasicalgorithm............ 26 3.4 Binary constraint propagation .................... 27 3.4.1 Unitresolution........................ 27 3.4.2 Pureliteralsresolution.................... 27 3.4.3 Equivalentliteralsdetection................. 27 3.5Branchingheuristics......................... 27 3.5.1 Maximizingsatisfiedclausesheuristics........... 27 3.5.2 Literalcountheuristics................... 30 vii viii CONTENTS 3.5.3 Variablestateindependentheuristics............ 30 3.6 Conflict Directed Backtracking and Learning . ........ 31 3.6.1 Implicationgraph...................... 32 3.6.2 Conflictanalysis....................... 34 3.6.3 Conflict-freelearning..................... 37 3.6.4 Backtracking......................... 37 3.6.5 Clause recording . .................... 38 3.6.6 Restarts............................38 3.7AlternativeTechniques........................ 38 3.7.1 Resolution `alaDavis-Putnam . ............ 38 3.7.2 Localsearch.......................... 40 3.7.3 St˚almarck’smethod..................... 41 4 A Mixed SAT Solver 45 4.1 Overview . ............................ 45 4.1.1 Solvingcontext........................ 45 4.1.2 Assignments......................... 47 4.1.3 Clauserewriting....................... 47 4.2SimplificationRules......................... 50 4.2.1 Booleanunitresolution................... 50 4.2.2 Booleanliteralsequivalencedetection........... 51 4.2.3 PureBooleanliteralsresolution............... 51 4.2.4 DBMupdating........................ 52 4.2.5 DBManalysis......................... 52 4.3 Davis-Putnam Rules . ........................ 53 4.3.1 Restricted Boolean Davis-Putnam rule application .... 53 4.3.2 Restricted numerical Davis-Putnam rule application . 54 4.4DPLLBranching........................... 55 4.5ConflictAnalysis........................... 61 4.5.1 Extensionofsolvingcontexts................ 61 4.5.2 Changesinoperations.................... 61 4.5.3 Conflictdetectionandanalysis............... 63 4.6MX-SolverImplementation..................... 64 4.6.1 Technical overview . .................... 64 4.6.2 Datastructures........................ 64 4.6.3 Features............................ 66 4.6.4 Designguidelines....................... 67 5 Timed Systems 69 5.1TimedAutomata........................... 69 5.1.1 Flattimedautomata..................... 69 5.1.2 TranslationintoDL..................... 71 5.1.3 Composition......................... 74 5.2AsynchronousDigitalCircuits.................... 77 5.2.1 Usedmodel.......................... 77 5.2.2 Conversiontotimedautomata............... 80 5.3 Non-Preemptive Job-Shops . .................... 81 CONTENTS ix 5.3.1 Introductoryexample.................... 81 5.3.2 Expressionofjob-shopproblems.............. 82 5.3.3 TranslationintoDL..................... 83 6 Experimental Results 85 6.1 Study Methodology . ........................ 85 6.2Job-Shopproblems.......................... 86 6.2.1 Overview . ........................ 86 6.2.2 Instances........................... 86 6.2.3 Results............................ 89 6.3Timed-Automataproblems..................... 90 6.3.1 Overview . ........................ 90 6.3.2 Instances........................... 90 6.3.3 Results............................ 90 6.4Asynchronouscircuitsproblems................... 92 6.4.1 Overview . ........................ 92 6.4.2 Instances........................... 93 6.4.3 Results............................ 93 6.5Conclusions.............................. 94 7 Conclusions 97 7.1 Contribution . ............................ 97 7.2 Future Research Directions . .................... 97 7.2.1 NewAlgorithmsandMethods................ 98 7.2.2 TheMXToolbox....................... 98 AMXToolbox 99 A.1 Overview . ............................ 99 A.2ToDLTranslators.......................... 99 A.2.1TimedautomatatoDL................... 99 A.2.2AsynchronousdigitalcircuitstoDL............101 A.2.3Job-shoptoDL........................102 A.3DLtoMX-CNFTranslator.....................102
Recommended publications
  • A Boolean Approach to Unbounded, Fully Symbolic Model Checking of Timed Automata
    A Boolean Approach to Unbounded, Fully Symbolic Model Checking of Timed Automata Sanjit A. Seshia Randal E. Bryant March 2003 CMU-CS-03-117 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 A shorter version of this paper will appear at CAV '03. Abstract We present a new approach to unbounded, fully symbolic model checking of timed automata that is based on an efficient translation of quantified separation logic to quantified Boolean logic. Our technique preserves the interpretation of clocks over the reals and can check any property expressed in the timed µ calculus. The core operations of eliminating quantifiers over real variables and deciding separation logic are respectively translated to eliminating quantifiers on Boolean variables and checking Boolean satisfiability (SAT). We can thus leverage well-known techniques for Boolean formulas, including Binary Decision Diagrams (BDDs) and recent advances in SAT and SAT-based quantifier elimination. We present preliminary empirical results for a BDD-based implementation of our method. This research was supported in part by a National Defense Science and Engineering Graduate Fellowship and by ARO grant DAAD19-01-1-0485. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwith- standing any copyright annotation thereon. The views and conclusions contained in this document are those of the authors, and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Department of Defense or the U.S. Government. Keywords: Timed automata, Model checking, Boolean logic, Separation logic, Quantifier elimination 1 Introduction Timed automata [2] have proved to be a useful formalism for modeling real-time systems.
    [Show full text]
  • Automata on Timed Structures 1
    Automata on Timed Structures 1 Samy Jaziri June 14, 2019 1This thesis have been supported by ERC project EQualIS Contents I Timed Systems Modeling 7 1 Basic Notions on Transition Systems 8 1.1 Partial Functions . .9 1.2 Labeled Transition System . .9 1.3 Bisimulation on Labeled Transition Systems . 11 2 Timed Structures 14 2.1 Timed Domains . 15 2.2 Updates and Timed Structures . 19 2.3 About Guards and Guarded Timed Structures . 20 3 Automata on Timed Structures 25 3.1 Definition and Representation . 26 3.2 Bisimulation for Automata on Timed Structures . 31 4 Controls 36 4.1 General Definition . 37 4.2 Timed Controls . 39 4.3 Graph and Bisimulation of Timed Controlled Automata . 42 II Determinization of Timed Systems 47 5 Timed Control Determinization 48 5.1 Determinization of Timed Controlled Automata on Timed Systems . 50 5.2 Application to Timed Automata . 56 6 Timed Structure Equivalences 59 6.1 From Product to Maps . 60 6.2 From Maps to Bounded Markings . 67 7 Application to Classes of Timed Automata 74 7.1 Application to Timed Automata . 75 7.2 About Other Determinizable Classes . 76 8 Full Control Determinization 80 8.1 Full Controlled ATS are always Strongly Determinizable . 81 8.2 Application to Input-Determined Models . 85 1 III Diagnosis of Timed Automata 90 9 Diagnosis for Timed Automata 91 9.1 General Context . 92 9.2 Diagnosis with Automata On Timed Structures . 93 10 Timed Set Algebra 97 10.1 Timed Sets . 98 10.2 Regular Timed Interval . 104 10.3 Regular Timed Markings .
    [Show full text]
  • Fully Symbolic Model Checking of Timed Systems Using Di Erence
    p URL httpwwwelsevier nl lo ca te ent cs vol ume htm l pages Fully Symb olic Mo del Checking of Timed Systems using Dierence Decision Diagrams Jesp er Mller Jakob Lichtenberg Henrik R Andersen and Henrik Hulgaard The IT University in Copenhagen Glentevej DK Copenhagen NV Denmark Email jmjlhrahenrikitudk Abstract Current approaches for analyzing timed systems are based on an explicit enumera tion of the discrete states and thus these techniques are only capable of analyzing systems with a handful of timers and a few thousand states We address this lim itation by describing how to analyze a timed system fully symb olically ie by representing sets of discrete states and their asso ciated timing information implic itly We demonstrate the eciency of the symb olic technique by computing the set of reachable states for a nontrivial timed system and compare the results with the stateoftheart to ols Kronos and Uppaal With an implementation based on dif ference decision diagrams the runtimes are several orders of magnitudes b etter The key op eration in obtaining these results is the abilitytoadvance time symb olically Weshow how to do this eciently by essentially quantifying out aspecialvariable z which is used to represent the constant zero The symb olic manipulations given in this pap er are sucienttoverify TCTLformulae fully symb olically Intro duction Mo del checking is to day used extensively for formal verication of nite state systems such as digital circuits and emb edded software The success of the technique is primarily due to
    [Show full text]
  • Clocks, Dbms and States in Timed Systems
    Clocks, DBMs and States in Timed Systems Johan Bengtsson A Dissertation submitted for the Degree of Doctor of Philosophy Department of Information Technology Uppsala University June 2002 Dissertation for the Degree of Doctor of Philosophy in Computer science with specialization in Real Time Systems presented at Uppsala University in 2002. ABSTRACT Bengtsson, J. 2002: Clocks, DBMs and States in Timed Systems. Acta Universitatis Upsaliensis Uppsala Dissertations from the Faculty of Science and Technology 39. 143 pp. Uppsala. ISBN 91-554-5350-3 Today, computers are used to control various technical systems in our society. In many cases, time plays a crucial role in the operation of computers embedded in such systems. This thesis is about techniques and tools for the analysis of timing behaviours of computer systems. Its main contributions are in the development and implementation of UPPAAL, a tool designed to automate the analysis process of systems modelled as timed automata. As the first contribution, we present a software package for timing constraints represented as Difference Bound Matrices. We describe in details, all data-structures and operations for DBMs needed in state-space exploration of timed automata, as well as techniques for efficient imple- mentation. In particular, we have developed two normalisation algorithms to guarantee termina- tion of reachability analysis for timed automata containing constraints on clock differences, that transform DBMs according to not only maximal constants of clocks as in algorithms published in the literature, but also difference constraints appearing in the automata. The second contribu- tion of this thesis is a collection of low level optimisations on the internal data-structures and algorithms of UPPAAL to minimise memory and time consumption.
    [Show full text]
  • Context-Dependent Reachability Analysis in Hybrid System Have Been Explored
    The present work was submitted to the LuFG Theory of Hybrid Systems MASTER OF SCIENCE THESIS CONTEXT-DEPENDENT REACHABILITY ANALYSIS FOR HYBRID AUTOMATA Justin Winkens Examiners: Prof. Dr. Erika Ábrahám Prof. Dr. Thomas Noll Additional Advisor: Stefan Schupp M.Sc. Aachen, May 22, 2018 Abstract This thesis is focused on the analysis of hybrid automata, which incorporate discrete and continuous behavior of a given system into one model. A common approach to analyze these automata for safety is so called flowpipe construction that iteratively constructs a set of over-approximative geometric objects that contain all reachable states of the automaton. Implementations of this approach can be found in toolboxes like Flow*, HyPro/HyDRA or SpaceEx. Unfortunately, the computational cost of flowpipe construction is exponential in the number of variables/dimensions. This thesis aims at improving the HyPro/HyDRA toolbox by implement- ing a context-based approach to flowpipe analysis using variable set separation, in which the state space of the underlying automaton is decomposed into syn- tactically independent sets of variables allowing for separate analysis of the now lower dimensional subspaces. The different subspaces can then be analyzed for their properties enabling us to perform a context-based analysis where we will be able to dynamically choose data structures and algorithms based on the context defined by the automaton’s current location and the state’s subspaces. In the process HyPro is augmented with a new representation called differ- ence bound matrix that is especially suited for the analysis of timed automata. Experimental results in common benchmarks show a speedup of up to 11 000% for decomposed analysis.
    [Show full text]
  • Controller Program Synthesis for Industrial Machines
    R S V E I T I A N S U S S A I R S A V I E N CONTROLLER PROGRAM SYNTHESIS FOR INDUSTRIAL MACHINES by Hans-Jorg¨ Peter A diploma thesis in the DEPARTMENT 6.2 - COMPUTER SCIENCE ADVISORS Prof. Bernd Finkbeiner, PhD Prof. Dr.-Ing. habil. Hartmut Janocha SAARLAND UNIVERSITY, GERMANY November 2005 Erklarung¨ Hiermit versichere ich an Eides statt, dass ich die vorliegende Arbeit selbst¨andig und unter ausschließlicher Verwendung der angegebenen Hilfsmittel angefertigt habe. Saarbr¨ucken, im November 2005 i This work is dedicated to my grandparents Hannelore and Nikolaus Peter ii Abstract In this thesis, a new synthesis algorithm for industrial controller programs is presented. Verification and synthesis are the two basic approaches to guarantee that a system is correct. While verification requires the programmer to provide both the specification and the implementation, synthesis automatically transforms the specification into an implemen- tation that is correct by construction. The presented approach includes a new specification language that is geared towards usability in an industrial set-up. Specifications consist of two parts: a generic description of the machine components that is reused for different programs, and a description of the production goals that is specific to each program. The behaviour of the machine compo- nents is described by timed automata, while the production goals are captured by safety and bounded liveness properties. The advantage of this approach is that the description of the goals, and thus of the behaviour of the overall system, is decoupled from the technical details of the machine components. This results in a high degree of re-usability, adaptivity, and maintainability.
    [Show full text]
  • Symbolic Implementation of Model-Checking Probabilistic Timed Automata
    SYMBOLIC IMPLEMENTATION OF MODEL-CHECKING PROBABILISTIC TIMED AUTOMATA by FUZHI WANG A thesis submitted to The University of Birmingham for the degree of DOCTOR OF PHILOSOPHY School of Computer Science The University of Birmingham September 2006 Abstract In this thesis, we present symbolic implementation techniques for model checking prob- abilistic timed automata as models for systems, for example, communication networks and randomised distributed algorithms. Given a system model as probabilistic timed au- tomata and a specification, such as, “a leader will be elected within 5 time units with probability 0.999” and “the message can be successfully delivered within 3 time units with probability 0.985”, a probabilistic real-time model checker can automatically verify if the model satisfies the specification. Motivated by the success of symbolic approaches to both non-probabilistic real-time model checking and untimed probabilistic model checking, we present a symbolic implementation of model checking for probabilistic timed automata, which is based on the data structure called Multi-terminal Binary Decision Diagrams (MTBDDs). Our MTBDD-based symbolic implementation is generic with respect to the support of the real-time information. Two data structures representing the real-time information are supported, Difference Bound Matrices (DBMs) and Difference Decision Diagrams (DDDs). We develop explicit and symbolic implementations of model check- ing for probabilistic timed automata, focusing on probabilistic reachability properties. The explicit implementation concerns both forward and backward generation of the zone graph, where the latter results in non-convex zones in the case of calculating the minimum probability. The symbolic implementation is of the forward exploration and is built on the PRISM software.
    [Show full text]
  • Symbolic Model Checking of Timed Guarded Commands Using
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector THE JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING The Journal of Logic and Algebraic Programming 52–53 (2002) 53–77 www.elsevier.com/locate/jlap Symbolic model checking of timed guarded commands using difference decision diagramsୋ Jesper Møller∗, Henrik Hulgaard, Henrik Reif Andersen Department of Innovation, The IT University of Copenhagen, Denmark Abstract We describe a novel methodology for analyzing timed systems symbolically. Given a formula representing a set of states, we describe how to determine a new formula that represents the set of states reachable by taking a discrete transition or by advancing time. The symbolic representations are given as formulae expressed in a simple first-order logic over difference constraints of the form x − y d which can be combined with Boolean operators and existentially quantified. We also show how to symbolically determine the set of states that can reach a given set of states (i.e., a backward step), thus making it possible to verify timed CTL-formulae symbolically. The main contribution is a way of advancing time symbolically essentially by quantifying out a special variable z which is used to represent the current zero point in time. We also describe a data structure called DDDs for representing difference constraint formulae, and we demonstrate the efficiency of the symbolic technique by analyzing two scheduling protocols using a DDD-based model checker. © 2002 Elsevier Science Inc. All rights reserved. Keywords: Real-time systems; Timed automata; Timed guarded commands; Symbolic model check- ing; Timed CTL; Difference constraint systems; Difference decision diagrams; Quantifier elimination 1.
    [Show full text]
  • What Else Is Decidable About Integer Arrays? Peter Habermehl, Radu Iosif, Tomáš Vojnar
    What Else Is Decidable about Integer Arrays? Peter Habermehl, Radu Iosif, Tomáš Vojnar To cite this version: Peter Habermehl, Radu Iosif, Tomáš Vojnar. What Else Is Decidable about Integer Arrays?. Foun- dations of Software Science and Computational Structures, 11th International Conference, FOSSACS 2008, Mar 2008, Budapest, Hungary. 10.1007/978-3-540-78499-9_33. hal-01418914 HAL Id: hal-01418914 https://hal.archives-ouvertes.fr/hal-01418914 Submitted on 17 Dec 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. What else is decidable about integer arrays? Peter Habermehl1, Radu Iosif2, and Tom´aˇsVojnar3 1 LSV, ENS Cachan, CNRS, INRIA; 61 av. du Pr´esident Wilson, F-94230 Cachan, France, e-mail:[email protected] 2 VERIMAG,CNRS, 2 av. de Vignate, F-38610 Gi`eres, France, e-mail:[email protected] 3 FIT BUT, Boˇzetˇechova 2, CZ-61266, Brno, Czech Republic, e-mail: [email protected] Abstract. We introduce a new decidable logic for reasoning about infinite arrays of integers. The logic is in the ∃∗∀∗ first-order fragment and allows (1) Presburger constraints on existentially quantified variables, (2) difference constraints as well as periodicity constraints on universally quantified indices, and (3) difference constraints on values.
    [Show full text]
  • Arxiv:2108.00893V2 [Cs.LG] 23 Aug 2021 Ning for Autonomous Systems
    Static analysis of ReLU neural networks with tropical polyhedra Eric Goubault?1, S´ebastienPalumby1, Sriram Sankaranarayanan2, Sylvie Putot1, and Louis Rustenholz1 1 LIX, Ecole Polytechnique, CNRS and Institut Polytechnique de Paris, 91128 Palaiseau, France [email protected] 2 Engineering Center Computer Science, University of Colorado at Boulder, USA [email protected] Abstract. This paper studies the problem of range analysis for feedfor- ward neural networks, which is a basic primitive for applications such as robustness of neural networks, compliance to specifications and reacha- bility analysis of neural-network feedback systems. Our approach focuses on ReLU (rectified linear unit) feedforward neural nets that present spe- cific difficulties: approaches that exploit derivatives do not apply in gen- eral, the number of patterns of neuron activations can be quite large even for small networks, and convex approximations are generally too coarse. In this paper, we employ set-based methods and abstract inter- pretation that have been very successful in coping with similar difficulties in classical program verification. We present an approach that abstracts ReLU feedforward neural networks using tropical polyhedra. We show that tropical polyhedra can efficiently abstract ReLU activation func- tion, while being able to control the loss of precision due to linear com- putations. We show how the connection between ReLU networks and tropical rational functions can provide approaches for range analysis of ReLU neural networks. We report on a preliminary evaluation of our approach using a prototype implementation. 1 Introduction and related work Neural networks are now widely used in numerous applications including speech recognition, natural language processing, image segmentation, control and plan- arXiv:2108.00893v2 [cs.LG] 23 Aug 2021 ning for autonomous systems.
    [Show full text]
  • Data Structure Choices for On-The-Fly Model Checking of Real-Time Systems
    Data Structure Choices for On-the-Fly Model Checking of Real-Time Systems Peter Fontana Rance Cleaveland Department of Computer Science Department of Computer Science University of Maryland, College Park University of Maryland, College Park Email: [email protected] Email: [email protected] Abstract—This paper studies the performance of sparse- checking based on proof search: a formula correspond- matrix-based data structures to represent clock zones (con- ing to the assertion that a timed automaton satisfies a vex sets of clock values) in an on-the-fly predicate equation mu-calculus property can be checked in a goal-driven system model checker for timed automata. We analyze the fashion to determine its truth. Zhang and Cleaveland [6] impact of replacing the dense difference bound matrix demonstrated the efficiency of this approach vis a` vis (DBM) with both the linked-list CRDZone and array-list CRDArray data structure. From analysis on the paired- other real-time model-checking approaches. example-by-example differences in time performance, we In this paper we consider the special model check- infer the DBM is either competitive with or slightly faster ing case of timed automata and timed modal equation than the CRDZone, and both perform faster than the systems representing safety properties (also studied in CRDArray. Using similar analysis on space performance, [6]), for which there are still many opportunities for we infer the CRDZone takes the least space, and the DBM performance improvements. One component of such a takes less space than the CRDArray. model checker that has a noticeable influence on perfor- mance is the data structure for the sets of clock values.
    [Show full text]
  • Incremental Closure for Systems of Two Variables Per Inequality
    City Research Online City, University of London Institutional Repository Citation: Howe, J. M. ORCID: 0000-0001-8013-6941, King, A. and Simon, A. (2019). Incremental closure for systems of two variables per inequality. Theoretical Computer Science, 768, pp. 1-42. doi: 10.1016/j.tcs.2018.12.001 This is the published version of the paper. This version of the publication may differ from the final published version. Permanent repository link: https://openaccess.city.ac.uk/id/eprint/21241/ Link to published version: http://dx.doi.org/10.1016/j.tcs.2018.12.001 Copyright: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely distributed and linked to. Reuse: Copies of full items can be used for personal research or study, educational, or not-for-profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. City Research Online: http://openaccess.city.ac.uk/ [email protected] Theoretical Computer Science 768 (2019) 1–42 Contents lists available at ScienceDirect Theoretical Computer Science www.elsevier.com/locate/tcs Incremental Closure for Systems of Two Variables Per Inequality ∗ ∗ Jacob M. Howe a, , Andy King b, , Axel Simon c a Department of Computer Science, City, University of London, EC1V 0HB, UK b School of Computing, University of Kent, Canterbury, CT2 7NF, UK c Google, Mountain View, California, CA 94043, USA a r t i c l e i n f o a b s t r a c t Article history: Subclasses of linear inequalities where each inequality has at most two variables are Received 1 December 2017 popular in abstract interpretation and model checking, because they strike a balance Received in revised form 14 October 2018 between what can be described and what can be efficiently computed.
    [Show full text]