[{"quality_controlled":0,"page":"1 - 201","publisher":"University of California, Berkeley","author":[{"last_name":"Majumdar","full_name":"Majumdar, Ritankar S","first_name":"Ritankar"}],"publication_status":"published","date_published":"2003-12-01T00:00:00Z","year":"2003","_id":"4416","month":"12","publist_id":"313","day":"01","extern":1,"status":"public","type":"dissertation","date_created":"2018-12-11T12:08:44Z","abstract":[{"lang":"eng","text":"Methods for the formal specification and verification of systems are indispensible for the development of complex yet correct systems. In formal verification, the designer describes the system in a modeling language with a well-defined semantics, and this system description is analyzed against a set of correctness requirements. Model checking is an algorithmic technique to check that a system description indeed satisfies correctness requirements given as logical specifications. While successful in hardware verification, the potential for model checking for software and embedded systems has not yet been realized. This is because traditional model checking focuses on systems modeled as finite state-transition graphs. While a natural model for hardware (especially synchronous hardware), state-transition graphs often do not capture software and embedded systems at an appropriate level of granularity. This dissertation considers two orthogonal extensions to finite state-transition graphs making model checking techniques applicable to both a wider class of systems and a wider class of properties.\n\nThe first direction is an extension to infinite-state structures finitely represented using constraints and operations on constraints. Infinite state arises when we wish to model variables with unbounded range (e.g., integers), or data structures, or real time. We provide a uniform framework of symbolic region algebras to study model checking of infinite-state systems. We also provide sufficient language-independent termination conditions for symbolic model checking algorithms on infinite state systems.\n\nThe second direction supplements verification with game theoretic reasoning. Games are natural models for interactions between components. We study game theoretic behavior with winning conditions given by temporal logic objectives both in the deterministic and in the probabilistic context. For deterministic games, we provide an extremal model characterization of fixpoint algorithms that link solutions of verification problems to solutions for games. For probabilistic games we study fixpoint characterization of winning probabilities for games with omega-regular winning objectives, and construct (epsilon-)optimal winning strategies."}],"date_updated":"2019-01-24T13:19:54Z","citation":{"ieee":"R. Majumdar, *Symbolic algorithms for verification and control*. University of California, Berkeley, 2003, pp. 1–201.","ista":"Majumdar R. 2003. Symbolic algorithms for verification and control, University of California, Berkeley,p.","ama":"Majumdar R. *Symbolic Algorithms for Verification and Control*. University of California, Berkeley; 2003:1-201.","chicago":"Majumdar, Ritankar. *Symbolic Algorithms for Verification and Control*. University of California, Berkeley, 2003.","apa":"Majumdar, R. (2003). *Symbolic algorithms for verification and control* (pp. 1–201). University of California, Berkeley.","mla":"Majumdar, Ritankar. *Symbolic Algorithms for Verification and Control*. University of California, Berkeley, 2003, pp. 1–201.","short":"R. Majumdar, Symbolic Algorithms for Verification and Control, University of California, Berkeley, 2003."},"title":"Symbolic algorithms for verification and control"},{"quality_controlled":0,"publication_status":"published","author":[{"id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph","full_name":"Christoph Lampert","orcid":"0000-0001-8622-7887","last_name":"Lampert"}],"publisher":"Universität Bonn, Fachbibliothek Mathematik","page":"1 - 165","year":"2003","date_published":"2003-03-31T00:00:00Z","intvolume":" 356","publist_id":"2704","_id":"3678","month":"03","extern":1,"day":"31","type":"dissertation","status":"public","main_file_link":[{"open_access":"0","url":"http://pub.ist.ac.at/~chl/papers/lampert-phd2003.pdf"}],"title":"The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric ","citation":{"apa":"Lampert, C. (2003). *The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric *. *Bonner Mathematische Schriften* (Vol. 356, pp. 1–165). Universität Bonn, Fachbibliothek Mathematik.","short":"C. Lampert, The Neumann Operator in Strictly Pseudoconvex Domains with Weighted Bergman Metric , Universität Bonn, Fachbibliothek Mathematik, 2003.","mla":"Lampert, Christoph. “The Neumann Operator in Strictly Pseudoconvex Domains with Weighted Bergman Metric .” *Bonner Mathematische Schriften*, vol. 356, Universität Bonn, Fachbibliothek Mathematik, 2003, pp. 1–165.","ieee":"C. Lampert, *The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric *, vol. 356. Universität Bonn, Fachbibliothek Mathematik, 2003, pp. 1–165.","chicago":"Lampert, Christoph. *The Neumann Operator in Strictly Pseudoconvex Domains with Weighted Bergman Metric *. *Bonner Mathematische Schriften*. Vol. 356. Universität Bonn, Fachbibliothek Mathematik, 2003.","ama":"Lampert C. *The Neumann Operator in Strictly Pseudoconvex Domains with Weighted Bergman Metric *. Vol 356. Universität Bonn, Fachbibliothek Mathematik; 2003:1-165.","ista":"Lampert C. 2003. The Neumann operator in strictly pseudoconvex domains with weighted Bergman metric , Universität Bonn, Fachbibliothek Mathematik,p."},"date_updated":"2019-04-26T07:22:33Z","date_created":"2018-12-11T12:04:34Z","publication":"Bonner Mathematische Schriften","volume":356},{"day":"01","extern":1,"status":"public","type":"dissertation","date_updated":"2019-01-24T13:19:54Z","abstract":[{"lang":"eng","text":"This dissertation investigates game-theoretic approaches to the algorithmic analysis of concurrent, reactive systems. A concurrent system comprises a number of components working concurrently; a reactive system maintains an ongoing interaction with its environment. Traditional approaches to the formal analysis of concurrent reactive systems usually view the system as an unstructured state-transition graphs; instead, we view them as collections of interacting components, where each one is an open system which accepts inputs from the other components. The interactions among the components are naturally modeled as games.\n\nAdopting this game-theoretic view, we study three related problems pertaining to the verification and synthesis of systems. Firstly, we propose two novel game-theoretic techniques for the model-checking of concurrent reactive systems, and improve the performance of model-checking. The first technique discovers an error as soon as it cannot be prevented, which can be long before it actually occurs. This technique is based on the key observation that "unpreventability" is a local property to a module: an error is unpreventable in a module state if no environment can prevent it. The second technique attempts to decompose a model-checking proof into smaller proof obligations by constructing abstract modules automatically, using reachability and "unpreventability" information about the concrete modules. Three increasingly powerful proof decomposition rules are proposed and we show that in practice, the resulting abstract modules are often significantly smaller than the concrete modules and can drastically reduce the space and time requirements for verification. Both techniques fall into the category of compositional reasoning.\n\nSecondly, we investigate the composition and control of synchronous systems. An essential property of synchronous systems for compositional reasoning is non-blocking. In the composition of synchronous systems, however, due to circular causal dependency of input and output signals, non-blocking is not always guaranteed. Blocking compositions of systems can be ruled out semantically, by insisting on the existence of certain fixed points, or syntactically, by equipping systems with types, which make the dependencies between input and output signals transparent. We characterize various typing mechanisms in game-theoretic terms, and study their effects on the controller synthesis problem. We show that our typing systems are general enough to capture interesting real-life synchronous systems such as all delay-insensitive digital circuits. We then study their corresponding single-step control problems --a restricted form of controller synthesis problem whose solutions can be iterated in appropriate manners to solve all LTL controller synthesis problems. We also consider versions of the controller synthesis problem in which the type of the controller is given. We show that the solution of these fixed-type control problems requires the evaluation of partially ordered (Henkin) quantifiers on boolean formulas, and is therefore harder (nondeterministic exponential time) than more traditional control questions.\n\nThirdly, we study the synthesis of a class of open systems, namely, uninitialized state machines. The sequential synthesis problem, which is closely related to Church's solvability problem, asks, given a specification in the form of a binary relation between input and output streams, for the construction of a finite-state stream transducer that converts inputs to appropriate outputs. For efficiency reasons, practical sequential hardware is often designed to operate without prior initialization. Such hardware designs can be modeled by uninitialized state machines, which are required to satisfy their specification if started from any state. We solve the sequential synthesis problem for uninitialized systems, that is, we construct uninitialized finite-state stream transducers. We consider specifications given by LTL formulas, deterministic, nondeterministic, universal, and alternating Buechi automata. We solve this uninitialized synthesis problem by reducing it to the well-understood initialized synthesis problem. While our solution is straightforward, it leads, for some specification formalisms, to upper bounds that are exponentially worse than the complexity of the corresponding initialized problems. However, we prove lower bounds to show that our simple solutions are optimal for all considered specification formalisms. The lower bound proofs require nontrivial generic reductions."}],"date_created":"2018-12-11T12:08:44Z","title":"Games in open systems verification and synthesis","citation":{"mla":"Mang, Freddy. *Games in Open Systems Verification and Synthesis*. University of California, Berkeley, 2002, pp. 1–116.","short":"F. Mang, Games in Open Systems Verification and Synthesis, University of California, Berkeley, 2002.","apa":"Mang, F. (2002). *Games in open systems verification and synthesis* (pp. 1–116). University of California, Berkeley.","chicago":"Mang, Freddy. *Games in Open Systems Verification and Synthesis*. University of California, Berkeley, 2002.","ista":"Mang F. 2002. Games in open systems verification and synthesis, University of California, Berkeley,p.","ama":"Mang F. *Games in Open Systems Verification and Synthesis*. University of California, Berkeley; 2002:1-116.","ieee":"F. Mang, *Games in open systems verification and synthesis*. University of California, Berkeley, 2002, pp. 1–116."},"quality_controlled":0,"author":[{"first_name":"Freddy","full_name":"Mang, Freddy Y","last_name":"Mang"}],"page":"1 - 116","publisher":"University of California, Berkeley","publication_status":"published","year":"2002","date_published":"2002-05-01T00:00:00Z","_id":"4414","month":"05","publist_id":"315"},{"year":"1999","date_published":"1999-10-01T00:00:00Z","publist_id":"321","supervisor":[{"last_name":"Bryton","first_name":"Robert","full_name":"Bryton, Robert K."},{"last_name":"Steel","full_name":"Steel, John","first_name":"John"}],"month":"10","_id":"4411","quality_controlled":0,"publication_status":"published","author":[{"first_name":"Shaz","full_name":"Qadeer,Shaz","last_name":"Qadeer"}],"page":"1 - 150","publisher":"University of California, Berkeley","main_file_link":[{"open_access":"0","url":"http://mtc.epfl.ch/~tah/Students/qadeer.pdf"}],"title":"Algorithms and Methodology for Scalable Model Checking","citation":{"ieee":"S. Qadeer, *Algorithms and Methodology for Scalable Model Checking*. University of California, Berkeley, 1999, pp. 1–150.","ista":"Qadeer S. 1999. Algorithms and Methodology for Scalable Model Checking, University of California, Berkeley,p.","ama":"Qadeer S. *Algorithms and Methodology for Scalable Model Checking*. University of California, Berkeley; 1999:1-150.","chicago":"Qadeer, Shaz. *Algorithms and Methodology for Scalable Model Checking*. University of California, Berkeley, 1999.","apa":"Qadeer, S. (1999). *Algorithms and Methodology for Scalable Model Checking* (pp. 1–150). University of California, Berkeley.","mla":"Qadeer, Shaz. *Algorithms and Methodology for Scalable Model Checking*. University of California, Berkeley, 1999, pp. 1–150.","short":"S. Qadeer, Algorithms and Methodology for Scalable Model Checking, University of California, Berkeley, 1999."},"abstract":[{"lang":"eng","text":"Model checking algorithms for the verification of reactive systems proceed by a systematic and exhaustive exploration of the system state space. They do not scale to large designs because of the state explosion problem --the number of states grows exponentially with the number of components in the design. Consequently, the model checking problem is PSPACE-hard in the size of the design description. This dissertation proposes three novel techniques to combat the state explosion problem.\n\nOne of the most important advances in model checking in recent years has been the discovery of symbolic methods, which use a calculus of expressions, such as binary decision diagrams, to represent the state sets encountered during state space exploration. Symbolic model checking has proved to be effective for verifying hardware designs. Traditionally, symbolic checking of temporal logic specifications is performed by backward fixpoint reasoning with the operator Pre. Backward reasoning can be wasteful since unreachable states are explored. We suggest the use of forward fixpoint reasoning based on the operator Post. We show how all linear temporal logic specifications can be model checked symbolically by forward reasoning. In contrast to backward reasoning, forward reasoning performs computations only on the reachable states.\n\nHeuristics that improve algorithms for application domains, such as symbolic methods for hardware designs, are useful but not enough to make model checking feasible on industrial designs. Currently, exhaustive state exploration is possible only on designs with about 50-100 boolean state variables. Assume-guarantee verification attempts to combat the state explosion problem by using the principle of "divide and conquer," where the components of the implementation are analyzed one at a time. Typically, an implementation component refines its specification only when its inputs are suitably constrained by other components in the implementation. The assume-guarantee principle states that instead of constraining the inputs by implementation components, it is sound to constrain them by the corresponding specification components, which can be significantly smaller. We extend the assume-guarantee proof rule to deal with the case where the specification operates at a coarser time scale than the implementation. Using our model checker Mocha, which implements this methodology, we verify VGI, a parallel DSP processor chip with 64 compute processors each containing approximately 800 state variables and 30K gates.\n\nOur third contribution is a systematic model checking methodology for verifying the abstract shared-memory interface of sequential consistency on multiprocessor systems with three parameters --number of processors, number of memory locations, and number of data values. Sequential consistency requires that some interleaving of the local temporal orders of read/write events at different processors be a trace of serial memory. Therefore, it suffices to construct a non-interfering serializer that watches and reorders read/write events so that a trace of serial memory is obtained. While in general such a serializer must be unbounded even for fixed values of the parameters --checking sequential consistency is undecidable!-- we show that the paradigmatic class of snoopy cache coherence protocols has finite-state serializers. In order to reduce the arbitrary-parameter problem to the fixed-parameter problem, we develop a novel framework for induction over the number of processors and use the notion of a serializer to reduce the problem of verifying sequential consistency to that of checking language inclusion between finite state machines."}],"date_updated":"2019-01-24T13:19:53Z","date_created":"2018-12-11T12:08:43Z","extern":1,"day":"01","type":"dissertation","status":"public"},{"status":"public","type":"dissertation","day":"01","extern":1,"date_updated":"2019-01-24T13:19:55Z","date_created":"2018-12-11T12:08:45Z","title":"The Theory of Rectangular Hybrid Automata","citation":{"chicago":"Kopke, Peter. *The Theory of Rectangular Hybrid Automata*. Cornell University, 1996.","ama":"Kopke P. *The Theory of Rectangular Hybrid Automata*. Cornell University; 1996.","ista":"Kopke P. 1996. The Theory of Rectangular Hybrid Automata, Cornell University,p.","ieee":"P. Kopke, *The Theory of Rectangular Hybrid Automata*. Cornell University, 1996.","mla":"Kopke, Peter. *The Theory of Rectangular Hybrid Automata*. Cornell University, 1996.","short":"P. Kopke, The Theory of Rectangular Hybrid Automata, Cornell University, 1996.","apa":"Kopke, P. (1996). *The Theory of Rectangular Hybrid Automata*. Cornell University."},"author":[{"full_name":"Kopke, Peter W","first_name":"Peter","last_name":"Kopke"}],"publisher":"Cornell University","publication_status":"published","quality_controlled":0,"_id":"4419","month":"01","publist_id":"312","year":"1996","date_published":"1996-01-01T00:00:00Z"},{"publist_id":"304","month":"01","_id":"4428","year":"1995","date_published":"1995-01-01T00:00:00Z","doi":"CSD-TR95-1536","publication_status":"published","author":[{"last_name":"Ho","full_name":"Ho, Pei-Hsin","first_name":"Pei"}],"page":"1 - 188","publisher":"Cornell University","quality_controlled":0,"title":"Automatic Analysis of Hybrid Systems","citation":{"apa":"Ho, P. (1995). *Automatic Analysis of Hybrid Systems* (pp. 1–188). Cornell University. https://doi.org/CSD-TR95-1536","mla":"Ho, Pei. *Automatic Analysis of Hybrid Systems*. Cornell University, 1995, pp. 1–188, doi:CSD-TR95-1536.","short":"P. Ho, Automatic Analysis of Hybrid Systems, Cornell University, 1995.","ieee":"P. Ho, *Automatic Analysis of Hybrid Systems*. Cornell University, 1995, pp. 1–188.","ama":"Ho P. *Automatic Analysis of Hybrid Systems*. Cornell University; 1995:1-188. doi:CSD-TR95-1536","ista":"Ho P. 1995. Automatic Analysis of Hybrid Systems, Cornell University,p.","chicago":"Ho, Pei. *Automatic Analysis of Hybrid Systems*. Cornell University, 1995. https://doi.org/CSD-TR95-1536."},"date_updated":"2019-01-24T13:19:58Z","abstract":[{"text":"Hybrid systems are real-time systems that react to both discrete and continuous activities (such as analog signals, time, temperature, and speed). Typical examples of hybrid systems are embedded systems, timing-based communication protocols, and digital circuits at the transistor level. Due to the rapid development of microprocessor technology, hybrid systems directly control much of what we depend on in our daily lives. Consequently, the formal specification and verification of hybrid systems has become an active area of research. This dissertation presents the first general framework for the formal specification and verification of hybrid systems, as well as the first hybrid-system analysis tool--HyTech. The framework consists of a graphical finite-state-machine-like language for modeling hybrid systems, a temporal logic for modeling the requirements of hybrid systems, and a computer procedure that verifies modeled hybrid systems against modeled requirements. The tool HyTech is the implementation of the framework using C++ and Mathematica.\n\nMore specifically, our hybrid-system modeling language, Hybrid Automata, is an extension of timed automata with discrete and continuous variables whose dynamics are governed by differential equations. Our requirement modeling language, ICTL, is a branching-time temporal logic, and is an extension of TCTL with stop-watch variables. Our verification procedure is a symbolic model-checking procedure that verifies linear hybrid automata against ICTL formulas. To make HyTech more efficient and effective, we use model-checking strategies and abstract operators that can expedite the verification process. To enable HyTech to verify nonlinear hybrid automata, we introduce two translations from nonlinear hybrid automata to linear hybrid automata. We have applied HyTech to analyze more than 30 hybrid-system benchmarks. In this dissertation, we present the application of HyTech to three nontrivial hybrid systems taken from the literature.","lang":"eng"}],"date_created":"2018-12-11T12:08:48Z","type":"dissertation","status":"public","extern":1,"day":"01"},{"main_file_link":[{"url":"http://mtc.epfl.ch/~tah/Publications/the_temporal_specification_and_verification_of_real-time_systems.pdf","open_access":"0"}],"title":"The Temporal Specification and Verification of Real-time Systems ","citation":{"ama":"Henzinger TA. *The Temporal Specification and Verification of Real-Time Systems *. Stanford University; 1991.","ista":"Henzinger TA. 1991. The Temporal Specification and Verification of Real-time Systems , Stanford University,p.","chicago":"Henzinger, Thomas A. *The Temporal Specification and Verification of Real-Time Systems *. Stanford University, 1991.","ieee":"T. A. Henzinger, *The Temporal Specification and Verification of Real-time Systems *. Stanford University, 1991.","short":"T.A. Henzinger, The Temporal Specification and Verification of Real-Time Systems , Stanford University, 1991.","mla":"Henzinger, Thomas A. *The Temporal Specification and Verification of Real-Time Systems *. Stanford University, 1991.","apa":"Henzinger, T. A. (1991). *The Temporal Specification and Verification of Real-time Systems *. Stanford University."},"date_updated":"2019-08-02T12:38:32Z","date_created":"2018-12-11T12:09:15Z","type":"dissertation","status":"public","extern":1,"day":"01","publist_id":"210","_id":"4516","month":"08","year":"1991","date_published":"1991-08-01T00:00:00Z","publication_status":"published","author":[{"last_name":"Henzinger","full_name":"Thomas Henzinger","orcid":"0000−0002−2985−7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A"}],"publisher":"Stanford University","quality_controlled":0},{"citation":{"short":"N.H. Barton, A Hybrid Zone in the Alpine Grasshopper Podisma Pedestris, University of East Anglia, 1979.","mla":"Barton, Nicholas H. *A Hybrid Zone in the Alpine Grasshopper Podisma Pedestris*. University of East Anglia, 1979.","apa":"Barton, N. H. (1979). *A hybrid zone in the alpine grasshopper Podisma pedestris*. University of East Anglia.","chicago":"Barton, Nicholas H. *A Hybrid Zone in the Alpine Grasshopper Podisma Pedestris*. University of East Anglia, 1979.","ista":"Barton NH. 1979. A hybrid zone in the alpine grasshopper Podisma pedestris, University of East Anglia,p.","ama":"Barton NH. *A Hybrid Zone in the Alpine Grasshopper Podisma Pedestris*. University of East Anglia; 1979.","ieee":"N. H. Barton, *A hybrid zone in the alpine grasshopper Podisma pedestris*. University of East Anglia, 1979."},"title":"A hybrid zone in the alpine grasshopper Podisma pedestris","date_created":"2018-12-11T12:08:20Z","date_updated":"2019-04-26T07:22:43Z","type":"dissertation","status":"public","extern":1,"day":"01","publist_id":"1694","month":"01","_id":"4337","date_published":"1979-01-01T00:00:00Z","year":"1979","publication_status":"published","publisher":"University of East Anglia","author":[{"first_name":"Nicholas H","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","full_name":"Nicholas Barton","orcid":"0000-0002-8548-5240","last_name":"Barton"}],"quality_controlled":0}]