Abstract
Parameterized model checking is the problem of deciding if a given formula holds irrespective of the number of participating processes. A standard approach for solving the parameterized model checking problem is to reduce it to model checking finitely many finite-state systems. This work considers the theoretical power and limitations of this technique. We focus on concurrent systems in which processes communicate via pairwise rendezvous, as well as the special cases of disjunctive guards and token passing; specifications are expressed in indexed temporal logic without the next operator; and the underlying network topologies are generated by suitable formulas and graph operations. First, we settle the exact computational complexity of the parameterized model checking problem for some of our concurrent systems, and establish new decidability results for others. Second, we consider the cases where model checking the parameterized system can be reduced to model checking some fixed number of processes, the number is known as a cutoff. We provide many cases for when such cutoffs can be computed, establish lower bounds on the size of such cutoffs, and identify cases where no cutoff exists. Third, we consider cases for which the parameterized system is equivalent to a single finite-state system (more precisely a Büchi word automaton), and establish tight bounds on the sizes of such automata.
Introduction
Many concurrent systems consist of an arbitrary number of identical processes running in parallel, possibly in the presence of an environment or control process. The parameterized model checking problem (PMCP) for concurrent systems is to decide if a given temporal logic specification holds irrespective of the number of participating processes.
Although the PMCP is undecidable in general (see [28, 52]) it becomes decidable for some combinations of communication primitives, network topologies, and specification languages, e.g., [1, 8, 14, 21, 22, 30, 51]. Often, it is proved decidable by a reduction to model checking finitely many finite-state systems [2, 16, 24, 28, 36]. In many of these cases it is even possible to reduce the problem of whether a parameterized system satisfies a temporal specification for any number of processes to the same problem for systems with at most c processes. In fact, it is usually of interest to find such a number c that works for every specification formula of a given temporal logic [2, 10, 16, 26, 28]. Such a number is known as a cutoff for the given parameterized system.1 In other cases the reduction produces a single finite-state system, often in the form of a fair transition system (such as a Büchi automaton), that represents the set of all execution traces of systems of all sizes. Note that PMCP is at least as hard as ordinary model checking since one can consider a replicated process that does not communicate with any others.
The goal of this paper is to better understand the power and limitations of these techniques, and this is guided by three concrete questions.
Question 1. For which combinations of communication primitives, specification languages, and network topologies is the PMCP decidable? In case of a decidable configuration, what is the computational complexity of the PMCP?
In case a cutoff c exists, the PMCP is decidable by a reduction to model checking c many finite-state systems. The complexity of this procedure depends on the size of the cutoff. Thus we ask:
Question 2. When do cutoffs exist? In case a cutoff exists, can one compute a cutoff? And if so, is the computed cutoff the smallest possible?
The set of execution traces of a parameterized system (for a given process type P) is defined as the projection onto the local states of P of all (infinite) runs of systems of all sizes.2 In case this set is -regular, one can reduce the PMCP of certain specifications (including classic ones such as coverability) to the language containment problem for automata (this is the approach taken in [36, Section 4]). Thus we ask:
Question 3. Is the set of executions of the system -regular? And if so, how big is a non-deterministic Büchi word automaton recognizing this set?
System model
In order to model and verify a concurrent system we should specify three items: (i) the communication primitive, (ii) the specification language, and (iii) the set of topologies.
-
(i)
In this work we focus on concurrent systems in which processes have finitely many states and communicate via pairwise rendezvous [36]. Pairwise-rendezvous is like CSP message passing, and can model, for instance, the communication in population protocols [9, 32], vector-addition systems with states (or equivalently, Petri nets) [29], and concurrent Boolean programs with locks or shared variables [12, 42]. We also treat two other communication primitives which are expressible in terms of pairwise rendezvous, namely disjunctive guards [24] and token-passing systems [2, 16, 28]. A much more powerful communication is broadcast [27, 31], which is like Ethernet broadcast and the notifyAll method in Concurrent Java [20]. The relative expressive power of pairwise-rendezvous and various other communication primitives, including disjunctive guards and broadcast, is studied in [7], and decidability of the PMCP with all the mentioned communication primitives, as well as others, is summarised in [14].
-
(ii)
Specifications of parameterized systems are typically expressed in indexed temporal logic [15] which allows one to quantify over processes. For instance, the formula says that no two processes are in their critical sections at the same time. We focus on a fragment of this logic where the process quantifiers only appear at the front of a temporal logic formula—allowing the process quantifiers to appear in the scope of path quantifiers results in undecidability even with no communication between processes [41].
-
(iii)
The sets of topologies we consider all have either bounded tree-width, or more generally bounded clique-width, and are expressible in one of three ways.3
Using , a powerful and general formalism for describing sets of topologies, which can express e.g., planarity, acyclicity and -connectivity.
As iteratively constructible sets of topologies, an intuitive formalism which creates graph sequences by iterating graph operations [34]; many typical classes of topologies (e.g., all rings, all stars, all cliques) are iteratively constructible.
As homogeneous sets of topologies, which includes, e.g., the set of cliques and the set of stars, but excludes the set of rings.
Iteratively constructible and homogeneous sets of topologies are -definable, the former in the presence of certain auxiliary relations.
Prior work and our contributions
For each communication primitive (rendezvous, disjunctive guards, token passing) and each question (decidability and complexity, cutoffs, equivalent automata) we summarise the known answers and our contributions. Obviously, the breadth of questions along these axes is great, and we had to limit our choices as to what to address. Thus, this article is not meant to be a comprehensive taxonomy of PMCP. That is, it is not a mapping of the imaginary hypercube representing all possible choices along these axes. Instead, we started from the points in this hypercube that represent the most prominent known results and, guided by the three main questions mentioned earlier, have explored the unknown areas in each point’s neighborhood.
Pairwise rendezvous
Decidability and complexity. The PMCP for systems communicating by pairwise rendezvous, on clique topologies, with a controller C,4 for 1-index specifications is Expspace-complete [30, 36] (Pspace-complete without a controller [36, Section 4]). We show the PMCP is undecidable if we allow the more general 1-index specifications. Thus, for the results on pairwise rendezvous we fix the specification language to be 1-index . We prove that the PMCP of 1-index remains in Expspace even if one allows homogeneous topologies (Pspace-complete without a controller). We also prove that the program complexity is in Expspace (Ptime without a controller). In contrast, if one allows non-homogeneous topologies, the PMCP is much harder, e.g., it is undecidable for the simple case of unidirectional rings and 1-index safety specifications (this is implied by [28, 52]).
Cutoffs. We show that even for clique topologies there are not always cutoffs.
Equivalent automata. We prove that the set of executions of systems with a controller are not, in general, -regular, already for clique topologies. On the other hand, we extend the known result that the set of executions for systems with only user processes U (i.e., without a controller) is -regular for clique topologies [36] to homogeneous topologies, and give an effective construction of the corresponding Büchi automaton.
Disjunctive guards
Decidability and complexity. We show that, similar to pairwise-rendezvous systems, the PMCP is undecidable if we allow 1-index specifications already for clique topologies, and for 1-index specifications already for uni-directional ring topologies. Thus, we restrict our attention to specifications in 1-index and homogeneous topologies. We prove that the complexity of the PMCP is Pspace-complete for homogeneous topologies (irrespective of whether or not there is a controller). The program complexity is in Ptime without a controller, and in co-NP with a controller, and is co-NP hard already for the restricted case of a parameterized clique topology.
Cutoffs. It is known that cutoffs exist for disjunctively guarded clique topologies and are of size [24]. We prove that these cutoffs are tight. We then go on and prove a more general cutoff theorem for disjunctively guarded systems in homogeneous parameterized topologies.
Equivalent automaton. We prove that the set of executions is accepted by an effectively constructible Büchi automaton of size . It is very interesting to note that this size is smaller than the smallest system size one gets (in the worst-case) from the cutoff result, namely . Hence, the PMCP algorithm obtained from the cutoff is less efficient than the one obtained from going directly to a Büchi automaton. As far as we know, this is the first theoretical proof of the existence of the phenomenon that cutoffs may not yield optimal algorithms. We also prove that, in general, our construction is optimal, i.e., that in some cases every automaton for the set of executions must be of size .
Token passing
In this section we focus on -definable sets of topologies of bounded tree-width or clique-width, as well as on iteratively-constructible sets of topologies.
Decidability and complexity. We prove that the PMCP is decidable for indexed on such topologies. This considerably generalizes the results of [2], where decidability for this logic was shown for a few concrete topologies such as rings and cliques.
Cutoffs. We prove that the PMCPs have computable cutoffs for indexed . From [2] we know that there is a (computable) set of topologies and a system template such that there is no algorithm that given an indexed formula can compute the associated cutoff (even though a cutoff for the given formula exists). This justifies our search of sets of topologies for which the PMCP for has computable cutoffs. We also give a lower bound on cutoffs for iteratively-constructible sets and indexed .
Equivalent automaton. Our ability to compute cutoffs for 1-index formulas implies that the sets of execution traces are -regular, and the construction of Büchi automata which compute these traces is effective.
Definitions and preliminaries
A labeled transition system (LTS) is a tuple , where S is the set of states, is the transition relation, are the initial states, is the state-labeling, is a set of atomic propositions or atoms, and is the alphabet of transition labels. When and are clear from the context we drop them. A finite LTS is an LTS in which are finite and is finite for every . Transitions may be written . A transition system (TS) is an LTS without the labeling function and without the set of atomic propositions.
A path of an LTS is a finite sequence of the form or an infinite sequence of the form such that for all i. A state-labeled path of an LTS is the projection of a path onto states S. An action-labeled path of an LTS is the projection of a path onto transition labels . A run is an infinite path that starts in an initial state. Similarly, a state-labeled run is a state-labeled path that is infinite and starts in an initial state. However when it is clear from the context we will say ‘run’ instead of ‘state-labeled run’ (e.g., LTL formulas are interpreted over runs ). For a path , write for the induced sequence of labels, i.e., .
If is a sequence of vectors, i.e., (for some fixed sets X, Y), and , define the projection of to x, written , to be the sequence of elements of Y.
We now introduce notation for automata over infinite and finite strings. For a finite set , write for the set of infinite strings over . Subsets of are called languages. A (nondeterministic) Büchi word-automaton (NBW) A is a tuple where is a finite input alphabet, Q is a finite set of states, is the set of initial states, is the transition relation, and are the accepting states. A run in A is an infinite path through A that starts in an initial state. The run is successful if a state from F appears infinitely often. The language accepted by the automaton A is the set of all infinite strings that label successful runs in A. Languages accepted by NBWs are called -regular. A nondeterministic word automaton (NFW) is similar, except that runs are finite, and a successful run is one that ends in a state of F. The language of an NFW is thus a subset of , i.e., a set of finite strings over alphabet . Languages accepted by NFWs are called regular.
Undecidability proofs will make use of reductions from two-counter machines, known to be Turing powerful [46]. A 2CM is a finite set of instructions, say , where each instruction is from the following instruction set: (the machine stops when it reaches this instruction), (increment counter i by one), (decrement counter i by one), and (if counter i is zero then goto instruction ). Note that after performing each instruction (except for or a that performs a goto) the 2CM moves from it’s current instruction to the next instruction . We assume w.l.o.g. (by guarding every decrement with a test for zero) that the machine never tries to decrement a zero counter.
Process template, topology, pairwise rendezvous system
We define how to (asynchronously) compose processes that communicate via pairwise rendezvous into a single system. We consider discrete time (i.e., not continuous). Processes are not necessarily identical, but we assume there are only a finite number of different process types. Roughly, at every vertex of a topology (a directed graph with vertices labeled by process types) there is a process of the given type running; at every time step, either, and the choice is nondeterministic, exactly one process makes an internal transition, or exactly two processes with an edge between them in the topology perform a synchronizing transition, i.e., they instantaneously synchronize on a message (sometimes called an action) . The sender of the message performs an transition, and the receiver an transition. In this model processes have no IDs, and thus in particular, the sender can not direct the message to a specific neighbouring process (nor can the receiver choose from where to receive it), but the pair is chosen non-deterministically.5
In the following we fix a countable set of atoms , as well as a finite synchronization alphabet (that does not include the symbol ). Define the communication alphabet:
Process template and system template A pairwise-rendezvous process template is a finite LTS of the form . Since and the communication alphabet are typically fixed, we will usually omit them. The pairwise-rendezvous system arity is a natural number . It refers to the number of different process types in the system. We call the transitions of a process template local transitions. A pairwise-rendezvous r-ary system template is a tuple of process templates where r is the system arity. The process template is called the i th process template. We sometimes drop the adjectives “r-ary” and “pairwise-rendezvous”.
Topology An r -topology is a finite structure where , and the partition V.6 The type of denoted type(v) is the unique such that . We might write and to stress .
We write [n] to denote the set , for any . We sometimes assume that for some . For instance the 1-ary ring topology with has and .
Pairwise-rendezvous system Given a system arity r, a system template with , and an r-topology , define the system as the LTS where
The set Q is the set of functions such that iff (for ). Such functions (sometimes written as vectors) are called configurations.
The set consists of the unique initial configuration defined as (for all ).
- The set of global transitions are tuples where one of the following two conditions hold:
- and there exists such that is a transition of the process template , and for all , ; this is called an internal transition,
- and there exists with such that is a transition of and is a transition of and for all , ; this is called a synchronous transition. We say that the process at v sends the message and the process at w receives the message .
The labeling function is defined by (for configurations f, atoms and vertices ).
In words then, a topology of size n specifies n-many processes, which processes have which type, and how the processes are connected. In the internal transition above only the process at vertex v makes a transition, and in the synchronous transition above only the process at vertex v and its neighbour at w make a transition. Let be a state-labeled path in . The projection of to vertex , denoted , is the sequence of states of . If we say that the vertex v runs (a copy of) the process , or that the process template at v is . We sometimes drop the adjective “pairwise-rendezvous” and simply talk about a system.
Disjunctively-guarded systems and token passing systems
We define disjunctively-guarded systems and token-passing systems as restricted forms of pairwise rendezvous systems. In fact, the restrictions are on the synchronization alphabet, the system template, and in case of token passing systems also on the topology. Write .
Disjunctively-guarded system. A disjunctively-guarded system template is a system-template such that
The synchronization alphabet is is , and the communication-alphabet is .
The state sets of the process templates are pairwise disjoint, i.e., for .
For every state (), there is a transition in labeled .
For every state (), the only transitions in labeled are of the form .
Observe that a process can take a transition iff there is some other process in state s, and that the receiver of a message s stays in state s. We say that the transition is guarded by the state s. We say that a process in a disjunctively-guarded system that is in a state s opens the gate s.
In the following, given any pair of states q and , and given some finite set of states , we usually write instead of writing the multiple transitions for . We usually also forgo writing the -label (and thus write instead of ).
A disjunctively-guarded system is a system formed using disjunctively-guarded system templates. Our definition of disjunctively-guarded systems on a clique topology is a reformulation of the definition of concrete system in [24, Section 2]: there, local transitions of process templates can be guarded by disjunctive boolean formulas that observe the local state of some other process. In our encoding, the observer and the observed processes synchronize: the former does the desired local transition, while the latter self-loops, not changing its local state. For this encoding to work, we require that the transition labels have the same name of the local states of the observed process templates.
Token passing system. In this work we only consider the case of token passing systems (TPS) with a single valueless token [2, 28]. A token passing system template is a system template such that
, i.e., the only synchronization operation is passing the token.
The system arity r satisfies .
Every set is partitioned into and . We think of (resp. ) as the states in which the process has (resp. does not have) the token.
If , then or , i.e., internal transitions do not affect whether the process has the token.
If , then and , i.e., is the action of token sending.
If , then and . i.e., is the action of token receiving.
and for every , , i.e., a process with template starts with the token.
A token passing system is a system formed using a token passing system template and a topology G such that , i.e., exactly one process can start with the token.
Intuitively, at any time during the computation, exactly one vertex has the token. The token starts with the unique process , and later may be passed to processes in . This means that the token passing systems considered in this work inherently requires topologies with controllers (see Sect. 2.8 for details). At each time step either exactly one process makes an internal transition, or exactly two processes synchronize when one process sends the token to another along an edge of G.
Parameterized topologies
Parameterized topology. An r-ary parameterized topology is a set of r-topologies such that membership in is decidable. We may drop the adjective “r-ary”. The following are typical examples of parameterized topologies.
The set of all 1-ary ring topologies.
The set of all r-ary clique topologies.
The set of all 2-ary ring topologies such that . In a given topology of this form, the unique process at the vertex of type 1 is called a controller, and the processes at the vertices of type 2 are called users. See Sect. 2.8 for more on controllers and users.
Homogeneous parameterized topology. We now define the homogeneous parameterized topologies which generalize the clique parameterized topologies.
An r-ary parameterized topology is homogeneous if there is a directed graph H with vertex set and edge set and a partition of [r] such that an r-ary topology if and only if
For every there exists a unique such that ;
For every and : E(u, v) and E(v, u);
For every and : and ;
For every and : E(u, v) if and only if .
In other words, G is formed from H by substituting each vertex in with a clique, each vertex in with an independent set, leaving every vertex in as a single vertex, and connecting vertices as they were connected in H.
We say that is generated by H and . The cardinality of is the number of controllers in . In case we say that is controllerless, and otherwise we say that is controlled. If and H is a clique, then we say that is an r -ary clique parameterized topology. If then is called the r -ary controllerless-clique parameterized topology.
We now give some examples. Fix the 2-topology H with vertex set and edge set and for .
Example (Cliques) The set of 2-ary cliques in which exactly one index has type 1 is homogeneous generated by the H above, , and .
Example (Stars) The set of stars in which exactly one index has type 1 is homogeneous using H above, , and .
Example (Bipartite graphs) The set of topologies that are complete bipartite graphs is homogeneous using H above, , and .
Example (Rings are not homogeneous) The length of the longest simple path in any member of an homogeneous parameterized topology generated by H is at most the number of vertices in H. Thus the set of rings is not homogeneous (for any H).
Call a homogeneous parameterized topology H non-trivial if there exists and such that and . Informally, a non-trivial homogeneous parameterized topology means that there is bi-directional communication between a controller and arbitrarily many user processes. This notion is used for some of the lower-bounds in Sects. 3 and 4.
Indexed temporal logic
We assume the reader is familiar with the syntax and semantics of and LTL, see e.g., [11]. Indexed temporal logics were introduced by [15] to model specifications of certain distributed systems. They are obtained by adding vertex quantifiers to a given temporal logic over indexed atomic propositions. For example, in a system with two process templates, the formula
states that every process of type 1 on all computations at all points of time satisfies the atom good. In a system with one process template, the formula
states that it is never the case that two processes both satisfy the atom
at the same time.7
Syntax Fix an infinite set of vertex variables (called index variables). A vertex quantifier is an expression of the form or where . An indexed formula over vertex variables and atomic propositions is a formula of the form , where each , each is an vertex quantifier, and is a state formula over atomic predicates .
Semantics An indexed formula is interpreted over a system (for r-ary system template and r-topology ). A valuation is a function .
For some state formula , and valuation e define inductively. Path formulas are interpreted similarly, but over , where is a run of . The only new cases are the base case and the quantifier case.
- Base case:
For define to mean that . In words, the atom p holds at the state of the process at vertex .
- Quantifier case:
An i-variant of a valuation e is a valuation with for all with . Define
to mean that for all i-variants of e, if then . The semantics of the quantifiers
are defined similarly.
Finally, define if it holds for the initial state of .
Notation
In the rest of the paper we will apply the following conventions, for the sake of readability.
An atom is sometimes also written as .
A formula
is called a sentence if for every atom that occurs in the formula, there is a quantifier that binds j, that is, .The formula is called universal (resp. existential) if all the vertex quantifiers are universal (resp. existential).
For we allow more general quantification such as . The semantics are defined in the natural way, see the full version of [2].
In case of 1-ary systems, we may write instead of .
In the syntax of indexed formulas we sometimes write instead of .
Write for the set of all indexed sentences, and for the set of all k-indexed formulas in , i.e., formulas with k many quantifiers. Write for the fragment of with path-quantifier nesting-depth at most d [49]. We similarly define indexed versions of the various natural fragments of , e.g., , and .
Say that is -equivalent to , written , if they agree on all formulas: for every formula it holds that iff .
Note. The index variables are bound outside of all the temporal path quantifiers ( and ). In particular, for an existentially quantified formula to be satisfied there must exist a valuation of the index variables such that holds for all runs (and not one valuation for each run). Thus this logic is sometimes called prenex indexed temporal logic. Note that if one allows vertex quantifiers inside the scope of temporal path quantifiers then one quickly reaches undecidability even for systems with no communication [41].
For the remainder of this paper specifications only come from , i.e., without the next-time operator . It is usual in the context of parameterized systems to consider specification logics without the next-time operator. The reason is that since we discretize time, when a process makes an internal transition time proceeds by one step. However, a formula that talks about one processes should usually not be able to (as allows) refer to the time advance caused by other processes making internal moves.
The parameterized model checking problem
Fix an r-ary parameterized topology , a set of r-ary system templates , and a set of indexed temporal logic sentences . The parameterized model checking problem (PMCP), written , is to decide, given a formula and a system template , whether for all , . The complexity of the , where the formula is fixed and only the system template is given as an input, is called the program complexity.
Process executions
In this section we define process executions, and show in Lemma 2 how to reduce reasoning about Indexed Temporal Logic over homogeneous parameterized topologies to reasoning about process executions. In Corollary 1 we show how to apply the automata-theoretic approach to reasoning about the PMCP, and in Lemma 3 we show how to reduce homogeneous systems to clique systems.
First we define the destuttering of a word, which roughly means that one removes identical consecutive letters. The destuttering of a word is the word , also denoted , defined by replacing every maximal finite consecutive sequence of repeated symbols in by one copy of that symbol. Note that if is infinite, then is also infinite. Thus, the destuttering of is ; the destuttering of is ; and the destuttering of is . The destuttering of the set , written , is the set . The stuttering closure of L, written , is the set .
Lemma 1
If is -regular then so are the sets and . Moreover, let Q be the set of states of the Büchi automaton for L, then and are recognized by a Büchi automaton in time .
Proof
Given a Büchi automaton A recognizing L with states Q, we first obtain an automaton (with states ) also recognizing L by refining the states of A to remember the last symbol read. We can obtain an automaton B for the stuttering closure by adding transitions to : for every state (q, a) of add the transition ; and for every transition of of the form add the epsilon-transition . To obtain an automaton for the destuttering , intersect B with an automaton for those strings such that if then for all .
It is known that cannot distinguish between a word and its destuttering (this follows, e.g., from [49]), which is the main motivation for the next definition.
Process executions. Fix an r-ary parameterized topology and an r-ary system template . Define the set of (process) executions associated with a r-topology and vertex :
For , define the t-process executions in to be the union of all process executions associated with vertices of type t:
Finally, define the set of t-process executions of the parameterized topology :
Intuitively, contains all sequences of states visited by some instance of along some run. When or are clear from the context we may omit them.
The following lemma says that we can reduce PMCP of 1-index to model checking an ordinary formula over the set . Although we state it for pairwise-rendezvous system templates, its proof only uses symmetry (i.e., on a homogeneous topology , we have that is equal to the set of executions of any single process v of type t), and the fact that can not distinguish between a word and its destuttering.
Lemma 2
Fix an r-ary homogeneous parameterized topology , pairwise-rendezvous system template , and 1-index sentence of the form (for and ). Let be the formula in which every atom in of the form (a, x) has been replaced by the atom . The following are equivalent:
we have that ,
For all and all of type t in , and all , we have that .
Proof
It is easy to see that, for the case of a clique topology , the truth value of a 1-indexed sentence of the form depends only on the set . Observe that, on a homogeneous topology , due to symmetry, we have that is equal to the set of executions of any single process v of type t. Indeed, if are both of type t, then for every run of , there is a run of , such that . The run is obtained by simply replacing the roles of v and on (i.e., by replacing any local transition of v with one of , and vice-versa). This is possible since, being of the same type t, the vertices have exactly the same neighbouring vertices.
In the automata-theoretic approach to model checking [53], one reduces the question of whether every execution of a system satisfies an formula to the emptiness of the intersection of A and , where A is a non-deterministic Büchi word automaton (NBW) accepting the set of executions of the system and is an NBW accepting the set of words for which holds. Together with Lemma 2, this gives us the following corollary:
Corollary 1
Assume the hypotheses of Lemma 2. Then if and only if the intersection of A and is empty, where A is an NBW for the language (and is the state-labeling of the process template with type t).
From homogeneous to clique. We show a general reduction from homogeneous systems to clique systems. Moreover, if the homogeneous system is controllerless then so is the clique-system. Recall that homogeneous parameterized topologies are generated by an r-ary topology H (where each vertex has a unique type) and a partition of [r].
Lemma 3
Let be an r-ary homogeneous parameterized topology, and let be a pairwise-rendezvous r-ary system template.
If is controllerless, then there exists a pairwise-rendezvous template such that , where is the 1-ary controllerless-clique parameterized topology. Also, .
- If is controlled, then there exists a pairwise-rendezvous 2-ary system template and a 2-ary controlled-clique parameterized topology , such that is equal to , and for every ,
Moreover, is equal to and is equal to . If is a disjunctively-guarded system template, then also the system template in items 1 and 2 above can be taken to be disjunctively-guarded.
Proof
We prove the controlled case (the controllerless case is simpler). Given an r-ary system template , let the controlled homogeneous parameterized topology be generated by and some partition , , of .
The basic idea behind the reduction is that the process template is the disjoint union of the with , and the process template is the product of the with . Thus, every process running can nondeterministically decide (by starting in the corresponding component) which of the s to simulate, and the single process running simulates all of the s with . Note that (by definition of homogeneous) every is formed from some function such that every vertex i in H is replaced with a clique (if ) or an independent set (if ), of size . In this case let be the 2-ary clique of size (i.e., it has one vertex of type 1, and the rest are of type 2). Let be the set of all such and note that is a 2-ary controlled clique parameterized topology. We can simulate every computation of by a corresponding computation of , and vice versa, in which, for every , exactly processes make the nondeterministic choice to use the portion of that is . Observe that, in , a process associated with a vertex can send a message to another process, which is associated with a vertex j of H, if and only if either , or, and . We mirror this restriction in as follows: in , every state that is in the -component attaches i to every message that it sends, and for every , a state that is in the -component can receive a message if and only if either , or, and . Similarly, in , the ith co-ordinate (for ) attaches i to the messages it sends, and for every , the jth co-ordinate of can receive message if and only if .
Formally, suppose (for ) that is the ith template in , say with state set . Assume w.l.o.g. that for all , and that . Define the state set of to be the disjoint union of the s for . Thus has multiple initial states.8 Define the state set of to be the product of the s for . Formally, the states are functions such that . The initial state of is the function assigning to each the initial state of .
The communication alphabet is the set . The transitions of are simulated by below. In the following, transitions sending a message from i to j are simulated according to the sets to which i and j belong: transitions from to are simulated in items (A) and (D); transitions from to are simulated in items (B) and (C); transitions from to are simulated in items (A) and (C); and transitions from to are simulated in item (E). Internal transitions are simulated in items (F) and (G). The transitions from the dummy initial state of to the initial states of are given in item (H).
-
(A)
If , and is a transition of , then is a transition of ;
-
(B)
If , and is a transition of , then is a transition of where and for ;
-
(C)
if , or for , and is a transition of , then is a transition of ;
-
(D)
if , , , and is a transition of , then is a transition of where and for ;
-
(E)
If , and is a transition of , and is a transition of , then is a transition of where , , and for ;
-
(F)
If , and is a transition of , then is a transition of ;
-
(G)
If , and is a transition of , then is a transition of where and for ;
-
(H)
If and is the initial state of then is a transition of .
It is straightforward to check that we can indeed simulate every computation of by a corresponding computation of , and vice versa, which takes care of items 1 and 2 in the statement.
For item 3, observe that the communication primitive used by is the same as the one used in .
Cutoffs and decidability
Cutoff
A cutoff for is a natural number c such that for every and , the following are equivalent:
-
(i)
for all with ;
-
(ii)
for all .
Observe that the model checking problem (for an indexed formula) is decidable since is a finite structure and can be replaced by a Boolean combination of formulas, e.g., becomes .
Proposition 1
Let be a set of indexed- formulas. If has a cutoff then is decidable.
Proof
If c is a cutoff, let be all topologies in such that . The algorithm that solves PMCP takes as input and checks whether or not for all .
We remark that the previous proposition is not constructive. It simply says that from the existence of a cutoff one can deduce the existence of an algorithm.
The following theorem says that if there is a cutoff for the set of 1-indexed formulas then the set of executions is -regular. Although it is stated for pairwise-rendezvous system templates, the proof is generic.
Theorem 1
Fix an r-ary parameterized topology , let be a pairwise-rendezvous r-ary system template such that the set of atomic propositions contains all the states of process templates in ,9 and let be the set of 1-index formulas over . If has a cutoff, then for every the set of executions is -regular.
Proof
Let c be a cutoff, and let be the set of the topologies in below the cutoff. Observe that it is enough to prove that . Indeed, it is not hard to see that given , and a vertex , we can easily modify to an NBW that recognizes the language . Thus, by taking the disjoint union of all these NBW for every and every vertex of type t, we can obtain an NBW accepting (the finiteness of ensures that we indeed get a finite state automaton).
We now show that . The fact that is obvious. For the other direction, fix some , and consider some . We claim that every prefix u of w is also the prefix of some word . The claim implies that (and thus completes the proof) as follows. For every , consider the tree of words in that are prefixes of w. Observe that, by the claim above, all (the infinitely many) prefixes of w appear in one of these trees, and recall that is finite. Hence, by Kőnig’s lemma, there is an infinite path in one of these trees that contains infinitely many such prefixes, and thus all such prefixes. It follows that .
It remains to prove the claim. Let be a prefix of , and let where
Intuitively, this formula says that no t-execution starts with u. Note that is a 1-indexed formula over (by our assumption on ). Observe that since u is a prefix of w, there exists such that . Thus, since c is a cutoff, it is also the case that for some , i.e., u is also a prefix of some word in .
Two prominent kinds of pairwise rendezvous systems
The parameterized verification literature often distinguishes between two kinds of concurrent systems: those with identical processes, and those in which there is a single process that acts as a controller or environment.
Identical processes. Concurrent systems in which all processes are identical are modeled with system arity . In this case there is a single process template P, and the topology is with .
Identical processes with a controller. Concurrent systems in which all processes are identical except for one process (typically called a controller, or the environment) can be modeled with system arity , and system templates of the form , and we restrict the topologies so that exactly one vertex has type 1 (i.e., runs the controller). We call such topologies controlled. We often write (C, U) instead of . We write for the set of executions of the controller process, i.e., . We write for the set of executions of the user processes in this 2-ary system, i.e., . When the parameterized topology is clear from the context, we omit it.
Let us emphasize that the token passing systems with valueless tokens considered in this work are meaningful only for controlled topologies, since by definition (see Sect. 2.2) there exists exactly one copy of process template ; this copy is the unique process where the token is at the start of the run.
Pairwise rendezvous systems
The known decidability results for model checking parameterized pairwise rendezvous systems are for clique topologies and specifications from 1-indexed [36]. Thus, we might hope to generalize these results in two directions: more general specification languages and more general topologies. Unfortunately, as the following theorems show, we can not go too far in these directions. In Theorem 2 we show that one can reduce the non-halting problem of two-counter machines (2CMs), known to be undecidable, to the PMCP of 1-indexed formulas, i.e., 1-indexed formulas with at most 2 nestings of path quantifiers. Thus, allowing quite limited branching time specifications results in undecidability (already for cliques). This leads to the conclusion that we should restrict the specification logic if we want decidability (e.g., to LTL which has just 1 path quantifier), and try instead to look at topologies other than cliques. Unfortunately, as Theorem 3 shows, we also can not go too far in this direction.
Theorem 2
is undecidable where is the set of 1-indexed formulas, is the set of 1-ary clique parameterized topologies, and is the set of pairwise-rendezvous 1-ary system templates.
Proof
We first prove the claim for systems with a controller. Thus, consists of system templates of the form (C, U) and is the set of 2-ary clique topologies with a single vertex, say vertex 1, that runs the controller C.
We reduce the non-halting problem of two-counter machines (2CMs) [46], which is known to be undecidable, to the PMCP. See the preliminaries (Sect. 2) for the definition of 2CM.
The basic idea, based on the reduction in [28], is that the controller simulates the control flow of the 2CM, and the other processes (called memory processes) are each holding one bit of each of the two counters, and collectively storing the counter values using a unary encoding (see Fig. 1). The formula to be model-checked is used to specify that the simulated computation of the 2CM halts, as well as to enforce correct simulation of instructions. Due to the unary encoding we employ, a clique of vertices can simulate the 2CM with counter values up to n. Since the 2CM halts if and only if it halts with some bound n on the counter values, we can reduce the non-halting problem of the 2CM to the PMCP.
Fig. 1.
Process template of memory processes for the proof of Theorem 2
Using pairwise rendezvous, simulating and is straightforward. For example, can be simulated by a synchronous transition using the message , where the process at vertex v that is running the controller sends and updates it’s state from to (simulating the 2CM move to the next instruction), and some vertex w running a memory process with a 0-valued counter 2 bit receiving and updating this bit to 1. Simulating a instruction is slightly more involved since there is no direct way for the controller to query all memory processes for their bit values. However, if all the bits of counter i in all memory processes are 0, then none of these processes is in a state with an outgoing local transition labeled by and thus, even if the controller is willing to perform a synchronized transition on the message , it will not be able to. In order to make use of this observation, for every instruction of the form , the controller process C has the following 3 outgoing transitions: , where NZ is a special sink state labeled by the atomic proposition nz. Thus (assuming that for we label the state of C by the atomic proposition l), the formula specifies that the move from to is taken only when the counter i is not zero, and the formula specifies that the move from to is taken only when counter i is zero. The full specification formula is thus where halt is an atomic proposition that holds in states corresponding to instructions and, for , is the formula in which every atomic proposition is replaced by the atomic proposition (a, x).
We now consider the case of 1-ary clique topology and a single process template P, without controller. In this case, P is simply the union of the controller and memory process templates C, U used in the 2-ary clique case above, with an extra initial state that has two outgoing transitions one to each of the initial states of C and U. Thus, each process can nondeterministically decide to play the role of a controller or that of memory. Enforcing that exactly one process plays the controller is done as follows. We introduce a new state labeled by the atomic proposition , and add the transitions , where s ranges over all states of P except for (0, 0). Hence, the formula is satisfied in a computation of the system exactly at a point where one process (playing the controller) is at state (recall that the label 1 holds only in the state ), and the rest (playing memory) are at state (0, 0). The full formula to be model-checked is thus where is but with every atom replaced by the indexed atom .
Second, pairwise rendezvous systems can easily simulate systems communicating using tokens with values. Thus, the fact that PMCP on token passing systems and parameterized ring topologies and safety property (for the controller) is undecidable (see [28, 52]) implies the same for pairwise rendezvous systems.
Theorem 3
is undecidable where is the set of 1-indexed LTL formulas, is the 2-ary controlled ring parameterized topology, and is the set of pairwise-rendezvous 2-ary system templates.
Thus, in the rest of this section, we focus on linear logics and homogeneous parameterized topologies.
Cutoffs
Unlike systems using disjunctive guards or a valueless token for communication, systems using pairwise rendezvous do not always have a cutoff for 1-index formulas.
Theorem 4
Let be the 1-ary controllerless clique parameterized topology, and let be the set of 1-index formulas. There exists a pairwise-rendezvous process template U such that has no cutoff.
Proof
Define process template as in Fig. 2, where . In a system with such processes, one possible behaviour is, up to stuttering, . This run does not appear in any system with at most n processes. Thus we can define a formula:
Intuitively, states that in the system some process (and thus any process) is able to alternatively visit states and m times, building the desired prefix . For a parameterized system with template U, every number , fails to be a cutoff, since but .
Fig. 2.
Process template U, used to prove Theorem 4
Theorem 4 can easily be adapted to controlled topologies by assigning the controller with the same process template U as the users:
Theorem 5
Let be a controlled 2-ary clique parameterized topology and let be the set of 1-index formulas. There exist pairwise-rendezvous process templates C and U such that has no cutoff.
Equivalence to finite-state systems
We first recall the main result in [36, Section 4] (stated as comments after [36, Theorem 4.8]), restated using our notation:
Theorem 6
([36]) Let be the 1-ary controllerless clique parameterized topology. For every pairwise-rendezvous system template P there is an NBW (of linear size and computable in Ptime from P) that recognizes the set .
We now show that a similar result holds for controllerless homogeneous parameterized topologies. Using Lemma 3, we get:
Theorem 7
For every r-ary controllerless homogeneous parameterized topology , every pairwise-rendezvous r-ary system template , and every , there is a linearly sized NBW (computable in Ptime) that recognizes the set .
Proof
We reduce the case of controllerless homogeneous parameterized topology to 1-ary clique parameterized topology using Lemma 3: given the theorem assumptions, there exists a process template and a controllerless clique parameterized topology such that . By Theorem 6, there is a linearly sized NBW for , and thus, by intersecting it with the constant size NBW that accepts all strings that start with the label of , we obtain the theorem (we assume without loss of generality—simply by adding new atomic propositions if needed, and then projecting them out of the final NBW—that if then ).
Recall that by Theorem 1, if there is a cutoff for the set of 1-indexed formulas then the set of executions is -regular for any r-ary parameterized topology. However, by Theorem 5, 2-ary controlled clique parameterized topologies (and pairwise rendezvous communication) do not always have a cutoff. Furthermore, by constructing an appropriate system template, and using a pumping argument, we are able to show that the set of executions of systems with a controller is not, in general, -regular:
Theorem 8
Let be the 2-ary controlled clique parameterized topology. There exists a pairwise-rendezvous system template (C, U) for which is not -regular, and a pairwise-rendezvous system template (C, U) for which is not -regular.
Proof
We first show a system template for which is not -regular. Consider the process templates in Figs. 3 and 4, assuming states are labeled by their names. It is not hard to see that . The following standard pumping argument shows that is not -regular. Assume by way of contradiction that it is, and let be the number of states of an NBW A accepting . Consider an accepting run of A on the word , and let be the first states that A visits after reading the first b. Note that when reaching , the automaton has not read any c yet. By the pigeonhole principle, there are such that and thus, by pumping the loop , one can get accepting runs of A on words which are not in , which is a contradiction.
Fig. 3.
Controller process template
Fig. 4.
User process template
We now show how to obtain such that the language is not -regular. The idea is simply to have the controller switch places with some user process as follows. Have both and contain two disjoint copies of C and U (as defined above), and add new initial states to and (respectively), with the following transitions: , , and . Thus, when the new controller sends the message , it starts behaving like a U process, and the receiving new user process starts behaving like a C process. All other user processes can now only take the transition , and start behaving like U processes. Hence, the language is the union of and . Note that is -regular, that , and that L is not -regular. Hence, since -regular languages are closed under negations and intersection, it must be that the language is not -regular.
Complexity of PMCP
The complexity of PMCP for clique parameterized topologies is studied in [36]:
Theorem 9
([36]) Fix an r-ary controlled clique parameterized topology , let be the set of 1-index formulas, and the set of pairwise-rendezvous r-ary system templates. Then (as well as its program complexity) are Expspace-complete.
Recall that the PMCP program complexity is the complexity when the size of the specification formulas is ignored. The lower bound (for PMCP and its program complexity) follows from the fact that PMCP is Expspace-hard already for clique topologies and the coverability problem [30]. The upper bound for PMCP (and thus also for its program complexity) is proved in [36, Theorem 3.6].
Combing this with Lemma 3 we immediately get:
Theorem 10
Fix an r-ary controlled homogeneous parameterized topology , let be the set of 1-index formulas, and the set of pairwise-rendezvous r-ary system templates. Then (as well as its program complexity) are in Expspace.
The following theorem shows that for controllerless homogeneous parameterized topologies (i.e., ones with ) the complexity of PMCP is better.
Theorem 11
Fix an r-ary controllerless homogeneous parameterized topology , let be the set of 1-index formulas, and the set of pairwise-rendezvous r-ary system templates. Then is Pspace-complete, and its program complexity is in Ptime.
Proof
The lower bound for the PMCP follows from the fact that model checking a single finite state system P, with no communication, is Pspace-hard [50]. For the upper bound, take some system template and a specification formula . By Lemma 2, it is enough to check that we have that . The theorem follows by noting that this can be done by checking for the non-emptiness of the product of an NBW for (obtained using [53]), and the NBW for (obtained from Theorem 7).
Disjunctive guards
In this section we consider disjunctively-guarded systems (see Sect. 2.2) arranged in parameterized homogeneous topologies.
It is known that disjunctively-guarded systems are strictly less expressive than pairwise rendezvous ones [7]. Nonetheless, the following theorem states that also for disjunctive guards the PMCP of 1-indexed formulas is undecidable. The proof uses a reduction from the non-halting problem of 2CMs, and follows a similar line to the one used to prove Theorem 2. The main complication here is that, unlike the case of pairwise rendezvous, mutual exclusion is not easily obtainable using disjunctive guards, and thus more complicated gadgets are needed to ensure that the counter operations are simulated correctly.
Theorem 12
is undecidable where is the set of 1-indexed formulas, is the 1-ary clique parameterized topology, and is the set of disjunctively-guarded 1-ary system templates.
Proof
We adapt the proof of the similar statement (Theorem 2) for pairwise rendezvous. Recall that the proof of that theorem proceeded by building, given a 2CM, a process template P and a specification formula , such that the 2CM does not halt iff for every 1-ary clique . Here, we show how to adapt the process template P from that proof to use disjunctive guards instead of pairwise rendezvous (consequently, also changes).
At first glance, it may look like all we have to do is replace every transition of the form (resp. ) with the transition , where the guard g is the set of all states that have an outgoing transition labeled by (resp. ). Unfortunately, this introduces the following problem: once the controller is in a state , associated with an increment or a decrement instruction, it opens the gate for any number of memory components to update their bits, instead of just one. Hence, we have to work harder.
What we do is to replace every transition of the form (resp. ) in the controller (resp. memory) component of P, with a series of guarded moves, for every . The key point is that if more than one memory component enters the second stage of such a bit update sequence then it opens up the possibility for a computation segment that is impossible if only one memory component enters this stage, and the presence of such a segment can be detected by the specification formula.
We illustrate these sequences by considering the representative case of . Figure 5a shows the corresponding gadget used by the controller component, i.e., the sequence replacing a transition ); and Fig. 5b shows the corresponding gadgets—one per j for which is an instruction—used by the memory component, i.e., the sequences replacing the transitions , and . The formula that guarantees that instruction is simulated by incrementing at most one bit of counter 2 is . Similar gadgets and formulas are used for the other increment and decrement transitions. Finally, we replace a transition with the transition , and the transition with the transition (recall that these transitions are used, for a instruction , to test if a given counter is indeed not zero). We conclude by modifying the specification formula , used in the proof of Theorem 2, as follows. First, we update it to reflect the fact that we now use sequences of transitions to get from a state to in the controller; e.g., we replace with . Second, we make it disjunctive with (where m is the number of instructions of the 2CM)
Fig. 5.
Gadgets used in the proof of Theorem 12
We conclude that we should restrict the specification logic if we want decidability, and in the rest of this section we focus on 1-indexed . The following theorem shows that we also have to limit the topologies.
Theorem 13
is undecidable where is the set of 1-indexed formulas, is the controlled ring parameterized topology, and is the set of disjunctively-guarded 2-ary system templates.
Proof
As before, we give a reduction from the non-halting problem of 2CM. It will be useful later to assume w.l.o.g. that the 2CM contains no self-referring goto (i.e., an instruction of the form ). Given a 2CM, with instructions , we build a system template , where C is a controller process template and U is a user process template. The basic encoding is as in the previous undecidability results—the controller simulates the control of the 2CM, and each user process stores one unary bit for each counter. We augment this basic encoding by also storing the currently simulated instruction, as well as a status flag, in each user process. For technical convenience, we also have the constant flag in each controller state. More formally, each state of U is of the form , where is a number of an instruction of the 2CM (we consider to be a dummy instruction); is a flag indicating the status of the currently simulated instruction, and will be explained later; and are the bits of the counters 1 and 2, respectively. The states of C are of the form (j, f), with the same meaning as in U, except that f is always false (i.e., the set of states is ). The initial state of C is , and of U is .
The transitions in U and C are as follows. For every , and , let be the set of all states in C and U with the instruction number i and the flag x. For every such , there is a transition in C iff , and is the instruction that should execute after , i.e., if then ; if is of the form then if (indicating that counter i is zero) then , and otherwise ; and if and is not a instruction and then , however, if (indicating that the instruction could not be simulated, i.e., it was an increment and all bits were already 1) then there is no transition. In U, there is a transition iff , and (i): if then , , and ; (ii): if then if the instruction can not be simulated by updating the bits or (e.g., and ) then , , and , and otherwise , and the relevant counter bit is updated according to (e.g., , , and ). Note that if the instruction is of the form , then in case (ii) above we have that ; and if then , and otherwise .
We now describe how the simulation works. Let be a unidirectional ring with vertices arranged in a clockwise fashion, with edges going anti-clockwise (i.e., from to ), and assume that is the controller. The simulation of each 2CM instruction takes one “round” with n steps, where at each step process moves. Observe that (by the structure of C) can only move when its neighbour has the same instruction number as it does, and a user process can only move when has a different instruction number than it does. Thus, the simulation can only proceed in this rounds’ structure since the following two invariants are maintained: (i) at the beginning of each round all processes have the same instruction number j and; (ii) at the end of every step inside a round, processes store the currently simulated instruction, and processes store the previously simulated instruction. Recall that by our assumption, that the 2CM never jumps from an instruction back to itself, these two instruction numbers are always different.
A single round simulating an instruction begins by moving to the state ; then, at each step , the user process “looks” at the state of , copies the instruction number j, and proceeds according to the flag f stored in : if it means that the counter operation was not yet simulated (or in the case of a instruction, all the relevant bits in were 0), whereas if then the operation was simulated (or in the case of a , one of the previous bits was 1). Thus, in the first case tries to simulate the instruction if it can (e.g., if and then it changes to 0), and sets its flag to if it succeeded, and to otherwise; whereas in the second case it simply sets its flag to (without changing the counters’ bits) to propagate the information that the Instruction is done/resolved. At the end of the round, the value of the flag f of holds the information needed for the controller to move at the beginning of the next round to the correct succeeding instruction. Namely, if then it means that an increment or a decrement was successful, or that a should not jump since the counter is not zero; and if then it means that an increment command was not simulated since all the counter’s bits are already 1 (this deadlocks the simulation), or that a should jump since the counter is zero.
Let , where halt is an atomic proposition that holds in states corresponding to instructions. Given of size n, it is not hard to see from the description above that is deterministic, and that it simulates the run of the 2CM as long as both counters stay below n. Thus, the 2CM does not halt iff holds for all .
It is worth noting that the proof above can be easily modified to use 1-ary topologies and process templates as long as the symmetry of the rings is broken somehow (e.g., using spoked wheels instead of rings), thus allowing a virtual controller to be designated. We conclude that we should restrict the topologies if we want decidability, and in the rest of this section we focus on homogeneous topologies.
Cutoffs
By [24], for the r-ary clique parameterized topology and universal 2-indexed formulas, there is a cutoff of size (where U is the process template). The following theorem extends this to homogeneous topologies (for the case of 1-indexed ). Our proof (even when restricted to clique topologies) uses different and simpler reasoning than [24]. Note that Theorem 13 implies that an extension to general parameterized topologies is not possible.
First we need the following definitions. Given an r-ary parameterized homogeneous topology , generated by an r-ary topology with , , , let the controller types be the types in [r] that are associated with a singleton, and let the user types be the types associated with a clique or an independent set.
Theorem 14
Let be the set of 1-index formulas, be a disjunctively-guarded r-ary system template, and be an r-ary homogeneous parameterized topology. Then the expression , where are the states of , is a cutoff for .
Proof
Assume w.l.o.g. (by renaming states and updating the guards on the transitions to match) that . Let be the set of all user states. Let be generated by an r-ary topology with . The cutoff number is . Let be the set of topologies of with at most c vertices. In the following we will show that any trace w of a system with more than c vertices is also present in a system with c vertices. Formally: for every , , and , we show that , for some topology ; and thus that . Thus, given a 1-indexed formula , by using Lemma 2 we get: iff iff iff . This allows us to conclude that c is a cutoff.
Assume any , and . Let be a state-labelled run of such that for some , and let be the states in that are visited along . We construct a run in , of a suitably sized , that induces w. The intuition is that simulates every controller process (i.e., a process associated with a vertex in ) exactly; for every it uses one process to reach the guard s and keep it open forever; and two more processes: a process x of type t whose moves will induce w and, in case that x can induce w only by moving finitely many times, another process y that moves infinitely often on (to ensure that is infinite, and thus a run).
Consider the function that maps a state s to a process that has visited s first in , i.e., where v is such that there is some with , and in the prefix no process is in state s. Note that is uniquely determined except if s is an initial state of a process template (in which case it may be that first(s) can be chosen in more than one way). We first enlarge the topology to obtain a topology as follows: for every , we add a process to the clique or independent set containing . We say that is a companion of the process . Observe that a process j may have zero, one, or many companion processes, and let J be the set of processes with at least one companion.
Let be a run of that is obtained from by augmenting every move of a process with a sequence of identical moves of its companion processes, with the restriction that when a process reaches the state s it stays there forever. More formally, we begin by designating all companion processes as active. We then consider the transitions of in order; a transition in which a process changes states (by taking some internal or synchronizing local transition ) is replaced with the following sequence of transitions: if is an active companion of j then have take this local transition and designate it as inactive, then have all the remaining active companions of j, as well as j, take this transition (in some arbitrary order). It is easy to see that is a run of . Indeed, since all the companions of j are in the same clique (or independent set) as j, they have exactly the same neighbours as j, and thus see the same open guards—allowing them to mimic j. Furthermore, for every we have that , since the process at v made exactly the same moves in both runs—only sometimes waiting longer between moves in . Observe that (by the definition of first and by the construction of ), for every state , the first process on to visit s is the companion process , and that once reaches s it never leaves. It follows that if we take any two processes x, y in (such that y moves infinitely many times on ), together with all the controller processes and all the companion processes, we can obtain—by simply deleting all transitions in that involve the other processes—a run in a system of size at most in which . The theorem follows by recalling that for all , and that for some .
The following theorem shows that the cutoff in Theorem 14 is tight for controllerless cliques, up to an additive constant. A similar result has been shown in a slightly more complex scenario (viz. controlled clique topologies with 2-indexed ) [10].
Theorem 15
Let be the 1-ary controllerless clique parameterized topology, let be the set of 1-index formulas, and let . There is a disjunctively-guarded system template P of size d such that is the smallest cutoff for .
Proof
Consider the process template depicted in Fig. 6, where . It is easy to see, by induction on i, that if a process can take the local transition guarded by then there must be at least one process in each state for all . Hence, for a process to take the transition from to there must be at least processes in the system. It follows that the formula holds in all systems with at most d processes, but not in a system with more than d processes.
Fig. 6.
Process used to prove Theorem 15
Equivalence to finite-state systems
There are several techniques for solving the PMCP for 1-indexed formulas for systems using disjunctive guards. One of these is the automata theoretic approach. The main ingredient we need in order to apply this approach is to find an NBW that accepts the set of all possible executions of the system, for any number of copies of user processes U. We begin by showing that, in general, such an automaton is necessarily big, i.e., exponential in the size of the process templates. We show this by suitably encoding the language of palindromes.
Theorem 16
Let be the 2-ary controlled clique parameterized topology. For every , there exist a disjunctively-guarded system template (C, U), where the sizes of C and U are , such that the smallest NBW whose language is has size at least .
Proof
Fix , and consider the Boolean formula . Observe that is equivalent to , and let C, U be defined as in Figs. 7 and 8 (see also the description in the proof of Theorem 20) with respect to . Note that the sizes of C and U are linear in l. Let L be the language of finite words of the form where each (), and if and only if ().
Fig. 7.
Fig. 8.
Observe that is exactly the -regular language . By projecting out the letters , and replacing all transitions on with transitions on 0, and all transitions on with transitions on 1, one obtains (with no blowup) a nondeterministic finite automaton for the language of palindromes in the set . It is well known that every NFW for this language requires at least states [37, Theorem 1, Example 2], thus concluding the proof.
Given , the proof in [24] of a cutoff for 1-indexed actually shows the following stronger result: the set , of controller executions of controlled cliques of all sizes, is equal to the set of controller executions of , where is a clique of size . Observe that it is easy to modify to obtain, with no blowup, an NBW accepting its set of controller executions. Thus, we get that is recognizable by an NBW of size . Since (by Theorem 16) this cutoff is tight, there is no hope of obtaining a smaller NBW using this technique.
In the following we prove that, surprisingly, disjunctively-guarded systems in homogeneous parameterized topologies can be model checked using a smaller NBW, of size roughly , where is the product of the sizes of controller process templates and is the sum of the sizes of all the user process templates. This result is given in two steps, first showing that this property holds for controlled clique parameterized topologies, and next generalizing it to the case of homogeneous parameterized topologies.
Theorem 17
Let be the 2-ary controlled clique parameterized topology. For every disjunctively-guarded system template (C, U) there is an NBW K(C, U) of size recognizing . The same is true for .
Before we prove the theorem we note that it is sufficient to prove the theorem for . Indeed, reduce the case of by forming a new controller that simulates C and U using a product construction. Furthermore, an automaton for can be obtained with a linear blowup from an automaton for by projecting on the user component of and destuttering. Thus, in the following we focus on .
We now give the intuition of the proof. Given C, U we build a transition system with states of the form . The idea is that simulates C, and records in Y all the user states that could have been reached in a finite number of steps in systems of arbitrary size. We identify certain states (c, Y) of as good, i.e., either, in C there is a self loop from c to c with a guard in Y, or in U there is a cycle with guards from . We define a run of as good if it is not eventually constant or from some point on it only sees good states. The idea is that a run that is ultimately constant, say with state (c, Y), is called good if the controller stays in c forever. We prove that if and only if is the destuttering of a good run of .
We now give the proof.
Proof of Theorem 17
Fix and . For non-empty and define
and define Reach(c, Y) inductively:
,
-
, and
.
Observe that is non-decreasing in i, and contained in . Thus for every Y, c there exists such that .
Lemma 4
Fix non-empty and . For all , and every configuration for which every appears in at least times, there is a finite path of a DG system starting with configuration such that the first co-ordinate of every configuration in the path is c, and the path ends with some configuration such that every appears in at least L times.
Proof of Lemma
Fix Y, c, L and so that every appears in at least times. Say and order this set according to the earliest stage in which an element appears in this set in the construction of Reach(c, Y), say (in case that more than one element appears in a given stage, break ties arbitrarily). Build a state-labeled path starting with such that, for each in turn, moves L many processes from a state in Y into state . Note that this can be done because: (i) for each there exists a state y in Y and a sequence of enabled moves from y to (indeed, in this construction, once a guard is enabled it is never disabled), and (ii) there are enough processes in y (indeed, each uses L processes from y, and there are at most many to take care of, thus we are safe if initially there are at least processes in state y). Also note that at the end of this process, for every there are at least L processes in state y (indeed, if then at least L processes in Y did not move, and if then the construction moved at least L processes into state y). This completes the proof of the Lemma.
Define a transition system whose labels are the states of the controller, as follows:
where is a new symbol,
,
,
,
where
consists of transitions where ;
consists of transitions for which and there exists such that ;
.
Definition 1
A state (c, Y) of is called iff it satisfies the following property: if there is no such that , then there exists a cycle in U, starting and ending in an element of Y, and each transition of it is guarded by an element of .
An infinite word w is eventually constant if there exists such that for all . In this case, we can call the constant symbol in w. A run of is good if the state-labeled run satisfies the following property: if it is eventually constant then its constant symbol (which is a state of ) is good.
Definition 2
Define to be the following language:
Note that is -regular and can be recognized by an NBW W of size that simulates and stores in its second component whether or not the last simulated transition changed the state of ; a run is accepting if either there are infinitely many changes or some good state is seen infinitely often. Formally, define the NBW :
,
,
,
consists of transitions if and only if , where ,
consists of transitions if and only if .
consists of transitions if and only if ,
.
Thus, by Lemma 1, is recognized by an NBW K(C, U) whose size is linear in , i.e., .
To complete the proof of the theorem we show that .
Notation
For a tuple write for the set .
Claim A
.
Proof of Claim A
Fix from language . Let be a state-labeled run in some DG system, say with N user processes, that generates w, i.e., where v is the vertex of the controller. Partition into segments so that if is in then (pick any partition if there is more than one, which happens if there are successive configurations of with the same controller components). Define sets as follows: and . It is enough to show that is a good run of since its sequence of actions is exactly w.
Note. If occurs in and then . This can easily be proved by induction on i (use the fact that if there exists and a finite path in a DG system with M user processes starting with a configuration with two properties: (i) the first co-ordinate of every configuration in the path is c, and ii) the path ends in a configuration such that for some ).
By the Note, the transition (in C) from the end of to the beginning of is guarded, if at all, by a state in . Thus, by the definition of , is a run of . We now prove that is good. To this end, suppose that the state-labelled run induced by , i.e., , is eventually constant, say with constant symbol (c, Y), and that there is no such that (otherwise there is nothing to do). Thus, there exists such that for all , , and each transition from to is due to some user process taking a transition. Since there are only finitely many processes (i.e., N), some user process, say the Kth, must make be responsible for infinitely many transitions. However, since the process template U is finite, the Kth user process must eventually trace a cycle in U. By the Note, the cycle can be chosen to start and end at some element of Y, and every guard on the cycle is in . Thus, (c, Y) is good. This completes the proof Claim A.
Claim B
.
Proof of Claim B
Fix , say . In order to prove the claim, we will build a run in a system with one control process and user processes, where , so that w is the destuttering of the projection of onto C.
Let be any run in such that w is the destuttering of the actions in , say . Note that there exists such that for all (this is because the sequence is monotone and contained in the finite set ).
Intuitively, in order to build so that controller traces a path whose destuttering is w, we will ensure that the reaches a configuration in which at least two processes are in every state of : we need at least one process in every state of to enable all the guards that may be used in the future; but we may also need an additional process in a state y in case we need to make one process perform a cycle starting and ending with y (this case occurs if w is eventually constant, say with constant symbol (c, Y), and there is no self-loop in of the form for ). In order to reach such a configuration we will repeatedly apply Lemma 4, starting with , for (at most) N steps. In particular, we may require user processes to start with.
We first need some definitions. Define to be the set of indices such that either or . Since is non-empty, . List the elements of X as . For write for the largest integer such that . For , define . Note that , and , and .
We now describe how to build by iterating over the transitions of . After step (i.e., after considering the transition with target ) we will have built a path that ends in a state whose first co-ordinate is , say , with the following invariant: every appears in at least times.
We begin with the transition . Apply Lemma 4 with and initial configuration where and , to get a path starting with and ending with a configuration where and each element in this set appears in at least times (thus maintaining the invariant).
Suppose we have processed the transition with target and, thus, the path built so far, say , ends with and satisfies the invariant, i.e., every appears in at least times. Consider the transition in . There are two cases.
Case . Since, in this case, , the transition must be in , i.e., there is some such that . By the invariant, . Conclude that is a transition of the DG system. Thus, first extend by the state . Second, since we have that for some k, and thus ; also, , and thus . Conclude that . By the invariant we can apply Lemma 4 with and configuration . This results in a path p that starts with and ends with configuration of the form where every state in appears in at least times. Now extend by p. Note that the invariant is maintained.
- Case . Thus, in this case, . There are two subcases.
- Subcase . In this subcase, the transition must be in . As in the first half of the case , the DG systems has a transition . Extend by the state and note that the invariant is maintained since no user process moved.
- Subcase . This subcase can be ignored, i.e., do not extend . Again, the invariant is maintained since no user process moved.
At this point we have constructed a finite path that mimics the first m steps of . Recall that for all . To finish, we identify two cases. If is not eventually constant, then repeatedly apply the reasoning in case 2 above. On the other hand, if is eventually constant, say with constant symbol (for some ), then extend to mimic the transitions between m and n (as in Case 2 above), and then proceed as follows. Since is there are two subcases. If there is a self-loop in for some , then extend by the infinite path . Otherwise, by the definition of , there is a cycle in U starting and ending in some such that each transition is guarded by an element of ; thus we can extend by transitions in which a process at repeatedly makes this cycle (note that this is possible since up till now we guaranteed that there are at least 2 processes in every state of ). This completes the proof Claim B.
To summarise, we have shown that and that there is an NBW of size recognizing .
Now we can generalize the previous result, showing that model checking disjunctively-guarded systems in homogeneous parameterized topologies can be done with an NBW that is exponential in the size of the input models.
Theorem 18
Let be the r-ary homogeneous parameterized topology. Let and . For every disjunctively-guarded system template , for each (resp. ) there is an NBW of size recognizing , where and .
Proof
By Lemma 3, we can reduce to two templates: C is the product of the controllers, and U is the union of the user process. Next, we can apply Theorem 17 to produce an NBW K(C, U) of size recognizing the executions of C (and similarly, an NBW for the executions of U). In case , form an NBW from K(C, U) by projecting onto the i-th component of the state, and thus isolate only the executions of the i-th controller of the original system. In case , form an NBW from K(C, U) by intersecting with an automaton whose language is all runs through process . In both cases, the produced NBW is linear in the size of K(C, U), concluding the proof.
Complexity of PMCP
The following theorem states the complexity of PMCP for homogeneous parameterized topologies. It derives the complexity upper bound from the automata theoretic approach and constructing the NBW in Theorem 17 “on the fly”.
Theorem 19
Let be an r-ary homogeneous parameterized topology (controlled or controllerless). Let be the set of 1-index formulas, and let be the set of disjunctively-guarded r-ary system templates. The complexity of is Pspace-complete.
Proof
We begin with the lower bound. Pspace hardness follows from the fact that model checking of a Kripke structures is Pspace-hard [50] and the observation that this problem is a special case of PMCP. Indeed, given a Kripke structure, one can think of it as a process template all of whose transitions are silent (i.e., there is no communication). Since there is no communication, the topology plays no role, and the execution traces of all the processes of the same type (be it user or controller) running at any node are exactly the same. Hence, in all cases, the PMCP degenerates to model checking of Kripke structures.
We now address the upper bound. First, observe that the controllerless case can be immediately reduced to the controlled case simply by having a controller that runs the same process template as the other processes (i.e., by having ). Second, by Lemma 3, it is enough to consider the case of a 2-ary controlled clique parameterized topology.
Given process templates C, U, by Theorem 17 there is an NBW K(C, U), whose language is
or , as we wish. Given a 1-index specification formula , we can decide, by Corollary 1, the PMCP for by checking for the non-emptiness of the product of and : is the maximal subformula of such that every atom of the form (a, x) has been replaced by the atom a; is the same NBW as K(C, U) except that every transition label is replaced by . Furthermore, by [53], this non-emptiness problem can be solved in Pspace as long as storing a state of K(C, U), as well as checking membership in the transition relation of K(C, U), can be done in polynomial space. Since it is not hard to see that this is indeed the case, the required upper bound follows.
The next theorem states the program complexity of PMCP for clique parameterized topologies. For controllerless systems we inherit the Ptime program complexity from the NBW used to recognize the executions of a process in homogeneous topologies with pairwise rendezvous (see Theorem 7). With a controller, the co-NP upper bound results from a fine analysis of the construction in the proof of Theorem 17, and the co-NPhardness by coding of propositional unsatisfiability: the user processes store an assignment, and the controller verifies it is not satisfying.
Theorem 20
Fix to be the set of 1-index formulas. If is the set of disjunctively-guarded 1-ary system templates, and is the 1-ary clique parameterized topology, then the program complexity of is in Ptime. If is the set of disjunctively-guarded 2-ary system templates, and is the 2-ary controlled clique parameterized topology, then the program complexity of is co-NP-complete.
Proof
Without a controller, membership in P follows from [36, Section 4]. With a controller, membership in co-NPcan be derived using a more careful analysis of the complexity of the PMCP performed in the proof of Theorem 19, as follows.
In that proof it has been shown that deciding whether can be done by checking for the non-emptiness of the product NBW , for a suitable formula (from which the NBW is derived) and NBW . We recall from that proof that is the maximal subformula of the 1-indexed original formula , whose atoms with form (a, x) are replaced by atom a. The NBW , instead, is derived from K(C, U) (see Theorem 17) where transition label are replaced by .
Checking for the non-emptiness of an NBW amounts to finding a lasso in it. I.e., to finding a state s, and two simple paths: one from the initial state to s, and the other from s back to itself. Observe that a lasso in the product automaton A induces lassos x, y in and , respectively. Hence, checking that A is not empty can be done by guessing the lassos x, y and checking that their product is indeed a lasso in A.10 Looking at the proof of Theorem 17, one can see that (except for one state) all the states of the LTS are of the form (c, Y), where c is some state of C, and Y is a subset of the states of U. Furthermore, there is a transition between two such states only if . It follows that the longest simple path of is of length at most . Thus, since is formed by taking the product of with an automaton of size O(|C|),11 the length of the longest simple path, and thus also of the longest lasso, of is of length . Overall, since we also have that querying the transition relation of is cheap, we conclude that one can guess any lasso in in time polynomial in .
Recall that when analyzing program complexity, we consider the formula to be constant. Thus, we get that one can, in nondeterministic polynomial time, guess any pair of lassos x, y in and . It is not hard to see that given x, y, checking that their product is indeed a lasso in A can be done in time polynomial in the size of these lassos. It follows that one can guess and verify in nondeterministic polynomial time that the automaton A is not empty, and thus, that it is not the case that , which gives the desired membership of PMCP in co-NP.
For the lower bound, we reduce the unsatisfiability problem of a 3-SAT formula to the PMCP. Given a 3-SAT formula over the Boolean variables , we build the two process templates C, U given in Figs. 7 and 8, and consider computations in which the controller C reaches the state done. Note that, for every , the way to the state done goes either through or through , and that one can transition out of these states only if at least one user process U enables the corresponding guard ( or ). Also note that (): the guards on the transitions of U ensure that if the controller entered (resp. ), then no user process can be (anywhere along the computation) in state (resp. ).
It follows that if the controller reaches state then there were at least n user processes, and that the user processes store an assignment to each variable , , as follows: is true if there is some user process in state , and it is false if there is some user process in state (note that, by , these two options are mutually exclusive). Observe that the controller can reach the state done if and only if this assignment satisfies the 3-SAT formula. Indeed, for every , the guard on the outgoing transition from state ensures that this transition can be taken if and only if the stored assignment satisfies clause . It follows that the 3-SAT formula is unsatisfiable if and only if the PMCP for the 1-ary clique topology with process templates (C, U), and the fixed formula , has a positive answer.
Combining Theorem 20 and Lemma 3 we get the following corollary, extending the complexity analysis to homogeneous parameterized topologies:
Corollary 2
Let be an r-ary homogeneous parameterized topology, let be the set of 1-index formulas, and let be the set of disjunctively-guarded r-ary system templates. If is controllerless then the program complexity of is in Ptime, and otherwise (i.e., if is controlled) it is in co-NP.
Token passing systems
In this section we show that is decidable, where is the set of all process templates, and is either (1) -definable and of bounded clique-width or (2) iteratively constructible. We encode a characterization of the -indistinguishability equivalence relation from [6] in and utilize the composition property of proved there. We prove the existence of decidable cutoffs for the PMCP problem in this setting and show a lower bound on the cutoffs of iteratively-constructible parameterized topologies for indexed .
The section is organized as follows. Section 5.1 introduces the necessary background with regards to on token-passing systems. Section 5.2 gives preliminaries regarding topologies of bounded clique-width and the Monadic Second Order Logic of topologies. Section 5.3 proves the decidability of the PMCP problem and the existence of computable cutoffs. Section 5.4 discusses sizes of the cutoffs.
In this section we will have a running example which we will revisited several times in Running Examples 1, 2, 3, 4, and 5, and Figs. 9 and 10.
Fig. 9.
Running example: the topology and the graph LTS for . The 2-topology with and is depicted to the left. The graph LTS is depicted to the right. has atomic propositions , initial state , and state-labeling function , and . All of the transitions of are labelled
Fig. 10.
Running example: the token-passing system and the projection LTS . This figure depicts the token-passing system with topology and process templates . We represent the configurations of as 4-vectors containing the states of the processes at a, b, c, and d respectively. As shorthand we write for the most common state . We omit unreachable configurations, such as those in which no process has the token or two processes have the token. The dashed transitions are internal transitions. The solid transitions are synchronous transitions (i.e., transitions where the token passes from one process to another). The configuration is the initial configuration. The labeling function assigns to any configuration containing . Otherwise it assigns a singleton set for the corresponding . The projection LTS for is obtained from this figure by removing the labellings and
Running Example 1
Let be the 2-topology depicted in Fig. 9.
We define to be the process template with:
state set ,
atomic propositions set ,
state labeling and ,
synchronization alphabet ,
- transition relation
and initial state .
The process template is obtained from by setting the initial state to . Let . The token-passing system is depicted in Fig. 10.
Preliminaries I: and token-passing systems
Two abstractions of a token-passing system
We now define for a given TPS two abstractions used in the above-mentioned characterization [6]. The first abstraction simulates , keeping track only of the local states of processes indexed by . We call it the projection of onto . The second abstraction only simulates the movement of the token in G, restricted to . We call it the graph LTS of G and .
Notation. For topologies G and , let denote a tuple of vertices of G, and a k-tuple of distinct vertices of . Write if for some i.
The projection
Informally, the projection of onto a tuple of process indices is the LTS and a new labeling that removes all indexed atoms for .
More precisely, fix a system template , a topology G, and a k-tuple over . Say . Define the projection of onto , written as the LTS where for all the labeling L(q) is defined as .
The graph LTS
Informally, is an LTS where the states are the vertices of the r-topology G, and the transitions are the edges of G. The graph LTS simulates the passing of the token between the vertices of G, beginning with the token at the unique vertex belonging to . The vertices are assigned the atomic propositions , respectively.
The precise definition of the graph LTS is as follows. Let be an r-topology such that , and let be a k-tuple of G vertices. The graph LTS is the LTS in which:
the set of states is V,
the alphabet of transition labels is ,
the set of atomic propositions is ,
- the transition relation is
the set of initial states is , and
the state-labeling function of is .
-equivalence and -character
Recall that is the fragment of with at most d path quantifiers. For two LTSs and , we write that and are -equivalent if they agree on all formulas: for every formula it holds that iff . We denote that and are -equivalent by . Note that the definition of -equivalence applies in particular to our two abstractions, the projection LTS of onto and the graph LTS of G and .
The composition property
The composition theorem says that the -equivalence of projections and can be reduced to the -equivalence of their graph LTSs and . The composition property says that if two graph LTSs are indistinguishable, then so are their corresponding projections.
Theorem 21
(The composition Theorem [6]) For every , system template , topologies G, H, and k-tuples and of vertices of G and H respectively:
The -equivalence class of a graph LTS is uniquely determined by a -vector which is called the -character. This vector consists of pairs of labellings and markings .
Fix , topology , and k-tuple over V. Let be the graph LTS of G and . We will recursively define below a marking function that associates with each vertex a -dimensional vector whose ith coordinate is a set of strings over the alphabet
The -character of is the -tuple:
The crucial properties of the -character are:
The -character determines whether for every formula .
The number of -characters for any fixed d and k is finite and computable. We discuss the set containing all -characters for k and d below.
The marking
For every vertex , let be the set of maximal paths in G starting in v that have no intermediate vertices in , i.e.:
an infinite path is in iff and for all ;
a finite path is in iff , , and for all .
We write for the set of infinite paths in . For every , we write for the set of paths which end in .
Running Example 2
We write for the language of the regular expression . For with , , and , we have:
For a (finite or infinite) path we denote by the concatenation of the d markings of the vertices of , i.e., . We define the marking of a vertex inductively (on d) as follows:
, for every ;
- For , is the -vector
where
for every . The union in ranges over paths .
That is, for the marking is the label . For the marking is a vector of sets of strings, where the ith coordinate of the vector contains the set of strings obtained by de-stuttering the markings of the vertices of paths in , excluding the last vertex of those paths which are finite. For every and , the marking is a set of strings over the alphabet , and all strings in start with the letter . Note that for an infinite path , is a finite string by Lemma 5 below.
We have:
Theorem 22
([6]) For every , topologies , and k-tuples : If and have the same -character, then .
Running Example 3
For every , is a member of the power set of , and is a set of strings over the alphabet . For readability of the values of , we underline the letters of (e.g., we write rather than ).
The -character of is the 3-tuple:
The set and the set of characters
The marking belong to a finite poset which does not depend on v or G. We state the properties of that needed in this paper in Lemma 5. We do not define explicitly, since the definition is quite involved. We denote
and we have:
Lemma 5
([6])
.
For every , , there is a partial order such that is a finite poset.
For every path in G, is a strictly decreasing chain in the poset .
For every , , each member of is a set of -vectors of sets of strictly decreasing chains in .
The -character of every graph LTS with belongs to .
Preliminaries II: Monadic Second Order Logic and clique-width
Monadic Second Order Logic
We assume the reader is familiar with First Order Logic, see, e.g., [23]. Monadic Second Order Logic (or ) is a powerful logic for graphs and graph-like structures. It is the extension of First Order Logic with set quantification. can define classic graph-theoretic concepts such as planarity, connectivity, c-regularity and c-colorability. An excellent introduction to is Courcelle and Engelfriet’s book [17], but here we introduce some of the core notions of MSO.
Let be a vocabulary consisting of unary relation symbols , a binary relation symbol E and constant symbols .
Syntax
We define the logic inductively. We have two types of variables: first order variables, and unary second order variables . Atomic formulas are of the form , , , where are first order variables or constant symbols. The logical formulas of are built inductively by using the Boolean connectives , , and , and the quantifiers , , , .
A variable , is free if it is not in the scope of an appropriate quantifier. The quantifier rank of is the maximum number of nested quantifiers.
Semantics
Let be a structure with universe M such that the interpretation of a symbol R in is . Let m be a mapping of the free variables to their values: ranges over M and ranges over subsets of M. We extend m to by setting . For the atomic formulas , , , , , is defined as in First Order Logic. is defined as . The semantics of the Boolean connectives , , and , and the quantifiers is defined as in First Order Logic. We define if there exists such that , where is obtained from m by setting .
Given two -structures and , we say and are -equivalent, and write , if and agree on all sentences of quantifier rank at most q.
An (r, w)-topology G is a finite structure over the vocabulary in which the and are unary, and E is binary. An r-topology G is a finite structure over the vocabulary . The definition of -equivalence therefore applies to (r, w)-topologies and r-topologies. Note that using the same notation E, and for the symbols appearing in the vocabulary and formulas and for their interpretations in structures ((r, w)-topologies) is an abuse of notation. However, it should be clear from the context whether we means the symbols or the interpretations.
Clique-width
Clique-width is a graph parameter which generalizes the more familiar tree-width. The class of graphs of clique-width at most w is defined inductively.
An (r, w)-topology is an expansion of by a partition of V. For every , if then we say u has color i. We define the w-terms inductively. is a w-term. If x, y are w-terms, then , , and are w-terms for , . Every w-term x has an associated (r, w)-topology [[x]]:
has and empty labeling.
is formed by adding a new vertex of color i and type t to [[x]].
is formed by recoloring every vertex with color i of [[x]] by j.
is formed from [[x]] by adding an edge from every vertex of color i to every vertex of color j.
is the disjoint union of x and y and the union of the labeling.
An r-topology G has clique-width at most w if there is a w-term such that G is isomorphic to (forgetting the coloring ). Every topology of size n has clique-width at most n. A class of topologies has bounded clique-width if there exists w such that every graph in has clique-width at most w.
Running Example 4
The topology has clique-width at most 3. For , let
creates two vertices and such that has color 1 and type 1 and has color 2 and type 2, and adds the edges and . creates two vertices and such that has color 3, has color 2, and both vertices have type 2, and adds the edges and . adds the edges and . is isomorphic to when forgetting the colors.
Example 1
(Cliques) Let be the 1-topology such that and
Let , and
We have that is isomorphic to when ignoring the coloring . Hence, the cliques all have clique-width at most 2. Note that all the elements of have color 2.
Example 2
(Unidirectional lines) Let be the 1-topology such that and
Let , and
We have that is isomorphic to when ignoring the coloring. Hence, the unidirectional lines all have clique-width at most 3. Note that all the elements of have color 3, except for n which has color 2.
We assume the reader is familiar with tree-width, otherwise see [17] for an introduction to tree-width. The following theorem presents some properties of clique-width (see [17, Propositions 2.106 and 2.114]):
Theorem 23
All undirected cycles with least four vertices have clique-width 4 and tree-width 2.
All cliques with at least two vertices have clique-width 2. On the other hand, the class of cliques has unbounded tree-width.
The class of undirected grids has unbounded tree-width and unbounded clique-width.
If a class of topologies has bounded tree-width then it has bounded clique-width.
Monadic Second Order Logic and clique-width
A parameterized topology is -definable if there exists an -formula such that iff . For instance, the set of bipartite graphs is defined as:
Theorem 24
(Courcelle’s Theorem, see [17]) Let .
The theory of r-topologies of clique-width at most w is decidable. I.e., on input , the problem “is there an r-topology of clique-width at most w which satisfies ” is decidable.
For every q, the number of equivalence classes in is finite.
There is a computable function such that, for every , is satisfiable by an r-topology of clique-width at most w iff it is satisfiable by such a structure of size at most . Moreover, can be taken to be a tower of exponents in of height .
Remark 1
(Tree-width) Tree-width is a well-known graph parameter similar in spirit to clique-width [18, 19]. Every parameterized topology of bounded tree-width also has bounded clique-width, but the converse is not true. If we restrict ourselves to parameterized topologies of bounded tree-width, we may extend by allowing quantification on sets of edges while keeping the decidability.
Definition 3
( smoothness, [45]) A unary operation on (r, w)-topologies is called -smooth, if for all whenever , .
Theorem 25
([18]) For any fixed , the operations , and are -smooth.
Indeed, any operation which can be defined as a quantifier-free transduction is -smooth (see [45]). Smoothness is also defined for binary operations (e.g., the disjoint union is -smooth) but we do not use this generality here.
Iteratively constructible parameterized topologies
We now introduce a user-friendly and expressive formalism that can be used to generate natural parameterized topologies. A parameterized topology is iteratively constructible if it can be built from an initial labeled graph by means of repeating a fixed succession of elementary operations involving addition of vertices and edges, deletion of edges, and relabeling. More precisely, an r-ary parameterized topology is iteratively-constructible if there are w-terms with one variable x and no use of disjoint union, and a w-graph such that (i) iff for some , where , (ii) exactly one vertex of has type 1, and (iii) no vertex of type 1 is added in or . For terms and we write instead of . Intuitively, “builds up” the topology, and puts on the “finishing touch” (see examples below). The unique vertex of type 1 acts as the initial token position in TPSs. By definition, any parameterized topology has bounded clique-width.
Example 3
(Cliques and rings) The set of cliques (irreflexive) is iteratively constructible: let consist of a single vertex v of color 1 and type 1, let be , and be the identity.
The set of uni-directional rings is iteratively constructible: let consist of two vertices, one of color 1 and type 1 and one of color 2 and type 2 with an edge from 1 to 2. Let be and .
Homogeneous parameterized topologies revisited
All homogeneous parameterized topologies have bounded clique-width and are definable in .
Proposition 2
Let H be a directed graph with vertex set and edge set and let be a partition of [r]. Let be the homogeneous parameterized topology defined by H and . Then:
has clique-width at most .
is -definable.
Proof
First, lets assume for simplicity that we have 2r colors. For every function such that if , there is a unique topology in such that for all i. Conversely, for every topology G in there is such that .
For every , let . For all and , let . For all and , let . Let .
Observe that (1) is a singleton if , (2) is an edgeless graph with vertices if , and (3) is a clique with vertices if (see also Example 1).
Let . The topology is the disjoint union of of singletons, independent sets (i.e., edgeless sets), and cliques, whose numbers and sizes are determined by and size. We denote when we would like to make explicit in the notation. It remains to add the edges between the vertices in different ’s. Let . For every , let . We have that is isomorphic to .
Finally we note that a color was only used if . Hence, only colors are really used, and has clique-width at most .
Now we turn to -definability. We need a few auxiliary sentences:
A topology G satisfies iff induces an edgeless graph, G satisfies iff induces a clique, and G satisfies iff is a singleton. For every , let , , and if, respectively, , , or . For every , , let
where if , and otherwise . Hence G satisfies the following sentence iff there is such that G is isomorphic to :
Decidability of PMCP
-definable topologies of bounded clique-width
The purpose of this subsection is to prove the following theorem.
Theorem 26
Let be the set of token-passing system templates. Let be a parameterized topology that is -definable and contains only topologies of clique-width at most . Then
The problem is decidable;
There is an algorithm that given k and d produces a cutoff for .
We give an outline of the proof before diving into the details:
-
(I)
We give an alternative definition of the marking function with simple (i.e., cycle-free) paths rather than any paths.
-
(II)
We show that the -character of the graph LTS is -definable. That is, for every member of , we construct an -formula such that has -character if and only if G, , and satisfy . To do so, we use the alternative definition of with simple paths.
-
(III)
We show how to compute a mapping assigning to every -character a representative . The representative is a graph LTS such that H has clique-width at most w. To do so, we use the -definability of -characters and the decidability of on topologies of bounded clique-width.
-
(IV)
We show how to reduce the problem of whether a token-passing system with topology G satisfies a -sentence to the problem of whether G satisfies an -sentence. To do so, we use the composition theorem, Theorem 21, as well as the mapping of -characters to representatives, and the -definability of -characters.
-
(V)
Finally, using the reduction from the previous item and the -definability of , we express the PMCP as a satisfiability problem of a certain -sentence. We use that has bounded clique-width and that deciding -satisfiability over bounded clique-width is decidable. The cutoff is then obtained from the bound on the size of the minimal satisfying model of an -sentence.
(I) Defining markings using simple paths
Let be a graph LTS for an r-topology . First, we can move to finite paths instead of infinite paths:
Lemma 6
Let be an infinite path. Let be such that for infinitely many . Let be the path obtained from by cutting the path at . For every , .
Proof
For every i such that , . By Lemma 5, is strictly decreasing in the poset . This implies that is non-increasing, and, using that there are infinitely many i such that , for every , . Hence, .
Second, we can move to simple finite paths instead of finite paths (by repeated application of the following lemma):
Lemma 7
Let be a (finite or infinite) path with a cycle, i.e., there are such that . Let be the path obtained from by removing the subpath from . For every , .
Proof
Since we have that . By Lemma 5, is strictly decreasing in the poset , implying that is non-increasing. Hence, for every , , implying that: .
For every , and every vertex , let be the set of simple finite paths in G which start at v, have no vertices in , and whose last vertex u has an edge to if , or to some vertex in if . Lemmas 6 and 7, we have:
Lemma 8
Let with . Let be a graph LTS. For every , we have:
| 1 |
Running Example 5
For with , , and , we have:
The reader can verify that applying Equation (1) of Lemma 8 gives the same values of as those computed in Running Example 3.
(II) -character is -definable
Proposition 3
(The marking of a graph LTS is -definable) Let and . There is an -formula with free first-order variables such that, for every r-topology and , iff , where is the marking of .
Proof
We will prove this proposition by induction on d.
Let . By Lemma 5, consists of subsets of . The desired is:
since: iff iff iff .
Let and . For every , let be the -formula guaranteed by the induction hypothesis for .
Let denote the set of strictly decreasing chains of elements in . By Lemma 5, , where each .
We will use the definition of in Lemma 8 to define . The formula is the conjunction , where will be defined below to guarantee that the ith coordinate of the vector follows the definition of in Lemma 8.
By the definition of in Lemma 8, consists of the set of elements for which there exists a path in such that . For every , we will define below to express that there exists a path in such that . Using the , we can define as follows:
To define , observe that for a path and a chain in , the following are equivalent:
-
(i)
.
-
(ii)
There are such that for all .
Hence, for a chain in , the following are equivalent:
-
(i)
There is in such that .
-
(ii)
There are simple finite paths which are consecutive (i.e., the last vertex of is adjacent to the first vertex of for all i) such that if then . Let the last vertex of be u. If then u has an edge to . If then u has an edge to some in one of .
For every , below expresses that there is a path , , starting from and ending at such that for all i:
where expresses that there is a path between y and in the subgraph induced by Z similarly to the classical definition of connectivity in e.g., in [44, Proposition 7.14].
Finally, is given by
where expresses that the last vertex of has an edge to if , or to some vertex of if :
for .
Proposition 4
(The -character of a graph LTS is -definable) Let and . There is an -formula with k free first-order variables such that, for every r-topology with and , iff the -character of is .
Proof
Let be the unique vertex in . Let . By the definition of -character, the graph LTS has character iff for every v of , and . We use here that . Using the formulas of the form guaranteed in Proposition 3, has -character iff , where is
and is a tuple of first-order variables. Observe that we quantify over x to obtain the vertex init which starts with the token; init is the unique vertex belonging to .
(III) The representative mapping
Lemma 9
(Computable representatives) Assume . There is a computable function which maps every either to a graph LTS or to . If , then H has clique-width at most w and the -character of is . If , then there is no such that H has clique-width as most w and whose -character is .
Proof
Let . By Proposition 4, there does not exist a graph LTS whose -character is iff the sentence
belongs to the theory of topologies of clique-width at most w. By Theorem 24, the theory of topologies of clique-width at most w is decidable. If is valid for topologies of clique-width at most k, then . Otherwise, we search for whose character is by iteratively checking all graphs and k-tuples of their elements , where in the ith stage of the iteration, t iterates over all w-terms t of size at most i. When we find whose -character is , as is guaranteed to occur, we set to and end the search.
(IV) Reduction from on token-passing systems to on topologies
Consider a -formula for which we want to verify that, for every , . We show in Lemma 10 that there is an -sentence such that is satisfied by iff the system satisfies . The formula is of the form , where is a -formula. We construct to have the form , where is an -formula. To build we use the composition property of from Theorem 21. Coupled with Theorem 22, the composition property says that the token-passing systems and have the same -character if their graph LTSs have the same -character.
Lemma 10
For every formula
there exists a computable such that for every G with clique-width at most w,
Proof
Let be a topology and be a system template.
, where is
The disjunction in the last formula is over all elements of which are the -characters of some such that . Here we denote by the formula that results from replacing every atom in of the form by the atom , for and . The first equivalence is by the definition of semantics of indexed temporal logic; the second is by the definition of ; the third is by Theorem 21 and by the definition of in Lemma 9; the fourth is by Proposition 4.
The formula is computable because is computable (Lemma 9), is computable, for each in (Proposition 4), and model checking whether is computable.
(V) Decidability of PMCP
Proof
(Theorem 26) Let be the formula defining . By Lemma 10, there is such that there is such that . By Theorem 24, there is such that iff there exists such G of size at most , so is a cutoff for the problem.
Remark 2
(Fairness) The conference version of this paper [3] assumed that token-passing systems satisfy a fairness condition, namely that the token visits every process infinitely often. In contrast, the presentation in this paper does not require this fairness condition to hold. Elimination of the fairness condition is the reason that we replaced the treatment of equivalence classes using contractions based on [2] in [3] with a treatment using -characters and markings based on [6] in the current paper.
Corollary 3
Let be a parameterized topology that is -definable and contains only topologies of clique-width at most . Let be the set of 1-index formulas, and let be an r-ary system template. Then the set of executions is -regular.
Corollary 4
Let be the set of token-passing system templates. Let be a homogeneous parameterized topology. Then
The problem is decidable;
There is an algorithm that given k and d produces a cutoff for .
Iteratively-constructible parameterized topologies
The decidability of the PMCP problem for iteratively-constructible parameterized topologies can be reduced to decidability of in the presence of an auxiliary order relation (see for instance the discussion of the iteratively constructible class of graphs consisting of two cliques of equal size in [33, Example 1(ix)]). However, another approach to the decidability of the PMCP problem of iteratively-constructible parameterized topologies via will be easier.
Theorem 27
Let be the set of token-passing system templates. For every iteratively-constructible ,
is decidable;
There is an algorithm that given k and d produces a cutoff for .
Proof
Let . Let and be w-terms and . Since there are finitely many equivalence classes of , there are such that . By Theorem 25, applying the same sequence of clique-width operations on -equivalent topologies leads again to -equivalent topologies, i.e., for every . Therefore, for every , for every n iff for every . Let be the formula guaranteed by Lemma 10 such that for every , and is computable. We get that for every , iff for every .
Cutoffs
The algorithms obtained from the proofs of Theorem 26 and Theorem 27 give non-elementary upper bounds on the cutoffs due to the number of equivalence classes in . It is well-known that the latter also has a non-elementary lower bound (this is true already for first order logic, see [35, Lemma 10.21]). Therefore, in order to find low cutoffs, one must look at formalisms which are inherently simpler than such as iteratively-constructible parameterized topologies. We believe that a more direct proof of decidability of PMCP for iteratively-constructible parameterized topologies will give rise to elementary cutoffs close to the following lower bound:
Theorem 28
There exists a 2-ary system template , and, for every , an iteratively constructible parameterized 2-topology of clique-width at most k and a k-indexed formula12 such that the smallest cutoff for is .
Proof
The templates Let W be a process template whose state set consists of one state s, and whose transitions are and . The state-labeling of s is . Let . For any topology with , behaves similarly to the graph LTS: the token moves freely between the processes on along the edges of G.
We now describe the parameterized topology . See also Fig. 11. Let be the sequence of prime numbers arranged according to size. Let be the maximal integers such that
Let . For every , let . Let be a star with leaves whose center is denoted . Let be obtained from by adding the vertices of and, for every , adding an edge between (i, j, n) and , where is taken modulo . Let and let be obtained from by adding, for every , an edge between (i, j, 1) and (i, j, n). Note that is not in .
Fig. 11.
The figure depicts and for k in the range (where ). For such k, we have , . The white vertices of are . The black vertices of are . The clique-width of is at most . The black vertices of induce three disjoint cycles and , whilst the black vertices of induce one cycle. We have for all
There is a -expression such that . The colors of the vertices of are as follows:
the neighbors of have distinct colors from ;
the vertices in have distinct colors from .
all other vertices (including ) have color ;
The -expression adds new vertices with distinct colors from , connects them appropriately with the vertices of colored , recolors all vertices with colors to color , and recolors every vertex of color to . The -expression adds an edge between the vertices colored c and for every c in . We have . We get that is an iteratively constructible 2-topology with width .
The crucial property of is as follows. Let . The set
induces a single undirected cycle in iff does not divide n, for all i; induces undirected cycles in iff divides n. Hence, for every , contains less than cycles iff . Let where
So, says there exists such that (1) are all distinct vertices, which in particular implies that , and (2) all paths between and , , pass through . Hence, for any . On the other hand, for with at , and on pairwise distinct cycles. Hence is the smallest cutoff for .
From well-known properties of primes, , and (see e.g., [39]). By the maximality of t and , , implying that . Hence, and .
Since the parameterized topology in Theorem 28 is -definable and has bounded clique-width, we have:
Theorem 29
There exists a 2-ary system template , and, for every , an -definable 2-topology of clique-width at most k and a k-indexed formula such that the smallest cutoff for is .
Discussion and related work
The applicability of the reduction of the PMCP to finitely many classical model checking problems as a technique for solving the PMCP depends on the communication primitive, the specification language, and the set of topologies of the system. The wide-ranging nature of our work along these axes gives us some insights which may be pertinent to system models different from our own:
Decidability but no cutoffs. Theorems 4 and 10 show that, for certain sets of specifications formula, cutoffs do not exist yet the PMCP problem is decidable.
Cutoffs may not be optimal. Theorem 15 and Theorem 17 imply that even in cases that cutoffs exist and are computable, they may not yield optimal algorithms for solving the PMCP.
Formalisms for topologies are useful. Many results in Sects. 3 and 5 show that decidability and complexity of PMCP can be extended from concrete examples of sets of topologies such as rings and cliques to infinite classes of topologies given as user-friendly yet powerful formalisms. The formalisms we study may be useful for other system models; for instance, in the context of model-checking multi-agent systems in unknown parameterized environments [4, 5, 47].
In the context of cutoffs, it is worth noting that we considered cutoffs with respect to sets of formulas and process templates. As Theorem 4 shows, there is a parameterized topology , and a pairwise-rendezvous system template , for which no cutoff exists for the set of 1-indexed formulas. Note, however, that if the set of formulas being considered is finite, then a cutoff always exists. Indeed, given , let be a smallest topology G for which , and if none exists, then let be a smallest topology in . Then is a (minimal) cutoff for in case is finite.
Let us underline that the cutoffs we compute are linear in the number of states in the case of disjunctively-guarded systems, and exponential in the case of token-passing systems. We have shown that such cutoffs are already useful for establishing the decidability of the parameterized model checking problem. On the other hand, some experimental results on PMCP from real-world case studies (e.g., [25, 42] or [38, Sec. 6.2]) suggest that templates in such systems usually have tens or hundreds of states, suggesting that small cutoffs are desirable if one is to use them to solve the PMCP in practice. Interestingly, case studies have found that sometimes very small cutoffs do exist. For instance, [42] provide experimental results for checking reachability properties on Boolean programs and Petri nets. Note that both Boolean programs and Petri nets can be modeled by pairwise-rendezvous systems in controlled-clique topologies. Moreover, since there are only finitely many reachability properties, cutoffs are guaranteed to exist. They provide a dynamic approach to detecting cutoffs, i.e., they do a reachability analysis on systems with an increasing number of processes, until a certain stopping criterion is reached, producing a cutoff. To the best of our knowledge, it is an open research question whether a notion of dynamic cutoff exists for doing PMCP of pairwise-rendezvous systems against indexed specifications in practice.
As previously discussed, this work draws on and generalizes the work in [36] on pairwise rendezvous on cliques, the work in [24] on disjunctive guards on cliques, and the work in [2, 16, 28] on token-passing systems. There are very few published complexity lower-bounds for PMCP (notable exceptions are [30, 48]), and to the best of our knowledge, our lower bounds on the sizes of cutoffs are the first proven non-trivial lower bounds for these types of systems.
In Tables 1, 3 and 4 we summarized the answers given to the aforementioned problems earlier for controlled topologies. In Table 2 we collect answers to the complexity problems for the case of controllerless topologies. Such answers and questions, collected together, give an idea of the several combinations of process templates, synchronization mechanisms, process topologies and specification language that have been considered in this and previous works. We hope that analyzing such combinations as a “problem space” as well as the differences among the provided answers, will be helpful to further understanding the role played by every item in such space. Finally, question marks appearing in the tables represent combinations that have not been explored in the research area of parameterized model checking of rendezvous-systems and we hope they might represent good starting points for further research.
Table 1.
Complexity of PMCP for different controlled topologies
| PR | DG | TPS | |
|---|---|---|---|
| Ring | |||
| 1- | Undecidable (Theorem 13) | Undecidable (Theorem 13) | Pspace-complete [16, 28] |
| 1- | Undecidable (Theorem 13) | Undecidable (Theorem 13) | Pspace-complete [28] |
| Homogeneous | |||
| 1- | ExPACE-complete (Theorem 10) | Pspace-complete (Theorem 19) | Decidable (Corollary 4) |
| 1- | Undecidable (Theorem 2) | Undecidable (Theorem 12) | Decidable (Corollary 4) |
| MSO-definable and bounded clique-width | |||
| 1- | Undecidable [28, 52] | Undecidable (Theorem 13) | Decidable (Theorem 26) |
| 1- | Undecidable ([28, 52], Theorem 2) | Undecidable (Theorem 12) | Decidable (Theorem 26) |
The cited papers show that a cutoff exists and is independent from the input; Sistla and Clarke [50] showed that model checking is already Pspace-complete
Same as for 1-
The hardness result holds for controlled clique parameterized topologies
Table 3.
Regularity for the set of executions on homogeneous topologies. Sizes of NBW are given where appropriate
| PR | DG | TPS | |
|---|---|---|---|
| Controlled | |||
| controller | non -regular (Theorem 8) | (Theorem 18) | -regular (Corollary 3) |
| user | non -regular (Theorem 8) | (Theorem 18) | -regular (Corollary 3) |
| Controllerless | |||
| user | O(|U|) (Theorem 7) | (Theorem 18) | – |
Here C is the product of sizes of controller templates, U is the sum of sizes of user templates
Our definition of TPS requires the presence of a controller, thus this combination does not represent a meaningful question
Table 4.
Cutoffs for PMCP on different logics and controlled and controllerless parameterized topologies
| PR | DG | TPS | |
|---|---|---|---|
| Ring | |||
| 1- | Does not exist (Theorem 13) | Does not exist (Theorem 13) | 2 or 3 [16, 28] |
| 1- | Does not exist (Theorem 13) | Does not exist (Theorem 13) | 2 or 3 [28] |
| Homogeneous | |||
| 1- | Does not exist (Theorem 5) | (Theorem 14) | 2 [2] |
| 1- | Does not exist (Theorem 5, Theorem 2) | Does not exist (Theorem 12) | 2 [2] |
| MSO and bounded clique-width | |||
| k- | Does not exist (Theorem 5) | ? | (Theorem 26) (Theorem 29) |
| k- | Does not exist (Theorem 2) | Does not exist (Theorem 12) | (Theorem 26) (Theorem 29) |
In this column we answer the question whether there are cutoffs which are computable given parameterized topology . is some computable function of , k, and d defined in the respective theorems, where d is the number of nested path quantifiers
Here nc denotes the number of controller templates, denotes the size of the i-th user template
Table 2.
Complexity of PMCP of 1-indexed formula for different controllerless topologies (the TPS column is missing, since our definition of TPS requires a controlled topology)
In this context, it is worth noting that all the upper-bounds presented in this paper concerning 1-indexed can be easily extended to the existential or universal fragments of k-indexed (for ), i.e., to the case of many process quantifiers of the same type (all existential or all universal). Furthermore, this is also the case if one allows enhanced versions of these quantifiers that specify that the processes quantified are different, and/or are neighbours (or not) in the topology (see [2] for a definition of these enhanced quantifiers). This allows one, for example, to express mutual-exclusion: . For the case of full k-indexed where alternation of universal and existential quantifiers is allowed, many of the corresponding upper bounds are still unknown, and represent another direction for future work.
We now briefly describe what needs to be done to get this extension. All the upper bounds concerning 1-indexed were stated with respect to homogeneous parameterized topologies.13 Lemma 3 shows that, for 1-indexed , such systems can be simulated by cliques. However, looking at the proof of the lemma, it is not hard to see that this simulation actually works irrespective of the specification logic. Indeed, in the controllerless case we actually get that the set of runs of the cliques is exactly equal to the set of runs of the homogeneous topologies; and in the controlled case this is also true except for a slight technical mismatch between the structure of global configurations in these two types of systems—due to the fact that the single controller of a controlled clique simulates (using a product process template) all the controllers specified by the homogeneous parameterised topology skeleton. However, this technical mismatch is syntactic in nature, and is easily overcome by mapping each coordinate in the state of the unique clique controller to the corresponding controller vertex in the homogeneous topology. Also note that runs of a given topology G in the homogeneous parameterized topology are simulated by runs of a clique topology of the same size or smaller; conversely, all runs of a simulating clique topology correspond to runs of topologies in the parameterized homogeneous topology that are larger by at most a constant factor (namely, the number of controllers in the skeleton of the homogeneous topology minus 1).
Armed with the above observations, extending our upper-bounds from 1-indexed to the universal and existential fragments of k-indexed now requires the following. First, we can easily extend the construction in the proof of Lemma 3 to have the controller of the clique simulate not only the controllers of the homogeneous topology, but also any other k nodes of k different types. Combining this with the observation made in Lemma 2 that, due to symmetry, in a homogeneous system the executions of all processes of a given type are exactly the same, we reach the following conclusion: we can replace reasoning about properties of the set of all runs of a homogeneous parameterised system projected onto processes of k different types with reasoning about the 1-executions of the unique controller of a parameterized clique topology, projected onto the relevant k simulated nodes of interest. Moreover, this reduction incurs only a constant blowup (assuming k and the communication alphabet are fixed). Observe that in case we started with a homogeneous parameterized topology with no controllers (and k types of interest), we do not have to simulate it with a controlled clique-topology. Instead, we can simulate it with a clique topology with two types: one type that is the disjoint union of all the process templates (as in the basic construction in Lemma 3), and one which is the product of the k process templates of interest (similar to the controller case—but not designated as a controller, i.e., allowing one to have many nodes of this product type). Thus, in all cases we can reduce questions about universal and existential k-indexed formulas with respect to a homogeneous parameterized topology to a question about a 1-indexed formula with respect to a clique topology of the same type (controlled or uncontrolled), with a constant blowup.
As a final remark, observe that when the given existential k-indexed formula does not specify that two quantified vertices x, y should be different, we can replace it with the disjunction (conjunction for a universal formula) of two formulas: one specifying that , and one with one quantifier less and replacing every occurrence of y with x. For a fixed k, performing this for every possible pair of variables, incurs a constant blowup.
Acknowledgements
Open access funding provided by Austrian Science Fund (FWF).
Footnotes
Actually, the set of executions is defined to be the destuttering of this set of projections, as explained in Sect. 2.6.
In the body of the paper, sets of topologies are called “parameterized topologies”.
A controller refers to a process-template that is not duplicated, i.e., it occurs exactly once.
We remark that allowing processes to send in certain directions, e.g., send left and send right in a bi-directional ring, quickly makes the PMCP undecidable [2].
In this paper, the sets in a partition may be empty.
The definition we give in this paper for indexed temporal logic uses a longhand notation. Thus, in a system with a single process template, instead of writing we write . Also, for the sake of simplicity, we only consider the basic universal and existential quantifiers, ignoring quantifiers of the form that require that the process assigned to i is different than the one assigned to j (see for example [2] for a definition that allows such enhanced quantifiers). All the results in this paper also hold for the case where the enhanced quantifiers as defined in [2] are used, with the natural changes applied to the proofs.
These multiple initial states can be removed by introducing a dummy initial state ; in this case the statement of the Lemma needs to be slightly amended to remove the first state of each execution in .
Note that it is very common to assume that the atomic propositions are equal to the states.
Note that not all such products are legal paths in A, since A contains a transition from (p, q) to only if has a transition from p to while reading the atomic propositions that are true in q.
To see this, note that is the destuttering of an automaton with many states and input alphabet of size |C|, and apply Lemma 1.
is also a formula.
With the exception of Theorem 1. However, the construction in this Theorem can be easily extended without requiring any new ideas.
B. Aminof, T. Kotek, S. Rubin, and H. Veith were supported by the Austrian National Research Network S11403-N23 (RiSE) of the Austrian Science Fund (FWF) and by the Vienna Science and Technology Fund (WWTF) through Grants PROSEED, ICT12-059, and VRG11-005. S. Rubin was supported by a Marie Curie fellowship of the Istituto Nazionale di Alta Matematica. F. Spegni is supported by UnivPM through Grant RSA-A 2014. A preliminary version of this work already appeared at the CONCUR 2014 Conference [3]. Here we extend it with more results, and full detailed proofs.
The tragic death of Helmut Veith prevented him from approving the final version. All faults and inaccuracies belong to his co-authors.
References
- 1.Abdulla, P.A., Atig, M.F., Rezine, O.: Verification of directed acyclic ad hoc networks. In: Beyer, D., Boreale, M. (eds) Formal Techniques for Distributed Systems: Joint IFIP WG 6.1 International Conference, FMOODS/FORTE 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, 3-5 June 2013, Proceedings, pp. 193–208, Springer, Berlin, Heidelberg (2013). doi:10.1007/978-3-642-38592-6_14
- 2.Aminof, B., Jacobs, S., Khalimov, A., Rubin, S.: Parameterized model checking of token-passing systems. In: McMillan, K.L., Rival, X. (eds.) Verification, Model Checking, and Abstract Interpretation—15th International Conference, VMCAI 2014, San Diego, CA, USA, January 19–21, 2014, Proceedings, Volume 8318 of Lecture Notes in Computer Science, pp. 262–281. Springer (2014)
- 3.Aminof, B., Kotek, T., Rubin, S., Spegni, F., Veith, H.: Parameterized model checking of rendezvous systems. In: Baldan, P., Gorla, D. (eds.) CONCUR 2014—Concurrency Theory—25th International Conference, CONCUR 2014, Rome, Italy, September 2–5, 2014. Proceedings, Volume 8704 of Lecture Notes in Computer Science, pp. 109–124. Springer (2014)
- 4.Aminof, B., Murano, A., Rubin, S., Zuleger, F.: Verification of asynchronous mobile-robots in partially-known environments. In: PRIMA 2015: Principles and Practice of Multi-agent Systems—18th International Conference, Bertinoro, Italy, October 26–30, 2015, Proceedings, pp. 185–200 (2015)
- 5.Aminof, B., Murano, A., Rubin, S., Zuleger, F.: Automatic verification of multi-agent systems in parameterised grid-environments. In: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, Singapore, May 9–13, 2016, pp. 1190–1199 (2016)
- 6.Aminof, B., Rubin, S.: Model checking parameterised multi-token systems via the composition method. In: Olivetti, N., Tiwari, A. (eds.) Automated Reasoning—8th International Joint Conference, IJCAR 2016, Coimbra, Portugal, June 27–July 2, 2016, Proceedings, Volume 9706 of Lecture Notes in Computer Science, pp. 499–515. Springer (2016)
- 7.Aminof, B., Rubin, S., Zuleger, F.: On the expressive power of communication primitives in parameterised systems. In: Davis, M., Fehnker, A., McIver, A., Voronkov, A. (eds.) Logic for Programming, Artificial Intelligence, and Reasoning—20th International Conference, LPAR-20 2015, Suva, Fiji, November 24–28, 2015, Proceedings, Volume 9450 of Lecture Notes in Computer Science, pp. 313–328. Springer (2015)
- 8.Aminof, B., Rubin, S., Zuleger, F., Spegni, F.: Liveness of parameterized timed networks. In: Halldórsson, M.M., Iwama, K., Kobayashi, N., Speckmann, B. (eds.) Automata, Languages, and Programming—42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6–10, 2015, Proceedings, Part II, Volume 9135 of Lecture Notes in Computer Science, pp. 375–387. Springer (2015)
- 9.Angluin D, Aspnes J, Eisenstat D, Ruppert E. The computational power of population protocols. Distrib. Comput. 2007;20(4):279–304. doi: 10.1007/s00446-007-0040-2. [DOI] [Google Scholar]
- 10.Außerlechner, S., Jacobs, S., Khalimov, A.: Tight cutoffs for guarded protocols with fairness. In: Jobstmann, B., Leino, K.R.M. (eds.) Verification, Model Checking, and Abstract Interpretation—17th International Conference, VMCAI 2016, St. Petersburg, FL, USA, January 17–19, 2016. Proceedings, Volume 9583 of Lecture Notes in Computer Science, pp. 476–494. Springer (2016)
- 11.Baier C, Katoen J-P. Principles of Model Checking. Cambridge: MIT Press; 2008. [Google Scholar]
- 12.Ball, T., Bounimova, E., Cook, B., Levin, V., Lichtenberg, J., McGarvey, C., Ondrusek, B., Rajamani, S.K., Ustuner, A.: Thorough static analysis of device drivers. In: Berbers, Y., Zwaenepoel, W. (eds.) Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18–21, 2006, pp. 73–85. ACM (2006)
- 13.Bloem, R., Jacobs, S., Khalimov, A.: Parameterized synthesis case study: AMBA AHB. In: Proceedings 3rd Workshop on Synthesis, SYNT 2014, Volume 157 of EPTCS (2014)
- 14.Bloem R, Jacobs S, Khalimov A, Konnov I, Rubin S, Veith H, Widder J. Decidability of parameterized verification. Synth Lect. Distrib. Comput. Theory. 2015;6(1):1–170. doi: 10.2200/S00658ED1V01Y201508DCT013. [DOI] [Google Scholar]
- 15.Browne MC, Clarke EM, Grumberg O. Reasoning about networks with many identical finite state processes. Inf. Comput. 1989;81:13–31. doi: 10.1016/0890-5401(89)90026-6. [DOI] [Google Scholar]
- 16.Clarke, E.M., Talupur, M., Touili, T., Veith, H.: Verification by network decomposition. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004—Concurrency Theory, 15th International Conference, London, UK, August 31–September 3, 2004, Proceedings, Volume 3170 of Lecture Notes in Computer Science, pp. 276–291. Springer (2004)
- 17.Courcelle B, Engelfriet J. Graph Structure and Monadic Second-Order Logic—A Language-Theoretic Approach, Volume 138 of Encyclopedia of Mathematics and its Applications. Cambridge: Cambridge University Press; 2012. [Google Scholar]
- 18.Courcelle B, Makowsky JA, Rotics U. Linear time solvable optimization problems on graphs of bounded clique-width. Theory Comput. Syst. 2000;33(2):125–150. doi: 10.1007/s002249910009. [DOI] [Google Scholar]
- 19.Courcelle B, Olariu S. Upper bounds to the clique width of graphs. Discrete Appl. Math. 2000;101(1):77–114. doi: 10.1016/S0166-218X(99)00184-5. [DOI] [Google Scholar]
- 20.Delzanno, G., Raskin, J.-F., Van Begin, L.: Towards the automated verification of multithreaded java programs. In: Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS ’02. Springer (2002)
- 21.Delzanno, G., Sangnier, A., Traverso, R.: Parameterized verification of broadcast networks of register automata. In: Proceedings of the 7th International Workshop on Reachability Problems (RP’13), Volume 8169 of Lecture Notes in Computer Science. Springer (2013)
- 22.Delzanno, G., Traverso, R.: Decidability and complexity results for verification of asynchronous broadcast networks. In: Dediu, A-H., Martín-Vide, C., Truthe, B. (eds.) Language and Automata Theory and Applications: 7th International Conference, LATA 2013, Bilbao, Spain, 2-5 April 2013, Proceedings, pp. 239–249, Springer, Berlin, Heidelberg (2013). doi:10.1007/978-3-642-37064-9_22
- 23.Ebbinghaus H-D, Flum J. Finite Model Theory. Berlin: Springer; 2005. [Google Scholar]
- 24.Emerson, E.A., Kahlon, V.: Reducing model checking of the many to the few. In: CADE. Springer (2000)
- 25.Emerson, E.A., Kahlon, V.: Exact and efficient verification of parameterized cache coherence protocols. In: Geist, D., Tronci, E. (eds.) Correct Hardware Design and Verification Methods, 12th IFIP WG 10.5 Advanced Research Working Conference, CHARME 2003, L’Aquila, Italy, October 21–24, 2003, Proceedings, Volume 2860 of Lecture Notes in Computer Science, pp. 247–262. Springer (2003)
- 26.Emerson, E. A., Kahlon, V.: Parameterized model checking of ring-based message passing systems. In: Marcinkowski, J., Tarlecki, A. (eds.) Computer Science Logic, 18th International Workshop, CSL 2004, 13th Annual Conference of the EACSL, Karpacz, Poland, September 20–24, 2004, Proceedings, Volume 3210 of Lecture Notes in Computer Science, pp. 325–339. Springer (2004)
- 27.Emerson, E.A., Namjoshi, K.S.: On model checking for non-deterministic infinite-state systems. In: Thirteenth Annual IEEE Symposium on Logic in Computer Science, Indianapolis, Indiana, USA, June 21–24, 1998, pp. 70–80. IEEE Computer Society (1998)
- 28.Emerson EA, Namjoshi KS. On reasoning about rings. Int. J. Found. Comput. Sci. 2003;14(4):527–549. doi: 10.1142/S0129054103001881. [DOI] [Google Scholar]
- 29.Esparza, J.: Decidability and complexity of petri net problems—an introduction. In: Reisig, W., Rozenberg, G. (eds.) Lectures on Petri Nets I: Basic Models: Advances in Petri Nets, pp. 374–428, Springer, Berlin, Heidelberg. doi:10.1007/3-540-65306-6_20
- 30.Esparza, J.: Keeping a crowd safe: on the complexity of parameterized verification (invited talk). In: Mayr, E.W., Portier, N. (eds.) 31st International Symposium on Theoretical Aspects of Computer Science (STACS 2014), STACS 2014, March 5–8, 2014, Lyon, France, Volume 25 of LIPIcs, pp. 1–10. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik (2014)
- 31.Esparza, J., Finkel, A., Mayr, R.: On the verification of broadcast protocols. In: 14th Annual IEEE Symposium on Logic in Computer Science, Trento, Italy, July 2–5, 1999, pp. 352–359. IEEE Computer Society (1999)
- 32.Esparza, J., Ganty, P., Leroux, J., Majumdar, R.: Verification of population protocols. In: 26th International Conference on Concurrency Theory, CONCUR 2015, Volume 42 of LIPIcs. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik (2015)
- 33.Fischer, E., Makowsky, J.A.: The Specker-Blatter theorem revisited. In: Computing and Combinatorics, 9th Annual International Conference, COCOON 2003, Proceedings (2003)
- 34.Fischer, E., Makowsky, J.A.: Linear recurrence relations for graph polynomials. In: In: Avron, A., Dershowitz, N., Rabinovich, A. (eds.) Pillars of Computer Science: Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday, pp. 266–279, Springer, Berlin, Heidelberg (2008). doi:10.1007/978-3-540-78127-1_15
- 35.Flum J, Grohe M. Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series) Berlin: Springer; 2006. [Google Scholar]
- 36.German SM, Sistla AP. Reasoning about systems with many processes. J. ACM. 1992;39(3):675–735. doi: 10.1145/146637.146681. [DOI] [Google Scholar]
- 37.Glaister I, Shallit J. A lower bound technique for the size of nondeterministic finite automata. Inf. Process. Lett. 1996;59(2):75–77. doi: 10.1016/0020-0190(96)00095-6. [DOI] [Google Scholar]
- 38.Gmeiner, A., Konnov, I., Schmid, U., Veith, H., Widder, J.: Tutorial on parameterized model checking of fault-tolerant distributed algorithms. In: Formal Methods for Executable Software Models—14th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2014, Bertinoro, Italy, June 16–20, 2014, Advanced Lectures, pp. 122–171 (2014)
- 39.Graham, R.L., Knuth, D.E., Patashnik, O.: Concrete Mathematics: A Foundation for Computer Science, 2nd edn. Addison-Wesley, Reading (1994)
- 40.Jacobs, S., Bloem, R.: Parameterized synthesis. Log. Methods Comput. Sci. 10(1), 362–376 (2014)
- 41.John, A., Konnov, I., Schmid, U., Veith, H., Widder, J.: Counter attack on byzantine generals: parameterized model checking of fault-tolerant distributed algorithms. CoRR, abs/1210.3846 (2012)
- 42.Kaiser, A., Kroening, D., Wahl, T.: Dynamic cutoff detection in parameterized concurrent programs. In: Touili, T., Cook, B., Jackson, P.B. (eds.) Computer Aided Verification, 22nd International Conference, CAV 2010, Edinburgh, UK, July 15–19, 2010. Proceedings, Volume 6174 of Lecture Notes in Computer Science, pp. 645–659. Springer (2010)
- 43.Khalimov, A., Jacobs, S., Bloem, R.: PARTY parameterized synthesis of token rings. In: Computer Aided Verification—25th International Conference, CAV 2013, Proceedings, Volume 8044 of Lecture Notes in Computer Science. Springer (2013)
- 44.Libkin, L.: Elements of Finite Model Theory. In: Brauer, W., Rozenburg, G., Salomaa, A. (eds.) Texts in Theoretical Computer Science. An EATCS Series. Springer Berlin, Heidelberg (2004)
- 45.Makowsky JA. Algorithmic uses of the Feferman–Vaught theorem. Ann. Pure Appl. Log. 2004;126:159–213. doi: 10.1016/j.apal.2003.11.002. [DOI] [Google Scholar]
- 46.Minsky ML. Computation: Finite and Infinite Machines. Englewood Cliffs: Prentice-Hall, Inc.; 1967. [Google Scholar]
- 47.Rubin, S.: Parameterised verification of autonomous mobile-agents in static but unknown environments. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2015, pp. 199–208 (2015)
- 48.Schmitz, S., Schnoebelen, P.: The power of well-structured systems. In: D’Argenio, P.R., Melgratti, H.C. (eds.) CONCUR 2013—Concurrency Theory—24th International Conference, CONCUR 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings, Volume 8052 of Lecture Notes in Computer Science, pp. 5–24. Springer (2013)
- 49.Shamir S, Kupferman O, Shamir E. Branching-depth hierarchies. Electron. Notes Theor. Comput. Sci. 2003;39(1):65–78. doi: 10.1016/S1571-0661(05)82504-6. [DOI] [Google Scholar]
- 50.Sistla AP, Clarke EM. The complexity of propositional linear temporal logics. J. ACM (JACM) 1985;32(3):733–749. doi: 10.1145/3828.3837. [DOI] [Google Scholar]
- 51.Spalazzi, L., Spegni, F.: Parameterized model-checking of timed systems with conjunctive guards. In: Verified Software: Theories, Tools and Experiments—6th International Conference, VSTTE 2014, Volume 8471 of Lecture Notes in Computer Science. Springer (2014)
- 52.Suzuki I. Proving properties of a ring of finite-state machines. Inf. Process. Lett. 1988;28(4):213–214. doi: 10.1016/0020-0190(88)90211-6. [DOI] [Google Scholar]
- 53.Vardi M, Wolper P. Automata-theoretic techniques for modal logics of programs. J. Comput. Syst. Sci. 1986;32(2):183–221. doi: 10.1016/0022-0000(86)90026-7. [DOI] [Google Scholar]











