• Ingen resultater fundet

BRICS Basic Research in Computer Science

N/A
N/A
Info
Hent
Protected

Academic year: 2022

Del "BRICS Basic Research in Computer Science"

Copied!
26
0
0

Indlæser.... (se fuldtekst nu)

Hele teksten

(1)

BRICSRS-01-19J.Srba:OnthePowerofLabelsinTransitionSystems

BRICS

Basic Research in Computer Science

On the Power of

Labels in Transition Systems

Jiˇr´ı Srba

BRICS Report Series RS-01-19

ISSN 0909-0878 June 2001

(2)

Copyright c2001, Jiˇr´ı Srba.

BRICS, Department of Computer Science University of Aarhus. All rights reserved.

Reproduction of all or part of this work is permitted for educational or research use on condition that this copyright notice is included in any copy.

See back inner page for a list of recent BRICS Report Series publications.

Copies may be obtained by contacting:

BRICS

Department of Computer Science University of Aarhus

Ny Munkegade, building 540 DK–8000 Aarhus C

Denmark

Telephone: +45 8942 3360 Telefax: +45 8942 3255 Internet: BRICS@brics.dk

BRICS publications are in general accessible through the World Wide Web and anonymous FTP through these URLs:

http://www.brics.dk ftp://ftp.brics.dk

This document in subdirectoryRS/01/19/

(3)

On the Power of Labels in Transition Systems

?

Jiˇr´ı Srba??

BRICS? ? ?

Department of Computer Science University of Aarhus

Denmark srba@brics.dk

Abstract. In this paper we discuss the role of labels in transition sys- tems with regard to bisimilarity and model checking problems. We sug- gest a general reduction from labelled transition systems to unlabelled ones, preserving bisimilarity and satisfiability of µ-calculus formulas.

We apply the reduction to the class of transition systems generated by Petri nets and pushdown automata, and obtain several decidabil- ity/complexity corollaries for unlabelled systems. Probably the most interesting result is undecidability of strong bisimilarity for unlabelled Petri nets.

1 Introduction

Formal methods for verification of infinite-state systems have been an active area of research with a number of positive decidability results.

In particular, verification techniques for concurrent systems defined by process algebras like CCS [Mil89], ACP [BW90] or CSP [Hoa85], push- down systems, Petri nets, process rewrite systems [May00b] and others have attracted a lot of attention. There are two central questions about decidability (complexity) of equivalence and model checking problems:

– Equivalence checking(see [Mol96]):

Given two (infinite-state) systems, are they equal with regard to some equivalence notion?

– Model checking(see [BE97]):

Given an (infinite-state) transition system and a formula φ of some suitable logic, does the system satisfy the property described by φ?

? Full and extended version of [Srb01].

?? The author is supported in part by the GACR, grant No. 201/00/0400.

? ? ? BasicResearch inComputerScience,

Centre of the Danish National Research Foundation.

(4)

Both these problems have an interesting and unifying aspect in common.

They can be defined independently on the computational model by means oflabelled transition systems. All the models mentioned above give rise to a certain type of (infinite) labelled transition system and this is considered to be their desired semantics. Equivalence and model checking problems can be defined purely in terms of these transition systems.

In the first part of the paper we discuss the role of labels of such transition systems. There are two aspects of the branching structure de- scribed by a labelled transition system T. First, given a state ofT, there can be several outgoing edges with different labels. Second, given a state of T and a label a, there can be several outgoing edges under the same label a. We claim that for our purposes only the second property is the essential one. In other words, given a labelled transition system, we can construct another transition system where all edges are labelled by the same label, i.e., the labels are in fact completely irrelevant. We call such systems unlabelled transition systems. What is important is the fact that our construction preserves the answers to both the questions we are inter- ested in — equivalence checking (and we have chosen strong bisimilarity as the notion of equivalence) and model checking withaction-based modal µ-calculus as the chosen logic for expressing properties of labelled transi- tion systems.

In the second part we focus on two specific classes of infinite-state sys- tems, namely Petri nets and pushdown systems. Petri nets are a typical example of fully parallel models of computation, whereas pushdown sys- tems can model sequential stack-like process behaviours. Both Petri nets and pushdown systems generate (in general infinite) labelled transition systems. The question is whether the transformed unlabelled transition systems (given by the construction mentioned in the previous paragraph) are still definable by the chosen formalism of Petri nets resp. pushdown automata. The answer is shown to be positive for both our models — there are even polynomial time transformations. This implies several decidabil- ity/complexity results about bisimilarity and model checking problems for unlabelled Petri nets and pushdown systems.

Probably the most interesting corollary is the application of the trans- formation to Petri nets. We prove that strong bisimilarity for unlabelled Petri nets (where the set of labels is a singleton set) is undecidable. This is stronger result than undecidability of strong bisimilarity for labelled Petri nets given by Jancar [Jan95]. The undecidability for unlabelled Petri nets contrasts to a positive decidability result for the subclass of Petri nets which are deterministic [Jan95,Vog92], i.e., for any markingM and a la-

(5)

belathere is at most one outgoing transition fromM labelled bya. This again demonstrates that the role of labels is not important for decidabil- ity questions and what is crucial is the branching structure induced by transitions with the same label.

In the end we briefly discuss other popular process algebras — BPA (Basic Process Algebra) [BK85] and BPP (Basic Parallel Process) [Chr93].

BPA is a strict subclass of pushdown systems and BPP is a strict subclass of Petri nets (also called communication-free Petri nets). Unfortunately, it is sketched that these models — unlike pushdown systems and Petri nets — are not strong enough to express deadlock behaviour which is essential for the transformation. In other words, the corresponding unla- belled transition system of a given BPA (BPP) transition graph is not necessarily definable in the BPA (BPP) syntax.

2 Basic definitions

First, we definelabelled transition systems [Plo81,Mol96].

Definition 1 (Labelled transition system).Alabelled transition sys- tem is a triple T = (S,Act,−→) where

S is a set of states (or processes)

Actis a set of labels (or actions) such that S∩ Act= and

−→⊆ S × Act× S is a transition relation, written α −→a β for (α, a, β) ∈−→.

In what follows we assume that Act is a finite set. As usual we extend the transition relation to the elements of Act (α −→ α and inductively α −→aw β iff ∃γ : α −→a γ and γ −→w β where α, β, γ S, a ∈ Act and w ∈ Act). We also writeα −→ β iff ∃w ∈ Act such that α −→w β. A stateβ isreachablefrom a stateα, iffα−→ β. Moreover, we writeα 6−→

forα∈S iff there is no β∈S and a∈ Actsuch that α−→a β.

We call a labelled transition systemT normed iff∀s∈S.∃s0∈Ssuch that s−→ s0 6−→.

Definition 2. Let T = (S,Act,−→) be a labelled transition system and s S. By Ts we denote a labelled transition system restricted to states of T reachable from s. More precisely, Ts = (Ss,Act,−→s) where Ss = {s0 ∈S |s−→ s0} and s1−→a s s2 iff s1−→a s2 and s1, s2 ∈Ss.

Now, we introduce the notion of(strong) bisimilarity [Par81,Mil89].

(6)

Definition 3 (Bisimulation). Let T = (S,Act,−→) be a labelled tran- sition system. A binary relation R⊆S×S is a relation of bisimulation iff whenever (α, β)∈R then for each a∈ Act:

if α−→a α0 then β −→a β0 for some β0 such that (α0, β0)∈R ifβ −→a β0 then α−→a α0 for some α0 such that(α0, β0)∈R.

Two states α, β S are bisimilar in T, written α T β, iff there is a bisimulation R such that (α, β)∈R.

Bisimilarity has also an elegant characterisation in terms of bisimulation games [Tho93,Sti95]. A bisimulation game on a pair of statesα, β ∈S is a two-player game of an “attacker” and a “defender”. The attacker chooses one of the states and makes an−→a -move for somea∈ Act. The defender must respond by making an −→a -move from the other state under the same label a. Now the game repeats, starting from the new processes. If one player cannot move, the other player wins. If the game is infinite, the defender wins. Statesαandβ are bisimilar iff the defender has a winning strategy (and non-bisimilar iff the attacker has a winning strategy).

We introduceunlabelled transition systems in the following definition.

Definition 4 (Unlabelled transition system). LetT = (S,Act,−→) be a labelled transition system. We call T unlabelled transition system whenever Actis a singleton set, i.e., |Act|= 1.

Remark 1. If it is the case that|Act|= 1 then (for our purposes) we sim- ply write−→instead of−→a . We also forget about the second component in the definition of a labelled transition system, i.e., we can denote an unlabelled transition system by T = (S,−→) where−→⊆S×S.

Now, we define a powerful logic for labelled transition systems — modal µ-calculus [Koz83,Pra82].

Definition 5 (Syntax of modal µ-calculus).Let Var be a set of vari- ables and Act a set of action labels such that Var∩ Act=∅. The syntax of modal µ-calculus is defined as follows:

φ::= tt | X | φ1∧φ2 | ¬φ | haiφ | µX.φ

where tt stands for “true”, X ranges overVar and a over Act. There is a standard restriction on the formulas: we consider only formulas where each occurrence of a variable X is within a scope of an even number of negation symbols.

(7)

Given a labelled transition system T = (S,Act,−→), we interpret a for- mula φas follows. Assume a valuation Val:Var→2S.

[[tt]]Val,T =S [[X]]Val,T =Val(X)

[[φ1∧φ2]]Val,T = [[φ1]]Val,T [[φ2]]Val,T [[¬φ]]Val,T =Sr[[φ]]Val,T

[[haiφ]]Val,T ={s| ∃s0.(s−→a s0 s0 [[φ]]Val,T)} [[µX.φ]]Val,T =T

{S0 ⊆S |[[φ]]Val[S0/X],T ⊆S0}

HereVal[S0/X] stands for a valuation function such thatVal[S0/X](X) = S0 and Val[S0/X](Y) = Val(Y) for X 6= Y. We say that a formula φ is satisfied in a state sofT, and we writeT, s|=φ, if for all valuations Val we have s∈[[φ]]Val,T.

Remark 2. The logic defined above without the fixed-point operatorµX.φ is called Hennessy-Milner logic [HM85].

3 From labelled to unlabelled transition systems

In this section we present a transformation from labelled transition sys- tems to unlabelled ones, preserving bisimilarity and satisfiability of µ- calculus formulas.

Let T = (S,Act,−→) be a labelled transition system. We define a transformed unlabelled transition system Tb= (S,b −→). We reuse the re- lation symbol−→without causing confusion, since in the systemT it is a ternary relation and inTbit is a binary relation. Without loss of generality we assume thatAct={1,2, . . . , n}for somen >0. We define the system Tb= (S,b −→) as follows:

Sb =S∪ {rk(s,a,s0) |0≤k≤a s−→a s0} ∪ {dks |s∈S 0≤k≤n}

−→={(s, r0(s,a,s0)), (r(s,a,s0 0), s0)|s−→a s0} ∪ {(rk(s,a,s0), rk+1(s,a,s0))|s−→a s0 0≤k < a} ∪ {(s, d0s)|s∈S} ∪

{(dks, dk+1s )|s∈S 0≤k < n}.

For a better understanding of the transformation take a look at Figure 1 where a way how to transform a transition s−→a s0 is drawn. The idea consists in splitting each transition s −→a s0 labelled by a N0 with an intermediate state (the r0(s,a,s0) state) out of which goes a newly added

(8)

/. -,

() s *+ a ///. -,

() s0 *+

/. -,

() dns *+oo . . . /. -, () d0s *+

oo /. -,

() d0s0 *+ //. . . ///. -, () dns0 *+

/. -, () s *+

OO ///. -,() *+r0(s,a,s0) ///. -,() *+s0

OO

/. -,

()r1(s,a,s0*+) ///. -,

()r(s,a,s2 0*+) //. . . . . . ///. -, ()ra(s,a,s0*+)

Fig. 1.Transformation of a transitions−→a s0

linear path of length a. The ds states add a linear path of length n+ 1 to each state from S and serve for distinguishing the r-states from the original ones.

Notice that ifT is a finite-state system then the size of Tb is polyno- mially bounded by the size of T. In fact, we could add only one linear path of length n+ 1 with appropriate links into the path starting in the states fromS and in ther0-states. However, for technical convenience in Section 4, we use the previously described construction.

Remark 3. It is an easy observation thatTbis a normed transition system.

3.1 Bisimilarity

Let T = (S,Act,−→) be a labelled transition system and lets∈ S. We define aset of finite norms of sby

N(s) ={|w| | ∃s0 ∈S :s−→w s0 6−→}

where|w|is the length ofw. The following proposition is a standard one.

Proposition 1. LetT = (S,Act,−→)be a labelled transition system and s1, s2 ∈S. Thens1 T s2 implies that N(s1) =N(s2).

Our aim is to show that for a pair of states s1 and s2 of a labelled transition system T holds that s1 T s2 if and only if s1Tb s2.

Lemma 1. Let T = (S,Act,−→) be a labelled transition system and s1, s2 ∈S be a pair of states. Ifs1 T s2 then s1 Tbs2.

(9)

Proof. Suppose that the defender has a winning strategy in T starting from the pair s1 and s2. We show that the defender in Tb has also a winning strategy starting from the pairs1ands2. Any attacker’s move in Tb of the form si −→d0si (for i∈ {1,2}) can be matched by a defender’s move s3−i −→ d0s3−i. The states d0s1 and d0s2 are trivially bisimilar. Let the attacker’s move in Tb be si −→ r0(si,a,s0

i) fori∈ {1,2}. Of course, the following attacker’s move is possible in T as well: si −→a s0i. We assume defender’s answer inT by performings3−i −→a s03−i such that

s01 T s02. (1)

The defender’s response inTbis thens3−i −→r(s03−i,a,s0

3−i). Now the game in Tb continues from the states r(s01,a,s0

1) and r0(s2,a,s0

2). Given i ∈ {1,2}, only two transitions are possible from r(s0i,a,s0

i). Either the attacker can choose r0(si,a,s0

i) −→ s0i or r(s0i,a,s0

i) −→ r(s1i,a,s0

i). If he chooses the second option then he looses since the defender answers with r(s03−i,a,s0

3−i) −→

r1(s3−i,a,s0

3−i)and these reached states are easily seen to be bisimilar. Should the attacker’s choice be r0(si,a,s0

i) −→ s0i then the defender’s answer is r0(s3−i,a,s0

3−i)−→s03−i. Sinces01, s02 ∈Sand the defender inT has a winning strategy from these states because of (1), we have established a winning

strategy for the defender in Tb. ut

Before showing the other implication, we prove the following property.

Property 1. The attacker in Tb has a winning strategy from any pair of states s1, s2 ∈Sbsuch thats1 6∈S and s2 ∈S, or s1∈S and s26∈S. Proof. Assume w.l.o.g. that s1 6∈ S and s2 S. The other case is sym- metric. There are three possibilities if s16∈S.

Lets1 =dks for some s∈S and 0 ≤k≤n, or s1 =rk(s,a,s0) for some s, s0 ∈S,a∈ Act and 0 < k≤a. In both these cases n+ 16∈ N(s1) andn+ 1∈ N(s2). Because of Proposition 1 we gets1 6∼Tbs2 and the attacker inTbhas a winning strategy.

Let s1 = r0(s,a,s0) for some s, s0 S and a ∈ Act. Now the attacker has the following winning strategy inTb. He makes a mover0(s,a,s0)−→

r1(s,a,s0). Assume a defender’s answers2−→s02 for an arbitrarys02 ∈Sb. Obviously eithern∈ N(s02) orn+ 2∈ N(s02) and max [N(r(s,a,s1 0))]<

n. Again, using Proposition 1, the attacker has a winning strategy. ut

(10)

Lemma 2. Let T = (S,Act,−→) be a labelled transition system and s1, s2 ∈S be a pair of states. Ifs1 Tb s2 then s1 T s2.

Proof. Knowing that the defender has a winning strategy in Tb from s1 ands2, we establish a winning strategy for the defender inT froms1and s2. Suppose that the attacker’s move inT issi −→a s0i fori∈ {1,2}. Then it is possible to perform a series of two movessi−→r0(si,a,s0

i)−→s0i inTb. Because of Property 1, the defender in Tb has a response to this series of moves only by performings3−i −→r0(s3−i,b,s0

3−i)−→s03−ifor someb∈ Act and s03−i∈S where

s01 Tbs02. (2) Notice thata=b, otherwise the attacker has a winning strategy inTbfrom r0(si,a,s0

i)andr(s03−i,b,s0

3−i)by performing a mover0(si,a,s0

i)−→r(s1i,a,s0

i). Using Property 1, the defender must answer with r0(s3−i,b,s0

3−i) −→r1(s3−i,b,s0 3−i). However, the attacker has a winning strategy now sincea−1∈ N(r1(si,a,s0

i)) anda−16∈ N(r(s13−i,b,s0

3−i)) whenevera6=b— Proposition 1. This implies that the defender in T can performs3−i −→a s03−i and because of (2), the defender in T has a winning strategy froms01 and s02. Thuss1T s2. ut From Lemma 1 and Lemma 2 we can conclude with the following theorem.

Theorem 1. Let T = (S,Act,−→) be a labelled transition system and s1, s2 ∈S be a pair of states. Let Tb be the corresponding unlabelled tran- sition system. Then

s1 T s2 if and only if s1 Tbs2. 3.2 Model checking

We turn our attention to the model checking problem now. We show that there is a polynomial time transformation of any µ-calculus formula φ into φb such that T, s |= φ iff T , sb |= φb. When interpreting a µ-calculus formula on an unlabelled transition system Tb, we write ♦ instead ofhai, sincea∈ Actis the only label and hence it is irrelevant. We also define a dual operator asφ≡ ¬♦¬φand ffasff≡ ¬tt.

LetT = (S,Act,−→) be a labelled transition system such that Act= {1,2, . . . , n}and letTb= (S,b −→) be the corresponding unlabelled system.

First of all, we write a formula L(a) such that

[[L(a)]]Val0,Tb={r(s,a,s0 0)| ∃s, s0 ∈S:s−→a s0} (3)

(11)

for any valuationVal0:Var→2Sb. We define

L(a) n+1tt ♦(affa−1tt)

where ♦0φ φ and ♦k+1φ ♦(♦kφ), and similarly 0φ φ and k+1φ (kφ).

LetT , sb 1 |=L(a). The left subformula inL(a), namely♦n+1tt, ensures that the state s1 is not of the formrk(s,b,s0) for k >0, nor of the form dks for k 0. The second subformula in the conjunction says that there is a one step transition from s1, reaching a state s01 of the form r(s,b,s1 0)

— should s01 S, or s01 be of the form r0(s,b,s0), or s01 be of the form d0s, then the formula aff can never be satisfied. Moreover, the formula affguarantees that there are at mosta−1 transitions fromr(s,b,s1 0)and the formula ♦a−1tt finally ensures that at least a−1 transitions can be performed fromr1(s,b,s0). Hence a=b and (3) is established.

Let us consider another formula calledState and defined by State ♦tt ntt.

Obviously, [[State]]Val0,Tb = S for any valuation Val0 :Var 2Sb. We are now ready to define φb for a given µ-calculus formula φ. The definition follows:

ttb=tt∧ State Xb=X∧ State φ\1∧φ2=cφ1∧φc2∧ State

¬φc =¬φb∧ State µX.φ[ = (µX.φb)∧ State

haiφd =♦ L(a)φb

∧ State.

Theorem 2. Let T = (S,Act,−→) be a labelled transition system and s∈S. Let φ be a µ-calculus formula. Then

T, s|=φ if and only if T , sb |=φ.b Proof. By structural induction on φwe prove that

[[φ]]Val,T = [[φb]]Val0,Tb (4)

for arbitrary valuations Val :Var 2S and Val0 :Var 2Sb such that Val(X) =Val0(X)∩S for all X ∈ Var.

Base case:

(12)

Casett. Obviously, [[tt]]Val,T =S = [[tt]]Val0,Tb∩S= [[tt∧ State]]Val0,Tb. CaseX. Because of our assumptions onValandVal0we get [[X]]Val,T =

Val(X) =Val0(X)∩S = [[X∧ State]]Val0,Tb. Inductive step:

Case φ1 ∧φ2. By definition [[φ1 ∧φ2]]Val,T = [[φ1]]Val,T [[φ2]]Val,T. Using induction hypothesis this equals to [[cφ1]]Val0,Tb[[cφ2]]Val0,Tb which gives again by definition [[φc1cφ2]]Val0,Tb. Since [[φ1∧φ2]]Val,T = [[φc1 cφ2]]Val0,Tb ⊆S, we get [[cφ1cφ2]]Val0,Tb = [[cφ1cφ2 ∧ State]]Val0,Tb which equals to [[φ\1∧φ2]]Val0,Tb.

Case ¬φ. By definition [[¬φ]]Val,T = S r[[φ]]Val,T. Using induction hypothesis this equals to S r[[φb]]Val0,Tb which is the same as (Sbr [[φb]]Val0,Tb)∩S = [[¬φb]]Val0,Tb∩S = [[¬φb∧ State]]Val0,Tb. This is by defi- nition [[¬φc]]Val0,Tb.

Case µX.φ. By definition we know that [[µX.φ]]Val,T = T

{S0 S | [[φ]]Val[S0/X],T ⊆S0}and this equals by induction hypothesis toT

{S0 S|[[φb]]Val0[S0/X],Tb ⊆S0}. Notice that [[φb]]Val0[S0/X],Tb= [[φb]]Val0[S00/X],Tb S for any S0 ⊆S and S00 Sb such that S0 = S00∩S. ThusT

{S0 S | [[φb]]Val0[S0/X],Tb S0} = T

{S00 Sb | [[φb]]Val0[S00/X],Tb S00} ∩S. This is the same as [[(µX.φb)∧ State]]Val0,Tb and equals by definition to [[µX.φ[]]Val0,Tb.

Case haiφ. First, we show that [[haiφ]]Val,T [[haiφd]]Val0,Tb. Let s [[haiφ]]Val,T which means that there is some s0 S such that s −→a s0 and s0 [[φ]]Val,T. By induction hypothesis s0 [[φb]]Val0,Tb. We show that s∈[[haiφd]]Val0,Tb. However, r(s,a,s0 0) [[♦φb]]Val0,Tb. Moreover, r0(s,a,s0) [[L(a)]]Val0,Tb using (3) and of course s∈[[State]]Val0,Tb. This implies that s [[♦ L(a)φb

∧ State]]Val0,Tb = [[haiφd]]Val0,Tb. Sec- ond, we show that [[haiφd]]Val0,Tb [[haiφ]]Val,T. Let s∈ [[haiφd]]Val0,Tb = [[♦ L(a)∧♦φb

∧State]]Val0,Tbwhich means thats∈Sands−→s00such thats00[[L(a)φb]]Val0,Tb. Because of (3) we know thats00=r0(s,a,s0)

for some s0 S. We remind that r(s,a,s0 0) −→ s0. Since [[φb]]Val0,Tb S and r(s,a,s1 0) 6∈ S, we get that s0 [[φb]]Val0,Tb. This implies by induc- tion hypothesis that s0 [[φ]]Val,T and moreover s −→a s0. Hence s∈[[haiφ]]Val,T.

(13)

Thus we have established (4) and proved the theorem. ut Remark 4. Let us consider temporal operatorsEF φandEGφdefined by EF φ ≡µX.φ∨ h−iX and EGφ ≡ ¬µX.¬φ∨ ¬h−i¬X∧ h−itt

where h−iφ W

a∈Acthaiφ. We define the transformed formulas EF φ[ (using only EF operator) andEGφ[ (using onlyEGoperator) as follows:

EF φ[ =EFφb ∧ State EGφ[ =EG

State∨W

a∈ActL(a)

∧ State = φb

∧ State.

Note that still [[φb]]Val0,Tb ⊆S for any formula φ and any valuationVal0 : Var 2Sb. Let s∈S. ThenT, s|=EF φ iff T , sb |=EF φ[. If moreover Ts satisfies condition

∀s0 ∈Ss.∃s00∈Ss.∃a∈ Act:s0 −→a s00 (5) then T, s|=EGφ iff T , sb |=EGφ[. This enables to transform formulas of even weaker logics than modalµ-calculus (such as Hennessy-Milner logic, possibly equipped with the operatorEF, respectivelyEG) into unlabelled formulas of the same logic. Hennessy-Milner logic with the operatorsEF and EGis called unified system of branching-time logic (UB) [BAMP83]

and the fragments of UB containing only the operator EF φ (EGφ) are referred to as EF-logic (EG-logic).

Similarly, the until operators E [φU ψ] and A [φU ψ] of CTL [CE81]

— defined byE [φU ψ]≡µX.ψ∨(φ∧ h−iX) andA[φU ψ]≡µX.ψ∨ φ∧ h−itt∧ ¬h−i¬X

— can be transformed:

E\[φU ψ] =E [(State = φb) U ψb] ∧ State A\[φU ψ] =χdAU whereχAU =¬

E [¬ψ U (¬φ∧ ¬ψ)] EG(¬ψ)

.

In the case of A [φU ψ] we use the equivalence A [φU ψ] ⇐⇒ χAU from [CES86]. Again, for any s S it holds that T, s |= E [φU ψ] iff T , sb |= E\[φU ψ]. Moreover T, s |= A [φU ψ] iff T , sb |= A\[φU ψ] under the assumption of condition (5). This enables to transform also the logic CTL.

4 Applications

In this section we show how the previous results can be applied to equiva- lence/model checking of infinite-state systems. We focus in particular on

(14)

a typical representative of parallel models — Petri nets (see e.g. [Pet81])

— and sequential processes — pushdown systems (see e.g. [Mol96]). We have to show that the class of transition systems generated by these mod- els is closed under the transformation from labelled to unlabelled systems as presented in the previous section.

Let us now define bisimilarity and model checking problems.

Problem: Bisimilarity checking problem

Instance: Labelled transition system T = (S,Act,−→) and s1, s2 ∈S.

Question: s1 T s2 ?

Problem: Model checking problem with logic L

Instance: Labelled transition system T = (S,Act,−→), s∈S and a formulaφof the logic L.

Question: T, s|=φ?

First of all, we remind the reader of the fact that our transformation works immediately for finite-state transition systems. In the following corollary we consider the model checking problem with these logics: Hennessy- Milner logic, EF-logic, EG-logic, UB, CTL and modal µ-calculus.

Corollary 1. Let T = (S,Act,−→) be a finite-state labelled transition system, i.e., |S|,|Act| < ∞. There is a polynomial time reduction from the bisimilarity (model) checking problem forT to the bisimilarity (model) checking problem for Tb, where Tb is an unlabelled (and finite-state) tran- sition system.

Proof. Immediately from Theorem 1, Theorem 2 and Remark 4. In the case ofEG-logic, UB and CTL we can ensure the validity of condition (5) of Remark 4 by adding a self-loop s−→u s(u is a fresh action) to every state s∈S such thats 6−→. This does not influence satisfiability ofEG,

UB and CTL formulas. ut

4.1 Petri nets

It is a well known fact that the bisimilarity checking problem is undecid- able for labelled Petri nets [Jan95]. The technique of the proof is based

(15)

on a reduction from the counter machine of Minsky [Min67] and the labelling is essential for the reduction. It is also known that bisimilar- ity is decidable for the class of Petri nets which are deterministic up to bisimilarity [Jan95], i.e., F-deterministic nets of Vogler [Vog92]. Bisimi- larity between a labelled Petri net and a finite-state system is decidable [JM95,JKM98] and EXPSPACE-hard (see e.g. comments in [May00a]).

Model checking of even weak temporal logics on labelled transition systems generated by Petri nets is quite pessimistic. The only decid- able logic is (trivially) Hennessy-Milner logic. The EF-logic is undecid- able [Esp97] and model checking with EG is also undecidable, even for BPP [EK95] — BPP is a strict subclass of labelled Petri nets where each transition has exactly one input place.

We examine the bisimilarity and model checking problems for unla- belled Petri nets in this subsection.

Definition 6 (Labelled Petri net). A labelled Petri net is a tuple N = (P, T, F, L, λ), where P is a finite set of places, T is a finite set of transitionssuch thatT∩P =∅,F (P×T)(T×P)is a flow relation, L is a finite set of labels and λ:T →L is a labelling function.

A marking M of a net N is a mapping M : P N0, i.e., each place is assigned a nonnegative number of tokens. We definet={p|(p, t)∈F} and t = {p | (t, p) F} for a transition t T. We say that t T is enabled in a marking M iff ∀p∈t. M(p)>0. If t is enabled in M then it can be fired, producing a markingM0 such that:

M0(p) =M(p) for all p∈ Pr(t∪t)

(t∩t) M0(p) =M(p)1 for all p∈trt

M0(p) =M(p) + 1 for all p∈trt.

Then we write M[tiM0. Without loss of generality we assume that if M[t1iM0 andM[t2iM0thenλ(t1)6=λ(t2) for any pair of markingsM, M0 and transitions t1 andt2.

Definition 7 (Labelled transition system T(N)).

Let N = (P, T, F, L, λ) be a labelled Petri net. We define a corresponding labelled transition system T(N) as T(N) = ([P N0], L,−→) where M −→a M0 whenever M[tiM0 and a= λ(t) for M, M0 [P N0] and t∈T.

Now, we define unlabelled Petri nets.

Definition 8 (Unlabelled Petri net). An unlabelled Petri net is a labelled Petri net N = (P, T, F, L, λ) such that |L|= 1.

(16)

Remark 5. Whenever |L|= 1, let us say L ={a}, we can omit L and λ from the definition of the net N and instead of M −→a M0 in T(N) we simply writeM −→M0.

LetN = (P, T, F, L, λ) be a labelled Petri net. Without loss of generality assume that L={1, . . . , n} for somen >0. We construct an unlabelled Petri net N0 = (P0, T0, F0) and a mapping ψ : (P N0) (P0 N0) such that T\(N)M1 and T(N0)ψ(M1) are isomorphic unlabelled transition systems for any markingM1 ofN. Let us recall thatT\(N)M1 is the tran- sition system restricted to markings reachable from M1 and T(N0)ψ(M1) is restricted to markings reachable from ψ(M1) — see Definition 2. The netN0 is defined as follows:

P0=P ∪ {pkt |t∈T 0≤k≤λ(t)} ∪ {pc} ∪ {dk|0≤k≤n}

T0={tin, tout |t∈T} ∪ {lkt |t∈T 0≤k < λ(t)} ∪ {lk|0≤k≤n}

F0={(p, tin)|(p, t)∈F} ∪ {(tout, p)|(t, p)∈F} ∪ {(tin, p0t),(p0t, tout)|t∈T} ∪

{(pkt, lkt),(ltk, pk+1t )|t∈T 0≤k < λ(t)} ∪ {(pc, tin),(tout, pc)|t∈T} ∪

{(pc, l0)} ∪ {(lk, dk),(dk, lk+1)|0≤k < n} ∪ {(ln, dn)}.

In this construction each transition t with input places p1, . . . , pk1 and output places q1, . . . , qk2 is transformed into a set of transitions shown in Figure 2. Now, we give the mapping ψ. Let M (P N0). Then ψ(M) :P0 N0 is defined by

ψ(M)(p) =





1 ifp=pc M(p) ifp∈P 0 otherwise.

Lemma 3. Let N = (P, T, F, L, λ) be a labelled Petri net and N0 = (P0, T0, F0) the unlabelled Petri net defined above. Then T\(N)M1 and T(N0)ψ(M1) are isomorphic unlabelled transition systems for any M1 [P N0].

Proof. Assume that T\(N)M1 = (S1,−→1) and T(N0)ψ(M1) = (S2,−→2).

Recall that S1 [P N0]∪ {rk(M,λ(t),M0) |M[tiM0 0 k≤ λ(t)} ∪ {dkM |M [P N0] 0 ≤k ≤n} and S2 [P0 N0]. We define a

Referencer

RELATEREDE DOKUMENTER

We give an algorithm list- ing the maximal independent sets in a graph in time proportional to these bounds (ignoring a polynomial factor), and we use this algorithm to

Chromatic Number in Time O(2.4023 n ) Using Maximal Independent Sets. Higher Dimensional

for = 0 is to store a subset of the keys in S and corresponding associated information in a data structure of m bits, trying to optimize the sum of weights.. of

We are able to show a linear (exactly m) upper bound for the monotone span program size of a function on m variables, that is known to have ((m=log m) 3 = 2 ) monotone

Universal families of hash functions [1], widely used in various areas of computer science (data structures, derandomization, cryptology), have the property, among other things,

In [1] we studied the equational theory of the max-plus algebra of the natural numbers N ∨ = (N, ∨, + , 0), and proved that not only its equational theory is not finitely based,

We show that the conjecture is true for every digraph which possesses a quasi-kernel of cardinality at most two and every kernel-perfect digraph, i.e., a digraph for which every

Notions of Σ-definable sets or relations generalise those of computable enumerable sets of natural numbers, and play a leading role in the spec- ification theory that is used in