Loading...
Search for: temporal-logic
0.005 seconds

    Linear temporal logic of constraint automata

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 972-975 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Navidpour, S ; Izadi, M ; Sharif University of Technology
    2008
    Abstract
    Constraint automata are formalisms to describe the behavior and possible data flow in coordination models. In this paper we introduce a linear time temporal logic, called temporal logic of steps (TLS), for specifying the executions of constraint automata. TLS is the first attempt in presenting a linear temporal logic for constraint automata. Having TLS in hand, we are able to design model checking algorithms for verification of concurrent systems modeled by constraint automata. © 2008 Springer-Verlag  

    Automata based model checking for reo connectors

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 15 April 2009 through 17 April 2009 ; Volume 5961 LNCS , 2010 , Pages 260-275 ; 03029743 (ISSN) ; 3642116221 (ISBN) Bonsangue, M. M ; Izadi, M ; Sharif University of Technology
    Abstract
    Reo is a connector language for the exogenous composition and orchestration of components in a software system. An operational semantics of Reo connectors can be given in terms of Büchi automata over a suitable alphabet of records, capturing both synchronization and context dependency requirements. In this paper, we define an action based linear time temporal logic for expressing properties of Reo connectors. Formulas can be synthesized into Büchi automata representing Reo connectors, thus leading to an automata based model checking algorithm. By generalizing standard automata based model checking algorithms for linear time temporal logic, we give an efficient on-the-fly algorithm for the... 

    Model checking of component based software using compositional reductions

    , Article International Journal of Software Engineering and Knowledge Engineering ; Volume 18, Issue 5 , 2008 , Pages 683-712 ; 02181940 (ISSN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    World Scientific Publishing Co. Pte Ltd  2008
    Abstract
    A component-based computing system consists of two main parts: a set of components and a coordination subsystem. Reo is an exogenous coordination language for compositional construction of the coordination subsystem. Constraint automaton has been defined as the operational semantics of Reo. The main goal of this paper is to prepare a model checking method for verifying linear time temporal properties of component-based systems whose coordinating subsystems are modeled by Reo and components are modeled by labeled transition systems. For this purpose, we introduce modified definitions of constraint automata and their composition operators by which, every constraint automaton can be considered... 

    A Security Model based on Modal Description Logic for Semantic Web

    , M.Sc. Thesis Sharif University of Technology Faghihekhorasani, Fathiyeh (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    With the growth of semantic-aware environments, such as semantic web, new security requirements are imposed in access control procedures. An access control model for semantic web should take the semantic relationships (in three scopes of subject, object and action) into account in its access decisions. Considering the advantages of logic based models and description logic foundation of semantic web, we use the description logic as a basis to propose access control models in this environment. On the other hand, in some applications, such as e-banking environments, policy definition with the constraint(s) based on previous users’ accesses might be crucial. To consider this aspect, in this... 

    A Buchi automata based model checking framework for reo connectors

    , Article Proceedings of the ACM Symposium on Applied Computing, 26 March 2012 through 30 March 2012 ; March , 2012 , Pages 1536-1543 ; 9781450308571 (ISBN) Keshishzadeh, S ; Izadi, M ; Movaghar, A ; Sharif University of Technology
    Abstract
    Reo is an exogenous coordination language for synchronizing components participating in a component-based system. In this paper we provide a verification framework for model checking of Reo connectors. The proposed framework applies an extension of Büchi automata as the operational semantic model for Reo connectors and a record-based extension of linear time temporal logic (LTL) for expressing properties. Several aspects of Reo connectors, specially synchronization, context dependencies and fairness constraints, are addressed by this model checker due to its supported underlying model. The main ideas behind this implementation are to introduce a symbolic representation for the main elements... 

    Incorporating Degree of Belief, Desire and Capability into Propositional Belief Desire and Intention Logic

    , M.Sc. Thesis Sharif University of Technology Salimi, Babak (Author) ; Ardeshir, Mohammad (Supervisor)
    Abstract
    Nowadays, BDI architecture is of the most well known agent’s architectures. BDI architecture or the architecture in which the system is viewed as rational agents based on the attitudes of belief, desire and intention represents an abstraction of human deliberation based on a theory of rational action in the human cognition process. BDI logic introduced by Rao and Georgeff have been widely used as the theoretical basis of specification and implementation of rational agents. BDI logic is limited to deal with crisp assertion, while the assertions encountered in real world are not precise and thus cannot be treated simply by using yes or no. Moreover, In order to obtain more human like agents we... 

    Deductive Verification of Temporal Properties of Agent-based Systems

    , M.Sc. Thesis Sharif University of Technology Sahebolamri, Arash (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    In this thesis, we first study agent-based systems, and briefly review methods to formally describe such systems. One of these methods is theMetatem language. This language uses a form of linear-time temporal logic to describe the behavior of agents over time. We then introduce modal logics, and argue that they are well suited to describing agents’ knowledge in agent-based systems. We also introduceModal Logic of Knowledge, a combination of linear-time temporal and modal logics, using which temporal behavior of multi agent systems, along with knowledge of agents can be specified.Then, we review and implement a tableau based theorem-proving algorithm for this logic, which can be used as a... 

    Using on-the-fly Translation of Temporal Logic to Automata in Model Checking

    , M.Sc. Thesis Sharif University of Technology Salehi Ghahfarokhi, Khayyam (Author) ; Ardeshir, Mohammad (Supervisor) ; Izadi, Mohammad (Supervisor)
    Abstract
    According to increasing computer systems, needs for verification of such systems with respect to desirable properties is critical. Model checking is one of the best methods of verification. Different methods have been proposed for model checking. The most efficient of these methods is automata-theoretic approach. In this approach, formal specification of desirable property, specified by formula in temporal logics, is translated to corresponding automaton. If the system model is expressed as automaton, the problem of model checking is then reduced to a problem of automata-theory. The question is the following. Are all the computations of the corresponding automaton accepted by the automaton... 

    A temporal description logic based access control model for expressing history constrained policies in semantic web

    , Article Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009, 20 July 2009 through 22 July 2009, London ; 2009 , Pages 142-149 ; 9780769537429 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2009
    Abstract
    An access control model for Semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering the benefits of logic-based models and the description logic foundation of Semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics (TL-ALCF). This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses. The specification of each component of the model as well as the approach to define history... 

    GTHBAC: A generalized temporal history based access control model

    , Article Telecommunication Systems ; Volume 45, Issue 2-3 , 2010 , Pages 111-125 ; 10184864 (ISSN) Noorollahi Ravari, A ; Haadi Jafarian, J ; Amini, M ; Jalili, R ; Sharif University of Technology
    Abstract
    Time plays a crucial role in access control for new computing environments, which is not supported in traditional access control models. In this paper, we propose a Generalized Temporal History Based Access Control (GTHBAC) model, aimed at integrating history-based constraints along with a generic access control model. GTHBAC enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over users' history of accesses. Due to different application needs, GTHBAC uses two different time schemes, i.e., real time and logical time, in its authorization rules. A formal semantics for temporal authorizations is provided, and conflicting... 

    Specification of history based constraints for access control in conceptual level

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 17 December 2010 through 19 December 2010, Gandhinagar ; Volume 6503 LNCS , 2010 , Pages 186-200 ; 03029743 (ISSN) ; 9783642177132 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2010
    Abstract
    An access control model for Semantic Web should take the semantic relationships among the entities, defined in the abstract conceptual level (i.e., ontology level), into account. Authorization and policy specification based on a logical model let us infer implicit security policies from the explicit ones based on the defined semantic relationships in the domains of subjects, objects, and actions. In this paper, we propose a logic based access control model for specification and inference of history-constrained access policies in conceptual level of Semantic Web. The proposed model (named TDLBAC-2) enables authorities to state policy rules based on the history of users' accesses using a... 

    Symbolic checking of fuzzy CTL on fuzzy program graph

    , Article Acta Informatica ; Volume 56, Issue 1 , Februray , 2019 , Pages 1-33 ; 00015903 (ISSN) Ebrahimi, M ; Sotudeh, G ; Movaghar, A ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    Few fuzzy temporal logics and modeling formalisms are developed such that their model checking is both effective and efficient. State-space explosion makes model checking of fuzzy temporal logics inefficient. That is because either the modeling formalism itself is not compact, or the verification approach requires an exponentially larger yet intermediate representation of the modeling formalism. To exemplify, Fuzzy Program Graph (FzPG) is a very compact, and powerful formalism to model fuzzy systems; yet, it is required to be translated into an equal Fuzzy Kripke model with an exponential blow-up should it be formally verified. In this paper, we introduce Fuzzy Computation Tree Logic (FzCTL)... 

    Compositional failure-based equivalence of constraint automata

    , Article Electronic Notes in Theoretical Computer Science ; Volume 250, Issue 1 , 2009 , Pages 105-122 ; 15710661 (ISSN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    2009
    Abstract
    Reo is a coordination language for modeling component connectors of component-based computing systems. Constraint automaton, as an extension of finite automaton, has been proposed as the operational semantics of Reo. In this paper, we introduce an extended definition of constraint automaton by which, every constraint automaton can be considered as a labeled transition system and each labeled transition system can be translated into a constraint automaton. We show that failure-based equivalences CFFD and NDFD are congruences with respect to composition of constraint automata using their join (production) and hiding operators. Based on these congruency results and by considering the temporal... 

    Symbolic checking of fuzzy CTL on fuzzy program graph

    , Article Acta Informatica ; Volume 56, Issue 1 , 2019 ; 00015903 (ISSN) Ebrahimi, M ; Sotudeh, G ; Movaghar, A ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    Few fuzzy temporal logics and modeling formalisms are developed such that their model checking is both effective and efficient. State-space explosion makes model checking of fuzzy temporal logics inefficient. That is because either the modeling formalism itself is not compact, or the verification approach requires an exponentially larger yet intermediate representation of the modeling formalism. To exemplify, Fuzzy Program Graph (FzPG) is a very compact, and powerful formalism to model fuzzy systems; yet, it is required to be translated into an equal Fuzzy Kripke model with an exponential blow-up should it be formally verified. In this paper, we introduce Fuzzy Computation Tree Logic (FzCTL)... 

    An efficient model checking algorithm for a fragment of μ-calculus

    , Article 17th International Conference on Software Engineering and Knowledge Engineering, SEKE 2005, Taipei, 14 July 2005 through 16 July 2005 ; 2005 , Pages 392-395 ; 9781627486590 (ISBN) Izadi, M ; MOVAGHAR RAHIMABADI, A. M ; Sharif University of Technology
    2005
    Abstract
    Model checking is a formal method for verifying finite state systems properties. μ-calculus is a very expressive fix point logic capable of specifying a wide range of properties of finite state, reactive and concurrent systems. In this paper, we present a new model checking algorithm for linear and a fragment of indexed modal μ - calculus. This algorithm is based on the method of characterization of fixed point temporal logics formulae using automata. We use first recurrence automata for this purpose. Our algorithm is linear time on the size of the system model. The main contributions of this work are the efficiency of the algorithm and the first use of first recurrence automata for μ... 

    Model Checking of Real-time Coordination Systems

    , M.Sc. Thesis Sharif University of Technology Kazemi, Mahmoud (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    The main goal of this thesis is to verify real-time properties of timed coordinated systems specified by timed-Reo circuits using the model checking techniqe. We use Timed Buchi Automata of Records (TBAR) as the semantics of timed-Reo. The model checking is done by converting Timed Buchi Automata of Records to an extension of Timed Automata that are usingas input of UPPAAL tool. We introduce a writer-automaton, which is synchronous with the desired Timed Automata, for initializing input ports. A tool that transforms Timed Buchi Automata of Records to UPPAAL Timed Automata has been implemented. Finally, two model checking case studies are examined by usingof our implemented tool over UPPAAL  

    Actor-based Timing Analysis in Automotive Systems

    , M.Sc. Thesis Sharif University of Technology Khoshechin Jorshari, Mohammad Hossein (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    Meeting timing constraints is crucial for the correct behavior of embedded systems in modern vehicles. In the automotive domain, TADL2 Timing constraints are widely used and accepted standards for repetitive and critical timing requirements. However, ensuring these constraints in modern automotive systems, which encompass over 150 Electronic Control Units (ECUs), is challenging due to the increased complexity of automotive systems. Previous work proposed formal frameworks for specifying and verifying timing constraints, mostly based on timed automata, Time(d) Petri Nets, and TCTL logic for specification, which are the most prominent formalisms in the timed system's domain. They used UPPAAL...