Skip to main content

Using Approximation for the Verification of Token-Scaling Models

  • Chapter
  • First Online:
Transactions on Petri Nets and Other Models of Concurrency XVI

Part of the book series: Lecture Notes in Computer Science ((TOPNOC,volume 13220))

  • 208 Accesses

Abstract

In the model checking domain, the state explosion problem is the core issue. The cause is usually the sheer size of the model or the cardinality of tokens in the initial state. For the latter, which we call token-scaling models, we propose an under-approximation for reachable states. The idea is to freeze tokens in the initial state (i.e. they are not used for firing transitions) and thus reducing the state space. If in the reduced state space a witness path is found, then the witness path can also be executed in the original state space. This method preserves existential temporal properties (ECTL\(^*\)) using a simulation relation between the reduced and the original state space. Since the cardinality of the initial marking varies from only a few tokens to multi-digit numbers of tokens, we apply heuristics to compute the number of tokens that should be frozen. We implemented the new method in the explicit model checker LoLA 2. The experiments, done on the model checking contest benchmark, show that this method can speed up the model checking process and verify additional queries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Berthelot, G., Terrat, R.: Petri nets theory for the correctness of protocols. In: Carl, A. Sunshine (ed.) Protocol Specification, Testing and Verification, Proceedings of the IFIP WG6.1 Second International Workshop on Protocol Specification, Testing and Verification, Idyllwild, CA, USA, 17–20 May, 1982, pp. 325–342. North-Holland (1982)

    Google Scholar 

  2. Bønneland, F., Dyhr, J., Jensen, P.G., Johannsen, M., Srba, J.: Simplification of CTL formulae for efficient model checking of petri nets. In: Khomenko, V., Roux, O.H. (eds.) PETRI NETS 2018. LNCS, vol. 10877, pp. 143–163. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91268-4_8

    Chapter  MATH  Google Scholar 

  3. Clarke, E.M., Henzinger, T.A., Veith, H., Bloem, R.: Handbook of Model Checking. Springer, Cham (2018)

    Book  Google Scholar 

  4. Clarke, E.M., Klieber, W., Nováček, M., Zuliani, P.: Model checking and the state explosion problem. In: Meyer, B., Nordio, M. (eds.) LASER 2011. LNCS, vol. 7682, pp. 1–30. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35746-6_1

    Chapter  Google Scholar 

  5. Amparore, E., et al.: Presentation of the 9th edition of the model checking contest. In: Beyer, D., Huisman, M., Kordon, F., Steffen, B. (eds.) TACAS 2019. LNCS, vol. 11429, pp. 50–68. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17502-3_4

  6. Napione, L., et al.: On the use of stochastic petri nets in the analysis of signal transduction pathways for angiogenesis process. In: Degano, P., Gorrieri, R. (eds.) CMSB 2009. LNCS, vol. 5688, pp. 281–295. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03845-7_19

  7. Godefroid, P., Wolper, P.: A partial approach to model checking. Inf. Comput. 110(2), 305–326 (1994)

    Article  MathSciNet  Google Scholar 

  8. Grumberg, O., Long, D.E.: Model checking and modular verification. In: Baeten, J.C.M., Groote, J.F. (eds.) CONCUR 1991. LNCS, vol. 527, pp. 250–265. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-54430-5_93

    Chapter  Google Scholar 

  9. Heiner, M.: GPPP (2016). https://mcc.lip6.fr/pdf/GPPP-form.pdf. Accessed 15 Aug 2020

  10. Kordon, F.: Robot Manipulation (2017). https://mcc.lip6.fr/pdf/RobotManipulation-form.pdf. Accessed 08 Dec 2020

  11. Liebke, T., Wolf, K.: Taking some burden off an explicit CTL model checker. In: Donatelli, S., Haar, S. (eds.) PETRI NETS 2019. LNCS, vol. 11522, pp. 321–341. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21571-2_18

    Chapter  Google Scholar 

  12. Milner, R.: Communication and Concurrency. Prentice Hall international series in computer science. Prentice Hall, New York (1989)

    Google Scholar 

  13. Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77(4), 541–580 (1989)

    Article  Google Scholar 

  14. Peled, D.: All from one, one for all: on model checking using representatives. In: Courcoubetis, C. (ed.) CAV 1993. LNCS, vol. 697, pp. 409–423. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-56922-7_34

    Chapter  Google Scholar 

  15. Schmidt, K.: Lola wird pfadfinder. In: Desel, J., Oberweis, A., eds, 6. Workshop Algorithmen und Werkzeuge für Petrinetze (AWPN’99), Frankfurt, Germany, October 11–12, 1999, volume 26 of CEUR Workshop Proceedings. CEUR-WS.org (1999)

    Google Scholar 

  16. Schmidt, K.: How to calculate symmetries of petri nets. Acta Inf. 36(7), 545–590 (2000)

    Article  MathSciNet  Google Scholar 

  17. Valmari, A.: Stubborn sets for reduced state space generation. In: Rozenberg, G. (ed.) ICATPN 1989. LNCS, vol. 483, pp. 491–515. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-53863-1_36

    Chapter  Google Scholar 

  18. Wimmel, H., Wolf, K.: Applying CEGAR to the Petri net state equation. Logical Meth. Comput. Sci. 8(3) (2012)

    Google Scholar 

  19. Wolf, K.: Petri net model checking with LoLA 2. In: Khomenko, V., Roux, O.H. (eds.) PETRI NETS 2018. LNCS, vol. 10877, pp. 351–362. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91268-4_18

    Chapter  Google Scholar 

  20. Wolf, K.: Portfolio management in explicit model checking. In: Köhler-Bußmeier, M., Kindler, E., Rölke, H. (eds.) Proceedings of the International Workshop on Petri Nets and Software Engineering co-located with 41st International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2020), Paris, France, June 24, 2020 (due to COVID-19: virtual conference), vol. 2651 of CEUR Workshop Proceedings, pp. 10–28. CEUR-WS.org (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Karsten Wolf .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer-Verlag GmbH Germany, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Liebke, T., Wolf, K. (2022). Using Approximation for the Verification of Token-Scaling Models. In: Koutny, M., Kordon, F., Moldt, D. (eds) Transactions on Petri Nets and Other Models of Concurrency XVI. Lecture Notes in Computer Science(), vol 13220. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-65303-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-65303-6_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-65302-9

  • Online ISBN: 978-3-662-65303-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics