Abstract
In the model checking domain, the state explosion problem is the core issue. The cause is usually the sheer size of the model or the cardinality of tokens in the initial state. For the latter, which we call token-scaling models, we propose an under-approximation for reachable states. The idea is to freeze tokens in the initial state (i.e. they are not used for firing transitions) and thus reducing the state space. If in the reduced state space a witness path is found, then the witness path can also be executed in the original state space. This method preserves existential temporal properties (ECTL\(^*\)) using a simulation relation between the reduced and the original state space. Since the cardinality of the initial marking varies from only a few tokens to multi-digit numbers of tokens, we apply heuristics to compute the number of tokens that should be frozen. We implemented the new method in the explicit model checker LoLA 2. The experiments, done on the model checking contest benchmark, show that this method can speed up the model checking process and verify additional queries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Berthelot, G., Terrat, R.: Petri nets theory for the correctness of protocols. In: Carl, A. Sunshine (ed.) Protocol Specification, Testing and Verification, Proceedings of the IFIP WG6.1 Second International Workshop on Protocol Specification, Testing and Verification, Idyllwild, CA, USA, 17–20 May, 1982, pp. 325–342. North-Holland (1982)
Bønneland, F., Dyhr, J., Jensen, P.G., Johannsen, M., Srba, J.: Simplification of CTL formulae for efficient model checking of petri nets. In: Khomenko, V., Roux, O.H. (eds.) PETRI NETS 2018. LNCS, vol. 10877, pp. 143–163. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91268-4_8
Clarke, E.M., Henzinger, T.A., Veith, H., Bloem, R.: Handbook of Model Checking. Springer, Cham (2018)
Clarke, E.M., Klieber, W., Nováček, M., Zuliani, P.: Model checking and the state explosion problem. In: Meyer, B., Nordio, M. (eds.) LASER 2011. LNCS, vol. 7682, pp. 1–30. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35746-6_1
Amparore, E., et al.: Presentation of the 9th edition of the model checking contest. In: Beyer, D., Huisman, M., Kordon, F., Steffen, B. (eds.) TACAS 2019. LNCS, vol. 11429, pp. 50–68. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17502-3_4
Napione, L., et al.: On the use of stochastic petri nets in the analysis of signal transduction pathways for angiogenesis process. In: Degano, P., Gorrieri, R. (eds.) CMSB 2009. LNCS, vol. 5688, pp. 281–295. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03845-7_19
Godefroid, P., Wolper, P.: A partial approach to model checking. Inf. Comput. 110(2), 305–326 (1994)
Grumberg, O., Long, D.E.: Model checking and modular verification. In: Baeten, J.C.M., Groote, J.F. (eds.) CONCUR 1991. LNCS, vol. 527, pp. 250–265. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-54430-5_93
Heiner, M.: GPPP (2016). https://mcc.lip6.fr/pdf/GPPP-form.pdf. Accessed 15 Aug 2020
Kordon, F.: Robot Manipulation (2017). https://mcc.lip6.fr/pdf/RobotManipulation-form.pdf. Accessed 08 Dec 2020
Liebke, T., Wolf, K.: Taking some burden off an explicit CTL model checker. In: Donatelli, S., Haar, S. (eds.) PETRI NETS 2019. LNCS, vol. 11522, pp. 321–341. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21571-2_18
Milner, R.: Communication and Concurrency. Prentice Hall international series in computer science. Prentice Hall, New York (1989)
Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77(4), 541–580 (1989)
Peled, D.: All from one, one for all: on model checking using representatives. In: Courcoubetis, C. (ed.) CAV 1993. LNCS, vol. 697, pp. 409–423. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-56922-7_34
Schmidt, K.: Lola wird pfadfinder. In: Desel, J., Oberweis, A., eds, 6. Workshop Algorithmen und Werkzeuge für Petrinetze (AWPN’99), Frankfurt, Germany, October 11–12, 1999, volume 26 of CEUR Workshop Proceedings. CEUR-WS.org (1999)
Schmidt, K.: How to calculate symmetries of petri nets. Acta Inf. 36(7), 545–590 (2000)
Valmari, A.: Stubborn sets for reduced state space generation. In: Rozenberg, G. (ed.) ICATPN 1989. LNCS, vol. 483, pp. 491–515. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-53863-1_36
Wimmel, H., Wolf, K.: Applying CEGAR to the Petri net state equation. Logical Meth. Comput. Sci. 8(3) (2012)
Wolf, K.: Petri net model checking with LoLA 2. In: Khomenko, V., Roux, O.H. (eds.) PETRI NETS 2018. LNCS, vol. 10877, pp. 351–362. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91268-4_18
Wolf, K.: Portfolio management in explicit model checking. In: Köhler-Bußmeier, M., Kindler, E., Rölke, H. (eds.) Proceedings of the International Workshop on Petri Nets and Software Engineering co-located with 41st International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2020), Paris, France, June 24, 2020 (due to COVID-19: virtual conference), vol. 2651 of CEUR Workshop Proceedings, pp. 10–28. CEUR-WS.org (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer-Verlag GmbH Germany, part of Springer Nature
About this chapter
Cite this chapter
Liebke, T., Wolf, K. (2022). Using Approximation for the Verification of Token-Scaling Models. In: Koutny, M., Kordon, F., Moldt, D. (eds) Transactions on Petri Nets and Other Models of Concurrency XVI. Lecture Notes in Computer Science(), vol 13220. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-65303-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-662-65303-6_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-65302-9
Online ISBN: 978-3-662-65303-6
eBook Packages: Computer ScienceComputer Science (R0)