skip to main content
10.1145/3294052.3319705acmconferencesArticle/Chapter ViewAbstractPublication PagespodsConference Proceedingsconference-collections
research-article

Reachability in Database-driven Systems with Numerical Attributes under Recency Bounding

Published:25 June 2019Publication History

ABSTRACT

A prominent research direction of the database theory community is to develop techniques for verification of database-driven systems operating over relational and numerical data. Along this line, we lift the framework of database manipulating systems \citeAbdullaAAMR-pods-16 which handle relational data to also accommodate numerical data and the natural order on them. We study an under-approximation called recency bounding under which the most basic verification problem --reachability, is decidable. Even under this under-approximation the reachability space is infinite in multiple dimensions -- owing to the unbounded sizes of the active domain, the unbounded numerical domain it has access to, and the unbounded length of the executions. We show that, nevertheless, reachability is ExpTime complete. Going beyond reachability to LTL model checking renders verification undecidable.

References

  1. Parosh Aziz Abdulla, C. Aiswarya, and Mohamed Faouzi Atig. 2017. Data Multi-Pushdown Automata. In CONCUR (LIPIcs), Vol. 85. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 38:1--38:17.Google ScholarGoogle Scholar
  2. P. A. Abdulla, M. F. Atig, G. Delzanno, and A. Podelski. 2013. Push-Down Automata with Gap-Order Constraints. In FSEN (LNCS), Vol. 8161. Springer, 199--216.Google ScholarGoogle Scholar
  3. Parosh Aziz Abdulla, C. Aiswarya, Mohamed Faouzi Atig, Marco Montali, and Othmane Rezine. 2016. Recency-Bounded Verification of Dynamic Database-Driven Systems. In PODS. ACM, 195--210.Google ScholarGoogle Scholar
  4. Parosh Aziz Abdulla, C. Aiswarya, Mohamed Faouzi Atig, Marco Montali, and Othmane Rezine. 2018. Complexity of Reachability for Data-Aware Dynamic Systems. In ACSD. IEEE Computer Society, 11--20.Google ScholarGoogle Scholar
  5. Babak Bagheri Hariri, Diego Calvanese, Giuseppe De Giacomo, Alin Deutsch, and Marco Montali. 2013. Verification of Relational Data-Centric Dynamic Systems with External Services. In PODS . Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Francesco Belardinelli, Alessio Lomuscio, and Fabio Patrizi. 2012. Verification of GSM-Based Artifact-Centric Systems through Finite Abstraction. In ICSOC (LNCS), Vol. 7636. Springer, 17--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Francesco Belardinelli, Alessio Lomuscio, and Fabio Patrizi. 2014. Verification of Agent-Based Artifact Systems. J. Artif. Intell. Res., Vol. 51 (2014), 333--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mikolaj Boja'n czyk, Anca Muscholl, Thomas Schwentick, and Luc Segoufin. 2009. Two-variable logic on data trees and XML reasoning. J. ACM, Vol. 56, 3 (2009), 13:1--13:48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Mikolaj Bojanczyk, Anca Muscholl, Thomas Schwentick, Luc Segoufin, and Claire David. 2006. Two-Variable Logic on Words with Data. In LICS. 7--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Mikolaj Bojanczyk, Luc Segoufin, and Szymon Torunczyk. 2013. Verification of Database-Driven Systems via Amalgamation. In PODS .Google ScholarGoogle Scholar
  11. B. Bollig, A. Cyriac, P. Gastin, and K. Narayan Kumar. 2012. Model Checking Languages of Data Words. In FoSSaCS'12 (LNCS), Vol. 7213. Springer, 391--405. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Diego Calvanese, Giuseppe De Giacomo, and Marco Montali. 2013. Foundations of Data-Aware Process Analysis: A Database Theory Perspective. In PODS . ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Diego Calvanese, Giuseppe De Giacomo, Marco Montali, and Fabio Patrizi. 2018. First-order (?) -calculus over generic transition systems and applications to the situation calculus. Inf. Comput., Vol. 259, 3 (2018), 328--347.Google ScholarGoogle ScholarCross RefCross Ref
  14. Diego Calvanese, Giorgio Delzanno, and Marco Montali. 2015. Verification of Relational Multiagent Systems with Data Types. In AAAI. AAAIP. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Diego Calvanese, Marco Montali, Fabio Patrizi, and Michele Stawowy. 2016. Plan Synthesis for Knowledge and Action Bases. In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9--15 July 2016, Subbarao Kambhampati (Ed.). IJCAI/AAAI Press, 1022--1029. http://www.ijcai.org/Abstract/16/149 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lorenzo Clemente and Slawomir Lasota. 2015. Reachability Analysis of First-order Definable Pushdown Systems. In CSL 2015, (LIPIcs), Vol. 41. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 244--259.Google ScholarGoogle Scholar
  17. E. Damaggio, A. Deutsch, and V. Vianu. 2011. Artifact Systems with Data Dependencies and Arithmetic. In ICDT . Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Giuseppe De Giacomo, Riccardo De Masellis, and Riccardo Rosati. 2012. Verification of Conjunctive Artifact-Centric Services. Int. J. Cooperative Inf. Syst., Vol. 21, 2 (2012), 111--140.Google ScholarGoogle ScholarCross RefCross Ref
  19. Stéphane Demri and Ranko Lazi?. 2009. LTL with the freeze quantifier and register automata. ACM TOCL, Vol. 10, 3 (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Alin Deutsch, Richard Hull, Fabio Patrizi, and Victor Vianu. 2009. Automatic verification of data-centric business processes. In ICDT . Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Deutsch, Y. Li, and V. Vianu. 2016. Verification of Hierarchical Artifact Systems. In Proc. of PODS. ACM Press, 179--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Jö rg Hoffmann, Piergiorgio Bertoli, Malte Helmert, and Marco Pistore. 2009. Message-Based Web Service Composition, Integrity Constraints, and Planning under Uncertainty: A New Connection. J. Artif. Intell. Res., Vol. 35 (2009), 49--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Yuliang Li, Alin Deutsch, and Victor Vianu. 2017. VERIFAS: A Practical Verifier for Artifact Systems. Proc. VLDB Endow., Vol. 11, 3 (Nov. 2017), 283--296. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Riccardo De Masellis, Chiara Di Francescomarino, Chiara Ghidini, Marco Montali, and Sergio Tessaris. 2017. Add Data into Business Process Verification: Bridging the Gap between Theory and Practice. In AAAI . Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Shaz Qadeer and Jakob Rehof. 2005. Context-Bounded Model Checking of Concurrent Software. In TACAS. Springer Berlin Heidelberg, 93--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Victor Vianu. 2009. Automatic Verification of Database-Driven Systems: a New Frontier. In Proc. of ICDT . 1--13.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Reachability in Database-driven Systems with Numerical Attributes under Recency Bounding

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          PODS '19: Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems
          June 2019
          494 pages
          ISBN:9781450362276
          DOI:10.1145/3294052

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 June 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          PODS '19 Paper Acceptance Rate29of87submissions,33%Overall Acceptance Rate642of2,707submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader