Exploiting Adjoints in Property Directed Reachability Analysis

dc.contributor.authorKori, Mayuko
dc.contributor.authorAscari, Flavio
dc.contributor.authorBonchi, Filippo
dc.contributor.authorBruni, Roberto
dc.contributor.authorGori, Roberta
dc.contributor.authorHasuo, Ichiro
dc.date.accessioned2026-02-05T14:08:02Z
dc.date.available2026-02-05T14:08:02Z
dc.date.issued2023-07
dc.description.abstractWe formulate, in lattice-theoretic terms, two novel algorithms inspired by Bradley’s property directed reachability algorithm. For finding safe invariants or counterexamples, the first algorithm exploits over-approximations of both forward and backward transition relations, expressed abstractly by the notion of adjoints. In the absence of adjoints, one can use the second algorithm, which exploits lower sets and their principals. As a notable example of application, we consider quantitative reachability problems for Markov Decision Processes.
dc.description.versionpublisheddeu
dc.identifier.arxiv2307.02817
dc.identifier.doi10.1007/978-3-031-37703-7_3
dc.identifier.ppn1960568477
dc.identifier.urihttps://kops.uni-konstanz.de/handle/123456789/76133
dc.language.isoeng
dc.rightsAttribution 4.0 International
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subject.ddc004
dc.titleExploiting Adjoints in Property Directed Reachability Analysiseng
dc.typeINPROCEEDINGS
dspace.entity.typePublication
kops.citation.bibtex
@inproceedings{Kori2023-07Explo-76133,
  title={Exploiting Adjoints in Property Directed Reachability Analysis},
  year={2023},
  doi={10.1007/978-3-031-37703-7_3},
  number={13965},
  isbn={978-3-031-37702-0},
  address={Cham},
  publisher={Springer},
  series={Lecture Notes in Computer Science (LNCS)},
  booktitle={Computer Aided Verification : 35th International Conference, CAV 2023, Proceedings, Part II},
  pages={41--63},
  editor={Enea, Constantin and Lal, Akash},
  author={Kori, Mayuko and Ascari, Flavio and Bonchi, Filippo and Bruni, Roberto and Gori, Roberta and Hasuo, Ichiro}
}
kops.citation.iso690KORI, Mayuko, Flavio ASCARI, Filippo BONCHI, Roberto BRUNI, Roberta GORI, Ichiro HASUO, 2023. Exploiting Adjoints in Property Directed Reachability Analysis. Computer Aided Verification : 35th International Conference, CAV 2023. Paris, France, 17. Juli 2023 - 22. Juli 2023. In: ENEA, Constantin, Hrsg., Akash LAL, Hrsg.. Computer Aided Verification : 35th International Conference, CAV 2023, Proceedings, Part II. Cham: Springer, 2023, S. 41-63. Lecture Notes in Computer Science (LNCS). 13965. ISBN 978-3-031-37702-0. Verfügbar unter: doi: 10.1007/978-3-031-37703-7_3deu
kops.citation.iso690KORI, Mayuko, Flavio ASCARI, Filippo BONCHI, Roberto BRUNI, Roberta GORI, Ichiro HASUO, 2023. Exploiting Adjoints in Property Directed Reachability Analysis. Computer Aided Verification : 35th International Conference, CAV 2023. Paris, France, Jul 17, 2023 - Jul 22, 2023. In: ENEA, Constantin, ed., Akash LAL, ed.. Computer Aided Verification : 35th International Conference, CAV 2023, Proceedings, Part II. Cham: Springer, 2023, pp. 41-63. Lecture Notes in Computer Science (LNCS). 13965. ISBN 978-3-031-37702-0. Available under: doi: 10.1007/978-3-031-37703-7_3eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/76133">
    <dc:contributor>Bruni, Roberto</dc:contributor>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dc:contributor>Hasuo, Ichiro</dc:contributor>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/76133/1/Kori_2-c6kjw8bzv3hr7.pdf"/>
    <dcterms:title>Exploiting Adjoints in Property Directed Reachability Analysis</dcterms:title>
    <dc:language>eng</dc:language>
    <dcterms:issued>2023-07</dcterms:issued>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/76133"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2026-02-05T14:08:02Z</dcterms:available>
    <dc:contributor>Gori, Roberta</dc:contributor>
    <dc:creator>Ascari, Flavio</dc:creator>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:creator>Bruni, Roberto</dc:creator>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2026-02-05T14:08:02Z</dc:date>
    <dc:contributor>Bonchi, Filippo</dc:contributor>
    <dc:rights>Attribution 4.0 International</dc:rights>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:creator>Kori, Mayuko</dc:creator>
    <dc:creator>Gori, Roberta</dc:creator>
    <dcterms:abstract>We formulate, in lattice-theoretic terms, two novel algorithms inspired by Bradley’s property directed reachability algorithm. For finding safe invariants or counterexamples, the first algorithm exploits over-approximations of both forward and backward transition relations, expressed abstractly by the notion of adjoints. In the absence of adjoints, one can use the second algorithm, which exploits lower sets and their principals. As a notable example of application, we consider quantitative reachability problems for Markov Decision Processes.</dcterms:abstract>
    <dcterms:rights rdf:resource="http://creativecommons.org/licenses/by/4.0/"/>
    <dc:creator>Hasuo, Ichiro</dc:creator>
    <dc:contributor>Kori, Mayuko</dc:contributor>
    <dc:contributor>Ascari, Flavio</dc:contributor>
    <dc:creator>Bonchi, Filippo</dc:creator>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/76133/1/Kori_2-c6kjw8bzv3hr7.pdf"/>
  </rdf:Description>
</rdf:RDF>
kops.conferencefieldComputer Aided Verification : 35th International Conference, CAV 2023, 17. Juli 2023 - 22. Juli 2023, Paris, Francedeu
kops.date.conferenceEnd2023-07-22
kops.date.conferenceStart2023-07-17
kops.description.openAccessopenaccessbookpart
kops.flag.knbibliographyfalse
kops.identifier.nbnurn:nbn:de:bsz:352-2-c6kjw8bzv3hr7
kops.location.conferenceParis, France
kops.sourcefieldENEA, Constantin, Hrsg., Akash LAL, Hrsg.. <i>Computer Aided Verification : 35th International Conference, CAV 2023, Proceedings, Part II</i>. Cham: Springer, 2023, S. 41-63. Lecture Notes in Computer Science (LNCS). 13965. ISBN 978-3-031-37702-0. Verfügbar unter: doi: 10.1007/978-3-031-37703-7_3deu
kops.sourcefield.plainENEA, Constantin, Hrsg., Akash LAL, Hrsg.. Computer Aided Verification : 35th International Conference, CAV 2023, Proceedings, Part II. Cham: Springer, 2023, S. 41-63. Lecture Notes in Computer Science (LNCS). 13965. ISBN 978-3-031-37702-0. Verfügbar unter: doi: 10.1007/978-3-031-37703-7_3deu
kops.sourcefield.plainENEA, Constantin, ed., Akash LAL, ed.. Computer Aided Verification : 35th International Conference, CAV 2023, Proceedings, Part II. Cham: Springer, 2023, pp. 41-63. Lecture Notes in Computer Science (LNCS). 13965. ISBN 978-3-031-37702-0. Available under: doi: 10.1007/978-3-031-37703-7_3eng
kops.title.conferenceComputer Aided Verification : 35th International Conference, CAV 2023
relation.isAuthorOfPublication0c59eb08-08c1-4e0a-9097-b41f3d89a2d0
relation.isAuthorOfPublication.latestForDiscovery0c59eb08-08c1-4e0a-9097-b41f3d89a2d0
source.bibliographicInfo.fromPage41
source.bibliographicInfo.seriesNumber13965
source.bibliographicInfo.toPage63
source.contributor.editorEnea, Constantin
source.contributor.editorLal, Akash
source.identifier.isbn978-3-031-37702-0
source.publisherSpringer
source.publisher.locationCham
source.relation.ispartofseriesLecture Notes in Computer Science (LNCS)
source.titleComputer Aided Verification : 35th International Conference, CAV 2023, Proceedings, Part II

Dateien

Originalbündel

Gerade angezeigt 1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
Kori_2-c6kjw8bzv3hr7.pdf
Größe:
518.46 KB
Format:
Adobe Portable Document Format
Kori_2-c6kjw8bzv3hr7.pdf
Kori_2-c6kjw8bzv3hr7.pdfGröße: 518.46 KBDownloads: 7