Heuristics for the State Space Division

نویسنده

  • T. Poch
چکیده

All model checkers suffer from the state space explosion. The distribution of the task among several machines is a technique which adresses this problem. The key issue of a distributed checker are the rules for assigning the states to the participating machines. The task of the checker is to visit all states of the system, which usually arise from the composition of smaller systems. This paper presents ideas how to use information obtained from the state spaces of the particular systems to predict suitable division of the composite state space among the participating machines. Introduction Growth of the computability power in the last years enabled practical use of model checking of software systems. The developer provides a model of the software and a set of properties that are believed to hold. Then the state space of the model is examined to prove that all properties really hold in all states the system can reach. This proof, or the counter example which is provided if some property does not hold, helps the developer to deliver the software sooner and cheaper. Unfortunately, the size of the state space is typically exponential to the size of the model description. This fact is referred as ‘state space explosion’. The state space explosion is a burning problem that limits usage of the model checking to relatively small tasks. One of the approaches that significantly decrease state space of the task are Behavior Protocols [1]. This is achieved by using component paradigm for splitting the model into independent parts. A Behavior Protocol is a regular expression that describes the behavior of a software component. The component implementation details are hidden during the checking of the whole application—what is reduced to the checking whether behavior protocols of used components are compliant. However, even the checking of Behavior Protocols compliance faces the exponential growth of number of states. Here, the distribution can help. As a Behavior Protocol is similar to a regular expression, it can be expressed by a finite state machine—FSM. We are interested in such state spaces that originate from a set of behavior protocols. Such state spaces—composite state spaces (CSS)—resemble the cartesian product of the original protocols’ FSMs—primitive state spaces (PSS). In the following text, the states (resp. edges) of the Composite State Space are refered to as composite states ( resp. edges). If there is no communication between components, the CSS is even equal to the cartesian product of PSSs. Having a system consisting of n components, a state is uniquely identified by an ncomponent vector. Each vector component identifies a state of one protocol. The entire state space can be thus enclosed in an n-dimensional cuboid. One of the key issues of a distributed checker is the set of rules for assigning the states to the participating machines. We can formulate this issue as assigning parts of the n-dimensional cuboid to the available machines. Other approaches are described in [2–5]. There are two requirements for the division. Requirement 1 Number of composite states assigned to each machine must be similar. Requirement 2 Number of composite edges crossing a machine boundary must be minimal. The task of splitting the cuboid can be split into two independent problems. First, split the cuboid into areas, and second, assign the areas to distinct machines. In the following text, the WDS'07 Proceedings of Contributed Papers, Part I, 52–57, 2007. ISBN 978-80-7378-023-4 © MATFYZPRESS

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

M1, M2, ..., Mk/G1, G2,..., Gk/l/N Queue with Buffer Division and Push-Out Schemes for ATM Networks (RESEARCH NOTE)

In this paper, loss probabilities and steady state probabilities of data packets for an asynchronous transfer mode (ATM) network are investigated under the buffer division and push-out schemes. Data packets are classified in classes k which arrive in Poisson fashion to the service facility and are served with general service rate under buffer division scheme, finite buffer space N is divided in...

متن کامل

Cell Division Approach for Search Space in Reinforcement Learning

In this paper, we propose a state and action search space division algorithm during learning process like a cell division. This algorithm is designed for search domain reduction and heuristic space segmentation. In this method, the most activated space segment is divided into new two segments during its learning. Appropriate search domain reduction can minimize the learning time and enables us ...

متن کامل

Collaboration space division in collaborative product development based on a genetic algorithm

The advance in the global environment, rapidly changing markets, and information technology has created a new stage for design. In such an environment, one strategy for success is the Collaborative Product Development (CPD). Organizing people effectively is the goal of Collaborative Product Development, and it solves the problem with certain foreseeability. The development group activities are ...

متن کامل

New Sol-Gel Solution with 45 Days Stability for Preparation Silica Thin Films

As we know sol-gel is one of the most important techniques for thin film preparation. In this paper, high transmission silica thin films have been prepared by dip-coating process from a new silicon-alkoxide solution. The prepared sol was stable for 45 days which is very important to characterize the coating process. The optical properties as a function of aging time, withdrawal rate, and he...

متن کامل

Higher-Dimensional Potential Heuristics for Optimal Classical Planning

Potential heuristics for state-space search are defined as weighted sums over simple state features. Atomic features consider the value of a single state variable in a factored state representation, while binary features consider joint assignments to two state variables. Previous work showed that the set of all admissible and consistent potential heuristics using atomic features can be characte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007