Interactive Markov Chains Analyzer



Similar documents
DiPro - A Tool for Probabilistic Counterexample Generation

A new binary floating-point division algorithm and its software implementation on the ST231 processor

LECTURE 16. Readings: Section 5.1. Lecture outline. Random processes Definition of the Bernoulli process Basic properties of the Bernoulli process

Mathematical finance and linear programming (optimization)

Confidence Intervals for the Difference Between Two Means

Development of dynamically evolving and self-adaptive software. 1. Background

Parallel Computing for Option Pricing Based on the Backward Stochastic Differential Equation

Modeling and Verification of Sampled-Data Hybrid Systems

Regression Clustering

4.6 Linear Programming duality

Is log ratio a good value for measuring return in stock investments

Prediction of DDoS Attack Scheme

A Tool for Generating Partition Schedules of Multiprocessor Systems

Verification of hybrid dynamical systems

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation

IEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2

Curriculum Vitae. Jens Chr. Godskesen. IT University of Copenhagen Rued Langgaards Vej 7, DK-2300 Copenhagen S, Denmark

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances

Operation Count; Numerical Linear Algebra

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

EE 570: Location and Navigation

Math 115 Spring 2011 Written Homework 5 Solutions

CS229 Project Report Automated Stock Trading Using Machine Learning Algorithms

Solving Method for a Class of Bilevel Linear Programming based on Genetic Algorithms

Probabilistic Models for Big Data. Alex Davies and Roger Frigola University of Cambridge 13th February 2014

Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison

Analysis of a Production/Inventory System with Multiple Retailers

Introduction. Digital Signature

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises

CASH FLOW MATCHING PROBLEM WITH CVaR CONSTRAINTS: A CASE STUDY WITH PORTFOLIO SAFEGUARD. Danjue Shang and Stan Uryasev

How To Solve A Sequential Mca Problem

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

Decentralized Utility-based Sensor Network Design

Inventory management in a manufacturing/ remanufacturing hybrid system with condition monitoring

Automated Model Based Testing for an Web Applications

Fast and Robust Normal Estimation for Point Clouds with Sharp Features

Electric Company Portfolio Optimization Under Interval Stochastic Dominance Constraints

>

Imputing Values to Missing Data

arxiv: v1 [math.pr] 5 Dec 2011

24. The Branch and Bound Method

Software Verification: Infinite-State Model Checking and Static Program

Roots of Equations (Chapters 5 and 6)

Arithmetic Coding: Introduction

3. Evaluate the objective function at each vertex. Put the vertices into a table: Vertex P=3x+2y (0, 0) 0 min (0, 5) 10 (15, 0) 45 (12, 2) 40 Max

CS556 Course Project Performance Analysis of M-NET using GSPN

Adaptive model for thermal demand forecast in residential buildings

Lecture 4 Online and streaming algorithms for clustering

Peer-Assisted Online Storage and Distribution: Modeling and Server Strategies

A Fast Algorithm for Multilevel Thresholding

TPCalc : a throughput calculator for computer architecture studies

Completion Time Scheduling and the WSRPT Algorithm

Strategic Online Advertising: Modeling Internet User Behavior with

Elevator Simulation and Scheduling: Automated Guided Vehicles in a Hospital

A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property

The Green Index: A Metric for Evaluating System-Wide Energy Efficiency in HPC Systems

More details on the inputs, functionality, and output can be found below.

A Learning Based Method for Super-Resolution of Low Resolution Images

System Copy GT Manual 1.8 Last update: 2015/07/13 Basis Technologies

Chapter 5. Linear Inequalities and Linear Programming. Linear Programming in Two Dimensions: A Geometric Approach

Two-Sample T-Tests Assuming Equal Variance (Enter Means)

Independent t- Test (Comparing Two Means)

A Network Flow Approach in Cloud Computing

Distributed Load Balancing for Machines Fully Heterogeneous

npsolver A SAT Based Solver for Optimization Problems

1 Review of Least Squares Solutions to Overdetermined Systems

Two-Sample T-Tests Allowing Unequal Variance (Enter Difference)

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff

Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning

An Environment Model for N onstationary Reinforcement Learning

MODELING RANDOMNESS IN NETWORK TRAFFIC

Blacklisting and Blocking

ALGORITHMIC TRADING WITH MARKOV CHAINS

7 Gaussian Elimination and LU Factorization

Management of Software Projects with GAs

modeling Network Traffic

GRID SEARCHING Novel way of Searching 2D Array

The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method

A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux

Chapter 2: Linear Equations and Inequalities Lecture notes Math 1010

Transcription:

Interactive Markov Chains Analyzer Dennis Guck Contents 1 IMCA s Input Files 1 1.1 The.imc and.ipc File Format...................... 1 2 Functionality of IMCA 2 2.1 Minimization of an IMC......................... 2 2.2 Time- and Interval-Bounded Reachability................ 2 2.3 Unbounded Reachability......................... 3 2.4 Expected Time and Expected Steps................... 4 2.5 Scheduler Synthesis............................ 4 2.6 Plot Function............................... 4 2.7 Log-File.................................. 4 The Interactive Markov Chains Analyzer (IMCA) is able to analyze IMC s and IPC s. It is written in C++ and uses the following libraries: GMP [1] MPFR [2] MPFRCPP [3] QT 4.6 [4] 1 IMCA s Input Files IMCA expect two input files: a.imc-file describes an IMC with its Markovian and interactive transitions and initial and goal states, and a. ipc-file describes an IPC with its probabilistic and interactive transitions and initial and goal states. After opening of a new IMC or IPC, the file is displayed in the model view window. 1.1 The.imc and. ipc File Format The file format contains in the first row the initial states. If there are several initial states, each state is seperated by a space character, and // will end the line. The second row contains the goal states. There are the same constraints as for the initial row. The following rows describe the transitions of the IMC or rather IPC. One transition is described as follows: 1

src dst prob/rate/action where src is the source state, dst the destination state, and prob/rate/action the probability, rate or action to move from src to dst. Listing 1: Example. imc-file s0 // i n i t i a l s s3 // g o a l s s0 s1 a s0 s3 b s1 s3 0. 5 s1 s2 0. 5 s2 s1 0.25 s2 s2 0. 5 s2 s3 0.25 s3 s2 c a s 0 s 1 b 0.5 0.5 0.25 0.25 s 3 s 2 0.5 c Figure 1: Associated IMC to Listing 1. 2 Functionality of IMCA The main functionalities are to calculate the maximum and minimum time-bounded reachability probability [9], expected time, and expected steps. Besides it is possible to extract the scheduler for the time-bounded reachability probability. Moreover, it is possible to minimize an IMC via bisimulation. 2.1 Minimization of an IMC The computation time depends for every computation on the complexity of the model. Because of that, it is implemented a minimization algorithm, which works with a bisimulation algorithm described in [5]. A condition is, that the IMC is closed. However, the program make it closed and well formed. After the minimization is finished, the minimized model is displayed in the model view. 2.2 Time- and Interval-Bounded Reachability It is possible to compute the time- and the interval-bounded reachability probability. The theory is explained in [9]. The inputs that are needed for the computation are: error lower bound upper bound interval 2

The error will specify the error-bound ɛ. The lower- and upper-bound specify the interval for which we calculate the reachability probability. If the lower-bound is 0, we calculate the time-bounded reachability, otherwise the interval-bounded. The variable interval have to be specified to record the progress of the probability during the computation within the defined interval. Furthermore, we have to choose between the computation of the maximum and minimum time-bounded reachability. Another feature is to start the computation with an advanced error bound [8]. This option allows a faster computation. A comparison between the advanced and normal error-bound, with the workstation cluster from [7] with one workstation per cluster, is given in Table 1 and 2. Since we calculate everything on the discretized IMC, we also can compute the step-bounded and step-interval-bounded reachability for IPC s. Time Bound z error bound ɛ iteration steps N probability 1 10 2 173 3.07535 10 6 1 10 4 17323 3.06783 10 6 1 10 6 1732390 3.06795 10 6 10 10 2 200 7.1097 10 5 10 10 4 20026 7.10122 10 5 10 10 6 2002700 7.10156 10 5 100 10 2 200 0.000881425 Table 1: value-iteration with advanced error bound Time Bound z error bound ɛ iteration steps N probability 1 10 2 201 3.06691 10 6 1 10 4 20055 3.06807 10 6 1 10 6 2005400 3.06795 10 6 10 10 2 20055 7.10174 10 5 10 10 4 2005400 7.10156 10 5 10 10 6 200540366 aborted 100 10 2 2005400 0.000882816 Table 2: value-iteration with normal error bound 2.3 Unbounded Reachability The unbounded reachability probability will be calculated on the embedded IPC. We use the value iteration algorithm from the time-bounded reachability and iterate until we reach a fixpoint. The fixpoint is a point where the unbounded reachability probability for all states do not change after k iteration steps. Hence s S. i > k.p i 1 (s) = p i (s). (1) 3

The fixpoint is reached, if equation 1 is satisfied for 1000 steps, hence for i = k + 1,..., k + 1000. Besides it is possible to accept a variance ɛ to satisfy the fixpoint ( p i 1 (s) p i (s) = ɛ). Therefore exists the input field error. As before it is possible to choose between the maximum and minimum unbounded reachability prbability. Since we calculate the unbounded reachability on the embedded IPC, we also can compute the unbounded reachability for IPC s. 2.4 Expected Time and Expected Steps Another function is to obtain the expected time or the expected steps to reach a set of goal states. The expected time and expected steps will also be calculated with a value iteration algorithm, and iterate until a fixpoint is reached, as described in 2.3. Further it is possible to choose between the maximum and the minimum. In case of an IPC, it is only possible to calculate the expected steps. 2.5 Scheduler Synthesis The scheduler synthesis is implemented for the maximum time- and interval-bounded reachability 2.2. The theory is the same as in [6]. Therefore, for each step in the value iteration, we save the chosen action for each interactive state. After the computaton is finished, the scheduler is displayed in the log-file (c.f. Section 2.7). The same principle is applicable for the expected time and expected steps, but is not featured in the tool yet. 2.6 Plot Function The plot function is supported for the time- and interval-bounded reachability (c.f. section 2.2). Therefore, we use the input of the interval field, that describes how often we capture the probability during the computation. After the computation, it is possible to choose a state s S and plot the developing of the probability of this state for the given interval [lower-bound;upper-bound]. Further, it is possible to save the plot. 2.7 Log-File The log-file registers the open model, the chosen computation with their inputs, the computation time, the result for the initial state and additionally the scheduler. Besides, the computation steps are displayed in the log-file. The log-file can also be saved. Listing 2: Example log-file for time-bounded reachability of the IMC in figure 1.1 L o g f i l e ===================== IMC Analyzer ===================== 4

open f i l e :.. / e a r l y. imc S t a t e s : 4 I n i t i a l S t a t e s : 1 Goal S t a t e s : 1 T r a n s i t i o n s : 8 maximum time bounded r e a c h a b i l i t y p r o b a b i l i t y making goal s t a t e s absorbing ( time bounded r e a c h a b i l i t y )... c l o s i n g imc... making deadlock s t a t e s absorbing... d i s c r e t i z i n g imc... time i n t e r v a l : [ 0, 1 ] i n t e r v a l time : 0. 1 e r r o r bound : 1e 06 max e x i t r a t e : 1 step duration : 2e 06 step i n t e r v a l : [ 0, 5 0 0 0 0 1 ] i n t e r v a l step : 50000 computation s t a r t... computation end... Time : 1.92002 seconds i n i t i a l s t a t e prob : s0 = 1 References [1] The GNU Multiple Precision Arithmetic Library. http://gmplib.org/. [2] The MPFR Library. http://www.mpfr.org/. [3] The Multiple Precision Floating-Point Reliable Library C++ Interface. http://beshenov.ru/mpfrcpp/. [4] Qt. http://doc.qt.nokia.com/4.6/index.html. [5] C. Baier and J.-P. Katoen. Principles of Model Checking. The MIT Press, May 2008. [6] D. Guck. Analysis and scheduler synthesis of time-bounded reachability in continuous-time Markov decision processes. Bachelorarbeit, RWTH Aachen University, 2010. [7] B. R. Haverkort, H. Hermanns, and J.-P. Katoen. On the use of model checking techniques for dependability evaluation. Reliable Distributed Systems, IEEE Symposium on, 0:228, 2000. [8] J.-P. K. Taolue Chen, Tingting Han and A. Mereacre. Computing Maximum Reachability Probabilities in Markovian Timed Automata. Technical Report AIB-2010-06, 2010. 5

[9] L. Zhang and M. Neuhäußer. Model Checking Interactive Markov Chains. Lecture Notes in Computer Science, 6015:53 68, 2010. 6