Blocking and Other Enhancements for Bottom-Up Model Generation Methods

11/28/2016
by   Peter Baumgartner, et al.
0

Model generation is a problem complementary to theorem proving and is important for fault analysis and debugging of formal specifications of security protocols, programs and terminological definitions. This paper discusses several ways of enhancing the paradigm of bottom-up model generation. The two main contributions are new, generalized blocking techniques and a new range-restriction transformation. The blocking techniques are based on simple transformations of the input set together with standard equality reasoning and redundancy elimination techniques. These provide general methods for finding small, finite models. The range-restriction transformation refines existing transformations to range-restricted clauses by carefully limiting the creation of domain terms. All possible combinations of the introduced techniques and classical range-restriction were tested on the clausal problems of the TPTP Version 6.0.0 with an implementation based on the SPASS theorem prover using a hyperresolution-like refinement. Unrestricted domain blocking gave best results for satisfiable problems showing it is a powerful technique indispensable for bottom-up model generation methods. Both in combination with the new range-restricting transformation, and the classical range-restricting transformation, good results have been obtained. Limiting the creation of terms during the inference process by using the new range restricting transformation has paid off, especially when using it together with a shifting transformation. The experimental results also show that classical range restriction with unrestricted blocking provides a useful complementary method. Overall, the results showed bottom-up model generation methods were good for disproving theorems and generating models for satisfiable problems, but less efficient than SPASS in auto mode for unsatisfiable problems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/07/2020

Generating Distributed Programs from Event-B Models

Distributed algorithms offer challenges in checking that they meet their...
research
06/06/2023

Range-Restricted Interpolation through Clausal Tableaux

We show how variations of range-restriction and also the Horn property c...
research
04/30/2018

A Formal Transformation Method for Automated Fault Tree Generation from a UML Activity Model

Fault analysis and resolution of faults should be part of any end-to-end...
research
10/17/2020

Blocking Probability Analysis for 5G New Radio (NR) Physical Downlink Control Channel

The 5th generation (5G) new radio (NR) is designed to support a wide ran...
research
07/19/2011

The IHS Transformations Based Image Fusion

The IHS sharpening technique is one of the most commonly used techniques...
research
01/25/2017

Towards Automatic Learning of Heuristics for Mechanical Transformations of Procedural Code

The current trends in next-generation exascale systems go towards integr...

Please sign up or login with your details

Forgot password? Click here to reset