• Keine Ergebnisse gefunden

Construct the And-Or graph for the(Γ, L)overapproximation and: (a) specify one of its execution trees that proves{(q2, a)}is avoidable

N/A
N/A
Protected

Academic year: 2021

Aktie "Construct the And-Or graph for the(Γ, L)overapproximation and: (a) specify one of its execution trees that proves{(q2, a)}is avoidable"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Concurrency Theory(WS 2010/11) Out: Wed, Jan 26 Due: Mon, Jan 31

Exercise Sheet 12

Jun.-Prof. Roland Meyer, Georgel C˘alin Technische Universit¨at Kaiserslautern

Problem 1: On Adequate Domains of Limits

For lcs(Q, q0, C, M,→)takeL:=P(Q)×sre(M)C whereP(•)denotes the powerset.

(a) Why isLΓ =∅?Hint: words versus atomic expressions.

(b) Define the representation functionr.

(c) Here, the>element can be expressed in the syntax. What is it?

(d) Show completeness of the domain of limits. Which theorem do you need?

(e) Describe how one can enumerateL0 L1 L2 . . .

Problem 2: EEC and And-Or Graph Questions

Consider the lcs depicted in the figure below:

q0 x!a q1 x?b q2

x!b x!c

Further consider the partial domains and limit sets described by Γ = {(q0, ),(q1, a)} and L={>} ∪ {(q1,(a+)(b+c)),(q1,(a+b)),(q2,(b+c)),(q2,(a+b)),(q2,(a+b+c)}.

Construct the And-Or graph for the(Γ, L)overapproximation and:

(a) specify one of its execution trees that proves{(q2, a)}is avoidable.

(b) specify one of its execution trees that intersects{(q2, a)}.

How many execution trees does the And-Or graph have?

Problem 3: π-calculus interpretation of FSA and PN

This exercise is meant to familiarize you with the behaviour (and expressiveness) ofπ-calculus.

LetA = (Q, q0,→)be an arbitrary finite state automaton. By using a free nameqfor each stateq Q, a configuration (state at runtime) ofAis represented by

qhqi

Y

q→q0

Kq→q0bq, q0c,

whereKq→q0(q, q0) :=q(x). Kq→q0bq, q0c q0hq0i

describes theqq0transition ofA.

The automaton is then described byq0hq0i

Q

q→q0Kq→q0bq, q0c.

(2)

(a) Extend the described method to Petri nets.Hints:

−synchronize the execution of transitions; you need deadlocks

−change the defining equationKt(q, q0) := here Ktbq, q0c

here

(b) Represent theFSAbelow using the method above:

q0 q1

q3

q2

What are your observations on the process syntax? What is the size of the processes as compa- red to the automaton (Petri net) they represent?

Problem 4: Structural Congruence & Normalization

(a) Show thatνa.P P ifa /f n(P).Hint:0is useful.

(b) Prove that the following two processes are structurally congruent:

P =νx νs xhsi.shai.shbi

x(u).u(y).u(z).yhzi

|x(t).t(w).t(v).vhwi Q=νx νs xhsi.shai.shbi

x(t).t(w).t(v).vhwi

|x(u).u(y).u(z).yhzi

(c) Prove that eachπ-calculus process is structurally congruent to a process of the form

νx1. . . νxm.(P1|. . .|Pn) where eachPi is a choice.

Referenzen

ÄHNLICHE DOKUMENTE

We believe that the power of scenarios lies in proving the feasibility of an aspirational future, such as an energy system that relies on large shares of renewables, maybe even

If we compare this procedure to the estimators based on the conventional propensity score, conven- tional propensity score combined with trimming rule 1 as well as the

Watch Part one of the programme and choose the correct word or phrase to complete these sentences.. Bridget gets a letter

Our quantitative findings suggest that migrants prefer a remittance to arrive as cash than as groceries when stakes are high ($400), but not when they are low ($200).. This result

Во избежание этого специализация определяется не только с помощью индекса Балассы (BI): предлагается « индекс лидерства » (LI), который

As ”each trading structure provides a different vector of execution attributes and services a different clientele” (Macey and O’Hara 1997, p. 220) designing one market structure

We provide a logical basis for dynamical evaluation: algebraic closure may fail to exist effectively, but it is possible to build effectively a Beth model of the theory of

Department of Defense (DOD) Deputy Assistant Secretary of the Army for Research and Technology requested that the Center for Technology and National Security Policy (CTNSP)