<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On the existence of cuto s for model checking disjunctive timed networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Luca Spalazzi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Spegni</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DII, Universita Politecnica delle Marche</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Given a logical formula and a system described as the composition of arbitrarily many copies of some process template, the parameterized model checking problem wants to establish whether the system satis es the formula. The focus is on the fact that the property should not depend on the actual number of participating processes. Exactly this, makes the problem equivalent to verifying an in nite state system, and thus undecidable problem in general. Several authors identi ed relevant sub-classes of systems or formulae to be model checked. In this work we study the parameterized model checking problem of real-time systems against real-time temporal logics. In particular we study the possibility of nding an upper bound to the size of the system, known as cuto , ensuring that adding more participants does not change the set of satis able formulae. A distinction exists between dynamic cuto s, depending both on the process templates and the formula, and static cuto s, that only consider the templates. We start by introducing disjunctive timed networks. We show they do not admit static cuto s, in general. Then we identify a subfamily that admits static cuto , implying that the parameterized model checking problem is decidable.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Many types of system are naturally described as the combination of several
agents or processes cooperating in order to reach a common task (distributed
algorithms, protocols, . . . ). When the number of participants is a parameter of
the system, which is expected to behave correctly despite its exact value, we say
that we are handling a parameterized system.</p>
      <p>The parameterized veri cation problem is the problem of checking whether
a speci cation holds in a parameterized system, for any number of participants.
This is known to be an undecidable problem in general, but there exists a variety
of restrictions that isolate families of systems and properties whose
parameterized model checking problem is decidable.</p>
      <p>
        In this work we focus on a speci c subset of systems, viz. real-time systems
where processes are nite state and communicate by means of transitions with
disjunctive boolean guards referring to the neighbor locations . This family of
systems, that we call disjunctive timed networks, is a combination of timed
networks by Abdulla et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Emerson and Kahlon's disjunctively guarded
processes [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        We also focus on a restriction of the parameterized veri cation problem via
model checking of systems up to a maximum number c of participants. Such
maximum number c must have the property that any system with more than c
instances satis es exactly the same logical formulae that are satis ed by systems
up to c instances. If this is the case, c is called a cuto . If the cuto depends
on both the structure of the processes and the formula, we call it dynamic,
following Kaiser et al. terminology [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. By contrast, if the cuto only depends
on the structure of the processes we call it static.
      </p>
      <p>Contribution. In this work we rst show that the family of disjunctive timed
networks does not admit static cuto s, in the most general case. Next, we show
a subset of such family that instead admits such cuto . Roughly speaking, such
subset contains timed processes that are allowed to stay in their locations as
long as they wish. Finally, we determine the complexity of the parameterized
model checking problem of such subset.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Real-time temporal logics</title>
      <p>
        We de ne iMTL, an indexed extension of real-time (linear) temporal logic MTL
[
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]. Let us denote with T the time domain, i.e. the set of all possible time
values considered by the logics, and let us consider it a dense set, i.e. T = Q 0.
In the following AP denotes a nite set of atomic propositions.
      </p>
      <p>De nition 1 (Syntax of iMTL). Let fS1; : : : ; Skg be a nite set of sorts and
V a nite set of variables. Let p be an atomic proposition in AP. iMTL is the
multi-sorted logic whose set of formulae is inductively de ned as follows:
::= 8i : Sl: j
::= &gt; j p hii j p hSl; ai j
^
j : j</p>
      <p>U c
where</p>
      <p>2 f&lt;; ; ; &gt;; =g, l 2 [1; k], a 2 N&gt;0, i 2 V , p 2 AP and c 2 T.</p>
      <p>Let us call the pair hSl; ai in the above grammar a concrete instance
identier (or just instance identi er ), while i 2 V denotes an instance variable. Let
us assume only closed formulae, where variables are all bound to a sort. The
notation [i a] represents the usual replacement operation, where all free
occurrences of variable i of sort Sl in the sub-formula are replaced by the
instance identi er hSl; ai. Missing boolean operators (_; !; : : : ) and temporal
operators (G; F; W; : : : ) can be de ned in the usual ways. 1</p>
      <p>Examples. Given a sort P representing a process, and a set of propositions
AP = fcs; : : :g, the familiar mutual exclusion property can be expressed with the
formula 8i : P: 8j : P: G 0:(cs hii ^ cs hji). The alternative formula 8i : P: 8j :
P: G 3:(cs hii ^ cs hji) expresses that the mutual exclusion property is ensured
after a transient time of three time units. The formula 8i : P: G 0(cs hii !
1 The usual \next" operator (X) does not appear, since iMTL assumes a dense time
domain, thus it does not make sense to talk about a next state in time.
F 3:cs hii) is an example of bounded response property ; namely it states that
any instance of the process must exit the critical section within three time units.</p>
      <p>In this work, executions are represented as sequences of time values together
with the propositions that hold at that time. To this aim, let us call interval
sequence over T any in nite sequence I = I0I1 : : : of non-empty intervals of T
with the following properties:
{ (adjacency) the intervals Ii = [a; b) and Ii+1 = [b; c) are adjacent, for all
i 0 and a; b; c 2 T s.t. a &lt; b &lt; c;
{ (progress) for every t 2 T, there exists j 0 such that t 2 Ij .
Given the set of propositions AP and sorts S1; : : : ; Sk, let us call state any subset
of the following set: fp hSl; ai s:t: p 2 AP; l 2 [1; k]; a 2 N&gt;0g. For instance, given
a sort P representing a process and a set of propositions AP = fa; b; cg, the set
fa hP; 1i ; b hP; 1i ; c hP; 2ig represents the state with two copies of P : in the former
a and b holds, while in the latter only c holds. Let us call state sequence any
in nite sequence = 0 1 : : : of states. Finally, let us call timed state sequence
a pair = ( ; I) where I is an interval sequence, and is a state sequence. Let
us write (t) to denote the state 0 at time t, formally: given = ( ; I), where
= 0 1 : : : and I = I0I1 : : :, then 0 = i if t 2 Ii, for some i 2 N 0. Let us
now introduce the satis ability relation of iMTL.</p>
      <sec id="sec-2-1">
        <title>De nition 2 (Satis ability of iMTL).</title>
        <p>Assume t 2 T and let be a timed state sequence. The satis ability relation of
an iMTL formula is de ned inductively on the structure of the formula itself:
; t j= 8i : Sl: i
; t j= &gt;
; t j= p hSl; ai i
; t j= 1 ^ 2 i
; t j= : 1 i
; t j= 1 U c 2 i
; t j= [i</p>
        <p>a] for any a 2 N&gt;0
p hSl; ai 2 (t)
; t j= 1 and ; t j= 2
; t 6j= 1
9t0 &gt; t : t0 c and ; t0 j=
8t00 2 [t; t0): ; t00 j=
2 and
1</p>
        <p>In this work we will consider also the following fragments of iMTL viz.:
{ iMITL. It is the restriction of iMTL to formulae where punctual intervals are
not allowed (e.g. cannot use the U=c operator).
{ iUpp. It is an extension of the Uppaal speci cation language to sorted
variables. It can be de ned as the following subset of iMTL:
::= 8i : Sl: j
::= &gt; j p hii j p hSl; ai j ^ j : j</p>
        <p>G cp hii j F cp hii j G c(p hii ! F cp hii) j</p>
        <p>G cp hSl; ai j F cp hSl; ai j G c(p hSl; ai ! F cp hSl; ai)
where</p>
        <p>
          2 f&lt;; ; ; &gt;; =g, l 2 [1; k], a 2 N&gt;0, i 2 V , p 2 AP, and c 2 T. 2
2 Let us underline that usually the Uppaal speci cation logic is presented as a fragment
of the real-time (branching time) temporal logic TCTL [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Nevertheless, the syntax
of formulae is so limited to be expressible also as a fragment of MTL
Let us denote with iMTLh iMITLh and iUpph, for h 2 N, the subsets of the
logics iMTL iMITL and iUpp, respectively, where formulae use at most h sorted
variables. We also denote with iLTL (resp. iLTLh) the subset of iMTL (resp.
iMTLh) using only universal time intervals [0; 1).
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Timed automata</title>
      <p>Assume a set of clock variables C. We call temporal constraints T C(C) the terms
of the grammar: TC(C) ::= &gt; j : T C(C) j T C(C) _ T C(C) j C C j C T,
where 2 f&lt;; ; &gt;; ; =g is a comparison operator and T is the same dense
time domain introduced in Sec. 2.</p>
      <sec id="sec-3-1">
        <title>De nition 3 (Timed automaton template). A timed automaton template</title>
        <p>Ul is a tuple hQl; q^l; Cl; l; l; Ili where Ql is a nite set of locations, q^l 2 Ql is
a distinguished initial location, Cl is a nite set of clock variables, l is a nite
set of synchronization labels, l Ql T C(Cl) 2Cl l Ql is a nite set of
transitions, Il : Ql ! T C(Cl) maps locations to temporal constraints.
In the following we write jUlj to denote the number of locations jQlj in the
template. Let us remark that the temporal constraint Il(q) for some location q
will also be referred to as the invariant of location q.</p>
        <p>We call network of timed automata any nite combination of templates, and
we will call timed network the family of networks of arbitrary size.</p>
      </sec>
      <sec id="sec-3-2">
        <title>De nition 4 (Network of timed automata). Assume the TA templates</title>
        <p>U1; : : : ; Uk. Let (n1; : : : ; nk) be a tuple of positive natural numbers. Then
(U1; : : : ; Uk)(n1;:::;nk)
is a network of timed automata (NTA for short) denoting the asynchronous
parallel composition of timed automata U11 k : : : k U1n1 k : : : k Uk1 k : : : k Uknk ,
such that Uli is the i th disjoint copy of Ul, for each l 2 [1; k] and i 2 [1; nl].
De nition 5 (Timed networks). Given any set of timed automaton templates
U1; : : : ; Uk, it induces a timed network (TN for short) de ned as the following
family of networks of timed automata:</p>
        <p>f(U1; : : : ; Uk)(n1;:::;nk) : n1; : : : ; nk 2 N&gt;0g
Let us denote a TN with the tuple: (U1; : : : ; Uk).</p>
        <p>The core idea of TNs with disjunctive guards is that their component is
a restricted (disjunctive) boolean formula allowing to look at neighbor locations
before deciding to take a step.</p>
      </sec>
      <sec id="sec-3-3">
        <title>De nition 6 (Disjunctive templates). Given any template Ul, it is a dis</title>
        <p>junctive template i the following holds:
{ l is a set of boolean guards of the form:</p>
        <p>Wh2[1;k] 9i : h 6= l _ i 6= self: qh1(i) _
for every h 2 [1; k] and some r 2 N 0;
{ Il(q^l) = &gt;.
_ qhr(i) where fqh1; : : : ; qhrg</p>
        <p>
          We call disjunctive timed network (or DTN) a TN made of only disjunctive
templates. The formal de nition of NTA operational semantics is omitted for
the sake of spacee. Here we informally describe the rules, well known from the
theory of (safety) timed automata [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]: delay transitions cause all clock variables
to increase by the same amount 2 T, provided that at any point in time no
process falsi es a location invariant; discrete transition causes a single process
to make a move, provided that: (i) the associated disjunctive boolean guard is
satis ed by the neighbors locations, (ii) the clock constraint associated to the
guard is satis ed, (iii) the moving process does not falsify the location invariant
after the move, (iv) if speci ed, some clock variables are reset.
        </p>
        <p>Let us de ne the parameterized model checking problem of DTN on top of
the usual de nitions of model checking NTAs.</p>
      </sec>
      <sec id="sec-3-4">
        <title>De nition 7 (NTA model checking problem). Let assume a NTA (U1;</title>
        <p>: : : ; Uk)(n1;:::;nk) and a iMTL formula . The model checking problem (MCP for
short) is de ned as follows:</p>
        <p>IN : (U1; : : : ; Uk)(n1;:::;nk);</p>
        <p>OU T : yes or hno; xi
such that the output are:
{ hno; xi if x is an execution in it and x; 0 6j= , and
{ yes otherwise.</p>
        <p>
          Let us consider MTL, MITL, and Upp as the non-indexed restrictions of the
logics presented in Section 2. Let us report known decidability of their MCP.
Property 1 (Decidability of MCP). The MCP for MTL is undecidable [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. The
MCP for MITL is decidable, it has space complexity EXPSPACE-Complete [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ],
and thus it has time complexity in 2-EXPTIME. The MCP for Upp can be reduced
to reachability in timed networks, which is decidable, it has space complexity
PSPACE-complete [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], and thus it has time complexity in EXPTIME.
        </p>
        <p>Let us now extend the model checking problem to timed networks.</p>
      </sec>
      <sec id="sec-3-5">
        <title>De nition 8 (DTN parameterized model checking problem). Let as</title>
        <p>sume a DTN (U1; : : : ; Uk) and a iMTL formula . Its parameterized model
checking problem (PMCP) is de ned as follows:</p>
        <p>IN : (U1; : : : ; Uk);</p>
        <p>OU T : yes or hno; (n1; : : : ; nk); xi
such that the output are:
{ hno; (n1; : : : ; nk); xi if (U1; : : : ; Uk)(n1;:::;nk) is a disjunctive NTA, x is an
execution in it and x; 0 6j= ,
{ yes otherwise.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Cuto s</title>
      <p>We introduce blueprints to delineate the property of a tuple being a cuto .</p>
      <sec id="sec-4-1">
        <title>De nition 9. (Blueprint) Let us call k-blueprint a triple (P; k; F ) where k 2</title>
        <p>N&gt;0, Pk is a family of systems with k templates, and F a family of temporal
logic formulae. A blueprint is a pair: (P; F ) = f(P; k; F ) : k 2 N&gt;0g.</p>
        <p>In Section 2, we have seen three families of logic formulae, namely iMTL,
iMITL and iUpp. In Section 3, we have introduced a family of system templates,
viz. disjunctive TNs. We will use DTNk to denote the set of disjunctive timed
networks with k templates and de ne DTN = Sk2N&gt;0 DTNk. In Section 5, we
will introduce a sub-family of the latter.</p>
        <p>We assume the following partial ordering on tuples of natural numbers:
for any natural k and tuples (a1; : : : ; ak) and (a01; : : : ; a0k) in Nk, we will write
(a1; : : : ; ak) (a01; : : : ; a0k) i ai a0i for all i 2 [1; k].</p>
        <p>In order to say that a tuple of positive natural numbers is a cuto for
a blueprint, we introduce a relation between tuples of natural numbers and
blueprints. One may read this property also as the blueprint admits a cuto .
De nition 10. (Dynamic cuto ) Let (P; k; F ) be a k-blueprint, U 2 Pk a
system template, and 2 F a formula. A dynamic cuto is any tuple c 2 Nk&gt;0:
(8m
c: U
m
j=
) , (8n 2 Nk&gt;0: U n j=
)</p>
      </sec>
      <sec id="sec-4-2">
        <title>De nition 11. (Dynamic cuto relation) Let (P; k; F ) be a k-blueprint.</title>
        <p>Any R(Pk;F) Nk&gt;0 Pk F is a dynamic cuto relation i c is a dynamic
cuto w.r.t. system template U and formula , for any (c; U ; ) 2 R(Pk;F).</p>
        <p>We call this type of cuto dynamic since it may return di erent values
depending on both the system template and the formula to be veri ed.
De nition 12. (Static cuto ) Let (P; k; F ) be a k-blueprint and U 2 Pk a
system template. A static cuto is any tuple c 2 Nk&gt;0:
8
2 F : (8m
c: U
m
j=
) , (8n 2 Nk&gt;0: U n j=
)</p>
        <sec id="sec-4-2-1">
          <title>De nition 13. (Static cuto</title>
          <p>RPk Nk&gt;0 Pk is a static cuto
template U , for any (c; U ) 2 R k.</p>
          <p>P
relation) Let (P; k; F ) be a k-blueprint. Any</p>
          <p>relation i c is a static cuto w.r.t. system</p>
          <p>We call this second type of cuto static since it only depends on the system
template structure, thus relating the same cuto tuple for any logical formula.</p>
          <p>Fixing a system template and a speci cation, it is immediate to understand
that, whenever a tuple is a cuto for them, than any bigger tuple is also a cuto .
In other words, any system template and speci cation either admit in nitely
many cuto s or none. The same holds for static cuto relations on k-blueprints.</p>
          <p>Let us observe that by xing both a system template and a formula, there
always exists a tuple that is a cuto for them: the idea is that either the
speci cation does hold for any size of the system, thus the cuto is (1; : : : ; 1), or it
does not hold and thus the cuto is the smallest system size that falsi es it.</p>
        </sec>
      </sec>
      <sec id="sec-4-3">
        <title>Property 2 (Dynamic cuto s always exist). Let (P; k; F ) be a k-blueprint.</title>
        <p>Then there exists some dynamic cuto relation R k
(P;F):
8U 2 Pk: 8</p>
        <p>2 F : 9c 2 Nk&gt;0: (c; U ; ) 2 R(Pk;F):</p>
        <p>The proof of the property above reduces the problem of nding a cuto to the
PMCP. If the PMCP is decidable, we also obtain an algorithm for computing
it. Nevertheless, the cuto obtained in this way is of little practical use for
veri cation purposes, since usually one desires to know the cuto to the aim of
deciding the PMCP.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Property 3 (Static cuto s imply dynamic cuto s). Let (P; k; F ) be a k</title>
        <p>blueprint and RPk 2 Nk&gt;0 Pk a static cuto relation. Then, there exists a
dynamic cuto relation R k</p>
        <p>(P;F).</p>
        <p>The proof is immediate, since we can de ne R k
(P;F) = f(c; U ; ) : (c; U ) 2
cRuPtko; , i2t isFigm, pfoliredanthyatgiRve(nPk;Fst)aitsica cduytnoamrieclactuioton RfoPkr.thBeybdlueepnriitniot.n of static</p>
        <p>Let us underline that a cuto relation does not require to include all tuples
that are cuto s for the given system template and formula. Notice also that any
total and computable function f : Pk F ! Nk&gt;0 (resp. f : Pk ! N&gt;0) returning
a tuple which is a dynamic (resp. static) cuto for the input, induces a dynamic
(resp. static) cuto relation. Indeed, for every input, it is enough to take all the
tuples that are greater than the returned one to have a cuto relation. We call
any such f a dynamic cuto algorithm (resp. static cuto algorithm).</p>
      </sec>
      <sec id="sec-4-5">
        <title>De nition 14. (Cuto existence) We say a blueprint (P; F ) admits a dy</title>
        <p>namic cuto i for every k-blueprint (P; k; F ) there exists a dynamic cuto
relation R k</p>
        <p>(P;F). We say it admits a static cuto relation i for every k-blueprint
(P; k; F ) there exists a static cuto relation R k.</p>
        <p>P</p>
        <p>In the next section, we will see that the blueprint formed by disjunctive timed
networks and iMTL does not admit a static cuto .</p>
        <p>Such negative result does not imply that all the system templates in the
blueprint cannot have a static cuto for iMTL formulae. Indeed, the existence of
the static cuto can be \recovered" for a subset of system templates. Later we
are going to exploit exactly this observation and we are going to introduce a
subfamily of disjunctive timed networks for which a static cuto can be computed.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Cuto theorems for timed networks</title>
      <p>Let us introduce a witness disjunctive timed network and a family of formulae
that can count the number of running processes in the system.</p>
      <p>sink
t
1
pre
t := 0
start
s1
9i: prei
t 1
Theorem 1. There exists a TA template U such that for every number c 2 N&gt;0
there exists a formula c 2 iMTL with the following property:</p>
      <p>Lemma 1. Let k; h 2 N&gt;0. Let (DTN; k; iMTL) be any k-blueprint. Let f be any
function such that f : DTNk ! Nk&gt;0. Then f is not a static cuto algorithm for
the k-blueprint.</p>
      <p>This lemma is proven by contradiction, exploiting Thm. 1. Let us now
introduce DTN as the subfamily of DTN such that every TA template U =
hQ; q^; C; ; ; Ii satis es the following property: for every location q 2 Q, either
I(q) = &gt; or location q cannot appear in the transition guards of any template.
Later we show that blueprint (DTN ; iMTL) admits static cuto s.</p>
      <p>
        Let us x a family of static cuto algorithm for DTN's, inspired by the
algorithm used by Emerson and Kahlon to prove the cuto theorems for disjunctive
processes [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The algorithm is the total mapping: dckh : DTN k ! Nk&gt;0 such
that dckh((U1; : : : ; Uk)) = (c1; : : : ; ck) and for every l 2 [1; k], cl = jUlj + h.
      </p>
      <p>Such total mappings return cuto s which are basically given by the number
of process locations augmented by a constant factor h.</p>
      <p>We introduce two properties of DTN : the former shows that adding
instances does not cause to loose counterexamples, while the latter shows that for
any counterexample found in systems bigger than the cuto it is possible to nd
a similar counterexample in the system with as many instances as the cuto .
Together they imply that a property holds in the system whose size equals the
cuto if and only if it holds in any bigger instance.</p>
      <sec id="sec-5-1">
        <title>Lemma 2 (DTN monotonicity).</title>
        <p>For any k; h 2 N&gt;0, let be any iMTLh formula, let (U1; : : : ; Uk)(n1;:::;nk)
and (U1; : : : ; Uk)(m1;:::;mk) be two NTAs in DTN , such that (n1; : : : ; nk)
(m1; : : : ; mk). Then the following holds:
(U1; : : : ; Uk)(n1;:::;nk) 6j=</p>
        <p>) (U1; : : : ; Uk)(m1;:::;mk) 6j=</p>
        <p>The proof is immediate: it is enough to leave the ml nl added instances of
template l in the initial state, and replay in the \big" system the counterexample
of the \small" system.</p>
      </sec>
      <sec id="sec-5-2">
        <title>Lemma 3 (DTN bounding).</title>
        <p>For any k; h 2 N&gt;0, let be any iMTLh formula, let (U1; : : : ; Uk)(n1;:::;nk)
and (U1; : : : ; Uk)(c1;:::;ck) be two NTAs in DTN such that (c1; : : : ; ck) = dckh((U1;
: : : ; Uk)) and (c1; : : : ; ck) (n1; : : : ; nk). Then the following holds:
(U1; : : : ; Uk)(n1;:::;nk) 6j=</p>
        <p>) (U1; : : : ; Uk)(c1;:::;ck) 6j=</p>
        <p>Intuitively, we have to prove any counterexample in a \big" system has a
core of processes whose behavior can be replicated exactly in a system whose
size equals the cuto . Given the falsi ed formula with j sorted variables, the
core of the counterexample is made of j processes that falsify the formula itself.
We call them core processes. In the proof we use jUij additional processes for each
template i 2 [1; k] to enable the moves of the core processes. We call the latter
enabling processes. One key observation is that any step of the computation is
enabled by checking that some process of template i is in some location q. The
second key observation is that working with disjunctive guards of the family
DTN , a process is never \forced" to leave its current location. This is the key
feature that is not available, in general, in DTN processes. The latter, in fact,
may have invariants that force a process to leave its current state. Given these
assumptions, the core processes can replay (modulo some stuttering) the steps
taken in the \big" system to falsify the formula . Lemmata 2 and 3 imply the
following results.</p>
      </sec>
      <sec id="sec-5-3">
        <title>Lemma 4 (DTN cuto ).</title>
        <p>For any k; h 2 N&gt;0, let be any iMTLh formula, let (U1; : : : ; Uk)(n1;:::;nk)
and (U1; : : : ; Uk)(c1;:::;ck) be two NTAs in DTN such that (c1; : : : ; ck) = dckh((U1;
: : : ; Uk)) and (c1; : : : ; ck) (n1; : : : ; nk). Then the following holds:
(U1; : : : ; Uk)(n1;:::;nk) j=</p>
        <p>, (U1; : : : ; Uk)(c1;:::;ck) j=</p>
      </sec>
      <sec id="sec-5-4">
        <title>Corollary 1 (Cuto existence for (DTN ; iMTL)). The blueprint</title>
        <p>(DTN ; iMTL) admits a static cuto relation.
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Complexity of PMCP for timed networks</title>
      <p>The undecidability of the MCP for timed automata against MTL speci cations
(see Property 1) yields the following.</p>
      <p>Corollary 2. For any k; h 2 N&gt;0, the parameterized model checking problems
of k-blueprints (DTN; k; iMTLh) are undecidable.</p>
      <p>Let us now lift complexity of MCP for timed automata and sub-families of
iMTL to the PMCP of DTN .</p>
      <p>Lemma 5. Assume a k-blueprint (P; k; F ) and a template cuto algorithm f :
Pk ! Nk&gt;0. Call O(TIMEMCP(n)) the upper bound on time computational
complexity of the model checking problem with system of size n. Similarly, call
O(SPACEMCP(n)) the upper bound on the space complexity of the same problem.
The PMCP of (U1; : : : ; Uk) and formula has the following complexities:
{ O(SPACEMCP(Uk cU )),
{ (cU)k O(TIMEMCP(Uk cU ))
where U = maxfjU1j; : : : ; jUkjg, (c1; : : : ; ck) = f (U1; : : : ; Uk), and
cU = maxfc1; : : : ; ckg.</p>
      <p>Lemma 5 together with Property 1 yield the following.</p>
      <p>Theorem 2. The parameterized model checking problem of blueprint (DTN ;
iMITL) has space complexity 2-EXPSPACE, and time complexity in 3-EXPTIME.
Theorem 3. The parameterized model checking problem of blueprint (DTN ;
iUpp) has space complexity EXPSPACE, and time complexity in 2-EXPTIME.
7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions and related work</title>
      <p>In this work we studied di erent types of cuto s to the aim of verifying
properties on timed networks of arbitrary size. We discovered an interesting boundary
between systems that only admit dynamic cuto s w.r.t. those that can admit
static cuto s. Here we share the questions that motivated our research, as a
suggestions for future works on this direction. Given a blueprint, one may ask:
RQ1 Does a dynamic cuto relation exist that does not assume the decidability
of the corresponding parameterized model checking problem?
RQ2 Does a static cuto relation exist?
RQ3 Does a cuto algorithm return the smallest possible cuto , for the blueprint
and speci cation in input?
RQ4 Is the PMCP of a blueprint with unknown cuto decidable?</p>
      <p>
        It is remarkable that, to the best of our knowledge, almost all cuto results
in literature consists of nding static cuto s, i.e. answering RQ2. For instance,
Emerson et al. [11{13] present examples of static cuto s for (untimed) processes
communicating via token passing and arranged in rings, or communicating via
either conjunctive or disjunctive boolean guards and arranged in cliques. Aminof
et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] generalize Emerson template cuto algorithms to a wider set of
process topologies. The latter also showed that the blueprint composed of pairwise
s
t
s
i
x
e
o
t
u
c
c
i
t
a
t
S
t
s
tcou itex
c on
i
ttaS seod
(CG; iLTL)
(DG; iLTL)
(CTN; iMITL)
(DTN ; iMITL)
(CTN; iUpp)
(DTN ; iUpp)
(CTN; iMTL)
(DTN ; iMTL)
(PR; iLTL)
(PR; iCTL?)
(DG; iCTL?)
(BR; iLTL)
(PRTN; iMITL)
(DTN; iMTL)
(DTN; iMITL)
(DTN; iUpp)
PMCP decidable
      </p>
      <p>
        PMCP undecidable
rendez-vous processes (PR for short) and iLTLh formulae do not admit a static
cuto (even for h = 1). In contrast, in a previous work [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] we have shown that
the blueprint (CTN; iMITL), i.e. conjunctive timed networks and iMITL speci
cations, admits static cuto s and its PMCP is decidable.
      </p>
      <p>
        A notable exception is Kaiser et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], that addressed RQ1, showing that
dynamic cuto s exist for the blueprint formed by nite state programs with
shared variables and reachability properties.
      </p>
      <p>
        We provided a negative answer to RQ2 for the blueprint (DTN; iMITL) and
a positive answer for (DTN ; iMITL). To the best of our knowledge, it is still
an open question whether there exist other blueprints that answer negatively to
RQ2. It is also open RQ1 for PR and DTN. While RQ4 is answered positively
for (PR; iLTL) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], it is still open for (DTN; iMITL).
      </p>
      <p>We underline that even blueprints admitting static cuto s are worth
investigating for existence of dynamic cuto s considering the veri ed speci cation. It
may lead to obtaining smaller cuto s, thus reducing the number of invocations
of the model checker, and perhaps reducing the complexity of the PMCP.</p>
      <p>
        Figure 2 contains an overview of several blueprints, describing either timed or
untimed systems. In it we compare whether each blueprint admits static cuto s
and whether its PMCP is decidable. The blueprints crossing the decidability line
denote the fact that RQ4 has not been set. Blueprints (CG; iLTL) and (DG; iLTL)
denote untimed systems with conjunctive and disjunctive guards, respectively,
and the existence of static cuto s for them have been proven by Emerson and
Kahlon [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Non existence of static cuto s for pairwise-rendezvous systems, i.e.
(PR; iLTL), as well as undecidability of PMCP for (PR; iCTL?) and (DG; iCTL?)
have been proved by Aminof et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Decidability of PMCP for (PR; iLTL)
have been proved by German and Sistla [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. The system template PRTN
represents an alternative de nition of timed networks synchronizing via pairwise
rendezvous, introduced by Abdulla et al. who also proved the undecidability of
their PMCP for logics capable of expressing liveness speci cations [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. The
system template BR represents networks of untimed processes communicating
via broadcast, whose undecidability of PMCP for liveness speci cations have
been proven by Esparza et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. All the other results in the Figure have been
proven in the current work. The PMCP of several other blueprints have been
proven decidable or undecidable in literature, but are not represented in the
Figure for the sake of conciseness. We leave as future work to determine whether the
computed cuto s for DTN are the minimal static cuto s (RQ3), by appealing
at existing approaches for untimed systems [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Abdulla</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deneux</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mahata</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>Multi-clock timed networks</article-title>
          .
          <source>In: Logic in Computer Science</source>
          ,
          <year>2004</year>
          .
          <source>Proceedings of the 19th Annual IEEE Symposium on</source>
          . pp.
          <volume>345</volume>
          {
          <issue>354</issue>
          (
          <year>July 2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Abdulla</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jonsson</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Model checking of systems with many identical timed processes</article-title>
          .
          <source>Theoretical Computer Science</source>
          <volume>290</volume>
          (
          <issue>1</issue>
          ),
          <volume>241</volume>
          {264 (Jan
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alur</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dill</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          :
          <article-title>A Theory of Timed Automata</article-title>
          .
          <source>Theoretical Computer Science</source>
          <volume>126</volume>
          (
          <issue>2</issue>
          ),
          <volume>183</volume>
          {235 (Apr
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Alur</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feder</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henzinger</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The bene ts of relaxing punctuality</article-title>
          .
          <source>Journal of the ACM (JACM)</source>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Aminof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotek</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rubin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spegni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veith</surname>
          </string-name>
          , H.:
          <article-title>Parameterized Model Checking of Rendezvous Systems</article-title>
          .
          <source>In: CONCUR</source>
          <year>2014</year>
          , pp.
          <volume>109</volume>
          {
          <fpage>124</fpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Au erlechner, S.,
          <string-name>
            <surname>Jacobs</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khalimov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Tight cuto s for guarded protocols with fairness</article-title>
          .
          <source>In: VMCAI, Proceedings</source>
          . pp.
          <volume>476</volume>
          {
          <issue>494</issue>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Behrmann</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>David</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Larsen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>A tutorial on UPPAAL</article-title>
          . In:
          <article-title>Formal methods for the design of real-time systems</article-title>
          , pp.
          <volume>33</volume>
          {
          <fpage>35</fpage>
          . No. November, Springer (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Bengtsson</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yi</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          : Timed Automata: Semantics, Algorithms and Tools.
          <source>Tech. Rep</source>
          .
          <volume>316</volume>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Bouyer</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Model-checking timed temporal logics</article-title>
          .
          <source>Electronic Notes in Theoretical Computer Science</source>
          <volume>231</volume>
          ,
          <issue>323</issue>
          {
          <fpage>341</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bouyer</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chevalier</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markey</surname>
          </string-name>
          , N.:
          <article-title>On the expressiveness of TPTL and MTL</article-title>
          .
          <source>Information and Computation</source>
          <volume>208</volume>
          (
          <issue>2</issue>
          ),
          <volume>97</volume>
          {116 (Feb
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Emerson</surname>
            ,
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kahlon</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Reducing model checking of the many to the few</article-title>
          .
          <source>Automated Deduction-CADE-17</source>
          pp.
          <volume>236</volume>
          {
          <issue>254</issue>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Emerson</surname>
            ,
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tre</surname>
            <given-names>er</given-names>
          </string-name>
          , R.J.,
          <string-name>
            <surname>Wahl</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Reducing Model Checking of the Few to the One pp</article-title>
          .
          <volume>94</volume>
          {
          <issue>113</issue>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Emerson</surname>
            ,
            <given-names>E.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Namjoshi</surname>
            ,
            <given-names>K.S.</given-names>
          </string-name>
          :
          <article-title>On reasoning about rings</article-title>
          .
          <source>Int. J. Found. Comput. Sci</source>
          .
          <volume>14</volume>
          (
          <issue>4</issue>
          ),
          <volume>527</volume>
          {
          <fpage>550</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Esparza</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Finkel, a.,
          <string-name>
            <surname>Mayr</surname>
          </string-name>
          , R.:
          <article-title>On the veri cation of broadcast protocols</article-title>
          .
          <source>Proceedings. 14th Symposium on Logic in Comp. Sci. (July)</source>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>German</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sistla</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          :
          <article-title>Reasoning about systems with many processes</article-title>
          .
          <source>J. ACM</source>
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <volume>675</volume>
          {
          <fpage>735</fpage>
          (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Kaiser</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kroening</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wahl</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Dynamic cuto detection in parameterized concurrent programs</article-title>
          .
          <source>In: CAV, Proceedings</source>
          . pp.
          <volume>645</volume>
          {
          <fpage>659</fpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Spalazzi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spegni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Parameterized Model-Checking of Timed Systems with Conjunctive Guards</article-title>
          . In: Veri ed Software: Theories, Tools and Experiments, pp.
          <volume>235</volume>
          {
          <fpage>251</fpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>