<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>M. Ghani);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Towards Model Consistency between abstract and explicit Delay-Robustness in Timed Graph Transformation System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mustafa Ghani</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Holger Giese</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Hasso Plattner Institute, University of Potsdam</institution>
          ,
          <addr-line>Potsdam</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The increasing interconnectivity of embedded software systems has led to the rise of new types of Multi-Agent Systems, such as Distributed Cyber-Physical Systems, where agents synchronize by exchanging observations and local actions with remote agents. This inter-agent message passing involves (transmission, propagation, queuing, and processing) delays, which may compromise safety in safety-critical decision-making systems due to outdated information. Therefore, we proposed a methodology to derive explicit delay-robust models (resilient to δ -delays) preserving safety from safe abstract models that assume zero-delays. However, this procedure requires iterative model checking steps. In this paper, we motivate to eliminate the need for costly iterations by exploring behavioral equivalences between explicit and abstract models to define a consistency notion. This consistency facilitates the systematic transfer of verified guarantees to unverified models, efectively eliminating the need for additional model checking.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Cyber-Physical Systems Engineering</kwd>
        <kwd>Formal Modeling</kwd>
        <kwd>Model Consistency</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Timed Graph Transformation System</title>
      <p>
        A graph G = (Gv, Ge, sG, tG) consists of a set Gv of nodes, a set Ge of edges, a source function sG: Ge →
GV, and a target function tG: Ge → Gv. Let G = (Gv, Ge, sG, tG) be a graph. Let Gs = (Gvs, Ges, sGs, tGs)
be a subgraph of G, if. Gvs ⊆ Gv and Ges ⊆ Ge. G|Gs denotes Gs is a subgraph of G. For a set X of clocks
Φ (X) denotes the set of all clocks contraints ϕ generated by ϕ ::= x1 ∼ c | xa - xj ∼ c | ϕ ∧ ϕ , where ∼ ∈
{&lt;, &gt;, ≤ , ≥ }, c ∈ N ∪ {∞} are constants, and xa, xj ∈ X are clocks. Let X be a set of clocks. V(X) denotes
the set of all functions v: X → R and is called Clock valuation. Let v: X → R and X’ ⊆ X. Then v[X’ :=
0] : X → R is a clock reset such that for any x ∈ X holds if x ∈ X’, then v[X’ := 0](x) = 0 else v[X’ :=
0](x) = v(x). Let v: X → R and δ ∈ R . Then v + δ : X → R is a clock increment such that for any x → X
holds (v + δ )(x) = v(x)+ δ . Let v: X → R and ϕ be some constraint over X. Then v |= ϕ denotes that
v satisfies the constraint ϕ . Let v0: X → R be the initial clock valuation if v0(x) = 0 for every x ∈ X.
V0(X) is the singleton set containing the unique initial clock valuation. Let H = (Hv, He, sH, tH) and
G be two graphs. An injective graph morphism (short: morphism) mg: G → H is a pair of mappings
mv: Gv → Hv and me: Ge → He, where mv ◦ sG = sH ◦ me and mv ◦ tG = tH ◦ me. Graph Conditions
(GCs) are used to state properties on graphs requiring the presence or absence of certain subgraphs in a
host graph using propositional connectives and (nested) existential quantification over graph patterns.
Let TG be a distinguished graph, called type graph. A type graph has attributes connected to local
variables and an attribute condition (AC) over many-sorted first-order attribute logic, which is used
to specify the values for those local variables. Tg = (G, mg’) is a typed graph, where G is a graph and
mg’ is a morphism: G → TG. Let Tg1 = (T1, t1) and Tg2 = (T2, t2) be two typed graphs. A typed graph
morphism tgm: Tg1 → Tg2 is a morphism mg”: T1 → T2, which is compatible with the typing functions,
i.e., t2 ◦ mg” = t1. Let ρ = (L, R, K, NAC, l: K → L, r: K → R, ω, prio) be a Graph Transformation Rule
(short: rule), if L (called left-hand side of rule), K (called interface graph of rule), R (called right-hand
side of rule) are (typed) graphs, l and r are two (typed) morphisms, NAC is a finite set of forbidden
(typed) graphs X containing L, prio: R → N assigns a priority to each rule, and ω is the Application
Condition (ApC) that is expressed as a graph condition. The transformation procedure defining a graph
transformation approach introduced by the Double Pushout Approach [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and is used throughout in
this paper. Intuitively, the adaption of graph G can be realized by using the graph transformation rule ρ ,
which enforces additions and removals of subgraphs from G resulting in graph Gi, if ρ can be applied to
G by satisying ApC ω for a match ma: G → Gi. Finally, we define Graph Transformations. Let GTS
= (R, G, prior) be a graph transformation system, if. R is a finite set of finite rules, G is a graph, and
prio: R → N is a mapping assigning priorities, formulated as a natural number, to each rule. Rule ri ∈ R
with priority pi ∈ N suppress rule rj ∈ R and its priority pj ∈ N if pi &gt; pj. A Graph Transformation Step
(short: step) is if Rule ρ transforms Graph G into Graph J. A step is called the application of a rule. If
G is transformed to J by a (possibly empty) sequence of rule applications/ steps, then we write →G−− ∗
J. Let tGTS be a Timed Graph Transformation System, then tGTS = (R, G, time, prio, NAC) is a typed
timed graph transformation system (short: TGTS), if. R is a finite set of finite rules, G is a graph, time:
G ⇀ R0+ is a partial function that maps a graph to an element of the set of all real numbers greater or
equal to 0, i.e., a total timepoint, and prio: R → N. Note, function CN(G) = {n | n ∈ Gv ∧ mg’v(n) =
Clock} identifies in every graph the nodes used for time measurement.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Research Objective</title>
      <p>To bypass model checking of SA1 and ease the general proposed methodology, we aim to transfer
verified safeness from S E1 to SA1 by design. The underlying idea to archieve this, is to explore the formal
relationship between the two models (i.e., SE1 and SA1) to leverage model consistency, which enables
transferring safety. Therefore, we define the following research questions.</p>
      <p>• Are SE1 and SA1 formally in relation?
• How can model-based guarantees be systematically transferred from SE1 to SA1 by design?
To address this research gap, we aim to identify potential behavioral equivalences among SE1 and SA1.
Establishing such a formal relation may facilitate the transfer of safety guarantees from SE1 to SA1 by
design, thereby eliminating the need for model checking of the latter. However, this approach presents
challenges in determining the appropriate level of abstraction required. Furthermore, SE1 may introduce
potential states that violate safety, which were not reachable in SE0.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Related Work</title>
      <p>
        Since model-based consistency research is inherently tied to its domain, and approaches that formally
reason about consistency assume additional information about what is being analyzed with respect to
the consistency notion [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], we restrict ourselves to models of Timed Graph Transformation Systems with
a focus on delay-robustness for mission-critical systems. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] the authors presented a diferent version
of Timed Graph Transformation Systems neither supporting quantitative analysis nor considering
delay-robustness. In [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ], inter-agent message delays were not explicit considered since message
passing was restricted by allowing communication within a given timing intervall. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], we presented
an approach to derive explicit delay-robustness for a given abstract model. However, this approach
requires the verification of every generated model (i.e., S E0, SE1, SA1) while in this work we propose a
consistency relation making model checking for SA1 not required and assuring delay-robustness per
design.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and Future Work</title>
      <p>In this paper, we discussed the motivation for reducing the computational cost and the number of
modelchecking iterations in our previously proposed approach by defining a consistency relation between
SE1 and SA1. Such a formal relation could serve as the foundation for systematically transferring
modelbased guarantees. In this context, we identified key research questions and the associated challenges
related to achieving this objective.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <sec id="sec-6-1">
        <title>This research was funded by the HPI Research School on Systems Design.</title>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <sec id="sec-7-1">
        <title>The authors have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Forouzan</surname>
          </string-name>
          ,
          <article-title>Data communications and networking</article-title>
          ,
          <source>Huga Media</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Van Steen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Tanenbaum</surname>
          </string-name>
          ,
          <article-title>A brief introduction to distributed systems</article-title>
          ,
          <source>Computing</source>
          <volume>98</volume>
          (
          <year>2016</year>
          )
          <fpage>967</fpage>
          -
          <lpage>1009</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ghani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schneider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Maximova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Giese</surname>
          </string-name>
          ,
          <article-title>Deriving delay-robust timed graph transformation system models</article-title>
          ,
          <source>in: International Conference on Graph Transformation</source>
          , Springer,
          <year>2024</year>
          , pp.
          <fpage>158</fpage>
          -
          <lpage>179</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Schmalz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Völzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Varacca</surname>
          </string-name>
          ,
          <article-title>Model checking almost all paths can be less expensive than checking all paths</article-title>
          ,
          <source>in: International Conference on Foundations of Software Technology and Theoretical Computer Science</source>
          , Springer,
          <year>2007</year>
          , pp.
          <fpage>532</fpage>
          -
          <lpage>543</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E.</given-names>
            <surname>Hartmut</surname>
          </string-name>
          , E. Karsten,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ulrike</surname>
          </string-name>
          , T. Gabriele,
          <article-title>Fundamentals of algebraic graph transformation, Monographs in theoretical computer science</article-title>
          .
          <source>An EATCS series</source>
          . Springer (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Pascual</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Beckert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbrich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kirsten</surname>
          </string-name>
          , W. Pfeifer,
          <article-title>Formal foundations of consistency in model-driven development</article-title>
          ,
          <source>in: International Symposium on Leveraging Applications of Formal Methods</source>
          , Springer,
          <year>2024</year>
          , pp.
          <fpage>178</fpage>
          -
          <lpage>200</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gyapay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Heckel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Varró</surname>
          </string-name>
          ,
          <article-title>Graph transformation with time: Causality and logical clocks</article-title>
          , in: Graph Transformation: First International Conference,
          <source>ICGT 2002 Barcelona, Spain, October</source>
          <volume>7</volume>
          -
          <issue>12</issue>
          ,
          <year>2002</year>
          Proceedings 1, Springer,
          <year>2002</year>
          , pp.
          <fpage>120</fpage>
          -
          <lpage>134</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Maximova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Giese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Krause</surname>
          </string-name>
          ,
          <article-title>Probabilistic timed graph transformation systems</article-title>
          , in: Graph Transformation: 10th International Conference, ICGT 2017,
          <article-title>Held as Part of STAF 2017</article-title>
          , Marburg, Germany,
          <source>July 18-19</source>
          ,
          <year>2017</year>
          , Proceedings 10, Springer,
          <year>2017</year>
          , pp.
          <fpage>159</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Maximova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schneider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Giese</surname>
          </string-name>
          ,
          <article-title>Compositional analysis of probabilistic timed graph transformation systems</article-title>
          ,
          <source>Formal Aspects of Computing</source>
          <volume>35</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>79</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>