<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1 plus MathML 2.0 plus SVG 1.1//EN" "http://www.w3.org/2002/04/xhtml-math-svg/xhtml-math-svg.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
  <head>
    <meta http-equiv="Content-Type" content="application/xhtml+xml; charset=utf-8"/>
    <title>Project-Team:SUMO</title>
    <link rel="stylesheet" href="../static/css/raweb.css" type="text/css"/>
    <meta name="description" content="New Results - New results on Axis 1: Quantitative models"/>
    <meta name="dc.title" content="New Results - New results on Axis 1: Quantitative models"/>
    <meta name="dc.subject" content=""/>
    <meta name="dc.publisher" content="INRIA"/>
    <meta name="dc.date" content="(SCHEME=ISO8601) 2019-01"/>
    <meta name="dc.type" content="Report"/>
    <meta name="dc.language" content="(SCHEME=ISO639-1) en"/>
    <meta name="projet" content="SUMO"/>
    <script type="text/javascript" src="https://cdn.mathjax.org/mathjax/latest/MathJax.js?config=TeX-MML-AM_CHTML">
      <!-- MathJax -->
    </script>
    <script type="text/javascript" src="../static/js/piwik.js">
      <!-- Piwik JS -->
    </script>
    <noscript>
      <p>
        <img src="https://piwik.inria.fr/matomo.php?idsite=49&amp;rec=1" style="border:0;" alt=""/>
      </p>
      <!-- Piwik Img -->
    </noscript>
  </head>
  <body>
    <div class="tdmdiv">
      <div class="logo">
        <a href="http://www.inria.fr">
          <img style="align:bottom; border:none" src="../static/img/icons/logo_INRIA-coul.jpg" alt="Inria"/>
        </a>
      </div>
      <div class="TdmEntry">
        <div class="tdmentete">
          <a href="uid0.html">Project-Team Sumo</a>
        </div>
        <span>
          <a href="uid1.html">Team, Visitors, External Collaborators</a>
        </span>
      </div>
      <div class="TdmEntry">Overall Objectives<ul><li><a href="./uid3.html">Context</a></li><li><a href="./uid4.html">Necessity of quantitative models</a></li><li><a href="./uid5.html">Specificities of distributed systems</a></li><li><a href="./uid6.html">New issues raised by large systems</a></li></ul></div>
      <div class="TdmEntry">Research Program<ul><li><a href="uid8.html&#10;&#9;&#9;  ">Introduction</a></li><li><a href="uid9.html&#10;&#9;&#9;  ">Axis 1: Quantitative models</a></li><li><a href="uid10.html&#10;&#9;&#9;  ">Axis 2: Large systems</a></li><li><a href="uid11.html&#10;&#9;&#9;  ">Axis 3: Population models</a></li><li><a href="uid12.html&#10;&#9;&#9;  ">Axis 4: Data-driven models</a></li><li><a href="uid13.html&#10;&#9;&#9;  ">Transversal concern: missing models</a></li></ul></div>
      <div class="TdmEntry">Application Domains<ul><li><a href="uid20.html&#10;&#9;&#9;  ">Smart transportation systems</a></li><li><a href="uid21.html&#10;&#9;&#9;  ">Management of telecommunication networks and of data centers</a></li><li><a href="uid22.html&#10;&#9;&#9;  ">Collaborative workflows</a></li></ul></div>
      <div class="TdmEntry">Highlights of the Year<ul><li><a href="./uid24.html">Changes in 2019</a></li></ul></div>
      <div class="TdmEntry">New Software and Platforms<ul><li><a href="uid26.html&#10;&#9;&#9;  ">Active Workspaces</a></li><li><a href="uid30.html&#10;&#9;&#9;  ">SIMSTORS</a></li></ul></div>
      <div class="TdmEntry">New Results<ul><li class="tdmActPage"><a href="uid35.html&#10;&#9;&#9;  ">New results on Axis 1: Quantitative models</a></li><li><a href="uid46.html&#10;&#9;&#9;  ">New results on Axis 2: Large Systems Models</a></li><li><a href="uid54.html&#10;&#9;&#9;  ">New results on Axis 3:
Population Models</a></li><li><a href="uid61.html&#10;&#9;&#9;  ">New results on Axis 4:
Data-driven Models</a></li><li><a href="uid69.html&#10;&#9;&#9;  ">New results on Transversal Concern:
Missing Models</a></li></ul></div>
      <div class="TdmEntry">Bilateral Contracts and Grants with Industry<ul><li><a href="uid74.html&#10;&#9;&#9;  ">Bilateral Contracts with Industry</a></li></ul></div>
      <div class="TdmEntry">Partnerships and Cooperations<ul><li><a href="uid80.html&#10;&#9;&#9;  ">Regional Initiatives</a></li><li><a href="uid83.html&#10;&#9;&#9;  ">National Initiatives</a></li><li><a href="uid108.html&#10;&#9;&#9;  ">International Initiatives</a></li><li><a href="uid139.html&#10;&#9;&#9;  ">International Research Visitors</a></li></ul></div>
      <div class="TdmEntry">Dissemination<ul><li><a href="uid152.html&#10;&#9;&#9;  ">Promoting Scientific Activities</a></li><li><a href="uid196.html&#10;&#9;&#9;  ">Teaching - Supervision - Juries</a></li><li><a href="uid249.html&#10;&#9;&#9;  ">Popularization</a></li></ul></div>
      <div class="TdmEntry">
        <div>Bibliography</div>
      </div>
      <div class="TdmEntry">
        <ul>
          <li>
            <a id="tdmbibentyear" href="bibliography.html">Publications of the year</a>
          </li>
          <li>
            <a id="tdmbibentfoot" href="bibliography.html#References">References in notes</a>
          </li>
        </ul>
      </div>
    </div>
    <div id="main">
      <div class="mainentete">
        <div id="head_agauche">
          <small><a href="http://www.inria.fr">
	    
	    Inria
	  </a> | <a href="../index.html">
	    
	    Raweb 
	    2019</a> | <a href="http://www.inria.fr/en/teams/sumo">Presentation of the Project-Team SUMO</a> | <a href="http://www.irisa.fr/sumo/index.html">SUMO Web Site
	  </a></small>
        </div>
        <div id="head_adroite">
          <table class="qrcode">
            <tr>
              <td>
                <a href="sumo.xml">
                  <img style="align:bottom; border:none" alt="XML" src="../static/img/icons/xml_motif.png"/>
                </a>
              </td>
              <td>
                <a href="sumo.pdf">
                  <img style="align:bottom; border:none" alt="PDF" src="IMG/qrcode-sumo-pdf.png"/>
                </a>
              </td>
              <td>
                <a href="../sumo/sumo.epub">
                  <img style="align:bottom; border:none" alt="e-pub" src="IMG/qrcode-sumo-epub.png"/>
                </a>
              </td>
            </tr>
            <tr>
              <td/>
              <td>PDF
</td>
              <td>e-Pub
</td>
            </tr>
          </table>
        </div>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid30.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid46.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
      <div id="textepage">
        <!--DEBUT2 du corps du module-->
        <h2>Section: 
      New Results</h2>
        <h3 class="titre3">New results on Axis 1: Quantitative models</h3>
        <a name="uid36"/>
        <h4 class="titre4">Verification of Real-Time Models</h4>
        <p class="notaparagraph"><b>Participants :</b> Ocan Sankur, Nicolas Markey, Victor Roussanaly</p>
        <p/>
        <a name="uid37"/>
        <h5 class="titre5">Abstraction-refinement algorithms for model
checking of timed automata.</h5>
        <p>The abstraction domain we consider <a href="./bibliography.html#sumo-2019-bid6">[26]</a>
abstracts away zones by restricting the set of clock constraints
that can be used to define them, while the refinement procedure
computes the set of constraints that must be taken into
consideration in the abstraction so as to exclude a given spurious
counterexample. We implement this idea in two ways: an enumerative
algorithm where a lazy abstraction approach is adopted, meaning that
possibly different abstract domains are assigned to each exploration
node; and a symbolic algorithm where the abstract transition system
is encoded with Boolean formulas.</p>
        <a name="uid38"/>
        <h5 class="titre5">Robust controller synthesis problem in Büchi timed automata </h5>
        <p>We solve a robust controller synthesis problem
<a href="./bibliography.html#sumo-2019-bid7">[20]</a>
in a purely symbolic way. The goal of the controller is to play according to an accepting lasso of the
automaton, while resisting to timing perturbations chosen by a
competing environment. The problem was previously shown to be
<i>PSPACE</i>-complete using regions-based techniques, but we provide a
first tool solving the problem using zones only, thus more resilient
to state-space explosion problem. The key ingredient is the
introduction of branching constraint graphs allowing to decide in
polynomial time whether a given lasso is robust, and even compute
the largest admissible perturbation if it is. We also make an
original use of constraint graphs in this context in order to test
the inclusion of timed reachability relations, crucial for the
termination criterion of our algorithm. Our techniques are
illustrated using a case study on the regulation of a train network.</p>
        <a name="uid39"/>
        <h4 class="titre4">Verification of Stochastic Models</h4>
        <p class="notaparagraph"><b>Participants :</b> Hugo Bazille, Nathalie Bertrand, Éric Fabre, Blaise Genest, Ocan Sankur</p>
        <p/>
        <a name="uid40"/>
        <h5 class="titre5">Long-run satisfaction of path properties</h5>
        <p>We introduced the concepts of long-run frequency of path properties
for paths in Kripke structures, and their generalization to long-run
probabilities for schedulers in Markov decision processes <a href="./bibliography.html#sumo-2019-bid8">[13]</a>. We then
studied the natural optimization problem of computing the optimal
values of these measures, when ranging over all paths or all
schedulers, and the corresponding decision problem when given a
threshold. The main results are as follows. For (repeated)
reachability and other simple properties, optimal long-run
probabilities and corresponding optimal memoryless schedulers are
computable in polynomial time. When it comes to constrained
reachability properties, memoryless schedulers are no longer
sufficient, even in the non-probabilistic setting. Nevertheless,
optimal long-run probabilities for constrained reachability are
computable in pseudo-polynomial time in the probabilistic setting and
in polynomial time for Kripke structures. Finally for co-safety
properties expressed by NFA, we gave an exponential-time algorithm to
compute the optimal long-run frequency, and proved the
PSPACE-completeness of the threshold problem.</p>
        <a name="uid41"/>
        <h5 class="titre5">Approximate Verification of Dynamic Bayesian Networks.</h5>
        <p>We are interested in studying the evolution of large homogeneous populations of cells, where each cell is assumed to be
composed of a group of biological players (species) whose dynamics is governed by a complex biological pathway, identical for all cells.
Modeling the inherent variability of the species concentrations in different cells is crucial to understand the dynamics of the population. In <a href="./bibliography.html#sumo-2019-bid9">[9]</a>, we focus on handling this variability by modeling each species by a random variable that evolves over time. This appealing approach runs into the curse of dimensionality since exactly representing a joint probability distribution involving a large set of random
variables quickly becomes intractable as the number of variables grows. To make this approach amenable to biopathways, we explore
different techniques to (i) approximate the exact joint distribution at a given time point, and (ii) to track its evolution as time elapses.</p>
        <a name="uid42"/>
        <h5 class="titre5">Classification among stochastic systems</h5>
        <p>An important task in AI is one of classifying an observation as belonging to one class among several
(e.g. image classification). We revisit this problem in a verification context:
given <span class="math"><math xmlns="http://www.w3.org/1998/Math/MathML"><mi>k</mi></math></span> partially observable systems modeled as Hidden Markov Models (HMMs, also called labeled Markov chains), and an
execution of one of them, can we eventually classify which system performed this execution, just by
looking at its observations? Interestingly, this problem generalizes several problems in verification
and control, such as fault diagnosis and opacity. Also, classification has strong connections with
different notions of distances between stochastic models.</p>
        <p>In <a href="./bibliography.html#sumo-2019-bid10">[12]</a>,
we study a general and practical notion of classifiers, namely limit-sure classifiers,
which allow misclassification, i.e. errors in classification, as long as the probability of misclassification
tends to 0 as the length of the observation grows.
To study the complexity of several notions of
classification, we develop techniques based on a simple but powerful notion of stationary distributions
for HMMs. We prove that one cannot classify among HMMs iff there is a finite separating word
from their stationary distributions. This provides a direct proof that classifiability can be checked in
PTIME, as an alternative to existing proofs using separating events (i.e. sets of infinite separating
words) for the total variation distance. Our approach also allows us to introduce and tackle new
notions of classifiability which are applicable in a security context.</p>
        <a name="uid43"/>
        <h5 class="titre5">Fault diagnosis for stochastic systems</h5>
        <p>Diagnosis of partially observable stochastic systems prone to faults
was introduced in the late nineties. Diagnosability, <i>i.e.</i> the
existence of a diagnoser, may be specified in different ways: exact
diagnosability requires that almost surely a fault is detected and
that no fault is erroneously claimed; approximate diagnosability
tolerates a small error probability when claiming a fault; last,
accurate approximate diagnosability guarantees that the error
probability can be chosen arbitrarily small.</p>
        <p>In the article <a href="./bibliography.html#sumo-2019-bid11">[7]</a>, we first refine the
specification of diagnosability by identifying three criteria: (1)
detecting faulty runs or providing information for all runs (2)
considering finite or infinite runs, and (3) requiring or not a
uniform detection delay. We then give a complete picture of
relations between the different diagnosability specifications for
probabilistic systems and establish characterisations for most of
them in the finite-state case. Based on these characterisations, we
develop decision procedures, study their complexity and prove their
optimality. We also design synthesis algorithms to construct
diagnosers and we analyse their memory requirements. Finally we
establish undecidability of the diagnosability problems for which we
provided no characterisation.</p>
        <a name="uid44"/>
        <h4 class="titre4">Energy Games</h4>
        <p class="notaparagraph"><b>Participants :</b> Loïc Hélouët, Nicolas Markey</p>
        <p/>
        <a name="uid45"/>
        <h5 class="titre5">Games with reachability objectives under energy constraints.</h5>
        <p>Under strict energy constraints (either only lower-bound constraint or interval constraint),
we prove <a href="./bibliography.html#sumo-2019-bid12">[23]</a> that
games with reachability objectives are
LOGSPACE-equivalent to energy games with the same energy constraints but without reachability
objective (i.e., for infinite runs). We then consider two kinds of relaxations of the upper-bound
constraints (while keeping the lower-bound constraint strict): in the first one, called weak upper bound,
the upper bound is absorbing, in the sense that it allows receiving more energy when the upper bound
is already reached, but the extra energy will not be stored; in the second one, we allow for temporary
violations of the upper bound, imposing limits on the number or on the amount of violations. We prove that when considering weak upper bound, reachability objectives require memory, but can still be solved in polynomial-time for one-player arenas; we prove that they are in co-NP in the two-player setting. Allowing for bounded violations makes the problem PSPACE-complete for one-player arenas and EXPTIME-complete for two players.</p>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid30.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid46.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
    </div>
  </body>
</html>
