2019
DOI: 10.1007/978-3-030-31277-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Liveness in Broadcast Networks

Abstract: We study two liveness verification problems for broadcast networks, a system model of identical clients communicating via message passing. The first problem is liveness verification. It asks whether there is a computation such that one of the clients visits a final state infinitely often. The complexity of the problem has been open since 2010 when it was shown to be P-hard and solvable in EXPSPACE. We close the gap by a polynomial-time algorithm. The algorithm relies on a characterization of live computations … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…Dually, it attempts to find an execution of some population of processes for which a property is violated. Within this context, the complexity of different variants of (parameterized) reachability and repeated coverability have been studied for RBN [12,11,8]. Moreover, many extensions of RBN with clocks, registers and probabilities have been proposed and studied, mainly within the perspective of parameterized verification [10,5,4].…”
Section: Introductionmentioning
confidence: 99%
“…Dually, it attempts to find an execution of some population of processes for which a property is violated. Within this context, the complexity of different variants of (parameterized) reachability and repeated coverability have been studied for RBN [12,11,8]. Moreover, many extensions of RBN with clocks, registers and probabilities have been proposed and studied, mainly within the perspective of parameterized verification [10,5,4].…”
Section: Introductionmentioning
confidence: 99%
“…(2) When we project a configuration visited by π (0, ) to Q, we obtain the corresponding configuration of π . We refer to [13] for the detailed construction. Note that client i visits F ¬ϕ infinitely often.…”
Section: Fair Model Checking Inputmentioning
confidence: 99%
“…The paper at hand is an extension of the conference version [12]. It features a new section, namely Sect.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Dually, it can be viewed as the problem of finding an execution of some number of agents which violates a given property. Ever since their introduction within this context [10], RBN have been studied extensively, with various results on (parameterized) reachability and coverability [8,10,3,7], along with various extensions using probabilities and clocks [5,4].…”
Section: Introductionmentioning
confidence: 99%