Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Heljanko, K

.
  1. arXiv:2405.04297  [pdf, other

    cs.SC

    Certifying Phase Abstraction

    Authors: Nils Froleyks, Emily Yu, Armin Biere, Keijo Heljanko

    Abstract: Certification helps to increase trust in formal verification of safety-critical systems which require assurance on their correctness. In hardware model checking, a widely used formal verification technique, phase abstraction is considered one of the most commonly used preprocessing techniques. We present an approach to certify an extended form of phase abstraction using a generic certificate forma… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  2. arXiv:2208.01443  [pdf, other

    cs.LO

    Stratified Certification for k-Induction

    Authors: Emily Yu, Nils Froleyks, Armin Biere, Keijo Heljanko

    Abstract: Our recently proposed certification framework for bit-level k-induction-based model checking has been shown to be quite effective in increasing the trust of verification results even though it partially involved quantifier reasoning. In this paper we show how to simplify the approach by assuming reset functions to be stratified. This way it can be lifted to word-level and in principle to other the… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  3. CEFIoT: A Fault-Tolerant IoT Architecture for Edge and Cloud

    Authors: Asad Javed, Keijo Heljanko, Andrea Buda, Kary Främling

    Abstract: Internet of Things (IoT), the emerging computing infrastructure that refers to the networked interconnection of physical objects, incorporates a plethora of digital systems that are being developed by means of a large number of applications. Many of these applications administer data collection on the edge and offer data storage and analytics capabilities in the cloud. This raises the following pr… ▽ More

    Submitted 23 January, 2020; originally announced January 2020.

    Comments: 6 pages, 6 figures

    Journal ref: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5-8 February, 2018

  4. arXiv:1904.06895  [pdf, other

    cs.LG stat.ML

    Exploiting Event Log Event Attributes in RNN Based Prediction

    Authors: Markku Hinkka, Teemu Lehto, Keijo Heljanko

    Abstract: In predictive process analytics, current and historical process data in event logs is used to predict the future, e.g., to predict the next activity or how long a process will still require to complete. Recurrent neural networks (RNN) and its subclasses have been demonstrated to be well suited for creating prediction models. Thus far, event attributes have not been fully utilized in these models.… ▽ More

    Submitted 15 January, 2020; v1 submitted 15 April, 2019; originally announced April 2019.

  5. Classifying Process Instances Using Recurrent Neural Networks

    Authors: Markku Hinkka, Teemu Lehto, Keijo Heljanko, Alexander Jung

    Abstract: Process Mining consists of techniques where logs created by operative systems are transformed into process models. In process mining tools it is often desired to be able to classify ongoing process instances, e.g., to predict how long the process will still require to complete, or to classify process instances to different classes based only on the activities that have occurred in the process inst… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: Proceedings of the BPM 2018 Workshops

  6. arXiv:1710.02823  [pdf, other

    cs.LG cs.DB cs.SE stat.ML

    Structural Feature Selection for Event Logs

    Authors: Markku Hinkka, Teemu Lehto, Keijo Heljanko, Alexander Jung

    Abstract: We consider the problem of classifying business process instances based on structural features derived from event logs. The main motivation is to provide machine learning based techniques with quick response times for interactive computer assisted root cause analysis. In particular, we create structural features from process mining such as activity and transition occurrence counts, and ordering of… ▽ More

    Submitted 17 May, 2018; v1 submitted 8 October, 2017; originally announced October 2017.

    Comments: Extended version of a paper published in the proceedings of the BPM 2017 workshops

  7. arXiv:1702.06704  [pdf, ps, other

    cs.PL cs.LO

    Portability Analysis for Axiomatic Memory Models. PORTHOS: One Tool for all Models

    Authors: Hernán Ponce-de-León, Florian Furbach, Keijo Heljanko, Roland Meyer

    Abstract: We present Porthos, the first tool that discovers porting bugs in performance-critical code. Porthos takes as input a program and the memory models of the source architecture for which the program has been developed and the target model to which it is ported. If the code is not portable, Porthos finds a bug in the form of an unexpected execution - an execution that is consistent with the target bu… ▽ More

    Submitted 28 April, 2017; v1 submitted 22 February, 2017; originally announced February 2017.

  8. arXiv:1507.02744  [pdf, other

    cs.LO

    Unfolding-Based Process Discovery

    Authors: Hernán Ponce-de-León, César Rodríguez, Josep Carmona, Keijo Heljanko, Stefan Haar

    Abstract: This paper presents a novel technique for process discovery. In contrast to the current trend, which only considers an event log for discovering a process model, we assume two additional inputs: an independence relation on the set of logged activities, and a collection of negative traces. After deriving an intermediate net unfolding from them, we perform a controlled folding giving rise to a Petri… ▽ More

    Submitted 9 July, 2015; originally announced July 2015.

    Comments: This is the unabridged version of a paper with the same title appearead at the proceedings of ATVA 2015

  9. Synchronous Counting and Computational Algorithm Design

    Authors: Danny Dolev, Keijo Heljanko, Matti Järvisalo, Janne H. Korhonen, Christoph Lenzen, Joel Rybicki, Jukka Suomela, Siert Wieringa

    Abstract: Consider a complete communication network on $n$ nodes, each of which is a state machine. In synchronous 2-counting, the nodes receive a common clock pulse and they have to agree on which pulses are "odd" and which are "even". We require that the solution is self-stabilising (reaching the correct operation from any initial state) and it tolerates $f$ Byzantine failures (nodes that send arbitrary m… ▽ More

    Submitted 5 January, 2015; v1 submitted 21 April, 2013; originally announced April 2013.

    Comments: 35 pages, extended and revised version

  10. arXiv:1111.0064   

    cs.DC cs.LO cs.SE

    Proceedings 10th International Workshop on Parallel and Distributed Methods in verifiCation

    Authors: Jiří Barnat, Keijo Heljanko

    Abstract: This volume contains the proceedings of the 10th International Workshop on Parallel and Distributed Methods in verifiCation (PDMC 2011) that took place in Snowbird, Utah, on July 14, 2011. The workshop was co-located with 23rd International Conference on Computer Aided Verification (CAV 2011). The PDMC workshop series covers all aspects related to the verification and analysis of very large and co… ▽ More

    Submitted 31 October, 2011; originally announced November 2011.

    Comments: EPTCS 72, 2011

    ACM Class: D.1.3; D.2.4

  11. Tarmo: A Framework for Parallelized Bounded Model Checking

    Authors: Siert Wieringa, Matti Niemenmaa, Keijo Heljanko

    Abstract: This paper investigates approaches to parallelizing Bounded Model Checking (BMC) for shared memory environments as well as for clusters of workstations. We present a generic framework for parallelized BMC named Tarmo. Our framework can be used with any incremental SAT encoding for BMC but for the results in this paper we use only the current state-of-the-art encoding for full PLTL. Using this en… ▽ More

    Submitted 13 December, 2009; originally announced December 2009.

    Journal ref: EPTCS 14, 2009, pp. 62-76

  12. Linear Encodings of Bounded LTL Model Checking

    Authors: Armin Biere, Keijo Heljanko, Tommi Junttila, Timo Latvala, Viktor Schuppan

    Abstract: We consider the problem of bounded model checking (BMC) for linear temporal logic (LTL). We present several efficient encodings that have size linear in the bound. Furthermore, we show how the encodings can be extended to LTL with past operators (PLTL). The generalised encoding is still of linear size, but cannot detect minimal length counterexamples. By using the virtual unrolling technique min… ▽ More

    Submitted 16 November, 2006; v1 submitted 6 November, 2006; originally announced November 2006.

    Comments: Final version for Logical Methods in Computer Science CAV 2005 special issue

    ACM Class: F.3.1; B.6.3; D.2.4; F.4.1

    Journal ref: Logical Methods in Computer Science, Volume 2, Issue 5 (November 15, 2006) lmcs:2236

  13. arXiv:cs/0305040  [pdf, ps, other

    cs.LO cs.AI

    Bounded LTL Model Checking with Stable Models

    Authors: Keijo Heljanko, Ilkka Niemelä

    Abstract: In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. As the model of asynchronous systems a generalisation of communicating automata, 1-safe Petri nets, are used. It is shown how a 1-safe Petri net and a requirement on the behaviour of the net can be translated into a logic program such that the bounded… ▽ More

    Submitted 23 May, 2003; originally announced May 2003.

    Comments: 32 pages, to appear in Theory and Practice of Logic Programming

    ACM Class: D.2.4; D.2.2; F.4.1; I.2.4; F.3.1