Academia.eduAcademia.edu

Termination detection

description135 papers
group0 followers
lightbulbAbout this topic
Termination detection is a computational problem in distributed systems that involves determining whether all processes in a system have completed their execution. It is crucial for ensuring the correctness of concurrent algorithms and for resource management in environments where processes operate asynchronously.
lightbulbAbout this topic
Termination detection is a computational problem in distributed systems that involves determining whether all processes in a system have completed their execution. It is crucial for ensuring the correctness of concurrent algorithms and for resource management in environments where processes operate asynchronously.

Key research themes

1. How can automated techniques leverage loop acceleration and SMT-solving to prove program non-termination and infer lower bounds on runtime?

This research area focuses on algorithmic and tool-based methods that transform loops in integer programs into nondeterministic straight-line code, enabling symbolic under-approximations useful for proving non-termination and establishing worst-case lower bounds on runtime. The use of SMT (Satisfiability Modulo Theories) solving and unsatisfiable core analysis uniquely improves efficiency and scalability. Understanding how loop acceleration can uncover infinite executions and provide precise computational complexity lower bounds is pivotal for both bug detection and formal program analysis.

Key finding: Introduces an enhanced Loop Acceleration Tool (LoAT) that implements a novel loop acceleration calculus integrated into a framework for full integer programs. By transforming loops into non-deterministic straight-line code... Read more
Key finding: Presents a resource analysis method that exploits termination proofs to generate cost relation systems (CRS) which are linearly bounded, enabling the sound derivation of closed-form upper bounds for program resource usage.... Read more
Key finding: Proves decidability of the halting problem for triangular weakly non-linear polynomial loops by analyzing loop executions on given inputs and constructing witnesses for non-termination. The work also advances methods to... Read more

2. What distributed termination detection protocols exist for asynchronous, dynamic, or fault-prone networks, including cognitive radio networks, message-passing architectures, and systems with crashes and recoveries?

Termination detection in distributed systems is non-trivial due to lack of global state, asynchronous communication, node mobility, failures, and unreliable channels. This theme encompasses protocols and algorithms designed for various architectures, including cognitive radio networks where channel occupancy changes, fine-grained message-passing systems requiring synchronization barriers, and crash-recovery models where processes may restart. Investigations analyze logical structures, communication patterns, fault models, and hardware/software co-design to enable safe, efficient detection of global termination or quiescence.

Key finding: Proposes a termination detection protocol tailored for multi-hop cognitive radio networks where nodes dynamically switch channels in response to primary user activity and mobility. The protocol employs credit distribution and... Read more
Key finding: Develops a refutable barrier primitive supporting termination detection integrated into an asynchronous, large-scale fine-grained message-passing architecture with tens of thousands of RISC-V threads. The primitive avoids... Read more
Key finding: Identifies two conditions under which safe termination detection is possible in asynchronous distributed systems subject to crash-recovery faults: (1) eventual reliability of processes (no infinite crash-recovery cycles), and... Read more

3. How can termination proofs be certified and formally verified using proof assistants integrated with automated termination tools?

This area covers the interplay between highly automated termination analyzers and formal proof assistants (such as Coq) to produce mechanically checked, reliable termination proofs. The challenge lies in constructing proof traces or certificates from automated tools that can be formally verified, thereby combining the advantages of automation with the rigour of proof assistants. Techniques involve embedding rewriting systems, dependency pairs, and polynomial interpretations as formal objects and using a combination of shallow and deep embeddings to optimize certificate size and verification complexity.

Key finding: Presents a mixed shallow and deep embedding framework in the Coq proof assistant to certify complex termination proofs generated by automated tools such as CiME. This approach balances proof representation size and... Read more
Key finding: Introduces a novel decision procedure for size-change termination (SCT) that directly encodes the existence of global ranking functions into SAT solving. This SAT-based method handles a sizable SCT subset with polynomially... Read more

All papers in Termination detection

The recently established computational equivalence between the traditional message-passing model and the mobile-agents model is based on the existence of a mobile-agents algorithm that simulates the execution of message-passing... more
In this paper we describe a technique for automatic construction of ontology, a semantic representation of a conceptualization, for any domain, organization or enterprise whose Web site is existent with quiet a big mine of information. An... more
With rapidly increasing concurrency, the HPC community is looking for new parallel programming paradigms to make best use of current and up-coming machines. Under the Japanese CREST funding program, the post-petascale HPC project... more
With rapidly increasing concurrency, the HPC community is looking for new parallel programming paradigms to make best use of current and up-coming machines. Under the Japanese CREST funding program, the post-petascale HPC project... more
Rule-based programs used in mission-and safety-critical applications need to be shown to be free of hazards. This paper discusses formal proof-techniques which promise to assist designers in this task. In this paper we show that the... more
Reliability, defined as the guarantee that a program satisfies its specifications, is an important aspect of many applications for which rule-based expert systems are suited. Verification refer to the process used to determine the... more
The term shared dataspace refers to the general class of programming languages in which the principal means of communication among the concurrent components of programs is a common, content-addressable data structure called a dataspace.... more
The OpenSHMEM Analyzer is a compiler-based tool that can help users detect errors and provide useful analyses about their OpenSHMEM applications. The tool is built on top of the Open64 compiler and presents OpenSHMEM information as... more
Most highly dynamic infrastructure-less networks have in common that the assumption of connectivity does not necessarily hold at a given instant. Still, communication routes can be available between any pair of nodes over time and space.... more
We consider infrastructure-less highly dynamic networks, where connectivity does not necessarily hold, and the network may actually be disconnected at every time instant. These networks are naturally modeled as time-varying graphs.... more
Highly dynamic networks rarely offer end-to-end connectivity at a given time. Yet, connectivity in these networks can be established over time and space, based on temporal analogues of multi-hop paths (also called journeys). Attempting to... more
On shared-memory systems, Cilk-style work-stealing has been used to effectively parallelize irregular task-graph based applications such as Unbalanced Tree Search (UTS). There are two main difficulties in extending this approach to... more
A 2-stage detector was designed to find rho-independent transcription terminators in the Escherichia coli genome. The detector includes a Stochastic Context Free Grammar (SCFG) component and a Support Vector Machine (SVM) component. To... more
A 2-stage detector was designed to find rho-independent transcription terminators in the Escherichia coli genome. The detector includes a Stochastic Context Free Grammar (SCFG) component and a Support Vector Machine (SVM) component. To... more
Purpose: Design reliable distributed protocols Special math needed for explanation: Algebra Special math needed to use results: Same Results useful to: Theoreticians and distributed-software developers Summary & Conclusions-Termination... more
We describe a rapid, automated method for direct detection of known single-base changes in genomic DNA. Fluorescence-based DNA minisequence analysis is employed in a templatedependent reaction which involves a single nucleotide extension... more
The termination detection problem involves detecting whether an ongoing distributed computation has ceased all its activities. We investigate the termination detection problem in an asynchronous distributed system under the crash-recovery... more
A new stochastic framework is proposed for distribution system restoration (DSR) problem. In this framework, dynamic programming (DP) is used to solve DSR problem for a distribution system that accommodates various technologies of... more
A new stochastic framework is proposed for distribution system restoration (DSR) problem. In this framework, dynamic programming (DP) is used to solve DSR problem for a distribution system that accommodates various technologies of... more
A combination of the multicast communication problem and the maximum disjoint paths problem can be addressed by creating well-formed schedules of inter-nodal message exchange.
A distributed and fully symmetric solution is presented for the distributed termination problem. In contrast to the existing solutions. the above solution does not require a predesignated process to detect termination. The case of... more
Abstract: Eleven reformulated gasoline fuels (RFGs) were evaluated by CVS tests on a chassis dynamometer to compare their effect on vehicle emissions of toxic volatile organic compounds (HVOCs). Fuel formulations were prepared by varying... more
In 2020 Bang-Jensen et al. generalized the Hajós join of two graphs to the class of digraphs and generalized several results for vertex colorings in digraphs. Although, as a consequence of these results, a digraph can be obtained by Hajós... more
We describe a rapid, automated method for direct detection of known single-base changes in genomic DNA. Fluorescence-based DNA minisequence analysis is employed in a templatedependent reaction which involves a single nucleotide extension... more
The global quiescence of a distributed computation (or distributed termination detection) is an important problem. Some concurrent programming languages and systems provide global quiescence detection as a built-in feature so that... more
The global quiescence of a distributed computation (or distributed termination detection) is an important problem. Some concurrent programming languages and systems provide global quiescence detection as a built-in feature so that... more
For large-scale and complex societies of agents monitoring and control are important to both agent designers and society administrators. Specifically, interaction monitoring and termination detection are of importance in optimising... more
We introduce a theoretical algorithm and its practical version to perform decentralized detection of the global convergence of parallel asynchronous iterative algorithms. We prove that even if the algorithm is completely decentralized,... more
The OpenSHMEM Analyzer is a compiler-based tool that can help users detect errors and provide useful analyses about their OpenSHMEM applications. The tool is built on top of the Open64 compiler and presents OpenSHMEM information as... more
Given a simple digraph D on n vertices (with n ≥ 2), there is a natural construction of a semigroup of transformations D. For any edge (a, b) of D, let a → b be the idempotent of rank n − 1 mapping a to b and fixing all vertices other... more
Wadler's deforestation algorithm eliminates intermediate data structures from functional programs. To be suitable for inclusion in a compiler, deforestation must terminate on all programs. Several techniques exist to ensure termination of... more
We investigate global measures of vertex similarity for knowledge graphs. While vertex similarity has been explored in the context of directed, unlabelled graphs, measures based on recursive algorithms or learning frameworks can be costly... more
Credit risk models, particularly those that seek to understand what signals are given by companies on the verge of bankruptcy, are under constant discussion and continually updated. Statistical models, for example, Discriminant Analysis... more
We present an efficient approach to detect a locally stable predicate in a distributed computation. Examples of properties that can be formulated as locally stable predicates include termination and deadlock of a subset of processes. Our... more
A distributed and fully symmetric solution is presented for the distributed termination problem. In contrast to the existing solutions. the above solution does not require a predesignated process to detect termination. The case of... more
Feature Recognition (FR) plays major role in engineering significance of a part model and serves as an important support tool for integrated manufacturing. Feature-based systems typically act as inter link between the CAD and CAM... more
We characterize exactly the cases in which it is possible to elect a leader in an anonymous network of processors by a deterministic algorithm, and we show that for every network there is a weak election algorithm (i.e., if election is... more
bytes/s, versus 0.435 bytes/s for the structured file. It should be noted that this is about a factor of ten slower than the MACRO-li assembler processing native input. ACKNOWLEDGMENT The author wishes to acknowledge the efforts of F.... more
A number of interpolation functions, including some radial basis functions, were evaluated for accuracy and computing time requirements when fitting high dimensional response surfaces. In addition, a hybrid method was developed that uses... more
Clustered data are a common occurrence in the social and behavioral sciences and pose a challenge when analyzing data using confirmatory factor analysis (CFA). In addition to potentially compromising point estimates and standard errors,... more
The purpose of this paper is to develop the transfer function for the ride and handling performance for military tracked vehicle. This transfer function will be used in placed of the expensive physical hardware or simulation model for... more
Determine how economic-social factors affect Peru's national competitiveness management, which is represented by productivity as a dependent variable. These factors are seven, so seven specific objectives were proposed, some of them... more
It is now well established that the device scaling predicted by Moore's Law is no longer a viable option for increasing the clock frequency of future uniprocessor systems at the rate that had been sustained during the last two decades. As... more
A combination of the multicast communication problem and the maximum disjoint paths problem can be addressed by creating well-formed schedules of inter-nodal message exchange.
A combination of the multicast communication problem and the maximum disjoint paths problem can be addressed by creating well-formed schedules of inter-nodal message exchange.
Distributed Constraint Satisfaction is a framework for modeling and solving distributed problems. Research on the topic intensied during the last ten years when mainly systematic techniques were thoroughly explored. A revival of attention... more
It is of critical importance to be aware of the historical discrimination embedded in the data and to consider a fairness measure to reduce bias throughout the predictive modeling pipeline. Various notions of fairness have been defined,... more
Download research papers for free!