A research project funded by the Academy of
Finland
(project number 47754)
Jan 1, 2000 - Dec 31, 2002
Project leader:
Prof. Leo Ojala (Jan 1, 2000 - Nov 30, 2000)
Prof. Ilkka Niemelä
(Dec 1, 2000 - Dec 31, 2002)
Research Personnel:
Tomi Janhunen, Tuomas Aura, Keijo Heljanko, Harri Haanpää, Tommi
Junttila, Petteri Kaski, Timo Latvala, Marko Mäkelä, Teemu
Tynjälä, Silja Mäki, Heikki Tauriainen,
Rauni Pääkkönen, Harriet Beaver, Elina Parviainen
Summary:
This project continues earlier research work on the analysis and
design methods for parallel and distributed systems in the Laboratory
for Theoretical Computer Science. The aim is to develop new analysis
and verification methods for parallel and distributed systems based on
partial order semantics, symmetries and data abstraction, methodology
for designing and analyzing multi-agent systems and formal models for
information security systems.
The project continues earlier research in the TCS laboratory on the
analysis and design methods of parallel and distributed systems. The
plan of the project divided research work into work packages WP1-WP5.
Due to partiality of the funding granted by the Academy of Finland,
the work package WP3 (Modeling and Verification of Safety Critical Systems)
was moved to the Maria project (funded by industry and the National
Technology Agency of Finland) in the beginning of the year 2000.
In the work-package WP1 (Model Checking),
we have created and implemented an LTL model checker based on
finite complete prefixes [11,12,47,48,13]
and parallelised a prefix
generation procedure [15,49].
Many of these results can be found in Keijo Heljanko's
doctoral dissertation [39] that was accepted in April 2002.
The research in WP1 has also produced methods for the
automated testing of model checkers [5,35],
for handling of fairness properties [3,23],
for model checking of
safety properties [19,20,22,23,24,42,55], for
bounded model checking [1,14,16,17,50] and
for stubborn set optimization [6,37]. A number of case studies
have been conducted [4,27,28,36,43].
In WP2 (Symmetries and Data Abstraction in Verification),
we have investigated the computational complexity of the sub-problems
appearing in the symmetry reduction method when applied to place/transition
nets [2,52]. In addition, we have developed new
algorithms for comparing whether two states are equivalent under
symmetries and for producing equivalent representatives for
states [54,53]. Tommi Junttila's doctoral dissertation
on the symmetry method containing main results of WP3 has been submitted
for preliminary examination [40].
In WP4 (Agent-based Framework), a declarative language has been
designed for the formal description of multi-agent systems by combining
features from both rule-based languages and Petri nets in order to
obtain a more expressive language [51].
We have implemented a prototype system [45]
that enables automated execution of specifications in this language.
In WP5 (Formal Models for Information Security Systems),
we have dealt with the use of certificates in network security
protocols [10,25,26,46]
as well as methods against denial of service
attacks [7,8,9,18,21].
Many of the results of WP5 can be found in Tuomas Aura's
doctoral dissertation [38] that was accepted in December 2000.
Modelling of quantum computation using Petri nets as the formal model
has been investigated [29,30,31,32,33,44].
The research has been carried out in close cooperation
with the projects 43963 (Constraint Programming Based on Default Rules)
and 53695 (Applications of Rule-Based Constraint Programming)
funded by the Academy of Finland. In particular,
the rule-based constraint programming paradigm
has been exploited in
(i) developing efficient model checking techniques based on finite complete
prefixes and bounded model checking,
(ii) analysis of network security, and
(iii) specification of multi-agent systems.
Keywords: Parallel and distributed systems, verification,
agent-based computing, security
Tuomas Aura, D.Sc. (Tech.), 2000 [38]
Supervisor: Prof. Ilkka Niemelä
Graduate School: HeCSE
Keijo Heljanko, D.Sc. (Tech.), 2002 [39]
Supervisor: Prof. Ilkka Niemelä
Graduate School: HeCSE
Petteri Kaski, Lic.Sc. (Tech.), 2002 [41]
Supervisor: Prof. Pekka Orponen
Graduate School: HeCSE
Timo Latvala, Lic.Sc. (Tech.) 2002 [42]
Supervisor: Prof. Nisse Husberg
Graduate School: HeCSE
Teemu Tynjälä, Lic.Sc. (Tech.), 2003 [43]
Supervisor: Prof. Nisse Husberg
Graduate School: HeCSE
Rauni Pääkkönen, M.Sc. (Tech.), 2001 [45]
Supervisor: Prof. Ilkka Niemelä
-
Articles in international scientific journals with referee practice
- 1
-
Keijo Heljanko and Ilkka Niemelä,
``Bounded LTL Model Checking with Stable Models,''
Theory and Practice of Logic Programming.
Accepted for publication.
- 2
-
Tommi Junttila,
``Computational Complexity of the Place/Transition-Net
Symmetry Reduction Method,''
Journal of Universal Computer Science, Vol. 7, No. 4, 2001,
pp. 307-326.
- 3
-
Timo Latvala and Keijo Heljanko,
``Coping with Strong Fairness,''
Fundamenta Informaticae (Annales Societatis Mathematicae
Polonae, Series IV), Vol. 43, No. 1-4, 2000, pp. 175-193.
- 4
-
Leo Ojala, Nisse Husberg, and Teemu Tynjälä,
``Modelling and analysing a distributed dynamic channel allocation
algorithm for mobile computing using high-level net methods,''
International Journal on Software Tools for Technology Transfer,
Vol. 3, No. 4, 2001, pp. 382-393.
http://link.springer.de/link/service/journals/10009/bibs/1003004/10030382.htm
- 5
-
Heikki Tauriainen and Keijo Heljanko,
``Testing LTL Formula Translation into Büchi Automata,''
International Journal on Software Tools for Technology Transfer,
Vol. 4, No. 1, 2002, pp. 57-70.
http://link.springer.de/link/service/journals/10009/bibs/2004001/20040057.htm
- 6
-
Kimmo Varpaaniemi,
``Towards Ambitious Approximation Algorithms in Stubborn Set Optimization,''
Fundamenta Informaticae (Annales Societatis Mathematicae
Polonae, Series IV), Vol. 54, No. 2-3, 2003, pp. 279-294.
Articles in international scientific conference proceedings with referee practice
- 7
-
Tuomas Aura,
``DOS-Resistant Authentication with Client Puzzles
(Transcript of Discussion),''
in B. Christianson, B. Crispo, J.A. Malcolm, and M. Roe (Eds.),
Security Protocols, 8th International Workshop,
Cambridge, UK, April 3-5, 2000, Revised Papers,
Lecture Notes in Computer Science, Vol. 2133,
Springer-Verlag, Berlin, Germany, 2001, pp. 178-181.
http://link.springer.de/link/service/series/0558/bibs/2133/21330178.htm
- 8
-
Tuomas Aura, Matt Bishop, and Dean Sniegowski,
``Analyzing single-server network inhibition,''
in Proceedings of the 2000 IEEE Computer Security Foundations Workshop,
IEEE Computer Society Press, Los Alamitos CA, USA, 2000, pp. 108-117.
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=18612&page=0
- 9
-
Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo,
``DOS-Resistant Authentication with Client Puzzles,''
in B. Christianson, B. Crispo, J.A. Malcolm, and M. Roe (Eds.),
Security Protocols, 8th International Workshop,
Cambridge, UK, April 3-5, 2000, Revised Papers,
Lecture Notes in Computer Science, Vol. 2133,
Springer-Verlag, Berlin, Germany, 2001, pp. 170-177.
http://link.springer.de/link/service/series/0558/bibs/2133/21330170.htm
- 10
-
Tuomas Aura and Silja Mäki,
``Towards a Survivable Security Architecture for Ad Hoc Networks,''
in B. Christianson, B. Crispo, J.A. Malcolm, and M. Roe (Eds.),
Security Protocols, 9th International
Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers,
Lecture Notes in Computer Science, Vol. 2467, Springer-Verlag,
Berlin, Germany, 2002, pp. 63-73.
http://link.springer.de/link/service/series/0558/bibs/2467/24670063.htm
- 11
-
Javier Esparza and Keijo Heljanko,
``A New Unfolding Approach to LTL Model Checking,''
in U. Montanari, J.D.P. Rolim, and E. Welzl (Eds.),
Automata, Languages and Programming,
Lecture Notes in Computer Science, Vol. 1853,
Springer-Verlag, Berlin, Germany, 2000, pp. 475-486.
http://link.springer.de/link/service/series/0558/bibs/1853/18530475.htm
- 12
-
Javier Esparza and Keijo Heljanko,
``Implementing LTL Model Checking with Net Unfoldings,''
in M.B. Dwyer (Ed.),
Model Checking Software, 8th
International SPIN Workshop,
Lecture Notes in Computer Science, Vol. 2057,
Springer-Verlag, Berlin, Germany, 2001, pp. 37-56.
http://link.springer.de/link/service/series/0558/bibs/2057/20570037.htm
- 13
-
Keijo Heljanko,
``Model Checking with Finite Complete Prefixes is PSPACE-Complete,''
in C. Palamidessi (Ed.),
CONCUR 2000 -- Concurrency Theory,
Lecture Notes in Computer Science, Vol. 1877,
Springer-Verlag, Berlin, Germany, 2000, pp. 108-122.
http://link.springer.de/link/service/series/0558/bibs/1877/18770108.htm
- 14
-
Keijo Heljanko,
``Bounded Reachability Checking with Process Semantics,''
in K.G. Larsen and M. Nielsen (Eds.),
CONCUR 2001 -- Concurrency Theory,
Lecture Notes in Computer Science, Vol. 2154,
Springer-Verlag, Berlin, Germany, 2001, pp. 218-232.
http://link.springer.de/link/service/series/0558/bibs/2154/21540218.htm
- 15
-
Keijo Heljanko, Victor Khomenko, and Maciej Koutny,
``Parallelisation of the Petri Net Unfolding Algorithm,''
in J.-P. Katoen and P. Stevens (Eds.),
Tools and Algorithms for the Construction and Analysis of Systems,
Lecture Notes in Computer Science, Vol. 2280,
Springer-Verlag, Berlin, Germany, 2002, pp. 371-385.
http://link.springer.de/link/service/series/0558/bibs/2280/22800371.htm
- 16
-
Keijo Heljanko and Ilkka Niemelä,
``Answer Set Programming and Bounded Model Checking,''
in Answer Set Programming: Towards Efficient and
Scalable Knowledge Representation and Reasoning,
AAAI Press, 2001, pp. 90-96.
http://www.tcs.hut.fi/~ini/papers/HelNie-ASP2001.ps.gz
- 17
-
Keijo Heljanko and Ilkka Niemelä,
``Bounded LTL Model Checking with Stable Models,''
in T. Eiter, W. Faber, and M. Truszczynski (Eds.),
Logic Programming and Nonmonotonic Reasoning,
Lecture Notes in Artificial Intelligence, Vol. 2173,
Springer-Verlag, Berlin, Germany, 2001, pp. 200-212.
http://link.springer.de/link/service/series/0558/bibs/2173/21730200.htm
- 18
-
John R. Hughes, Tuomas Aura, and Matt Bishop,
``Using conservation of flow as a security mechanism
in network protocols,''
in Proceedings of the 2000 IEEE Symposium on Security and Privacy,
IEEE Computer Society Press, Los Alamitos CA, USA, 2000, pp. 132-141.
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=18435&page=0
- 19
-
Jukka Järvenpää and Marko Mäkelä,
``Towards Automated Checking of Component-Oriented
Enterprise Applications,''
in D. Moldt (Ed.), Second Workshop on Modelling of
Objects, Components and Agents, Aarhus, Denmark,
August 26-27, 2002,
University of Aarhus, Department of Computer Science, Report DAIMI
PB-561, 2002, pp. 67-85.
http://www.daimi.au.dk/CPnets/workshop02/moca/papers/
- 20
-
Timo Latvala,
``Efficient Model Checking of Safety Properties,''
in T. Ball and S.K. Rajamani (Eds.),
Model Checking Software, 10th International
SPIN Workshop, Portland, OR, USA, May 9-10, 2003, Proceedings,
Lecture Notes in Computer Science, Vol. 2648, Springer-Verlag,
Berlin, Germany, 2003, pp. 74-88.
http://link.springer.de/link/service/series/0558/bibs/2648/26480074.htm
- 21
-
Jussipekka Leiwo, Tuomas Aura, and Pekka Nikander,
``Towards network denial of service resistant protocols,''
in S. Qing and J.H.P. Eloff (Eds.),
Information Security for Global Information Infrastructures,
IFIP Series, Vol. 175,
Kluwer Academic Publishers, Boston, MA, USA, 2000, pp. 301-310.
- 22
-
Marko Mäkelä,
``Efficiently Verifying Safety Properties with Idle Office Computers,''
in C. Lakos, R. Esser, L.M. Kristensen, and J. Billington (Eds.),
Formal Methods in Software Engineering and Defence
Systems 2002, Proceedings of the Workshops on Software Engineering and Formal
Methods and Formal Methods Applied to Defence Systems,
Conferences in Research and Practice in Information Technology,
Vol. 12, Australian Computer Society Inc., Sydney, Australia, 2002,
pp. 11-16.
http://CRPIT.com/Vol12.html
- 23
-
Marko Mäkelä,
``Maria: Modular Reachability Analyser for Algebraic System Nets,''
in J. Esparza and C. Lakos (Eds.), Application and
Theory of Petri Nets 2002,
Lecture Notes in Computer Science, Vol. 2360, Springer-Verlag,
Berlin, Germany, 2002, pp. 434-444.
http://link.springer.de/link/service/series/0558/bibs/2360/23600434.htm
- 24
-
Marko Mäkelä,
``Model Checking Safety Properties in Modular High-Level Nets,''
in W.M.P. van der Aalst and E. Best (Eds.),
Application and Theory of Petri Nets 2003,
24th International Conference, ICATPN 2003,
Eindhoven, The Netherlands, June 23-27, 2003, Proceedings,
Lecture Notes in Computer Science, Vol. 2679, Springer-Verlag,
Berlin, Germany, 2003, pp. 201-220.
http://link.springer.de/link/service/series/0558/bibs/2679/26790201.htm
- 25
-
Silja Mäki,
``Towards a Survivable Security Architecture for Ad Hoc Networks
(Transcript of Discussion),''
in B. Christianson, B. Crispo, J.A. Malcolm, and M. Roe (Eds.),
Security Protocols, 9th International
Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers,
Lecture Notes in Computer Science, Vol. 2467, Springer-Verlag,
Berlin, Germany, 2002, pp. 74-79.
http://link.springer.de/link/service/series/0558/bibs/2467/24670074.htm
- 26
-
Silja Mäki, Tuomas Aura, and Maarit Hietalahti,
``Robust Membership Management for Ad-hoc Groups,''
in U. Erlingsson (Ed.),
NordSec 2000 -- Proceedings of the Fifth Nordic
Workshop on Secure IT Systems,
Reykjavik University, Iceland, 2000, pp. 151-168.
http://www.tcs.hut.fi/old/papers/aura/maki-aura-hietalahti-nordsec00-abstract.html
- 27
-
Leo Ojala, Nisse Husberg, and Teemu Tynjälä,
``Modelling and Analysing a Distributed Dynamic Channel Allocation
Algorithm for Mobile Computing Using High-Level Net Methods,''
in K. Jensen (Ed.),
Practical Use of High-Level Petri Nets,
DAIMI PB-547, University of Aarhus, Denmark, 2000, pp. 73-90.
http://www.daimi.au.dk/pn2000/proceedings/pn2000_hlpnworkshop.pdf
- 28
-
Leo Ojala, Nisse Husberg, and Teemu Tynjälä,
``Modelling a Distributed Wireless Channel Allocation Algorithm for
Cellular Systems with Mobile Base Stations Using Predicate/Transition Nets,''
in J. Lee, M. Juric, A. Bruzzone, D. Klovshy, and M. Fujita (Eds.),
SCI2000 / ISAS2000
(The 4th
World Multiconference on Systemics, Cybernetics and Informatics /
The 6th International Conference on
Information Systems, Analysis and Synthesis),
Orlando, FL, USA, July 23-26, Proceedings,
Vol. VIII (Computer Science and Engineering: Part II),
IIIS (International Institute of Informatics and Systemics),
Orlando, FL, USA, 2000, pp. 678-683.
- 29
-
Leo Ojala, Elina Parviainen, Olli-Matti Penttinen, Harriet Beaver,
and Teemu Tynjälä,
``Modeling Feynman's Quantum Computer using Stochastic High Level Petri Nets,''
in Proceedings of the 2001 IEEE International Conference on
Systems, Man and Cybernetics, Tucson, AZ, USA, October 7-9, 2001,
Vol. 4, IEEE, 2001, pp. 2735-2741.
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=20944&page=7
- 30
-
Leo Ojala, Elina Parviainen, Olli-Matti Penttinen, and Juha Reunanen,
``Feynman's Quantum Computer Modeled Using Petri Nets: A Case Study,''
in N.C. Callaos, T. Leng, and B. Sanchez (Eds.),
SCI2002 / ISAS2002
(The 6th World Multiconference on Systemics,
Cybernetics and Informatics /
The 8th
International Conference on Information Systems, Analysis
and Synthesis),
Orlando, FL, USA, July 14-18, 2002,
Proceedings, Vol. V (Computer Science I),
IIIS (International Institute of Informatics and Systemics),
Orlando, FL, USA, 2002.
- 31
-
Leo Ojala, Elina Parviainen, Olli-Matti Penttinen, Teemu Tynjälä,
and Harriet Beaver,
``Modeling Feynman's Serial Quantum Computer Using Stochastic Petri
Nets,''
in H.R. Arabnia(Ed.), Proceedings of the International
Conference on Parallel and Distributed Processing Techniques and
Applications, PDPTA'02, Las Vegas, NV, USA, June 24-27, 2002,
Vol. III, CSREA (Computer Science, Research, Education,
and Applications) Press, Athens, GA, USA, 2002, pp. 1223-1229.
- 32
-
Leo Ojala, Teemu Tynjälä, and Harriet Beaver,
``Modeling Serial Quantum Processors Using Petri Nets,''
in N.C. Callaos, F.G. Tinetti, J.M. Champarnaud,
and J.K. Lee (Eds.),
SCI2001 / ISAS2001
(The 5th World Multiconference on Systemics,
Cybernetics and Informatics /
The 7th
International Conference on Information Systems, Analysis
and Synthesis),
Orlando, FL, USA, July 22-25, 2001,
Proceedings, Vol. XIV
(Computer Science and Engineering: Part II),
IIIS (International Institute of Informatics and Systemics),
Orland, FL, USA, 2001, pp. 463-468.
- 33
-
Elina Parviainen,
``Reducing Size of Quantum Gate Matrices Using Pr/T-Nets,''
in Proceedings of the 2002 IEEE International Conference on
Systems, Man and Cybernetics, Hammamet, Tunisia, October 6-9, 2002,
Vol. 2, IEEE, 2002, pp. 634-639.
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=26297&page=7
- 34
-
Tuomo Pyhälä and Keijo Heljanko,
``Specification Coverage Aided Test Selection,''
in Proceedings og the 3rd International Conference
on Application of Concurrency to System Design (ACSD'2003),
Guimarães, Portugal, June 18-20, 2003.
Accepted for publication.
- 35
-
Heikki Tauriainen and Keijo Heljanko,
``Testing SPIN's LTL Formula Conversion into Büchi Automata with
Randomly Generated Input,''
in K. Havelund, J. Penix, and W. Visser (Eds.),
SPIN Model Checking and Software Verification,
Lecture Notes in Computer Science, Vol. 1885,
Springer-Verlag, Berlin, Germany, 2000, pp. 54-72.
- 36
-
Teemu Tynjälä, Sari Leppänen, and Vesa Luukkala,
``Verifying Reliable Data Transmission over UMTS Radio Interface with
High Level Petri Nets,''
in D.A. Peled and M.Y. Vardi (Eds.), Formal Techniques
for Networked and Distributed Systems -- FORTE 2002,
Lecture Notes in Computer Science, Vol. 2529, Springer-Verlag,
Berlin, Germany, 2002, pp. 178-193.
http://link.springer.de/link/service/series/0558/bibs/2529/25290178.htm
- 37
-
Kimmo Varpaaniemi,
``Towards Ambitious Approximation Algorithms in Stubborn Set Optimization,''
in H.-D. Burkhard, L. Czaja, G. Lindemann, A. Skowron,
and P.H. Starke (Eds.), Workshop: Concurrency,
Specification and Programming, CS&P'2002, Berlin, October 7-9, Vol. 2,
Humboldt University Berlin, Department of Computer Science,
Technical Report 161, Berlin, Germany, 2002, pp. 370-379.
http://www.tcs.hut.fi/Publications/info/kva.Vrp02c.shtml
Doctoral dissertations
- 38
-
Tuomas Aura,
Authorization and Availability -- Aspects of Open Network Security,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A64.
Espoo, November 2000, 42 pp.
Supervised in Laboratory for Theoretical Computer Science
by Professor Ilkka Niemelä.
Department of Computer Science and Engineering conferred the degree of
D.Sc. (Tech.) on December 15, 2000.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A64.shtml
- 39
-
Keijo Heljanko,
Combining Symbolic and Partial Order Methods for Model Checking 1-Safe
Petri Nets,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A71.
Espoo, February 2002, 55+112 pp.
Supervised in Laboratory for Theoretical Computer Science
by Professor Ilkka Niemelä.
Department of Computer Science and Engineering conferred the degree of
D.Sc. (Tech.) on April 22, 2002.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A71.shtml
- 40
-
Tommi Junttila,
On the Symmetry Reduction Method for Petri Nets and Related Formalisms.
Submitted for preliminary examination.
Licentiate's theses
- 41
-
Petteri Kaski,
A Census of Steiner Triple Systems and Some Related Combinatorial
Objects, December 2002, 83 pp.
Supervised in Laboratory for Theoretical Computer Science
by Professor Pekka Orponen.
Department of Computer Science and Engineering conferred the degree
of Lic.Sc. (Tech.) on December 19, 2002.
- 42
-
Timo Latvala,
On Model Checking Safety Properties, December 2002, 64 pp.
Supervised in Laboratory for Theoretical Computer Science
by Professor (pro tem) Nisse Husberg.
Department of Computer Science and Engineering conferred the degree
of Lic.Sc. (Tech.) on December 19, 2002.
Published as [55].
- 43
-
Teemu Tynjälä,
Combining abstractions and reachability analysis:
A case study of the RLC protocol, March 2003, 61 pp.
Supervised in Laboratory for Theoretical Computer Science
by Professor (pro tem) Nisse Husberg.
Department of Computer Science and Engineering conferred the degree
of Lic.Sc. (Tech.) on March 17, 2003.
Master's theses
- 44
-
Elina Parviainen.
Modeling the Operation of Margolus Quantum Cellular Automaton Using
High-Level Petri Nets, June 2002, 64 pp.
Supervised in Laboratory for Theoretical Computer Science
by Professor Ilkka Niemelä.
Department of Computer Science and Engineering accepted the thesis
on June 10, 2002.
http://www.tcs.hut.fi/Publications/info/bibdb.ParviainenMsc.shtml
- 45
-
Rauni Pääkkönen,
Implementing a formal agent description language,
December 2001, 62 pp.
Supervised in Laboratory for Theoretical Computer Science
by Professor Ilkka Niemelä.
Department of Computer Science and Engineering conferred the degree
of M.Sc. (Tech.) on December 17, 2001.
Other scientific publications
- 46
-
Tuomas Aura and Carl Ellison,
Privacy and Accountability in Certificate Systems,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A61,
Espoo, April 2000, 17 pp.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A61.shtml
- 47
-
Javier Esparza and Keijo Heljanko,
A New Unfolding Approach to LTL Model Checking,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A60,
Espoo, April 2000, 32 pp.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A60.shtml
- 48
-
Javier Esparza and Keijo Heljanko,
Implementing LTL Model Checking
with Net Unfoldings,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A68,
Espoo, March 2001, 29 pp.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A68.shtml
- 49
-
Keijo Heljanko, Victor Khomenko, and Maciej Koutny,
Parallelisation of the Petri Net Unfolding Algorithm,
University of Newcastle upon Tyne,
Department of Computing Science,
Technical Reports CS-TR-733,
Newcastle upon Tyne, UK, June 2001, 14 pp.
http://www.cs.ncl.ac.uk/research/pubs/trs/papers/733.pdf
- 50
-
Keijo Heljanko and Ilkka Niemelä,
``Petri Net Analysis and Nonmonotonic Reasoning,''
in N. Husberg, T. Janhunen, and I. Niemelä (Eds.),
Leksa Notes in Computer Science:
Festschrift in Honour of Professor Leo Ojala,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A63,
Espoo, October 2000, pp. 7-19.
http://www.tcs.hut.fi/~kepa/publications/hn-lncs.ps.gz
- 51
-
Tomi Janhunen,
``Specifying Agent-Based Systems with Nets and Logic Programs,''
in N. Husberg, T. Janhunen, and I. Niemelä (Eds.),
Leksa Notes in Computer Science:
Festschrift in Honour of Professor Leo Ojala,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A63,
Espoo, October 2000, pp. 33-46.
- 52
-
Tommi Junttila,
Computational Complexity of the Place/Transition-Net
Symmetry Reduction Method,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A59,
Espoo, April 2000, 16 pp.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A59.shtml
- 53
-
Tommi Junttila,
New Canonical Representative Marking Algorithms for
Place/Transition-Nets,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A75,
Espoo, October 2002, 37 pp.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A75.shtml
- 54
-
Tommi Junttila,
Symmetry Reduction Algorithms for Data Symmetries,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A72,
Espoo, May 2002, 49 pp.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A72.shtml
- 55
-
Timo Latvala,
On Model Checking Safety Properties,
Helsinki University of Technology,
Laboratory for Theoretical Computer
Science, Research Reports HUT-TCS-A76,
Espoo, December 2002, 61 pp.
http://www.tcs.hut.fi/Publications/info/bibdb.HUT-TCS-A76.shtml