Abstract
We automatically verify the crucial steps in the original proof of correctness of an algorithm which, given a geometric graph satisfying certain additional properties removes edges in a systematic way for producing a connected graph in which edges do not (geometrically) intersect. The challenge in this case is representing and reasoning about geometric properties of graphs in the Euclidean plane, about their vertices and edges, and about connectivity. For modelling the geometric aspects, we use an axiomatization of plane geometry; for representing the graph structure we use additional predicates; for representing certain classes of paths in geometric graphs we use linked lists.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The other axioms, which are derived from A1, A2, A3, A4, A5, A6 are listed in the extended version of this paper [10, Appendix 6.1].
- 2.
Since the clause form of some of the axioms contain more than one formula, and for doing the tests we used axioms in clause form, in such cases a range of numbers is used for the axioms.
- 3.
The predicate for the vertices is used here to distinguish between the axioms for geometry, which hold for arbitrary points, and properties for edges between vertices in a graph.
- 4.
This nullable subterm property has the role of excluding null pointer errors.
- 5.
The tests can be found under https://github.com/sofronie/tests-vmcai-2024.git and https://userpages.uni-koblenz.de/~boeltz/CP-Algorithm-Verification/.
- 6.
The tests can be found in https://github.com/sofronie/tests-vmcai-2024.git (folder Proof) and https://userpages.uni-koblenz.de/~boeltz/CP-Algorithm-Verification/Proof.
- 7.
Then \(d_2=w_3x_3\) or \(d_2=x_3w_3\) or \(d_2 = w_3x_2\) or \(d_2 = x_3x_2\).
- 8.
Depending on the edge intersecting with \(u_1v_1\), \(d_3\) is either \(w_3x_3\) or \(x_3w_3\).
- 9.
In Step5d-f it is proven that the considered edges do not intersect with \(w_2x_2\).
- 10.
A similar result is proven in tests Step 6h-j for the edges \(w_2w_4\) and \(w_3w_4\).
- 11.
The tests can be found in https://github.com/sofronie/tests-vmcai-2024.git (folder Proof) and https://userpages.uni-koblenz.de/~boeltz/CP-Algorithm-Verification/Proof.
References
Abdulaziz, M., Mehlhorn, K., Nipkow, T.: Trustworthy graph algorithms (invited talk). In: Rossmanith, P., Heggernes, P., Katoen, J. (eds.) 44th International Symposium on Mathematical Foundations of Computer Science, MFCS 2019, August 26-30, 2019, Aachen, Germany. LIPIcs, vol. 138, pp. 1:1–1:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2019). https://doi.org/10.4230/LIPIcs.MFCS.2019.1
Barriére, L., Fraigniaud, P., Narayanan, L.: Robust position-based routing in wireless ad hoc networks with unstable transmission ranges. In: Proceedings of the 5th ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL M 01), New York, New York, USA, pp. 19–27. ACM Press (2001). https://doi.org/10.1145/381448.381451
Beeson, M., Wos, L.: Finding proofs in Tarskian geometry. J. Autom. Reason. 58(1), 181–207 (2017). https://doi.org/10.1007/s10817-016-9392-2
Bettstetter, C., Hartmann, C.: Connectivity of wireless multihop networks in a shadow fading environment. Wireless Netw. 11(5), 571–579 (2005). https://doi.org/10.1007/s11276-005-3513-x
Bjørner, N., de Moura, L., Nachmanson, L., Wintersteiger, C.M.: Programming Z3. In: Bowen, J.P., Liu, Z., Zhang, Z. (eds.) SETSS 2018. LNCS, vol. 11430, pp. 148–201. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17601-3_4
Bjørner, N., Nachmanson, L.: Navigating the universe of Z3 theory solvers. In: Carvalho, G., Stolz, V. (eds.) SBMF 2020. LNCS, vol. 12475, pp. 8–24. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63882-5_2
Böhmer, S., Schneider, D., Frey, H.: Stochastic modeling and simulation for redundancy and coexistence in graphs resulting from log-normal shadowing. In: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems - MSWIM 2019, New York, New York, USA, pp. 173–182. ACM Press (2019). https://doi.org/10.1145/3345768.3355933
Böltz, L., Becker, B., Frey, H.: Local construction of connected plane subgraphs in graphs satisfying redundancy and coexistence. In: XI Latin and American Algorithms, Graphs and Optimization Symposium (LAGOS), pp. 1–10 (2021)
Böltz, L., Frey, H.: Existence of connected intersection-free subgraphs in graphs with redundancy and coexistence property. In: Dressler, F., Scheideler, C. (eds.) ALGOSENSORS 2019. LNCS, vol. 11931, pp. 63–78. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34405-4_4
Böltz, L., Sofronie-Stokkermans, V., Frey, H.: On the verification of the correctness of a subgraph construction algorithm (extended version), ArXiv, https://doi.org/10.48550/arXiv.2311.17860 (2023)
Böltz, L., Sofronie-Stokkermans, V., Frey, H.: Tests for the verification of the CP-algorithm (2023). https://github.com/sofronie/tests-vmcai-2024.git
Chen, T., Chen, J., Wu, C.: Distributed object tracking using moving trajectories in wireless sensor networks. Wirel. Networks 22(7), 2415–2437 (2016)
Courcelle, B.: On the expression of monadic second-order graph properties without quantifications over sets of edges (extended abstract). In: Proceedings of the Fifth Annual Symposium on Logic in Computer Science (LICS 1990), Philadelphia, Pennsylvania, USA, June 4–7, 1990, pp. 190–196. IEEE Computer Society (1990). https://doi.org/10.1109/LICS.1990.113745
Courcelle, B.: The monadic second-order logic of graphs VI: on several representations of graphs by relational structures. Discret. Appl. Math. 63(2), 199–200 (1995). https://doi.org/10.1016/0166-218X(95)00006-D
Courcelle, B.: The monadic second-order logic of graphs XVI: canonical graph decompositions. Log. Methods Comput. Sci. 2(2) (2006). https://doi.org/10.2168/LMCS-2(2:2)2006
Courcelle, B.: Monadic second-order logic for graphs: algorithmic and language theoretical applications. In: Dediu, A.H., Ionescu, A.M., Martín-Vide, C. (eds.) LATA 2009. LNCS, vol. 5457, pp. 19–22. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00982-2_2
Cox, D.A., Little, J., O’Shea, D.: Ideals, varieties, and algorithms - an introduction to computational algebraic geometry and commutative algebra (2. ed.). Undergraduate texts in mathematics, Springer (1997)
Doczkal, C., Pous, D.: Graph theory in Coq: minors, treewidth, and isomorphisms. J. Autom. Reason. 64, 795–825 (2020)
Dolzmann, A., Sturm, T., Weispfenning, V.: A new approach for automatic theorem proving in real geometry. J. Autom. Reason. 21(3), 357–380 (1998). https://doi.org/10.1023/A:1006031329384
Frey, H., Simplot-Ryl, D.: Localized topology control algorithms for ad hoc and sensor networks. In: Nayak, A., Stojmenovic, I. (eds.) Handbook of Applied Algorithms, chap. 15, pp. 439–464. Wiley, Hoboken (2007)
Frey, H., Stojmenovic, I.: On delivery guarantees and worst-case forwarding bounds of elementary face routing components in ad hoc and sensor networks. IEEE Trans. Comput. 59(9), 1224–1238 (2010). https://doi.org/10.1109/TC.2010.107
Heckel, R., Lambers, L., Saadat, M.G.: Analysis of graph transformation systems: Native vs translation-based techniques. In: Electronic Proceedings in Theoretical Computer Science, vol. 309, pp. 1–22 (2019). https://doi.org/10.4204/eptcs.309.1
Hilbert, D.: The Foundations of Geometry. 2nd ed. Chicago: Open Court. (1980 (1899))
Ihlemann, C., Jacobs, S., Sofronie-Stokkermans, V.: On local reasoning in verification. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 265–281. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78800-3_19
Ihlemann, C., Sofronie-Stokkermans, V.: System description: H-PILoT. In: Schmidt, R.A. (ed.) CADE 2009. LNCS (LNAI), vol. 5663, pp. 131–139. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02959-2_9
Karamete, B.K., Adhami, L., Glaser, E.: A fixed storage distributed graph database hybrid with at-scale OLAP expression and I/O support of a relational DB: kinetica-graph. CoRR abs/2201.02136 (2022). https://arxiv.org/abs/2201.02136
Kuhn, F., Wattenhofer, R., Zollinger, A.: Ad-hoc networks beyond unit disk graphs. In: ACM DIALM-POMC Joint Workshop on Foundations of Mobile Computing, pp. 69–78. San Diego (2003)
Mathews, E.: Planarization of geographic cluster-based overlay graphs in realistic wireless networks. In: 2012 Ninth International Conference on Information Technology - New Generations, pp. 95–101. IEEE (2012)
Mathews, E., Frey, H.: A localized link removal and addition based planarization algorithm. In: Bononi, L., Datta, A.K., Devismes, S., Misra, A. (eds.) ICDCN 2012. LNCS, vol. 7129, pp. 337–350. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25959-3_25
McPeak, S., Necula, G.C.: Data structure specifications via local equality axioms. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 476–490. Springer, Heidelberg (2005). https://doi.org/10.1007/11513988_47
Mirzaie, M., Mazinani, S.M.: MCFL: an energy efficient multi-clustering algorithm using fuzzy logic in wireless sensor network. Wirel. Networks 24(6), 2251–2266 (2018)
de Moura, L., Bjørner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337–340. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78800-3_24
Neumann, F., Vivas Estevao, D., Ockenfeld, F., Radak, J., Frey, H.: Short paper: structural network properties for local planarization of wireless sensor networks. In: Mitton, N., Loscri, V., Mouradian, A. (eds.) ADHOC-NOW 2016. LNCS, vol. 9724, pp. 229–233. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40509-4_16
Peuter, D., Sofronie-Stokkermans, V.: On invariant synthesis for parametric systems. In: Fontaine, P. (ed.) CADE 2019. LNCS (LNAI), vol. 11716, pp. 385–405. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29436-6_23
Philip, S.J., Ghosh, J., Ngo, H.Q., Qiao, C.: Routing on overlay graphs in mobile ad hoc networks. In: Proceedings of the IEEE Global Communications Conference, Exhibition & Industry Forum (GLOBECOM’06) (2006)
Piskac, R., de Moura, L.M., Bjørner, N.S.: Deciding effectively propositional logic using DPLL and substitution sets. J. Autom. Reason. 44(4), 401–424 (2010). https://doi.org/10.1007/s10817-009-9161-6
Sofronie-Stokkermans, V.: Hierarchic reasoning in local theory extensions. In: Nieuwenhuis, R. (ed.) CADE 2005. LNCS (LNAI), vol. 3632, pp. 219–234. Springer, Heidelberg (2005). https://doi.org/10.1007/11532231_16
Sturm, T., Weispfenning, V.: Computational geometry problems in REDLOG. In: Wang, D. (ed.) ADG 1996. LNCS, vol. 1360, pp. 58–86. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0022720
Tarski, A., Givant, S.: Tarski’s system of geometry. Bull. Symb. Log. 5(2), 175–214 (1999). https://doi.org/10.2307/421089
Weidenbach, C., Dimova, D., Fietzke, A., Kumar, R., Suda, M., Wischnewski, P.: SPASS Version 3.5. In: Schmidt, R.A. (ed.) CADE 2009. LNCS (LNAI), vol. 5663, pp. 140–145. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02959-2_10
Acknowledgment
We thank the reviewers for their helpful comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Böltz, L., Sofronie-Stokkermans, V., Frey, H. (2024). On the Verification of the Correctness of a Subgraph Construction Algorithm. In: Dimitrova, R., Lahav, O., Wolff, S. (eds) Verification, Model Checking, and Abstract Interpretation. VMCAI 2024. Lecture Notes in Computer Science, vol 14499. Springer, Cham. https://doi.org/10.1007/978-3-031-50524-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-50524-9_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50523-2
Online ISBN: 978-3-031-50524-9
eBook Packages: Computer ScienceComputer Science (R0)