Abstract
Automatically generating invariants, key to computer-aided analysis of probabilistic and deterministic programs and compiler optimisation, is a challenging open problem. Whilst the problem is in general undecidable, the goal is settled for restricted classes of loops. For the class of solvable loops, introduced by Rodríguez-Carbonell and Kapur (in: Proceedings of the ISSAC, pp 266–273, 2004), one can automatically compute invariants from closed-form solutions of recurrence equations that model the loop behaviour. In this paper we establish a technique for invariant synthesis for loops that are not solvable, termed unsolvable loops. Our approach automatically partitions the program variables and identifies the so-called defective variables that characterise unsolvability. Herein we consider the following two applications. First, we present a novel technique that automatically synthesises polynomials from defective monomials, that admit closed-form solutions and thus lead to polynomial loop invariants. Second, given an unsolvable loop, we synthesise solvable loops with the following property: the invariant polynomials of the solvable loops are all invariants of the given unsolvable loop. Our implementation and experiments demonstrate both the feasibility and applicability of our approach to both deterministic and probabilistic programs.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Extension of previous work
This paper is an extended version of the conference paper ‘Solving invariant generation for unsolvable loops’ published at SAS 2022 [1]. We extended the text and results from the conference paper.
In addition, this paper brings the following two new contributions when compared to our SAS 2022 paper [1]. First, we introduce an algorithmic approach (Algorithm 2) that synthesises solvable loops from unsolvable loops, such that the polynomial invariants of the solvable loop are also invariants of the unsolvable one. Second, we expand the list of unsolvable loops (with new Examples 36–43), drawn from the Mathematics and Physics literature; our benchmarks yield a new test suite for evaluating loop analysis techniques and demonstrate the feasibility of our approach.
2 Introduction
2.1 Background and motivation
With substantial progress in computer-aided program analysis and automated reasoning, several techniques have emerged to automatically synthesise loop invariants, thus advancing a central challenge in the computer-aided verification of programs with loops. In this paper, we address the problem of automatically generating loop invariants in the presence of polynomial arithmetic, which is still unsolved. This problem remains unsolved even when we restrict consideration to loops that are non-nested, without conditionals, and/or without exit conditions. Our work improves the state of the art under such and similar considerations.
Loop invariants, in the sequel simply invariants, are properties that hold before and after every iteration of a loop. Invariants therefore provide the key inductive arguments for automating the verification of programs; for example, proving correctness of deterministic loops [2,3,4,5,6] and correctness of hybrid and probabilistic loops [7,8,9], or data flow analysis and compiler optimisation [10]. One challenging aspect in invariant synthesis is the derivation of polynomial invariants for arithmetic loops. Such invariants are defined by polynomial relations \(P(x_1, \dots , x_k) = 0\) among the program variables \(x_1, \ldots , x_k\). While deriving polynomial invariants is, in general, undecidable [11], efficient invariant synthesis techniques emerge when considering restricted classes of polynomial arithmetic in so-called solvable loops [2], such as loops with (blocks of) affine assignments [3,4,5,6].
A common approach for constructing polynomial invariants, first pioneered in [12, 13], is to (i) map a loop to a system of recurrence equations modelling the behaviour of program variables; (ii) derive closed-forms for program variables by solving the recurrences; and (iii) compute polynomial invariants by eliminating the loop counter n from the closed-forms. The polynomial invariants resulting from step (iii) over-approximate the fixed point of the loop. The central components in this setting follow. In step (i) a recurrence operator is employed to map loops to recurrences, which leads to closed-forms for the program variables as exponential polynomials in step (ii); that is, each program variable is written as a finite sum of the form \(\sum _j P_j(n) \lambda _j^n\) parameterised by the \(n\)th loop iteration for polynomials \(P_j\) and algebraic numbers \(\lambda _j\). From the theory of algebraic recurrences, this is the case if and only if the behaviour of each variable obeys a linear recurrence equation with constant coefficients [14, 15]. Exploiting this result, the class of recurrence operators that can be linearised are called solvable [2]. Intuitively, a loop with a recurrence operator is solvable only if the non-linear dependencies in the resulting system of polynomial recurrences are acyclic (see Sect. 3). However, even simple loops may fall outside the category of solvable operators, but still admit polynomial invariants and closed-forms for combinations of variables. This phenomenon is illustrated in Fig. 1 whose recurrence operators are not solvable (i.e. unsolvable). In other works, the generation of polynomial invariants is usually limited to those variables that admit closed-forms. In our work, specifically step (iii), we can generate polynomial invariants from combinations of program variables that admit closed-forms (where individual variables may fail to do so). This analysis can lead to a tighter over-approximation of a loop’s fixed point. In general, the main obstacle in the setting of unsolvable recurrence operators is the absence of “well-behaved” closed-forms for the resulting recurrences.
2.2 Related work
To the best of our knowledge, the study of invariant synthesis from the viewpoint of recurrence operators is mostly limited to the setting of solvable operators (or minor generalisations thereof). In [2, 16] the authors introduce solvable loops and mappings to model loops with (blocks of) affine assignments and propose solutions for steps (i)–(iii) for this class of loops: all polynomial invariants are derived by first solving linear recurrence equations and then eliminating variables based on Gröbner basis computation. These results have further been generalised in [3, 6] to handle more generic recurrences; in particular, deriving arbitrary exponential polynomials as closed-forms of loop variables and allowing restricted multiplication among recursively updated loop variables. The authors of [5, 17] generalise the setting: they consider more complex programs and devise abstract (wedge) domains to map the invariant generation problem to the problem of solving C-finite recurrences. (We give further details of this class of recurrences in Sect. 2). All the aforementioned approaches are mainly restricted to C-finite recurrences for which closed-forms always exist, thus yielding loop invariants. In [9, 18] the authors establish techniques to apply invariant synthesis techniques developed for deterministic loops to probabilistic programs. Instead of devising recurrences describing the precise value of variables in step (i), their approach produces C-finite recurrences describing (higher) moments of program variables, yielding moment-based invariants after step (iii).
Pushing the boundaries in analyzing unsolvable loops is addressed in [5, 19]. The approach of [5] extracts C-finite recurrences over linear combinations of loops variables from unsolvable loops. For example, the method presented in [5] can also synthesise the closed-forms identified by our work for Fig. 1a. However, unlike [5], our work is not limited to linear combinations (we can extract C-finite recurrences over polynomial relations in the loop variables). As such, the technique of [5] cannot synthesise the polynomial loop invariant in Fig. 1b, whereas our work can. A further related approach to our work is given in [19], yet in the setting of loop termination. However, our work is not restricted to solvable loops that are triangular, but can handle mutual dependencies among (unsolvable) loop variables, as evidenced in Fig. 1.
Related work in the literature introduces techniques from the theory of martingales in order to synthesise invariants in the setting of probabilistic programs [20]. Therein, the programming model is represented by a class of loop programs where all updates are linear and the synthesised invariants are given by linear templates. By contrast, our method allows us to handle polynomial arithmetic; in particular, we automatically generate invariants given by monomials in the program variables. On the other hand, the approach of [20] can also synthesise supermartingales whereas our work is restricted to invariants defined by equalities.
2.3 Our contributions
In this paper we consider the sister problems of invariant generation and solvable loop synthesis in the setting of unsolvable recurrence operators. We introduce the notions of effective and defective program variables where, figuratively speaking, the defective variables are those “responsible” for unsolvability. Our main contributions are summarised below.
-
1.
Crucial for our synthesis technique is our novel characterisation of unsolvable recurrence operators in terms of defective variables (Theorem 14). Our approach complements existing techniques in loop analysis, by extending these methods to the setting of ‘unsolvable’ loops.
-
2.
On the one hand, defective variables do not generally admit closed-forms. On the other hand, some polynomial combinations of such variables are well-behaved (see e.g., Fig. 1). We show how to compute the set of defective variables in polynomial time (Algorithm 1).
-
3.
We introduce a new technique to synthesise valid linear relations in defective monomials such that these relations admit closed-forms, from which polynomial loop invariants follow (Sect. 5).
-
4.
Given an unsolvable loop, we introduce an algorithmic approach (Algorithm 2) that synthesises a solvable loop with the following property: every polynomial invariant of the solvable loop is also an invariant of the given unsolvable loop (Sect. 6).
-
5.
We generalise our work to the analysis of probabilistic program loops (Sect. 7) and showcase further applications of unsolvable operators in such programs (Sect. 8).
-
6.
We provide a fully automated approach in the tool Polar.Footnote 1 For evaluating our work, we compiled an extensive lists of challenging loops from the literature, including applications of mathematical and physical modelling. Our experiments demonstrate the feasibility of invariant synthesis for ‘unsolvable’ loops and the applicability of our approach to deterministic loops, probabilistic models, and biological systems (Sect. 9).
2.4 Beyond invariant generation
We believe our work can provide new solutions towards compiler optimisation challenges. Scalar evolutionFootnote 2 is a technique to detect general induction variables. Scalar evolution and general induction variables are used for a multitude of compiler optimisations, for example inside the LLVM toolchain [21]. On a high-level, general induction variables are loop variables that satisfy linear recurrences. As we show in our work, defective variables do not satisfy linear recurrences in general; hence, scalar evolution optimisations cannot be applied upon them. However, some linear combinations of defective monomials do satisfy linear recurrences, which opens avenues where we can apply scalar evolution techniques over such monomials. In particular, our work automatically computes polynomial combinations of some defective loop variables, which potentially enlarges the class of loops that, for example, LLVM can optimise.
2.5 Structure and summary of results
The rest of this paper is organised as follows. We briefly recall preliminary material in Sect. 2. Section 3 abstracts from concrete recurrence-based approaches to invariant synthesis via recurrence operators. Section 4 introduces effective and defective variables, presents Algorithm 1 that computes the set of defective program variables in polynomial time, and characterises unsolvable loops in terms of defective variables (Theorem 14). In Sect. 5 we present our new technique that synthesises linear relations in defective monomials that admit well-behaved closed-forms. In Sect. 6 we introduce Algorithm 2 to synthesise solvable loops. That is, given an unsolvable loop, Algorithm 2 outputs a solvable loop, if it exists such that each polynomial invariant of the solvable loop is also an invariant of the unsolvable loop. In Sect. 7 we detail the necessary changes to the algorithms in Sects. 5 and 6 for probabilistic programs. We illustrate our approach with several case-studies in Sect. 8, and describe a fully-automated tool support of our work in Sect. 9. We also report on accompanying experimental evaluation in Sects. 8–9, and conclude the paper in Sect. 10.
3 Preliminaries
3.1 Notation
Throughout this paper, we write \(\mathbb {N}\), \(\mathbb {Q}\), and \(\mathbb {R}\) to respectively denote the sets of natural, rational, and real numbers. We write \({\overline{\mathbb {Q}}}\), the algebraic closure of \(\mathbb {Q}\), to denote the field of algebraic numbers. We write \(\mathbb {R}[x_1,\ldots ,x_k]\) and \({\overline{\mathbb {Q}}}[x_1,\ldots ,x_k]\) for the polynomial rings of all polynomials \(P(x_1, \ldots , x_k)\) in k variables \(x_1,\ldots ,x_k\) with coefficients in \(\mathbb {R}\) and \({\overline{\mathbb {Q}}}\), respectively (with \(k\in \mathbb {N}\) and \(k\ne 0\)). A monomial is a monic polynomial with a single term.
For a program \(\mathcal {P}\), \({\text {Vars}}(\mathcal {P}) \) denotes the set of program variables. We adopt the following syntax in our examples. Sequential assignments in while loops are listed on separate lines (as demonstrated in Fig. 1). In programs where simultaneous assignments are performed, we employ vector notation (as demonstrated by the assignments to the variables \(x\) and \(y\) in program \(\mathcal {P}_{\text {MC}}\) in Example 5).
We refer to a directed graph with G, whose edge and vertex (node) sets are respectively denoted via A(G) and V(G). We endow each element of A(G) with a label according to a labelling function \(\mathcal {L}\). A path in G is a finite sequence of contiguous edges of G, whereas a cycle in G is a path whose initial and terminal vertices coincide. A graph that contains no cycles is acyclic. In a graph \(G\), if there exists a path from vertex u to vertex v, then we say that v is reachable from vertex u and say that \(u\) is a predecessor of \(v\).
3.2 C-finite recurrences
We recall relevant results on (algebraic) recurrences and refer to [14, 15] for further details. A sequence in \(\overline{\mathbb {Q}}\) is a function \(u :\mathbb {N}\rightarrow \overline{\mathbb {Q}}\), shortly written also as \(\langle u(n) \rangle _{n=0}^{\infty }\) or simply just \(\langle u(n) \rangle _{n}^{}\). A recurrence for a sequence \(\langle u(n) \rangle _{n}^{}\) is an equation \(u(n{+}\ell ) = \text {Rec}(u(n{+}\ell {-}1), \ldots , u(n{+}1), u(n),n)\), for some function \(\text {Rec}:\mathbb {R}^{\ell +1}\rightarrow \mathbb {R}\). The number \(\ell \in \mathbb {N}\) is the order of the recurrence.
A special class of recurrences we consider are the linear recurrences with constant coefficients, in short C-finite recurrences. A C-finite recurrence for a sequence \(\langle u(n) \rangle _{n}^{}\) is an equation of the form
where \(a_0,\ldots , a_{\ell -1}\in \overline{\mathbb {Q}}\) are constants and \(a_0 \ne 0\). A sequence \(\langle u(n) \rangle _{n}^{}\) satisfying a C-finite recurrence (1) is a C-finite sequence and is uniquely determined by its initial values \(u_0=u(0),\ldots , u_{\ell -1}=u(\ell {-}1)\). The characteristic polynomial associated with the C-finite recurrence relation (1) is
The terms of a C-finite sequence can be written in a closed-form as exponential polynomials, depending only on n and the initial values of the sequence. That is, if \(\langle u(n) \rangle _{n}^{}\) is determined by a C-finite recurrence (1), then \(u(n) = \sum _{k=1}^r P_k(n) \lambda _k^n\) where \(P_k(n)\in {\overline{\mathbb {Q}}}[n]\) and \(\lambda _1,\ldots , \lambda _r\) are the roots of the associated characteristic polynomial. Importantly, closed-forms of (systems of) C-finite sequences always exist and are computable [14, 15].
3.3 Invariants
A loop invariant is a loop property that holds before and after each loop iteration [22]. In this paper, we are interested in polynomial invariants, the class of invariants given by Boolean combinations of polynomial equations among loop variables. There is a minor caveat to our characterisation of (polynomial) loop invariants. We assume that a (polynomial) invariant consists of a finite number of initial values together with a closed-form expression of a monomial in the loop variables. Thus the closed-form of a loop invariant must eventually hold after a (computable) finite number of loop iterations. Let us illustrate this caveat with the following loop example.
Example 1
The loop admits the polynomial invariant \(y - z - 1 = 0\) given by the initial values \(x(0)=0\), \(y(0)=1\), \(z(0)=0\) and the closed-forms \(x(n)=1\), \(y(n)=n+1\), and \(z(n)=n\). For each \(n\ge 1\), we denote by v(n) the value of a loop variable v at loop iteration n.
Herein, we synthesise invariants that satisfy inhomogeneous first-order recurrence relations and it is straightforward to show that each associated closed-form holds for \(n\ge 1\).
3.4 Polynomial invariants and invariant ideals
A polynomial ideal is a subset \(I \subseteq {\overline{\mathbb {Q}}}[x_1,\ldots ,x_k]\) with the following properties: I contains 0; \(I\) is closed under addition; and if \(P \in {\overline{\mathbb {Q}}}[x_1,\ldots ,x_k]\) and \(Q \in I\), then \(PQ \in I\). For a set of polynomials \(S \subseteq {\overline{\mathbb {Q}}}[x_1,\ldots ,x_k]\), one can define the ideal generated by S by
Let \(\mathcal {P}\) be a program as before. For \(x_j\in {\text {Vars}}(\mathcal {P}) \), let \(\langle x_j(n) \rangle _{n}^{}\) denote the sequence whose \(n\)th term is given by the value of \(x_j\) in the \(n\)th loop iteration. The set of polynomial invariants of \(\mathcal {P}\) form an ideal, the invariant ideal of \(\mathcal {P}\) [16]. If for each program variable \(x_j\) the sequence \(\langle x_j(n) \rangle _{n}^{}\) is C-finite, then a basis for the invariant ideal can be computed as follows. Let \(f_j(n)\) be the exponential polynomial closed-form of variable \(x_j\). The exponential terms \(\lambda _1^n, \ldots , \lambda _s^n\) in each of the \(f_j(n)\) are replaced by fresh symbols, yielding the polynomials \(g_j(n)\). Next, with techniques from [23], the set R of all polynomial relations among \(\lambda _1^n, \ldots , \lambda _s^n\) (that hold for each \(n \in \mathbb {N}\)) is computed. Then we express the polynomial relations in terms of the fresh constants, so that we can interpret \(R\) as a set of polynomials. Thus
is precisely the invariant ideal of \(\mathcal {P}\). Finally, we can compute a finite basis for the invariant ideal with techniques from Gröbner bases and elimination theory [23].
4 From loops to recurrences
4.1 Recurrence operators
Modelling properties of loop variables by algebraic recurrences and solving the resulting recurrences is an established approach in program analysis. Multiple works [3, 5, 6, 17, 24] associate a loop variable x with a sequence \(\langle x(n) \rangle _{n}^{}\) whose \(n\)th term is given by the value of x in the nth loop iteration. These works are primarily concerned with the problem of representing such sequences via recurrence equations whose closed-forms can be computed automatically, as in the case of C-finite sequences. A closely connected question to this line of research focuses on identifying classes of loops that can be modelled by solvable recurrences, as advocated in [2]. To this end, over-approximation methods for general loops are proposed in [5, 17] such that solvable recurrences can be obtained from (over-approximated) loops.
In order to formalise the above and similar efforts in associating loop variables with recurrences, herein we introduce the concept of a recurrence operator, and the characterisation of both solvable and unsolvable operators. Intuitively, a recurrence operator maps program variables to recurrence equations describing some properties of the variables; for instance, the exact values at the nth loop iteration [2, 3, 17] or statistical moments in probabilistic loops [9].
Definition 2
(Recurrence operator) A recurrence operator \(\mathcal {R}\) maps the program variables \({\text {Vars}}(\mathcal {P}) \) to the polynomial ring \(\mathbb {R}[{\text {Vars}}_n(\mathcal {P})]\). The set of equations
constitutes a polynomial first-order system of recurrences. We call \(\mathcal {R}\) linear if \(\mathcal {R}[x]\) is linear for all \(x \in {\text {Vars}}(\mathcal {P}) \).
One can extend the operator \(\mathcal {R}\) to \(\mathbb {R}[{\text {Vars}}(\mathcal {P}) ]\). Then, with a slight abuse of notation, for \(P(x_1, \ldots , x_j) \in \mathbb {R}[{\text {Vars}}(\mathcal {P}) ]\) we define \(\mathcal {R}(P)\) by \(P(\mathcal {R}[x_1], \ldots , \mathcal {R}[x_j])\).
For a program \(\mathcal {P}\) with recurrence operator \(\mathcal {R}\) and a monomial over program variables \(M:= \prod _{x \in {\text {Vars}}(\mathcal {P})} x^{\alpha _x}\), we denote by M(n) the product of sequences \(\prod _{x \in {\text {Vars}}(\mathcal {P})} x^{\alpha _x}(n)\). Given a polynomial P over program variables, P(n) is defined by replacing every monomial M in P by M(n). For a set T of polynomials over program variables let \(T_n:= \{ P(n) \mid P \in T \}\).
Example 3
Consider the program \(\mathcal {P}_\text {SC}\) in Fig. 1b. One can employ a recurrence operator \(\mathcal {R}\) in order to capture the values of the program variables in the nth iteration. For \(v\in {\text {Vars}}(\mathcal {P}_\text {SC}) \), \(\mathcal {R}[v]\) is obtained by bottom-up substitution in the polynomial updates starting with \(v\). As a result, we obtain the following system of recurrences:
Similarly, for the program \(\mathcal {P}_\square \) of Fig. 1a, we obtain the following system of recurrences:
4.2 Solvable operators
Systems of linear recurrences with constant coefficients admit computable closed-form solutions as exponential polynomials [14, 15]. This property holds for a larger class of recurrences with polynomial updates, which leads to the notion of solvability introduced in [2]. We adjust the notion of solvability to our setting by using recurrence operators. In the following definition, we make a slight abuse of notation and order the program variables so that we can transform program variables by a matrix operator.
Definition 4
(Solvable operators [2, 4]) The recurrence operator \(\mathcal {R}\) is solvable if there exists a partition of \({\text {Vars}}_n\); that is, \({\text {Vars}}_n = W_1 \uplus \dots \uplus W_k\) such that for \(x(n) \in W_j\),
for some matrices \(M_j\) and polynomials \(P_j\). A recurrence operator that is not solvable is said to be unsolvable.
This definition captures the notion of solvability in [2] (see the discussion in [4]).
We conclude this section by emphasising the use of (solvable) recurrence operators beyond deterministic loops, in particular relating its use to probabilistic program loops. As evidenced in [9], recurrence operators model statistical moments of program variables by essentially focusing on solvable recurrence operators extended with an expectation operator \(\mathbb {E}({}\cdot {})\) to derive closed-forms of (higher) moments of program variables, as illustrated below.
Example 5
Consider the probabilistic program \(\mathcal {P}_\text {MC}\) of [25, 26] modelling a non-linear Markov chain, where \({\text {Bernoulli}}({p})\) refers to a Bernoulli distribution with parameter p. Here the updates to the program variables \(x\) and \(y\) occur simultaneously.
We can construct recurrence equations, in terms of the expectation operator \(\mathbb {E}({}\cdot {})\), for this program as follows:
5 Defective variables
To the best of our knowledge, existing approaches in loop analysis and invariant synthesis are restricted to solvable recurrence operators. In this section, we establish a new characterisation of unsolvable recurrence operators. Our characterisation pinpoints the program variables responsible for unsolvability, the defective variables (see Definition 8). Moreover, we provide a polynomial time algorithm to compute the set of defective variables (Algorithm 1), in order to exploit our new characterisation for synthesising invariants in the presence of unsolvable operators in Sect. 5.
For simplicity, we limit the discussion in this section to deterministic programs. We note however that the results presented herein can also be applied to probabilistic programs. The details of the necessary changes in this respect are given in Sect. 7.
In what follows, we write \(\mathcal {M}_n(\mathcal {P})\) to denote the set of non-trivial monomials in \({\text {Vars}}(\mathcal {P}) \) evaluated at the nth loop iteration so that
We next introduce the notions of variable dependency and dependency graph, needed to further characterise defective variables.
Definition 6
(Variable dependency) Let \(\mathcal {P}\) be a loop with recurrence operator \(\mathcal {R}\) and \(x,y \in {\text {Vars}}(\mathcal {P}) \). We say x depends on y if y appears in a monomial in \(\mathcal {R}[x]\) with non-zero coefficient. Moreover, x depends linearly on y if all monomials with non-zero coefficients in \(\mathcal {R}[x]\) containing y are linear. Analogously, x depends non-linearly on y if there is a non-linear monomial with non-zero coefficient in \(\mathcal {R}[x]\) containing y.
Furthermore, we consider the transitive closure for variable dependency. If z depends on y and y depends on x, then z depends on x and, if in addition, one of these two dependencies is non-linear, then z depends non-linearly on x. We otherwise say the dependency is linear.
For each program with polynomial updates, we further define a dependency graph with respect to a recurrence operator.
Definition 7
(Dependency graph) Let \(\mathcal {P}\) be a program with recurrence operator \(\mathcal {R}\). The dependency graph of \(\mathcal {P}\) with respect to \(\mathcal {R}\) is the labelled directed graph \(G=({\text {Vars}}(\mathcal {P}), A, \mathcal {L})\) with vertex set \({\text {Vars}}(\mathcal {P}) \), edge set \(A:= \{ (x, y) \mid x, y \in {\text {Vars}}(\mathcal {P}) \wedge x \text { depends on } y \}\), and a function \(\mathcal {L} :A \rightarrow \{ L, N \}\) that assigns a unique label to each edge such that
Given a program and a recurrence operator, its dependency graph can be constructed automatically with standard techniques. In our approach, we partition the variables \({\text {Vars}}(\mathcal {P}) \) of the program \(\mathcal {P}\) into two sets: effective- and defective variables, denoted by \(E(\mathcal {P})\) and \(D(\mathcal {P})\) respectively. Our partition builds on the definition of the dependency graph of \(\mathcal {P}\), as follows.
Definition 8
(Effective–defective) A variable \(x \in {\text {Vars}}(\mathcal {P}) \) is effective if:
-
1.
x appears in no directed cycle with at least one edge with an N label, and
-
2.
x cannot reach a vertex of an aforementioned cycle (as in 1).
A variable is defective if it is not effective.
Example 9
From the recurrence equations of Example 3 for the program \(\mathcal {P}_\text {SC}\) (see Fig. 1b), one obtains the dependencies between the program variables of \(\mathcal {P}_\text {SC}\): the program variable w depends linearly on both x and y, whilst x and y depend non-linearly on each other and on w. By definition, the partition into effective and defective variables is \(E(\mathcal {P}_\text {SC}) = \emptyset \) and \(D(\mathcal {P}_\text {SC}) = \{w, x, y\}\).
Similarly, we can construct the dependency graph for the program \(\mathcal {P}_\square \) from Fig. 1a, as illustrated in Fig. 2. We derive that \(E(\mathcal {P}_\square ) = \{z\}\) and \(D(\mathcal {P}_\square ) = \{x, y\}\).
We give the following straightforward corollary of Definition 8.
Corollary 10
Given any effective variable \(x\in E(\mathcal {P})\), the recurrence relation \(\mathcal {R}[x]\) is a polynomial in effective variables.
The concept of effective, and, especially, defective variables allows us to establish a new characterisation of programs with unsolvable recurrence operators: a recurrence operator is unsolvable if and only if there exists a defective variable (as stated in Theorem 14 and automated in Algorithm 1). We formalise and prove this results via the following three lemmas.
Lemma 11
Let \(\mathcal {P}\) be a program with recurrence operator \(\mathcal {R}\). If \(D(\mathcal {P})\) is non-empty, so that there is at least one defective variable, then \(\mathcal {R}\) is unsolvable.
Proof
Let \(x \in {\text {Vars}}(\mathcal {P}) \) be a defective variable and \(G=({\text {Vars}}(\mathcal {P}), A, \mathcal {L})\) the dependency graph of \(\mathcal {P}\) with respect to a recurrence operator \(\mathcal {R}\). Following Definition 8, there exists a cycle \(C\) such that x is a vertex visited by or can reach said cycle and, in addition, there is an edge in \(C\) labelled by \(N\).
Assume, for a contradiction, that \(\mathcal {R}\) is solvable. Then there exists a partition \(W_1,\ldots ,W_k\) of \({\text {Vars}}_{n}(\mathcal {P}) \) as described in Definition 4. Moreover, since \(C\) is a cycle, there exists \(j\in \{1,\ldots , k\}\) such that each variable visited by \(C\) lies in \(W_j\). Let \((w,y)\in C\) be an edge labelled with \(N\). Since \(w\) depends on \(y\) non-linearly, and \(\mathcal {R}[w] = M_j \cdot W_j^\top + P_j(W_1,\ldots , W_{j-1})\) (by Definition 4), it is clear that \(y(n) \in W_\ell \) for some \(\ell \ne j\). We also have that \(y(n) \in W_j\) since \(C\) visits \(y\). Thus we arrive at a contradiction as \(W_1,\ldots ,W_k\) is a partition of \({\text {Vars}}_{n}(\mathcal {P}) \). Hence \(\mathcal {R}\) is unsolvable. \(\square \)
Given a program \(\mathcal {P}\) whose variables are all effective, it is immediate that a pair of distinct mutually dependent variables are necessarily linearly dependent and, similarly, a self-dependent variable is necessarily linearly dependent on itself. Consider the following binary relation \(\sim \) on program variables:
Thus, any two mutually dependent variables are related by \(\sim \). Under the assumption that all variables of a program \(\mathcal {P}\) are effective, it is easily seen that \(\sim \) defines an equivalence relation on \({\text {Vars}}(\mathcal {P}) \). The partition of the equivalence classes \(\Pi \) of \({\text {Vars}}(\mathcal {P}) \) under \(\sim \) admits the following notion of dependence between equivalence classes: for \(\pi ,{\hat{\pi }}\in \Pi \) we say that \(\pi \) depends on \({\hat{\pi }}\) if there exist variables \(x\in \pi \) and \(y\in {\hat{\pi }}\) such that variable \(x\) depends on variable \(y\).
Lemma 12
Suppose that all variables of a program \(\mathcal {P}\) are effective. Consider the graph \(\mathcal {G}\) with vertex set given by the set of equivalence classes \(\Pi \) and edge set \(A':= \{ (\pi , {\hat{\pi }}) \mid (\pi \ne {\hat{\pi }}) \wedge (\pi \text { depends on } {\hat{\pi }}) \}\). Then \(\mathcal {G}\) is acyclic.
Proof
From the definition of \(\mathcal {G}\), it is clear that the graph is directed and has no self-loops. Now assume, for a contradiction, that \(\mathcal {G}\) contains a cycle. Since the relation \(\sim \) is transitive, there exists a cycle C in \(\mathcal {G}\) of length two. Moreover, the variables in a given equivalence class are mutually dependent. Thus the elements of the two classes in \(C\) are equivalent under the relation \(\sim \), which contradicts the partition into distinct equivalence classes. Therefore the graph \(\mathcal {G}\) is acyclic, as required. \(\square \)
Lemma 13
Let \(\mathcal {P}\) be a program with recurrence operator \(\mathcal {R}\). If each of the program variables of \(\mathcal {P}\) is effective then \(\mathcal {R}\) is solvable.
Proof
By Lemma 12, the associated graph \(\mathcal {G} = (\Pi , A')\) on the equivalence classes of \({\text {Vars}}(\mathcal {P}) \) is directed and acyclic. Thus there exists a topological ordering of \(\Pi = \{ \pi _1, \dots , \pi _{|\Pi |} \}\) such that for every \((\pi _i, \pi _j) \in A'\) we have \(i > j\). Thus if \(x \in \pi _i\) then x does not depend on any variables in class \(\pi _j\) for \(j > i\). Moreover, for each \(\pi _i \in \Pi \), if \(x, y \in \pi _i\) then x cannot depend on y non-linearly because every variable is effective (and all the variables in \(\pi _i\) are mutually dependent). Thus \(\Pi \) evaluated at loop iteration n partitions \({\text {Vars}}_{n}(\mathcal {P}) \) and satisfies the criteria in Definition 4. We thus conclude that \(\mathcal {R}\) is solvable. \(\square \)
Together, Lemmas 11–13 yield a new characterisation of unsolvable operators.
Theorem 14
(Defective characterisation) Let \(\mathcal {P}\) be a program with recurrence operator \(\mathcal {R}\), then \(\mathcal {R}\) is unsolvable if and only if \(D(\mathcal {P})\) is non-empty.
In Algorithm 1 we provide a polynomial time algorithm that constructs both \(E(\mathcal {P})\) and \(D(\mathcal {P})\) given a program and a recurrence operator. We use the initialism “DFS” for the depth-first search procedure. Algorithm 1 terminates in polynomial time as both the construction of the dependency graph and depth-first search exhibit polynomial time complexity. The procedure searches for cycles in the dependency graph with at least one non-linear edge (labelled by \(N\)). All variables that reach such cycles are, by definition, defective.
In what follows, we focus on programs with unsolvable recurrence operators, or equivalently by Theorem 14, the case where \(\mathcal {D}(\mathcal {P}) \ne \emptyset \). The characterisation of unsolvable operators in terms of defective variables and our polynomial algorithm to construct the set of defective variables is the foundation for our approach synthesising invariants in the presence of unsolvable recurrence operators in Sect. 5.
Remark 15
The recurrence operator \(\mathcal {R}[x]\) for an effective variable \(x\) will admit a closed-form solution for every initial value \(x_0\). For the avoidance of doubt, the same cannot be said for the recurrence operator of a defective variable. However, it is possible that a set of initial values will lead to a closed-form expression as a C-finite sequence: consider a loop with defective variable \(x\) and update \(x\leftarrow x^2\) and initialisation \(x_0 \leftarrow 0\) or \(x_0\leftarrow \pm 1\).
6 Synthesising invariants
In this section we propose a new technique to synthesise invariants for programs with unsolvable recurrence operators. The approach is based on our new characterisation of unsolvable operators in terms of defective monomials (Sect. 4).
For the remainder of this section we fix a program \(\mathcal {P}\) with an unsolvable recurrence operator \(\mathcal {R}\), or equivalently with \(D(\mathcal {P}) \ne \emptyset \). We start by extending the notions of effective and defective from program variables to monomials of program variables. Let \(\mathcal {E}\) be the set of effective monomials given by
The complement, the defective monomials, is given by \(\mathcal {D}(\mathcal {P}):= \mathcal {M}(\mathcal {P}) \setminus \mathcal {E}(\mathcal {P})\). The difficulty with defective variables is that in general they do not admit closed-forms. However, linear combinations of defective monomials may allow for closed-forms as illustrated in previous examples. The main idea of our technique for invariant synthesis in the presence of defective variables is to find such polynomials. We fix a candidate polynomial called \({S}(n)\) based on an arbitrary degree \(d \in \mathbb {N}\):
where the coefficients \(c_W\in \mathbb {R}\) are unknown real constants. We use \(\mathcal {D}_n(\mathcal {P})\restriction _d\) to indicate the set of defective monomials of degree at most d.
Example 16
For \(\mathcal {P}_\square \) in Fig. 1a we have \(\mathcal {D}_n(\mathcal {P}_\square )\restriction _1 = \{x,y\}\), and \(\mathcal {D}_n(\mathcal {P}_\square )\restriction _2 = \{x,y,x^2, y^2, xy, xz, yz\}\).
On the one hand, all variables in \({S}(n)\) are defective; however, \({S}(n)\) may admit a closed-form. This occurs if \({S}(n)\) obeys a “well-behaved” recurrence equation; that is to say, an inhomogeneous recurrence equation where the inhomogeneous component is given by a linear combination of effective monomials. In such instances the recurrence takes the form
where the coefficients \(c_M\) are unknown. Thus an intermediate step towards our goal of synthesising invariants is to determine whether there are constants \(c_M, c_W, \kappa \in \mathbb {R}\) that satisfy the above equations. If such constants exist then we come to our final step: solving a first-order inhomogeneous recurrence relation. There are standard methods available to solve first-order inhomogeneous recurrences of the form \({S}(n{+}1) = \kappa {S}(n) + h(n)\), where h(n) is the closed-form of \(\sum _{M \in \mathcal {E}_{n}(\mathcal {P})}c_M M\), see e.g., [15]. We note \(h(n)\) is computable and an exponential polynomial since it is determined by a linear sum of effective monomials. Thus \(\langle S(n) \rangle _{n}^{}\) is a C-finite sequence.
Remark 17
Observe that the sum on the right-hand side of Eq. (3) is finite, since all but finitely many of the coefficients \(c_M\) are zero. Further, the coefficient \(c_M\) of monomial M is non-zero only if M appears in \(\mathcal {R}[S]\).
Going further, in equation (3) we express \({S}(n{+}1)\) in terms of a polynomial in \({\text {Vars}}_{n}(\mathcal {P}) \) with unknown coefficients \(c_M,c_W\), and \(\kappa \). An alternative expression for \({S}(n{+}1)\) in \({\text {Vars}}_{n}(\mathcal {P}) \) is given by the recurrence operator \({S}(n{+}1) = \mathcal {R}[S]\). Taken in combination, we arrive at the following formula
yielding a polynomial in \({\text {Vars}}_{n}(\mathcal {P}) \). Thus all the coefficients in the above formula are necessarily zero as the polynomial is identically zero. Therefore all solutions to the unknowns \(c_M, c_W\), and \(\kappa \) are computed by solving a (quadratic) system of equations. The main complexity of our invariant synthesis technique lies in solving the quadratic system. In the candidate polynomial, every monomial in defective variables (of degree at most d) is associated with a unique unknown coefficient. Hence, the size of the quadratic system can be polynomial in d and exponential in the number of defective variables.
Example 18
Consider the following illustration of our invariant synthesis procedure. Recall program \(\mathcal {P}_\square \) from Fig. 1a:
From Algorithm 1 we obtain \(E(\mathcal {P}_\square ) = \{z\}\) and \(D(\mathcal {P}_\square ) = \{x, y\}\). Because \(D(\mathcal {P}_\square ) \ne \emptyset \), we deduce using Theorem 14 that the associated operator \(\mathcal {R}\) is unsolvable. Consider the candidate \({S}(n) = ax(n) + by(n)\) with unknowns \(a,b\in \mathbb {R}\). The recurrence for \({S}(n)\) given by \(\mathcal {R}\) is
We next express \({S}(n{+}1)\) in terms of an inhomogeneous recurrence equation (cf. equation (3)). When we substitute for \({S}(n)\), we obtain
where the coefficients in the inhomogeneous component are unknown. We then combine the preceding two equations (for brevity we suppress the loop counter \(n\) in the program variables \(x,y,z\)) and derive
Thus we have a polynomial in the program variables that is identically zero. Therefore, all the coefficients in the above equation are necessarily zero. We then solve the resulting system of quadratic equations, which leads to the non-trivial solution \(a=b\), \(\kappa =2\), \(d=3a\), and \(c=-3a\). We substitute this solution back into the recurrence for \(\mathcal {R}[S]\) and find
Here, we have used the closed-form solution \(z(n) = {1}/{2} - {(-1)^n}/{2}\) of the effective variable \(z\). We can compute the solution of this inhomogeneous first-order recurrence equation. In the case that \(a=1\), we have \({S}(n) = 2^n ({S}(0) + 2) - {(-1)^n}/{2} -{3}/{2}\). Therefore, the following identity holds for each \(n \in \mathbb {N}\):
and so we have synthesised the closed-form of \(x+y\) for program \(\mathcal {P}_\square \) of Fig. 1a.
6.1 Solution space of invariants for unsolvable operators
Given a program and a recurrence operator, our invariant synthesis technique is relative-complete with respect to the degree d of the candidate \({S}(n)\). This means, for a fixed degree \(d \in \mathbb {N}\), our approach is in theory able to compute all polynomials of defective variables with maximum degree d that satisfy a “well-behaved” recurrence; that is, a first-order recurrence equation of the form (3). This holds because of our reduction of the problem to a system of quadratic equations for which all solutions are computable. It is not guaranteed that a solution does exist. In that case, our technique can rule out the existence of well-behaved polynomials of defective variables of degree at most d if the resulting system has no (non-trivial) solutions.
Example 19
The following loop models the logistic map [27] which is well-known for its chaotic behaviour.
The single variable x is defective due to its non-linear self-dependency. For most values of r and initial values of x the logistic map does not admit an analytical solution and well-behaved polynomials in x do not exist [28]. Hence, our invariant synthesis technique provides no solution for candidates of fixed degrees.
Let \(\mathcal {P}\) be a program with program variables \({\text {Vars}}(\mathcal {P}) = \{x_1, \dots , x_k \}\). The set of polynomials P with \(P(x_1(n), \dots , x_k(n)){=}0\) for all \(n \in \mathbb {N}\) form an ideal, the invariant ideal of \(\mathcal {P}\). The requirement of closed-forms is the main obstacle for computing a basis for the invariant ideal in the presence of defective variables. Our work introduces a method that includes defective variables in the computation of invariant ideals, via the following steps of deriving the polynomial invariant ideal of an unsolvable loop:
-
For every effective variable \(x_i\), let \(f_i(n)\) be its closed-form and assume h(n) is the closed-form for some candidate S given by a polynomial in defective variables.
-
Let \(\lambda _1^n, \ldots , \lambda _s^n\) be the exponential terms in all \(f_i(n)\) and h(n). Replace the exponential terms in all \(f_i(n)\) as well as h(n) by fresh constants to construct the polynomials \(g_i(n)\) and l(n) respectively.
-
Next, construct the set R of polynomial relations among all exponential terms, as explained in Sect. 2. Then, the ideal
$$\begin{aligned} I(\{ x_i - g_i(n) \mid x_i \in E(\mathcal {P}) \} \cup \{ S - l(n) \} \cup R) \cap {\overline{\mathbb {Q}}}[x_1, \dots , x_k] \end{aligned}$$contains precisely all polynomial relations among program variables implied by the equations \(\{ x_i = f_i(n) \} \cup \{ S = g(n) \}\) in the theory of polynomial arithmetic.
-
A finite basis for this ideal is computed using techniques from Gröbner bases and elimination theory. This step is similar to the case of the invariant ideal for solvable loops, see e.g., [2, 3].
In conclusion, we infer a finite representation of the ideal of polynomial invariants for loops with unsolvable recurrence operators.
7 Synthesising solvable loops from unsolvable loops
In previous sections, we introduced a new technique to compute invariants for unsolvable loops; that is, loops containing defective variables. An orthogonal challenge is to synthesise a solvable loop from an unsolvable loop that preserves or over-approximates given specifications.
In this section we establish, with Algorithm 2, a new method to synthesise a solvable loop \(\mathcal {P}'\) from an unsolvable loop \(\mathcal {P}\). The solvable loop \(\mathcal {P}'\) over-approximates the behaviour of \(\mathcal {P}\) in the sense that every polynomial invariant of \(\mathcal {P}'\) is an invariant of \(\mathcal {P}\). Moreover, we show the invariants among effective variables of \(\mathcal {P}\) and \(\mathcal {P}'\) coincide. The following example illustrates the main idea leading to Algorithm 2.
Example 20
Example 18 showed how to synthesise the polynomial \(S = x + y\) of defective variables x and y for the loop in Fig. 1a such that S admits a closed-form. In this case, the polynomial of program variables S satisfies the linear inhomogeneous recurrence \(S(n+1) = 2\,S(n) - 3z(n) + 3\). We can use this recurrence to construct a solvable loop from the unsolvable from Fig. 1a that captures the dynamics of the only effective variable z as well as S:
Our algorithmic approach, as given in Algorithm 2, synthesises the solvable loop from the unsolvable loop on the left. Such a synthesis step is implemented within our tool (Sect. 9), allowing us to synthesize the above solvable loop in about 1 second.
The inputs for Algorithm 2 are an unsolvable loop \(\mathcal {P}\) with recurrence operator \(\mathcal {R}\) and a fixed degree \(d \in \mathbb {N}\); the algorithm outputs a solvable loop \(\mathcal {P}'\), if it exist. Briefly, the algorithm invokes the invariant synthesis procedure from Sect. 2 (for degree d) and constructs the loop \(\mathcal {P}'\) from \(\mathcal {P}\) by removing all the defective variables and then introducing a new variable \(\texttt {s}\) that models an invariant among defective monomials, if such an invariant exists. The recurrence operator \(\mathcal {R}'\) associated with the synthesised loop \(\mathcal {P}'\) is the canonical recurrence operator: \(\mathcal {R}'\) maps every program variable to its assignment.
Lemma 21
(Soundness) The loop \(\mathcal {P}'\) returned by Algorithm 2 is solvable. Moreover, we have \(E(\mathcal {P}) \subseteq {\text {Vars}}(\mathcal {P}') \).
Proof
Using our characterisation of solvable and unsolvable loops in terms of effective and defective variables (Theorem 14), we show that all variables in \(\mathcal {P}'\) are effective. The variables of \(\mathcal {P}'\) consist of the effective variables of \(\mathcal {P}\) as well as the fresh variable \(\texttt {s}\): \({\text {Vars}}(\mathcal {P}') = E(\mathcal {P}) \cup \{ \texttt {s} \}\), or \({\text {Vars}}(\mathcal {P}') = E(\mathcal {P})\) if no invariant among defective monomials with degree d exists.
First, every \(x \in E(\mathcal {P})\) necessarily remains effective for the synthesised program \(\mathcal {P}'\): in the dependency graph of \(\mathcal {P}'\), the variable x cannot occur in a cycle containing \(\texttt {s}\), because \(\texttt {s}\) is a fresh variable and hence cannot appear in the recurrence \(\mathcal {R}[y]\) for any \(y \in E(\mathcal {P})\) (Algorithm 2 line 15). Hence, if \(z \in E(\mathcal {P})\cap D(\mathcal {P}')\), then there must exist a cycle in the dependency graph of \(\mathcal {P}'\) with a non-linear edge \((x,y)\) (i.e., \(\mathcal {L}(x,y)=N\)) such that every vertex in the cycle is in \(E(\mathcal {P})\). Consequently, this cycle is also present in the dependency graph of the original program \(\mathcal {P}\). This means that not all variables in \(E(\mathcal {P})\) are effective, which is a contradiction.
Second, the variable \(\texttt {s}\) is effective. Because \(\texttt {s}\) is a fresh variable, the only incoming edge of \(\texttt {s}\) in the dependency graph of \(\mathcal {P}'\) is a linear self-loop (Algorithm 2 line 18). Hence \(\texttt {s}\) cannot occur in a cycle with a non-linear edge. Moreover, all outgoing edges point to effective variables. Thus \(\texttt {s}\in E(\mathcal {P}')\) is effective. \(\square \)
With the next two lemmas, we prove that the loop \(\mathcal {P}'\) synthesised by Algorithm 2 over-approximates the invariants of the unsolvable loop \(\mathcal {P}\). Let \({\text {Inv}}({\mathcal {P}})\) and \({\text {Inv}}({\mathcal {P}'})\) denote the invariant ideals of \(\mathcal {P}\) and \(\mathcal {P}'\) respectively. The next lemma establishes that the synthesised loop \(\mathcal {P}'\) is complete with respect to invariants among effective variables.
Lemma 22
(Completeness with respect to effective variables) The invariant ideals of \(\mathcal {P}\) and \(\mathcal {P}'\) coincide when restricted on the effective variables of \(\mathcal {P}\). That is,
Proof
By the construction of \(\mathcal {P}'\), every \(x \in E(\mathcal {P})\) is also a variable of \(\mathcal {P}'\). To distinguish the variable x in \(\mathcal {P}\) from the variable x in \(\mathcal {P}'\) we refer to the latter by \(x'\). We will show that for every \(x \in E(\mathcal {P})\) the sequences \(\langle x(n) \rangle _{n}^{}\) and \(\langle x'(n) \rangle _{n}^{}\) coincide. If this is the case, the polynomial invariants for the programs \(\mathcal {P}\) and \(\mathcal {P}'\) among the variables \(E(\mathcal {P})\) necessarily coincide as well.
Let \(\mathcal {R}\) and \(\mathcal {R}'\) be the recurrence operators associated to \(\mathcal {P}\) and \(\mathcal {P}'\), respectively. For every \(x \in E(\mathcal {P})\) we have \(\mathcal {R}[x] = \mathcal {R}'[x']\) and \(x_0 = x'_0\) by the construction of \(\mathcal {P}'\). Furthermore, by Corollary 10, defective variables cannot occur in \(\mathcal {R}[x]\) for any \(x \in E(\mathcal {P})\). Moreover, the fresh variable \(\texttt {s}\) cannot occur in \(\mathcal {R}'[x']\) by the construction of \(\mathcal {P}'\). Hence the two systems of first-order recurrences \(\{ x(n{+}1) = \mathcal {R}[x] \mid x \in E(\mathcal {P}) \}\) and \(\{ x'(n{+}1) = \mathcal {R}'[x'] \mid x \in E(\mathcal {P}) \}\) together with the initial values \(\{ x_0 \mid E(\mathcal {P}) \}\) and \(\{ x'_0 \mid E(\mathcal {P}) \}\) induce the same sequences \(\langle x(n) \rangle _{n}^{}\) and \(\langle x'(n) \rangle _{n}^{}\) for all \(x \in E(\mathcal {P})\). \(\square \)
We note that when an invariant among defective monomials of degree \(d\) does not exist, the variables of the synthesised loop \(\mathcal {P}'\) are precisely the effective variables of \(\mathcal {P}\). In this case, Lemma 22 fully characterises the relationship between the invariants of \(\mathcal {P}\) and \(\mathcal {P}'\).
In the following, let us consider the complementary case, namely when an invariant among the defective monomials of \(\mathcal {P}\) exists. Hence, the synthesised loop \(\mathcal {P}'\) contains the additional fresh variable \(\texttt {s}\) modelling the behaviour of this invariant. With the next lemma, we confirm that the synthesised loop \(\mathcal {P}'\) is indeed a sound over-approximation of the unsolvable loop \(\mathcal {P}\). We show that every invariant of \(\mathcal {P}'\) is also an invariant of \(\mathcal {P}\). The program variable \(\texttt {s} \in {\text {Vars}}(\mathcal {P}') \) introduced by Algorithm 2 is however not a program variable of \(\mathcal {P}\); nevertheless, \(\texttt {s}\) models the polynomial S of defective variables in \(\mathcal {P}\). Hence, to compare the invariant ideals of \(\mathcal {P}\) and \(\mathcal {P}'\), we need to “substitute” \(\texttt {s}\) by the polynomial of defective variables it models. This can be done by adding the equation \(\texttt {s} = S\) (\(\texttt {s} - S = 0\)) to the invariant ideal of \(\mathcal {P}'\) and restricting the resulting ideal to \({\text {Vars}}(\mathcal {P})\):
Lemma 23
(Over-approximation) Let J be the ideal in (4) constructed from the invariant ideal of \(\mathcal {P}'\) by replacing the program variable \(\texttt {s}\) by the polynomial of defective variables it models. Then, \(J \subseteq {\text {Inv}}({\mathcal {P}})\).
Proof
As argued in the proof of Lemma 22, for every \(x \in E(\mathcal {P})\), the sequences corresponding to the variable x in both \(\mathcal {P}\) and \(\mathcal {P}'\) coincide; that is, \(\langle x(n) \rangle _{n}^{} \equiv \langle x'(n) \rangle _{n}^{}\). Furthermore, we have \({\text {Vars}}(\mathcal {P}') = E(\mathcal {P}) \cup \{ \texttt {s} \}\). The fresh variable \(\texttt {s}\) in \(\mathcal {P}'\) models the polynomial \(S \in {\overline{\mathbb {Q}}}[{\text {Vars}}(\mathcal {P}) ]\). Let \(\langle \texttt {s}(n) \rangle _{n}^{}\) be the sequence induced by the program variable \(\texttt {s}\) in \(\mathcal {P}'\) and, likewise, \(\langle S(n) \rangle _{n}^{}\) the sequence induced by the polynomial \(S \in {\overline{\mathbb {Q}}}[{\text {Vars}}(\mathcal {P}) ]\). Then, by the construction of \(\mathcal {P}'\), we have \(\langle \texttt {s}(n) \rangle _{n}^{} \equiv \langle S(n) \rangle _{n}^{}\).
Let \(Q \in {\text {Inv}}({P'})\). By the definition of the ideal J in (4), it holds that
(where the notation indicates that S is substituted for \(\texttt {s}\)).
Now, Q is a polynomial relation among the sequences induced by the variables in \({\text {Vars}}(\mathcal {P}') \). Because \(\langle x(n) \rangle _{n}^{} \equiv \langle x'(n) \rangle _{n}^{}\) for every \(x \in E(\mathcal {P})\) and \(\langle \texttt {s}(n) \rangle _{n}^{} \equiv \langle S(n) \rangle _{n}^{}\), the polynomial \(Q\{\texttt {s} \mapsto S\}\) represents a relation among the sequences induced by the variables in \({\text {Vars}}(\mathcal {P}) \). Hence we have \(Q \in {\text {Inv}}({\mathcal {P}})\). \(\square \)
Remark 24
Our loop synthesis procedure given in Algorithm 2 computes a single invariant among defective monomials (if such an invariant exists) of an unsolvable loop \(\mathcal {P}\). The results in this section naturally generalise to multiple invariants among defective monomials, as follows: for every invariant I, add a fresh variable \(\texttt {s}_I\) modelling the behaviour of I to the synthesised program \(\mathcal {P}'\). Note that with each additional invariant \(I\) added, the dynamics of the synthesised loop \(\mathcal {P}'\) more closely resembles that of the unsolvable loop \(\mathcal {P}\).
8 Adjustments for unsolvable operators in probabilistic programs
8.1 Defective variables in probabilistic loop models
The works [9, 29] defined recurrence operators for probabilistic loops. Specifically, a recurrence operator is defined for loops with polynomial assignments, probabilistic choice, and drawing from common probability distributions with constant parameters. Recurrences for deterministic loops model the precise values of program variables. For probabilistic loops, this approach is not viable, due to the stochastic nature of the program variables. Thus a recurrence operator for a probabilistic loop models (higher) moments of program variables. As illustrated in Example 5, the recurrences of a probabilistic loop are taken over expected values of program variable monomials.
The authors of [9, 29] explicitly excluded the case of circular non-linear dependencies to guarantee computability. However, in contrast to our notions in Sect. 3, they defined variable dependence not on the level of recurrences but on the level of assignments in the loop body. To use the notions of effective and defective variables for probabilistic loops, we follow the same approach and base the dependency graph on assignments rather then recurrences. We illustrate the necessity of this adaptation in the following example.
Example 25
A probabilistic assignment \(x \leftarrow a\ \{p\}\ b\) intuitively means that x is assigned a with probability p and b with probability \(1{-}p\). Consider the following probabilistic loop and associated set of first-order recurrence relations in terms of the expectation operator \(\mathbb {E}({}\cdot {})\).
It is straightforward to see that variable \(y\) is defective from the deterministic update \(y \leftarrow 4y(1-y)\) with its characteristic non-linear self-dependence. Moreover, y appears in the probabilistic assignment of x: However, due to the particular form of the assignment, the recurrence of \(\mathbb {E}(x_n)\) does not contain y. Nevertheless, y appears in the recurrence of \(\mathbb {E}(x^2_n)\). This phenomenon is specific to the probabilistic setting. For deterministic loops, it is always the case that if the values of a program variable w do not depend on defective variables, then neither do the values of any power of w.
In light of the phenomenon exhibited in Example 25, we adapt our notion of variable dependency, for probabilistic loops. Without loss of generality, we assume that every program variable has exactly one assignment in the loop body. Let \(\mathcal {P}\) be a probabilistic loop and \(x, y \in {\text {Vars}}(\mathcal {P}) \). We say x depends on y, if y appears in the assignment of x. Additionally, the dependency is linear if all occurrences of y in the assignment of x are linear, else the dependency is non-linear. Further, we consider the transitive closure of variable dependency analogous to deterministic loops and Definition 6.
With variable dependency thus defined, the dependency graph and the notions of effective and defective variables follow immediately. Analogous to our characterisation of unsolvable recurrence operators in terms of defective variables for deterministic loops, all (higher) moments of effective variables of probabilistic loops can be described by a system of linear recurrences [9, 29]. For defective variables this property will generally fail For instance, in Example 25, the variable x is now classified as defective and \(\mathbb {E}(x^2_n)\) cannot be modelled by linear recurrences for some initial values.
The only necessary change to the invariant synthesis algorithm from Sect. 5 is as follows: instead of program variable monomials, we consider expected values of program variable monomials. Now, our invariant synthesis technique from Sect. 5 can also be applied to probabilistic loops to synthesise combinations of expected values of defective monomials that do satisfy a linear recurrence.
8.2 Synthesising solvable probabilistic loops
In Algorithm 2 we introduced a procedure, utilising our new invariant synthesis technique from Sect. 5, to over-approximate an unsolvable loop by a solvable loop. The inputs to Algorithm 2 are an unsolvable loop with a recurrence operator and a natural number specifying a fixed degree. As mentioned, our invariant synthesis procedure is also applicable to probabilistic loops using the recurrence operator modelling moments of program variables introduced in [9, 29]. Hence, Algorithm 2 can also be used to synthesise solvable loops from unsolvable probabilistic loops. In the probabilistic case, however, the invariants computed by our approach are over moments of program variables. Therefore, the invariant ideal of probabilistic loops describes polynomial relations among a given set of moments of program variables, such as the expected values. Consequently, the loop synthesised by Algorithm 2 for a given probabilistic loop will be deterministic and model the dynamics of moments of program variables of the probabilistic loop.
Example 26
Recall the program \(\mathcal {P}_\text {MC}\) of Example 5. An invariant synthesised by our approach in Sect. 5 with degree 1 is \(\mathbb {E}(x_n - y_n) = \frac{5^n}{6^n}(x_0 - y_0)\). Hence the solvable loop synthesised by Algorithm 2 for \(\mathcal {P}_\text {MC}\) with input degree 1 is
where \(\texttt {f}\) is the fresh variable introduced by Algorithm 2 modelling \(\mathbb {E}(x_n - y_n)\). Our approach from Algorithm 2 synthesises this solvable loop from \(\mathcal {P}_\text {MC}\), using less than 0.5 s within our implementation (Sect. 9).
9 Applications of unsolvable operators towards invariant generation
Our approach automatically generates invariants for programs with defective variables (Sect. 5), and pushes the boundaries of both theory and practice of invariant generation: we introduce and incorporate defective variable analysis into the state-of-the-art methodology for reasoning about solvable loops, complementing thus existing methods, see e.g., [2, 3, 5, 6], in the area. As such, the class of unsolvable loops that can be handled by our work extends (aforementioned) existing approaches on polynomial invariant generation. The experimental results of our approach (see Sect. 9) demonstrate the efficiency and scalability of our work in deriving invariants for unsolvable loops. Since our approach to loops via recurrences is generic, we can deal with emerging applications of programming paradigms such as: transitions systems and statistical moments in probabilistic programs; and reasoning about biological systems. We showcase these applications in this section and also exemplify the limitations of our work. In the sequel, we write \(\mathbb {E}(t)\) to refer to the expected value of an expression t, and denote by \(\mathbb {E}(t_n)\) (or \(\mathbb {E}(t(n))\)) the expected value of \(t\) at loop iteration n.
Example 27
(Moments of probabilistic programs [25]) As mentioned in Example 26, \(\mathbb {E}(x_n - y_n) = \frac{5^n}{6^n}(x_0 - y_0)\) is an invariant for the program \(\mathcal {P}_\text {MC}\) introduced in Example 5. Closed-form solutions for higher order expressions are also available; for example,
refers to the dth moment of \(x(n)-y(n)\). While the work in [25] uses martingale theory to synthesise the above invariant (of degree 1), our approach automatically generates such invariants over higher-order moments (see Table 2). We note to this end that the defective variables in \(\mathcal {P}_\text {MC}\) are precisely x and y as can be seen from their mutual non-linear interdependence. Namely, we have \(D(\mathcal {P}_\text {MC}) = \{x, y\}\) and \(E(\mathcal {P}_\text {MC}) = \{s\}\).
Example 28
(non-lin-markov-2) We give a second example of a non-linear Markov chain. We analyse the moments of this probabilistic program in the next section.
Example 29
(Biological systems [30]) A model for the decision-making process of swarming bees choosing one nest-site from a selection of two is introduced in [30] and further studied in [31, 32]. Previous works have computed probability distributions for this model [32]. The (unsolvable) loop is a discrete-time model with five classes of bees (each represented by a program variable). The coefficient \(\Delta \) is the length of the time-step in the model and the remaining coefficients parameterise the rates of change. All coefficients here are symbolic.
We note that the model in [32] uses truncated Normal distributions, as [32] is limited to finite supports for the program variables, which is not the case with our work.
In the loop above, each of the variables exhibits non-linear self-dependence, and so the variables are partitioned into \(D(\mathcal {P}) = \{x, y_1, y_2, z_1, x_2 \} \) and \(E(\mathcal {P}) = \emptyset \). While the recurrence operator of the loop above is unsolvable, our approach infers polynomial loop invariants using defective variable reasoning (Sect. 5). Namely, we generate the following closed-form solutions over expected values of program variables:
One can interpret such invariants in terms of the biological assumptions in the model. Take, for example, the fact that \(\mathbb {E}(x(n) + y_1(n) + y_2(n) + z_1(n) + z_2(n))\) is constant. This invariant is in line with the assumption in the model that the total population of the swarm is constant. In fact, our invariants reflect the behaviour of the system in the original continuous-time model proposed in [30], because our approach is able to process all coefficients (most importantly \(\Delta \)) as symbolic constants.
Example 30
(Probabilistic transition systems [25]) Consider the following probabilistic loop modelling a probabilistic transition system from [25]:
While [25] uses martingale theory to synthesise a degree one invariant of the form \(a \mathbb {E}(x_k) + b \mathbb {E}(y_k) = a \mathbb {E}(x_0) + b \mathbb {E}(y_0)\), our work automatically generates invariants over higher-order moments involving the defective variables \(x\) and \(y\), as presented in Table 2.
The next example demonstrates an unsolvable loop whose recurrence operator cannot (yet) be handled by our work.
Example 31
(Trigonometric updates) As our approach is limited to polynomial updates of the program variables, the loop below cannot be handled by our work:
Note the trigonometric functions are transcendental, from which it follows that one cannot generally obtain closed-form solutions for the program variables. Nevertheless, this program does admit polynomial invariants in the program variables; for example, \(x^2 + y^2 = 1\). Although our definition of a defective variables does not apply here, we could say the variable x here is somehow defective: while the exact value of \(\sin (x)\) cannot be computed, it could be approximated using power series. Extending our work with more general notions of defective variables is an interesting line for future work.
Examples 32–35 (below) are custom-made benchmarks. We have tailored these benchmarks to demonstrate the flexibility and applicability of our method to the current state of the art. Our experimental analysis is delayed to Sect. 9.
Example 32
(squares+)
Example 33
(prob-squares)
Example 34
(squares-squared)
Example 35
(deg-d) The benchmarks deg-5, deg-6, deg-7, deg-8, deg-9, and deg-500 are parameterised by the degree \(d\) in the following program.
The following set of examples are taken from the literature on the theory of trace maps. Arguably the most famous example is the classical Fibonacci Trace Map \(f:\mathbb {R}^3\rightarrow \mathbb {R}^3\) given by \(f(x,y,z)=(y,z,2yz-x)\) (Example 36 below); said map has garnered the attention of researchers in fields as diverse as invariant analysis, representation theory, geometry, and mathematical physics (cf. the survey papers [33, 34]). From a computational viewpoint, trace maps arise from substitution rules on matrices (see, again, the aforementioned survey papers). Given two matrices \(A,B\in {{\,\textrm{SL}\,}}(2,\mathbb {R})\) (the group of \(2\times 2\) matrices with unit determinant), consider the following substitution rule on strings of matrices: \(A\mapsto B\) and \(B\mapsto AB\). The classical Fibonacci Trace Map is determined by the action of this substitution on the traces of the matrices; i.e.,
Further examples of trace maps (Examples 37 and 38 below) are constructed from similar substitution rules on strings of matrices. For Examples 36–38, our work generates the cubic polynomial invariant
from the well-studied class of Fricke–Vogt invariants as well as higher-degree polynomial invariants.
Example 36
(fib1)
Example 37
(fib2) A Generalised Fibonacci Trace Map
Example 38
(fib3) A second Generalised Fibonacci Trace Map
Examples 39–40 are while loops that generate Markov triples [35, Chapter II.3]; that is, at every iteration each loop variable takes an integer value that appears in a Diophantine solution of the Markov equation \(x^2+y^2+z^2=3xyz\).
Example 39
(markov-triples-toggle) A while loop that generates an infinite sequence of nodes on the Markov tree (the walk alternates between ‘upper’ and ‘lower’ branches).
For this example, our approach generates the polynomial invariant, the Markov equation, given by \(x^2 + y^2 + z^2 - 3xyz=0\).
Example 40
(markov-triples-random) A while loop that simulates a Bernoulli walk on the Markov tree.
For this benchmark, our technique generates both closed-forms and invariants in (higher) moments of program variables such as \(\mathbb {E}(x_n^2 + y_n^2 + z_n^2 - 3x_ny_nz_n)=0\) and \(\mathbb {E}(x_n-z_n) = 2^{-n}\).
The next two benchmarks concern a special class of polynomial automorphisms, the Yagzhev maps, (sometimes cubic-homogeneous maps) introduced (independently) by Yagzhev [36] and Bass et al. [37] in the context of the Jacobian conjecture.
Recall that Yagzhev maps \(f:\mathbb {C}^n \rightarrow \mathbb {C}^n\) take the form \(f(x) = x - g(x)\) such that \(\det f'(x) = 1\) for all \(x\), and \(g:\mathbb {C}^n \rightarrow \mathbb {C}^n\) is a homogeneous polynomial mapping of degree \(3\).
De Bondt exhibited a Yagzhev mapping in 10 dimensions that has no linear invariants (providing a counterexample to the “linear dependence conjecture” for the class of maps) [38]. Zampieri demonstrated that De Bondt’s example has quadratic and cubic invariants [39] (see Example 41 for such a Yagzhev map in 9 dimensions). Work by Santos Freire, Gorni, and Zampieri [40] exhibited a Yagzhev mapping in 11 dimensions that has neither linear invariants nor quadratic invariants (see Example 42).
Example 41
(yagzhev9 [39])
For this example, our work generates an invariant quadratic homogeneous polynomial in six variables and three symbolic constants, which we can interpret in terms of determinants (as given below):
Our computation confirms previous work by the authors of [39]. Those authors demonstrated that this example has no linear invariants, but does admit the above quadratic invariant.
Example 42
(yagzhev11 [40])
For this example, our approach generates an invariant cubic homogeneous polynomial, which we can interpret as the determinant of a matrix in the program variables:
For the avoidance of doubt, the above polynomial was previously found by the authors of [40]. Indeed, our implementation confirms previous results: there are neither linear nor quadratic invariants for this example.
Example 43
(nagata [41]) Let us now consider the classical Nagata automorphism introduced by Nagata [41, pg. 41] (see also [42]).
For the Nagata Automorphism, it is easy to see that the variable \(z\) is effective and so contributes a linear invariant. When used to search for quadratic closed-forms, our method generates the polynomial
where \(a\), \(b\), and \(c\) are symbolic constants. Here we note that \(x(n)z(n)\) and \(y(n)^2\) are defective monomials. Our computation confirms the invariants and closed-forms established in [41].
10 Experiments
In this section, we report on our implementation towards fully automating the analysis of unsolvable loops and describe our experimental setting and results.
10.1 Implementation
Algorithm 1, our method for synthesising invariants involving defective variables, and Algorithm 2, for the synthesis of solvable loops from unsolvable loops, are implemented in the Polar tool.Footnote 3 We use python3 and the sympy package [43] for symbolic manipulations of algebraic expressions.
10.2 Benchmark selection
While previous works [2, 4, 5, 9, 16, 44] consider invariant synthesis, their techniques are only applicable in a restricted setting: the analysed loops are, for the most part, solvable; or, for unsolvable loops, the search for polynomial invariants is template-driven or employs heuristics. In contrast, the work herein complements and extends the techniques presented for solvable loops in [2, 4, 5, 9, 16, 44]. Indeed, our automated approach turns the problem of polynomial invariant synthesis into a decidable problem for a larger class of unsolvable loops.
While solvable loops can clearly be analysed by our work, the main benefit of our work comes with handling unsolvable loops by translating them into solvable ones. For this reason, in our experimentation we are not interested in examples of solvable loops and so only focus on unsolvable loop benchmarks. There is therefore no sensible baseline that we can compare against, as state-of-the-art techniques cannot routinely synthesise invariants for unsolvable loops in the generality we present.
In our work we present a set of 23 examples of unsolvable loops, as listed in Table 1.Footnote 4 Common to all 23 benchmarks from Table 1 is the exhibition of circular non-linear dependencies within the variable assignments. We display features of our benchmarks in Table 1 (for example, column 3 of Table 1 counts the number of defective variables for each benchmark).
Three examples from Table 1 are challenging benchmarks taken from the invariant generation literature [25, 26, 31, 32]; full automation in analysing these examples was not yet possible. These examples are listed as non-lin-markov-1, pts, and bees in Table 1, respectively corresponding to Example 5 (and hence Example 27), Example 30, and Example 29 from Sect. 8. Eight further benchmarks, as described in Examples 36–43, are drawn from the theoretical physics and pure mathematics literature (references are given in Sect. 8).
The remaining 12 examples of Table 1 are self-constructed benchmarks to highlight the key ingredients of our work in synthesising invariants associated with unsolvable recurrence operators.
10.2.1 Experimental setup
We evaluate our approach in Polar on the examples from Table 1. All our experiments were performed on a machine with a 1.80 GHz Intel i7 processor and 16 GB of RAM.
10.2.2 Evaluation setting
The landscape of benchmarks in the invariant synthesis literature for solvable loops can appear complex with: high numbers of variables, high degrees in polynomial updates, and multiple update options. However, we do not intend to compete on these metrics for solvable loops. The power of our invariant synthesis technique lies in its ability to handle ‘unsolvable’ loop programs: those with cyclic inter-dependencies and non-linear self-dependencies in the loop body. Regarding Algorithm 2, specifying our method for synthesising solvable from unsolvable loops, the main complexity lies in constructing an invariant involving defective variables. Once, such an invariant has been found, the remaining complexity of Algorithm 2 is linear in the number of program variables. Hence, the experimental results for our invariant synthesis technique also show the feasibility of our new method synthesising solvable from unsolvable loops. While the benchmarks of Table 1 may be considered simple, the fact that previous works cannot systematically handle such simple models crystallises that even simple loops can be unsolvable, limiting the applicability of state-of-the-art methods, as illustrated in the example below.
Example 44
Consider the question: does the unsolvable loop program deg-9 in Table 1 (i.e. Example 35) possess a cubic invariant? The program variables for deg-9 are \(x,y,\) and \(z\). The variables \(x\) and \(y\) are defective. Using Polar, we derive that the cubic, non-trivial polynomial \(p(x_n,y_n,z_n)\) given by
yields a cubic polynomial loop invariant, where \(a,b,c,d,e,\) and \(f\) are symbolic constants. Moreover, for \(n\ge 1\), the expectation of this polynomial (deg-9 is a probabilistic loop) in the \(n\)th iteration is given by
10.3 Experimental results
Our experiments using Polar to synthesise invariants are summarised in Table 2, using the examples of Table 1. Patterns in Table 2 show that, if time considerations are the limiting factor, then the greatest impact cannot be attributed to the number of program variables nor the maximum degree in the program assignments (Table 1). Three of the examples in Table 1 exhibit timeouts (60 s) in the final column. The property common to each of these examples is the high number of monomial terms in any polynomial candidate of degree 7. In turn, this property feeds into a large system of simultaneous equations, which we solve to test for invariants. Indeed, time elapsed is not so strongly correlated with either of these program features. As supporting evidence we note the specific attributes of benchmark deg-500 whose assignments include polynomial updates of large degree and yet returns synthesised invariants with relatively low time elapsed in Table 2. We note the significantly longer running times associated with the benchmark bees (Example 29). This suggests that mutual dependencies between program variables in the loop assignment explain this phenomenon: such inter-relations lead to the construction of larger systems of equations, which itself feeds into the problem of resolving the recurrence equation associated with a candidate.
10.4 Experimental summary
Our experiments illustrate the feasibility of synthesising invariants and solvable loops using our approach for programs with unsolvable recurrence operators from various domains such as biological systems, probabilistic loops, and classical programs (see Sect. 5). This further motivates the theoretical characterisation of unsolvable operators in terms of defective variables (Sect. 4).
11 Conclusion
We establish a new technique that synthesises invariants for loops with unsolvable recurrence operators and show its applicability for deterministic and probabilistic programs. Our work is further extended to translate unsolvable loops into solvable ones, by ensuring that the polynomial loop invariants of the solvable loop are invariants of the given unsolvable loop. Our work is based on a new characterisation of unsolvable loops in terms of effective and defective variables: the presence of defective variables is equivalent to unsolvability. In order to generate invariants, we provide an algorithm to isolate the defective program variables and a new method to compute polynomial combinations of defective variables admitting exponential polynomial closed-forms. The implementation of our approach in the tool Polar and our experimental evaluation demonstrate the usefulness of our alternative characterisation of unsolvable loops and the applicability of our invariant synthesis technique to systems from various domains.
Data availibility
The tool’s source code, data, and benchmarks used in this work are available in Polar’s repository https://github.com/probing-lab/polar.
Notes
each benchmark in Table 1 references, in parentheses, the respective example from our paper.
References
Amrollahi D, Bartocci E, Kenison G, Kovács L, Moosbrugger M, Stankovic M (2022) Solving invariant generation for unsolvable loops. In: Singh G, Urban C (eds) Static analysis—29th international symposium, SAS 2022, Auckland, New Zealand, December 5–7, 2022, proceedings. Lecture notes in computer science, vol 13790, pp 19–43. Springer, Cham. https://doi.org/10.1007/978-3-031-22308-2_3
Rodríguez-Carbonell E, Kapur D (2004) Automatic generation of polynomial loop invariants: algebraic foundations. In: Proceedings of the ISSAC, pp 266–273
Kovács L (2008) Reasoning algebraically about P-solvable loops. In: Proceedings of the TACAS, pp 249–264
Oliveira S, Bensalem S, Prevosto V (2016) Polynomial invariants by linear algebra. In: Proceedings of the ATVA, pp 479–494
Kincaid Z, Cyphert J, Breck J, Reps TW (2018) Non-linear reasoning for invariant synthesis. In: Proceedings of the POPL, pp 54–15433
Humenberger A, Jaroschek M, Kovács L (2018) Invariant generation for multi-path loops with polynomial assignments. In: Proceedings of the VMCAI, pp 226–246
Huang Z, Fan C, Mereacre A, Mitra S, Kwiatkowska MZ (2014) Invariant verification of nonlinear hybrid automata networks of cardiac cells. In: Proceedings of the CAV, pp 373–390
Kaminski BL, Katoen J, Matheja C, Olmedo F (2016) Weakest precondition reasoning for expected run-times of probabilistic programs. In: Proceedings of the ESOP, pp 364–389
Bartocci E, Kovács L, Stankovic M (2019) Automatic generation of moment-based invariants for prob-solvable loops. In: Proceedings of the ATVA, pp 255–276
Müller-Olm M, Seidl H (2004) Computing polynomial program invariants. Inf Process Lett 91(5):233–244
Hrushovski E, Ouaknine J, Pouly A, Worrell J (2020) On strongest algebraic program invariants. J ACM (to appear)
Elspas B, Green M, Levitt K, Waldinger R (1972) Research in interactive program-proving techniques. Technical report, SRI
Katz S, Manna Z (1976) Logical analysis of programs. Commun ACM 19(4):188–206
Everest G, Poorten A, Shparlinski I, Ward T (2003) Recurrence sequences, vol 104. Mathematical surveys and monographs. American Mathematical Society, Providence, p 318
Kauers M, Paule P (2011) The concrete tetrahedron. Texts and monographs in symbolic computation. Springer, Vienna, p 203
Rodríguez-Carbonell E, Kapur D (2007) Generating all polynomial invariants in simple loops. J Symb Comput 42:443–476
Farzan A, Kincaid Z (2015) Compositional recurrence analysis. In: FMCAD, pp 57–64
Bartocci E, Kovács L, Stankovic M (2020) Analysis of Bayesian networks via prob-solvable loops. In: Proceedings of the ICTAC, pp 221–241
Frohn F, Hark M, Giesl J (2020) Termination of polynomial loops. In: Proceedings of the SAS, pp 89–112 (2020)
Chakarov A, Sankaranarayanan S (2013) Probabilistic program analysis with martingales. In: Sharygina N, Veith H (eds) Computer aided verification. Springer, Berlin, pp 511–526
Lattner C, Adve VS (2004) LLVM: a compilation framework for lifelong program analysis and transformation. In: Proceedings of the CGO, pp 75–88
Hoare CAR (1969) An axiomatic basis for computer programming. Commun ACM 12(10):576–580
Kauers M, Zimmermann B (2008) Computing the algebraic relations of C-finite sequences and multisequences. J Symb Comput 43:787–803
Humenberger A, Jaroschek M, Kovács L (2017) Automated generation of non-linear loop invariants utilizing hypergeometric sequences. In: Proceedings of the ISSAC, pp 221–228
Schreuder A, Ong C-L (2019) Polynomial probabilistic invariants and the optional stopping theorem. CoRR. arXiv:1910.12634
Chakarov A, Voronin Y-L, Sankaranarayanan S (2016) Deductive proofs of almost sure persistence and recurrence properties. In: Proceedings of the TACAS, pp 260–279
May RM (1976) Simple mathematical models with very complicated dynamics. Nature. https://doi.org/10.1038/261459a0
Maritz MF (2020) A note on exact solutions of the logistic map. Chaos Interdiscip J Nonlinear Sci 10(1063/1):5125097
Moosbrugger M, Stankovič M, Bartocci E, Kovács L (2022) This is the moment for probabilistic loops. Proc ACM Program Lang. https://doi.org/10.1145/3563341
Britton NF, Franks NR, Pratt SC, Seeley TD (2002) Deciding on a new home: How do honeybees agree? Proc R Soc Lond Ser B Biol Sci 269(1498):1383–1388
Dreossi T, Dang T, Piazza C (2016) Parallelotope bundles for polynomial reachability. In: Proceedings of the HSCC, pp 297–306
Sankaranarayanan S, Chou Y, Goubault E, Putot S (2020) Reasoning about uncertainties in discrete-time dynamical systems using polynomial forms. In: Proceedings of the NeurIPS, pp 17502–17513
Baake M, Grimm U, Joseph D (1993) Trace maps, invariants, and some of their applications. Int J Mod Phys B 7(6–7):1527–1550. https://doi.org/10.1142/S021797929300247X
Roberts JAG, Baake M (1994) Trace maps as 3D reversible dynamical systems with an invariant. J Stat Phys 74(3–4):829–888. https://doi.org/10.1007/BF02188581
Cassels JWS (1972) An introduction to diophantine approximation. Cambridge tracts in mathematics and mathematical physics, No. 45. Hafner Publishing Co., New York, p 169. Facsimile reprint of the 1957 edition
Jagžev AV (1980) On a problem of O.-H. Keller. Sibirsk Mat Zh 21(5):141–150191
Bass H, Connell EH, Wright D (1982) The Jacobian conjecture: reduction of degree and formal expansion of the inverse. Bull Am Math Soc 7(2):287–330. https://doi.org/10.1090/S0273-0979-1982-15032-7
Bondt M (2006) Quasi-translations and counterexamples to the homogeneous dependence problem. Proc Am Math Soc 134(10):2849–2856. https://doi.org/10.1090/S0002-9939-06-08335-3
Zampieri G (2008) Homogeneous polynomial invariants for cubic-homogeneous functions. Univ Iagel Acta Math 46:99–103
Santos Freire R Jr, Gorni G, Zampieri G (2008) Search for homogeneous polynomial invariants and a cubic-homogeneous mapping without quadratic invariants. Univ Iagel Acta Math 46:7–13
Nagata M (1972) On automorphism group of \(k[x,\,y]\). Kinokuniya Book Store Co., Ltd., Tokyo, p 53. Department of Mathematics, Kyoto University, Lectures in Mathematics, No. 5
van den Essen A, Peretz R (2003) Polynomial automorphisms and invariants. J Algebra 269(1):317–328. https://doi.org/10.1016/S0021-8693(03)00424-1
Meurer A, Smith CP, Paprocki M, Čertík O, Kirpichev SB, Rocklin M, Kumar A, Ivanov S, Moore JK, Singh S, Rathnayake T, Vig S, Granger BE, Muller RP, Bonazzi F, Gupta H, Vats S, Johansson F, Pedregosa F, Curry MJ, Terrel AR, Roučka V, Saboo A, Fernando I, Kulal S, Cimrman R, Scopatz A (2017) SymPy: symbolic computing in Python. PeerJ Comput Sci 3:103
Humenberger A, Jaroschek M, Kovács L (2018) Aligator.jl—A Julia package for loop invariant generation. In: Proceedings of the CICM, pp 111–117
Bayarmagnai E, Mohammadi F, Prébet R (2024) Algebraic tools for computing polynomial loop invariants. In: Proceedings of the 2024 International Symposium on Symbolic and Algebraic Computation, ISSAC 2024 (To Appear), https://10.1145/3666000.3669710
Acknowledgements
This research was supported by the Vienna Science and Technology Fund WWTF 10.47379/ICT19018 grant ProbInG, the European Research Council Consolidator Grant ARTIST 101002685, the Austrian Science Fund (FWF) project W1255-N23, and the SecInt Doctoral College funded by TU Wien. This research was also funded in part by the Austrian Science Fund (FWF) [10.55776/F85, 10.55776/W1255], for open access purposes; the authors have applied a CC BY public copyright license to any author accepted manuscript version arising from this submission. We thank the authors of [45] for alerting us to an error in an early version of our manuscript and the anonymous reviewers for their constructive feedback.
Funding
Open access funding provided by TU Wien (TUW).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Amrollahi, D., Bartocci, E., Kenison, G. et al. (Un)Solvable loop analysis. Form Methods Syst Des (2024). https://doi.org/10.1007/s10703-024-00455-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10703-024-00455-0