Effective Lossy Queue Languages

  • Parosh Aziz Abdulla
  • Luc Boasson
  • Ahmed Bouajjani
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2076)


Although the set of reachable states of a lossy channel system (LCS) is regular, it is well-known that this set cannot be constructed effectively. In this paper, we characterize significant classes of LCS for which the set of reachable states can be computed. Furthermore, we show that, for slight generatlizations of these classes, computability can no longer be achieved.

To carry out our study, we define rewriting systems which capture the behaviour of LCS, in the sense that (i) they have a FIFO-like semantics and (ii) their languages are downward closed with respect to the substring relation. The main result of the paper shows that, for context-free rewriting systems, the corresponding language can be computed. An interesting consequence of our results is that we get a characterization of classes of meta-transitions whose post-images can be effectively constructed. These meta-transitions consist of sets of nested loops in the control graph of the system, in contrast to previous works on meta-transitions in which only single loops are considered.

Essentially the same proof technique we use to show the result mentioned above allows also to establish a result in the theory of 0L-systems, i.e., context-free parallel rewriting systems. We prove that the downward closure of the language generated by any 0L-system is effectively regular.


Single Loop Nest Loop Reachable State Nonterminal Symbol Downward Closure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [AAB99]
    Parosh Aziz Abdulla, Aurore Annichini, and Ahmed Bouajjani. Algorithmic verification of lossy channel systems: An application to the bounded retransmission protocol. In TACAS’99. LNCS 1579, 1999.Google Scholar
  2. [ABJ98]
    Parosh Aziz Abdulla, Ahmed Bouajjani, and Bengt Jonsson. On-the-fly analysis of systems with unbounded, lossy fifo channels. In CAV’98. LNCS 1427, 1998.Google Scholar
  3. [AJ96]
    Parosh Aziz Abdulla and Bengt Jonsson. Verifying programs with unreliable channels. Information and Computation, 127(2):91–101, 1996.zbMATHCrossRefMathSciNetGoogle Scholar
  4. [BBK93]
    J.C.M. Baeten, J.A. Bergstra, and J.W. Klop. Decidability of bisimulation equivalence for processes generating context-free languages. Journal of the ACM, (40):653–682, 1993.zbMATHCrossRefMathSciNetGoogle Scholar
  5. [BG96]
    B. Boigelot and P. Godefroid. Symbolic verification of communication protocols with infinite state spaces using QDDs. In CAV’96. LNCS 1102, 1996.Google Scholar
  6. [BGWW97]
    B. Boigelot, P. Godefroid, B. Willems, and P. Wolper. The power of QDDs. In SAS’97. LNCS 1302, 1997.Google Scholar
  7. [BH97]
    A. Bouajjani and P. Habermehl. Symbolic reachability analysis of fifo-channel systems with nonregular sets of configurations. In ICALP’ 97. LNCS 1256, 1997.Google Scholar
  8. [Bur98]
    O. Burkart. Queues as processes. Electrnic Notes in Theoretical Computer Science, 18, 1998.Google Scholar
  9. [CFI96]
    Gérard Cécé, Alain Finkel, and S. Purushothaman Iyer. Unreliable Channels Are Easier to Verify Than Perfect Channels. Information and Computation, 124(1):20–31, 1996.zbMATHCrossRefMathSciNetGoogle Scholar
  10. [CHS92]
    S. Christensen, H. Hüttel, and C. Stirling. Bisimulation equivalence is decidable for all context-free processes. In CONCUR’ 92. LNCS, 1992.Google Scholar
  11. [Cou91]
    B. Courcelle. On constructing obstruction sets of words. EATCS, 44:178–185, June 1991.zbMATHGoogle Scholar
  12. [CVWY90]
    C. Courcoubetis, M. Vardi, P. Wolper, and M. Yannakakis. Memory efficient algorithms for the verification of temporal properties. In CAV’90, 1990.Google Scholar
  13. [GH94]
    J.F. Groote and H. Hüttel. Undecidable equivelences for basic process algebra. Information and Computation, 1994.Google Scholar
  14. [GvdP93]
    J.F. Groote and J. van de Pol. A bounded retransmission protocol for large data packets. Tech. report, Dept. of Philosophy, Utrecht University, Oct. 1993.Google Scholar
  15. [Hol91]
    G.J. Holzmann. Design and Validation of Computer Protocols. Prentice Hall, 1991.Google Scholar
  16. [May00]
    R. Mayr. Undecidable problems in unreliable computations. In LATIN’2000. LNCS 1776, 2000.Google Scholar
  17. [RS80]
    G. Rozenberg and A. Salomaa. The Mathematical Theory of L-systems. Academic Press, 1980.Google Scholar
  18. [Sti96]
    C. Stirling. Decidability of bisimulation equivalence for normed push-down processes. In CONCUR’96. LNCS 1119, 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Parosh Aziz Abdulla
    • 1
  • Luc Boasson
    • 2
  • Ahmed Bouajjani
    • 2
  1. 1.DoCSUppsala UniversityUppsalaSweden
  2. 2.LiafaUniv. of Paris 7Paris Cedex 05France

Personalised recommendations