Abstract
Markov decision processes are widely used for planning and verification in settings that combine controllable or adversarial choices with probabilistic behaviour. The standard analysis algorithm, value iteration, only provides lower bounds on infinitehorizon probabilities and rewards. Two “sound” variations, which also deliver an upper bound, have recently appeared. In this paper, we present a new sound approach that leverages value iteration’s ability to usually deliver good lower bounds: we obtain a lower bound via standard value iteration, use the result to “guess” an upper bound, and prove the latter’s correctness. We present this optimistic value iteration approach for computing reachability probabilities as well as expected rewards. It is easy to implement and performs well, as we show via an extensive experimental evaluation using our implementation within the mcsta model checker of the Modest Toolset.
The authors are listed alphabetically. This work was partly performed while author B. L. Kaminski was at RWTH Aachen University, Aachen, Germany. This work was supported by ERC Advanced Grant 787914 (FRAPPANT), DFG Research Training Group 2236 (UnRAVeL), and NWO VENI grant no. 639.021.754.
Download conference paper PDF
1 Introduction
Markov decision processes (MDP, [30]) are a widelyused formalism to represent discretestate and time systems in which probabilistic effects meet controllable nondeterministic decisions. The former may arise from an environment or agent whose behaviour is only known statistically (e.g. message loss in wireless communication or statistical user profiles), or it may be intentional as part of a randomised algorithm (such as exponential backoff in Ethernet). The latter may be under the control of the system—then we are in a planning setting and typically look for a scheduler (or strategy, policy) that minimises the probability of unsafe behaviour or maximises a reward—or it may be considered adversarial, which is the standard assumption in verification: we want to establish that the maximum probability of unsafe behaviour is below, or that the minimum reward is above, a specified threshold. Extensions of MDP cover continuous time [11, 26], and the analysis of complex formalisms such as stochastic hybrid automata [13] can be reduced to the analysis of MDP abstractions.
The standard algorithm to compute optimal (maximum or minimum) probabilities or reward values on MDP is value iteration (VI). It implicitly computes the corresponding optimal scheduler, too. It keeps track of a value for every state of the MDP, locally improves the values iteratively until a “convergence” criterion is met, and then reports the final value for the initial state as the overall result. The initial values are chosen to be an underapproximation of the true values (e.g. 0 for all states in case of probabilities or nonnegative rewards). The final values are then an improved underapproximation of the true values. For unbounded (infinitehorizon) properties, there is unfortunately no (known and practical) convergence criterion that could guarantee a predefined error on the final result. Still, probabilistic model checkers such as Prism [24] report the final result obtained via simple relative or absolute global error criteria as the definitive probability. This is because, on most case studies considered so far, value iteration in fact converges fast enough that the (relative or absolute) difference between the reported and the true value approximately meets the error \(\epsilon \) specified for the convergence criterion. Only relatively recently has this problem of soundness come to the attention of the probabilistic verification and planning communities [7, 14, 28]. First highlighted on handcrafted counterexamples, it has by now been found to affect benchmarks and reallife case studies, too [3].
The first proposal to compute sound reachability probabilities was to use interval iteration (II [15], first presented in [14]). The idea is to perform two iterations concurrently, one starting from 0 as before, and one starting from 1. The latter improves an overapproximation of the true values, and the process can be stopped once the (relative or absolute) difference between the two values for the initial state is below the specified \(\epsilon \), or at any earlier time with a correspondingly larger but known error. Baier et al. extended interval iteration to expected accumulated reward values [3]; here, the complication is to find initial values that are guaranteed to be an overapproximation. The proposed graphbased (i.e. not numerical) algorithm in practice tends to compute conservative initial values from which many iterations are needed until convergence. More recently, sound value iteration (SVI) [31] improved upon interval iteration by computing upper bounds onthefly and performing larger value improvements per iteration, for both probabilities and expected rewards. However, we found SVI tricky to implement correctly; some edge cases not considered by the algorithm as presented in [31] initially caused our implementation to deliver incorrect results or diverge on very few benchmarks. Both II and SVI fundamentally depend on the MDP being contracting; this must be ensured by appropriate structural transformations, e.g. by collapsing end components, a priori. These transformations additionally complicate implementations, and increase memory requirements. Our Contribution. We present (in Sect. 4) a new algorithm to compute sound reachability probabilities and expected rewards that is both simple and practically efficient. We first (1) perform standard value iteration until “convergence”, resulting in a lower bound on the value for every state. To this we (2) apply specific heuristics to “guess”, for every state, a candidate upper bound value. Further value iterations (3) then confirm (if all values decrease) or disprove (if all values increase, or lower and upper bounds cross) the soundness of the upper bounds. In the latter case, we perform more lower bound iterations with reduced \(\epsilon \) before retrying from step 2. We combine classic results from domain theory with specific properties of value iteration to show that our algorithm terminates. In problematic cases, many retries may be needed before termination, and performance may be worse than interval or sound value iteration. However, on many existing case studies, value iteration already worked well, and our approach attaches a soundness proof to its result with moderate overhead. We thus refer to it as optimistic value iteration (OVI). In contrast to II and SVI, it also works well for noncontracting MDP, albeit without a general termination guarantee. Our experimental evaluation in Sect. 5 uses all applicable models from the Quantitative Verification Benchmark Set [21] to confirm that OVI indeed performs as expected. It uses our publicly available implementations of II, SVI, and now OVI in the mcsta model checker of the Modest Toolset [20].
Related Work. In parallel to [15], the core idea behind II was also presented in [7] (later improved in [2]), embedded in a learningbased framework that manages to alleviate the state space explosion problem in models with a particular structure. In this approach, end components are statistically detected and collapsed onthefly. II has recently been extended to stochastic games in [23], offering deflating as a new alternative to collapsing end components in MDP. Deflating does not require a structural transformation, but rather extra computation steps in each iteration applied to the states of all (a priori identified) end components.
The only known convergence criterion for pure VI was presented in [9, Sect. 3.5]: if we run VI until the absolute error between two iterations is less than a certain value \(\alpha \), then the computed values at that point are within \(\alpha \) of the true values, and can in fact be rounded to the exact true values (as implemented in the rational search approach [5]). However, \(\alpha \) cannot be freely chosen; it is a fixed number that depends on the size of the MDP and the largest denominator of the (rational) transition probabilities. The number of iterations needed is exponential in the size and the denominators. While not very useful in practice, this establishes an exponential upper bound on the number of iterations needed in unboundedhorizon VI. Additionally, Balaji et al. [4] recently showed the computations in finitehorizon value iteration to be EXPTIMEcomplete.
As an alternative to the iterative numeric road, guaranteed correct results (modulo implementation errors) can be obtained by using precise rational arithmetic. It does not combine too well with iterative methods like II or SVI due to the increasingly small differences between the values and the actual solution. The probabilistic model checker Storm [10] thus combines topological decomposition, policy iteration, and exact solvers for linear equation systems based on Gaussian elimination when asked to use rational arithmetic [22, Section 7.4.8]. The disadvantage is the significant runtime cost for performing the unlimitedprecision calculations, limiting such methods to relatively smaller MDP.
The only experimental evaluations using large sets of benchmarks that we are aware of compared VI with II to study the overhead needed to obtain sound results via II [3], and II with SVI to show the performance improvements of SVI [31]. The learningbased method with deflation of [2] does not compete against II and SVI; its aim is rather in dealing with state space explosion (i.e. memory usage). Its performance was evaluated on 16 selected small (\({<}400\) k states) benchmark instances in [2], showing absolute errors on the order of \(10^{4}\) on many benchmarks with a 30min timeout. SVI thus appears the most competitive technique in runtime and precision so far. Consequently, in our evaluation in Sect. 5, we compare OVI with SVI, and II for reference, using the default relative error of \(10^{6}\), including large and excluding clearly acyclic benchmarks (since they are trivial even for VI), with a 10min timeout which is rarely hit.
2 Preliminaries
\(\mathbb {R}^+_0 \) is the set of all nonnegative real numbers. We write \(\{\, x_1 \mapsto y_1, \dots \,\}\) to denote the function that maps all \(x_i\) to \(y_i\), and if necessary in the respective context, implicitly maps to 0 all x for which no explicit mapping is specified. Given a set S, its powerset is \(2^{S} \). A (discrete) probability distribution over S is a function \(\mu \in S \rightarrow [0, 1]\) with countable support and \(\sum _{s \in spt ({\mu })} \mu (s) = 1\). \( Dist ({S}) \) is the set of all probability distributions over S.
Markov Decision Processes (MDP) combine nondeterministic choices as in labelled transition systems with discrete probabilistic decisions as in discretetime Markov chains (DTMC). We define them formally and describe their semantics.
Definition 1
A Markov decision process (MDP) is a triple \(M =\langle S, s_I, T \rangle \) where S is a finite set of states with initial state \(s_I \in S\) and \(T : S \rightarrow 2^{ Dist ({\mathbb {R}^+_0 \times S})} \) is the transition function. T(s) must be finite and nonempty for all \(s \in S\).
For \(s \in S\), an element of T(s) is a transition, and a pair \(\langle r, s' \rangle \in spt ({T(s)}) \) is a branch to successor state \(s'\) with reward r and probability \(T(s)(\langle r, s' \rangle )\). Let \(M^{(s_I')}\) be M but with initial state \(s_I'\), and \(M^0\) be M with all rewards set to zero.
Example 1
Figure 1 shows our example MDP \(M_e\). We draw transitions as lines to an intermediate node from which branches labelled with probability and reward (if not zero) lead to successor states. We omit the intermediate node and probability 1 for transitions with a single branch, and label some transitions to refer to them in the text. \(M^e\) has 5 states, 7 transitions, and 10 branches.
In practice, higherlevel modelling languages like Modest [17] are used to specify MDP. The semantics of an MDP is captured by its paths. A path represents a concrete resolution of all nondeterministic and probabilistic choices. Formally:
Definition 2
A finite path is a sequence \(\pi _\mathrm {fin} = s_0\, \mu _0\, r_0\, s_1\, \mu _1\, r_1 \dots \mu _{n1} r_{n1} s_n\) where \(s_i \in S\) for all \(i \in \{\, 0, \dots , n \,\}\) and \(\exists \, \mu _i \in T(s_i) :\langle r_i, s_{i+1} \rangle \in spt ({\mu _i}) \) for all \(i \in \{\, 0, \dots , n  1 \,\}\). Let , , and . \(\varPi _ fin \) is the set of all finite paths starting in \(s_I\). A path is an analogous infinite sequence \(\pi \), and \(\varPi \) is the set of all paths starting in \(s_I\). We write \(s \in \pi \) if \(\exists \, i :s = s_i\), and \(\pi _{\rightarrow G}\) for the shortest prefix of \(\pi \) that contains a state in \(G \subseteq S\), or \(\bot \) if \(\pi \) contains no such state. Let .
A scheduler (or adversary, policy or strategy) only resolves the nondeterministic choices of M. For this paper, memoryless deterministic schedulers suffice [6].
Definition 3
A function \(\mathfrak {s} :S \rightarrow Dist ({\mathbb {R}^+_0 \times S}) \) is a scheduler if, for all \(s \in S\), we have \(\mathfrak {s}(s) \in T(s)\). The set of all schedulers of M is \(\mathfrak {S}(M)\).
Given an MDP M as above, let \(M_\mathfrak {s} = \langle S, s_I, T_\mathfrak {s} \rangle \) with \(T_\mathfrak {s}(s) = \{\,\mathfrak {s}(s)\,\}\) be the DTMC induced by \(\mathfrak {s}\). Via the standard cylinder set construction [12, Sect. 2.2] on \(M_\mathfrak {s}\), a scheduler induces a probability measure \(\mathbb {P}_\mathfrak {s}^M\) on measurable sets of paths starting in \(s_I\). For goal state \(g \in S\), the maximum and minimum probability of reaching \(\textit{\textbf{g}}\) is defined as \(\mathrm {P}_{\!\mathrm {max}}^M(\diamond \, g) = \sup _{\mathfrak {s} \in \mathfrak {S}} \mathbb {P}_\mathfrak {s}^M(\{\, \pi \in \varPi \mid g \in \pi \,\})\) and \(\mathrm {P}_{\!\mathrm {min}}^M(\diamond \, g) = \inf _{\mathfrak {s} \in \mathfrak {S}} \mathbb {P}_\mathfrak {s}^M(\{\, \pi \in \varPi \mid g \in \pi \,\})\), respectively. The definition extends to sets G of goal states. Let \(R_G^M :\varPi \rightarrow \mathbb {R}^+_0 \) be the random variable defined by \(R_G^M(\pi ) = \mathrm {rew}(\pi _{\rightarrow G})\) and let \(\mathbb {E}_\mathfrak {s}^M(G)\) be the expected value of \(R_G^M\) under \(\mathbb {P}_\mathfrak {s}^M\). Then the maximum and minimum expected reward to reach \(\textit{\textbf{G}}\) is defined as \(\mathrm {E}_\mathrm {max}^M(G) = \sup _{\mathfrak {s}}\mathbb {E}_\mathfrak {s}^M(G)\) and \(\mathrm {E}_\mathrm {min}^M(G) = \inf _{\mathfrak {s}}\mathbb {E}_\mathfrak {s}^M(G)\), respectively. We omit the superscripts for M when they are clear from the context. From now on, whenever we have an MDP with a set of goal states G, we assume that they have been made absorbing, i.e. for all \(g \in G\) we only have a selfloop: \(T(g) = \{\, \{\, \langle 0, g \rangle \mapsto 1 \,\} \,\}\).
Definition 4
An end component of M as above is a (sub)MDP \(\langle S', T', s_I' \rangle \) where \(S' \subseteq S\), \(T'(s) \subseteq T(s)\) for all \(s \in S'\), if \(\mu \in T'(s)\) for some \(s \in S'\) and \(\langle r, s' \rangle \in spt ({\mu }) \) then \(r = 0\), and the directed graph with vertex set \(S'\) and edge set \(\{\, \langle s, s' \rangle \mid \exists \,\mu \in T'(s) :\langle 0, s' \rangle \in spt ({\mu }) \,\}\) is strongly connected.
3 Value Iteration
The standard algorithm to compute reachability probabilities and expected rewards is value iteration (VI) [30]. In this section, we recall its theoretical foundations and its limitations regarding convergence.
3.1 Theoretical Foundations
Let \(\mathbb {V} = \{\,v ~~ v :S \rightarrow \mathbb {R}^+_0 \cup \{\infty \}\,\}\) be a space of vectors of values. It can easily be shown that \(\langle \mathbb {V},\, {\preceq } \rangle \) with
forms a complete lattice, i.e. every subset \(V \subseteq \mathbb {V} \) has a supremum (and an infimum) in \(\mathbb {V} \) with respect to \(\preceq \). We write \(v \prec w\) for \(v \preceq w \wedge v \ne w\) and \(v \not \sim w\) for \(\lnot ( v \preceq w \vee w \preceq v )\).
Minimum and maximum reachability probabilities and expected rewards can be expressed as the least fixed point of the Bellman operator \(\varPhi :\mathbb {V} \rightarrow \mathbb {V} \) given by
where \( opt \in \{\, \mathrm {max},\, \mathrm {min}\,\}\) and the choice of both \(S_? \subseteq S\) and d depends on whether we wish to compute reachability probabilities or expected rewards. In any case, the Bellman operator \(\varPhi \) can be shown to be Scottcontinuous [1], i.e. in our case: for any subset \(V \subseteq \mathbb {V} \), we have \(\varPhi ( \sup V) = \sup \varPhi (V)\).
The Kleene fixed point theorem for Scottcontinuous selfmaps on complete lattices [1, 27] guarantees that \(\textsf {lfp}\,\!\varPhi \), the least fixed point of \(\varPhi \), indeed exists. Note that \(\varPhi \) can still have more than one fixed point. In addition to mere existence of \(\textsf {lfp}\,\varPhi \), the Kleene fixed point theorem states that \(\textsf {lfp}\,\varPhi \) can be expressed by
where \(\bar{0} \in \mathbb {V} \) is the zero vector and \(\varPhi ^n(v)\) denotes nfold application of \(\varPhi \) to v. Equation 1 is the basis of VI: the algorithm iteratively constructs a sequence of vectors
which converges to the soughtafter least fixed point. This convergence is monotonic: for every \(n \in \mathbb {N} \), we have \(\varPhi ^n(\bar{0}) \preceq \varPhi ^{n+1}(\bar{0})\) and hence \(\varPhi ^n(\bar{0}) \preceq \textsf {lfp}\,\varPhi \). In particular, \(\varPhi ^n(\bar{0})(s_I)\) is an underapproximation of the soughtafter quantity for every n. Note that iterating \(\varPhi \) on any underapproximation \(v \preceq \textsf {lfp}\,\varPhi \) (instead of \(\bar{0}\)) will still converge to \(\textsf {lfp}\,\varPhi \) and \(\varPhi ^n(v) \preceq \textsf {lfp}\,\varPhi \) will hold for any n.
GaussSeidel Value Iteration. Algorithm 1 shows the pseudocode of a VI implementation that uses the socalled GaussSeidel optimisation: Whereas standard VI needs to store two vectors \(v_{i}\) and \(v_{i+1}\), GaussSeidel VI stores only a single vector v and performs updates in place. This does not affect the correctness of VI, but may speed up convergence depending on the order in which the loop in line 4 considers the states in \(S_?\). The error metric \( diff \) is used to check for convergence.
VI for Probabilities. For determining reachability probabilities, we operate on \(M^0\) and set \(S_? = S \setminus G\) and \(d = 1\). Then the corresponding Bellman operator satisfies
and VI will iteratively approximate this quantity from below. The corresponding call to Algorithm 1 is \(\texttt {GSVI}(M^0\), \(S \setminus G\), \(\{\, s \mapsto 0 \mid s \in S \setminus G \,\} \cup \{\, s \mapsto 1 \mid s \in G \,\}, \alpha \), \( diff )\).
VI for Expected Rewards. For determining the expected reward \(\mathrm {E}_{ opt }^{M^{(s)}}(G)\), we operate on M and first have to determine the set \(S_\infty \) of states from which the minimum (if \( opt = \mathrm {max}\)) or maximum (if \( opt = \mathrm {min}\)) probability to reach G is less than 1.^{Footnote 1} If \(s_I \in S_\infty \), then the result is \(\infty \) due to the definition of \(\mathrm {rew}(\bot )\). Otherwise, we choose \(S_? = S \setminus S_\infty \) and \(d = \infty \). Then, for \( opt = \mathrm {max}\), the least fixed point of the corresponding Bellman operator satisfies
Again, VI underapproximates this quantity. The same holds for \( opt = \mathrm {min}\) if M does not have end components containing states other than those in G and \(S_\infty \). The corresponding call to Algorithm 1 is \(\texttt {GSVI}(M\), \(S \setminus S_\infty \), \(\{\, s \mapsto 0 \mid s \in S \setminus S_\infty \,\} \cup \{\, s \mapsto \infty \mid s \in S_\infty \,\}\), \(\alpha \), \( diff )\).
3.2 Uniqueness of Fixed Points
\(\textsf {lfp}\,\varPhi \) may not be unique for two reasons: states that cannot reach G under the optimal scheduler may take any value (causing fixed points greater than \(\textsf {lfp}\,\varPhi \) for \(\mathrm {P}_{\!\mathrm {min}}\) and \(\mathrm {P}_{\!\mathrm {max}}\)), and states in end components may take values higher than \(\textsf {lfp}\,\varPhi \). The latter affects \(\mathrm {P}_{\!\mathrm {max}}\) (higher fixed points) and \(\mathrm {E}_\mathrm {min}\) (lower fixed points).
Example 2
In \(M_e\) of Fig. 1, \(s_1\) and \(s_2\) and the two transitions inbetween form an end component. For \(\mathrm {P}_\mathrm {max}^{M_e}(\diamond \, \{\, s_+ \,\})\), \(v = \{\, s \mapsto 1 \,\}\) is a nonleast fixed point for the corresponding Bellman operator; with appropriate values for \(s_1\) and \(s_2\), we can obtain fixed points with any \(v(s_0) > 0.5\) of our choice. Similarly, we have \(\mathrm {E}_\mathrm {min}^M(\{\,s_+, s_\,\}) = 0.6\) (by scheduling b in \(s_0\)), but due to the end component (with only zeroreward transitions by definition), the fixed point is s.t. \(v(s_0) = 0\).
VI works for \(\mathrm {P}_{\!\mathrm {min}}\), \(\mathrm {P}_{\!\mathrm {max}}\), and \(\mathrm {E}_\mathrm {max}\) with multiple fixed points: we anyway seek \(\textsf {lfp}\,\varPhi \) and start from a (trivial) underapproximation. For \(\mathrm {E}_\mathrm {min}\), (zeroreward) end components need to be collapsed: we determine the maximal end components using algorithms similar to [15, Alg. 1], then replace each of them by a single state, keeping all transitions leading out of the end component. We refer to this as the ECC transformation. However, such end components rarely occur in case studies for \(\mathrm {E}_\mathrm {min}\) since they indicate Zeno behaviour w.r.t. to the reward. As rewards are often associated to time progress, such behaviour would be unrealistic.
To make the fixed points unique, for \(\mathrm {E}_\mathrm {max}\) and \(\mathrm {E}_\mathrm {min}\) we fix the values of all states in G to 0. For \(\mathrm {P}_{\!\mathrm {min}}\), we precompute the set \(S_\mathrm {min}^0\) of states that reach G with minimum probability 0 using Alg. 1 of [12], then fix their values to 0. For \(\mathrm {P}_{\!\mathrm {max}}\), we analogously use \(S_\mathrm {max}^0\) via Alg. 3 of [12]. For \(\mathrm {P}_{\!\mathrm {max}}\) and \(\mathrm {E}_\mathrm {min}\), we additionally need to remove end components via ECC. In contrast to the precomputations, ECC changes the structure of the MDP and is thus more memoryintensive.
3.3 Convergence
VI and GSVI will not reach a fixed point in general, except for special cases such as acyclic MDP. It is thus standard to use a convergence criterion based on the difference between two consecutive iterations (lines 6 and 8) to make GSVI terminate: we either check the absolute error, i.e.
or the relative error, i.e.
By default, probabilistic model checkers like Prism and Storm use and \(\alpha = 10^{6}\). Upon termination of GSVI, v is then closer to the least fixed point, but remains an underapproximation. In particular, \(\alpha \) has, in general, no relation to the final difference between \(v(s_I)\) and \({\mathrm {P}_{ \!\!opt }}(\diamond \, G)\) or \({\mathrm {E}_{ opt }}(G)\), respectively.
Example 3
Consider MDP \(M_e\) of Fig. 1 again with \(G = \{\, s_+ \,\}\). The first four rows in the body of Table 1 show the values for v after the ith iteration of the outer loop of a call to . After the fourth iteration, GSVI terminates since the error is less than \(\alpha = 0.05\); at this point, we have \(\mathrm {P}_{\!\mathrm {max}}(\diamond \, s_+)  v(s_0) = 0.08 > \alpha \).
To obtain a value within a prescribed error \(\epsilon \) of the true value, we can compute an upper bound in addition to the lower bound provided by VI. Interval iteration (II) [3, 15] does so by performing, in parallel, a second value iteration on a second vector u that starts from a known overapproximation. For probabilities, the vector \(\bar{1} = \{\,s \mapsto 1\,\}\) is a trivial overapproximation; for rewards, more involved graphbased algorithms need to be used to precompute (a very conservative) one [3]. II terminates when \( diff (v(s_I), u(s_I)) \le 2\epsilon \) and returns \(v_{ II } = \frac{1}{2}(u(s_I) + v(s_I))\). With , II thus guarantees that \(v_{ II } \in [v_ true  \epsilon \cdot v_ true , v_ true + \epsilon \cdot v_ true ]\) and analogously for expected rewards. However, to ensure termination, II requires a unique fixed point: u converges from above to the greatest fixed point \(\textsf {gfp}\,\varPhi \), thus for every MDP where \( diff ((\textsf {lfp}\,\varPhi )(s_I), (\textsf {gfp}\,\varPhi )(s_I)) > 2\epsilon \), II diverges. For \(\mathrm {P}_{\!\mathrm {max}}\), we have \(\textsf {gfp}\,\varPhi (s_ ec ) = 1\) for all \(s_ ec \) in end components, thus II tends to diverge when there is an end component. Sound value iteration (SVI) [31] is similar, but uses a different approach to derive upper bounds that makes it perform better overall, and that eliminates the need to precompute an initial overapproximation for expected rewards. However, SVI still requires unique fixed points.
We summarise the preprocessing requirements of VI, II, and SVI in Table 2. With unique fixed points, we can transform \(\mathrm {P}_{\!\mathrm {min}}\) into \(\mathrm {P}_{\!\mathrm {max}}\) by making \(S_\mathrm {min}^0\) states absorbing and setting G to \(S_\mathrm {min}^0\), and \(\mathrm {P}_{\!\mathrm {max}}\) into \(\mathrm {E}_\mathrm {max}\) by a similar transformation adding reward 1 to entering G. Most of the literature on VI variants works in such a setting and describes the \(\mathrm {P}_{\!\mathrm {max}}\) or \(\mathrm {E}_\mathrm {max}\) case only. Since OVI also works with multiple fixed points, we have to consider all four cases individually.
4 Optimistic Value Iteration
We now present a new, practical solution to the convergence problem for unbounded reachability and expected rewards. It exploits the empirical observation that on many case studies VI delivers results which are roughly \(\alpha \)close to the true value—it only lacks the ability to prove it. Our approach, optimistic value iteration (OVI), extends standard VI with the ability to deliver such a proof.
The key idea is to exploit a property of the Bellman operator \(\varPhi \) and its GaussSeidel variant as in Algorithm 1 to determine whether a candidate vector is a lower bound, an upper bound, or neither. The foundation is basic domain theory: by Scottcontinuity of \(\varPhi \) it follows that \(\varPhi \) is monotonic, meaning \(v \preceq w\) implies \(\varPhi (v) \preceq \varPhi (w)\). A principle called Park induction [29] for monotonic selfmaps on complete lattices yields the following induction rules: For any \(u \in \mathbb {V} \),
Thus, if we can construct a candidate vector u s.t. \(\varPhi (u) \preceq u\), then u is in fact an upper bound on the soughtafter \(\textsf {lfp}\,\!{\varPhi }\). We call such a u an inductive upper bound. Optimistic value iteration uses this insight and can be summarised as follows:
The resulting procedure in more detail is shown as Algorithm 2. Starting from the same initial vectors v as for VI, we first perform standard GaussSeidel value iteration (in line 2). We refer to this as the iteration phase of OVI. After that, vector v is an improved underapproximation of the actual probabilities or reward values. We then “guess” a vector u of upper values from the lower values in v (line 3). The guessing heuristics depends on \( diff \): if , then we use
if , then
We cap the result at 1 for \(\mathrm {P}_{\!\mathrm {min}}\) and \(\mathrm {P}_{\!\mathrm {max}}\). These heuristics have three important properties: (H1) \(v(s) = 0\) implies \( diff ^+(s) = 0\), (H2) \( diff (v(s), diff ^+(s)) \le 2\epsilon \), and (H3) \( diff (v(s), diff ^+(s)) > 0\) unless \(v(s) = 0\) or \(v(s) = 1\) for \(\mathrm {P}_{\!\mathrm {min}}\) and \(\mathrm {P}_{\!\mathrm {max}}\).
Then the verification phase starts in line 4: we perform value iteration on the lower values v and upper values u at the same time, keeping track of the direction in which the upper values move. For u, line 7 and the conditions around line 10 mean that we actually use operator \(\varPhi _\mathrm {min}(u) = \lambda \,s.~\mathrm {min}( \varPhi (u)(s), u(s) )\). This may shorten the verification phases, and is crucial for our termination argument. A state s is blocked if \(\varPhi (u)(s) > \varPhi _\mathrm {min}(u)(s)\) and unblocked if \(\varPhi (u)(s) < u(s)\) here.
If, in some iteration, no state was blocked (line 15), then we had \(\varPhi (u) \preceq u\) before the start of the iteration. We thus know by Eq. 2 that the current u is an inductive upper bound for the values of all states, and the true value must be in the interval \([v(s_I), u(s_I)]\). By property H2, our use of \(\varPhi _\mathrm {min}\) for u, and the monotonicity of \(\varPhi \) as used on v, we also know that \( diff (v(s_I), u(s_I)) \le 2\epsilon \), so we immediately terminate and return the interval’s centre \(v_I = \frac{1}{2}(u(s_I) + v(s_I))\). The true value \(v_ true = (\textsf {lfp}\,\varPhi )(s_I)\) must then be in \([v_I  \epsilon \cdot v_ true , v_I + \epsilon \cdot v_ true ]\).
If, in some iteration, no state was unblocked (line 16), then again by Park induction we know that \(u \preceq \textsf {gfp}\,\varPhi \). If we are in a situation of unique fixed points, this also means \(u \preceq \textsf {lfp}\,\varPhi \), thus the current u is no upper bound: we cancel verification and go back to the iteration phase to further improve v before trying again. We do the same if v crosses u: then \(u(s) < v(s) \le (\textsf {lfp}\,\varPhi )(s)\) for some s, so this u was just another bad guess, too.
Otherwise, we do not yet know the relationship between u and \(\textsf {lfp}\,\varPhi \), so we remain in the verification phase until we encounter one of the cases above, or until we exceed the verification budget of \(\frac{1}{\alpha }\) iterations (as checked by the loop condition in line 4). This budget is a technical measure to ensure termination.
Optimisation. In case the fixed point of \(\varPhi \) is unique, by Park induction (via Eq. 3) we know that \(u \preceq \varPhi (u)\) implies that u is a lower bound on \(\textsf {lfp}\,\varPhi \). In such situations of single fixed points, we can—as an optimisation—additionally replace v by u before the goto in line 16.
Heuristics. OVI relies on heuristics to gain an advantage over alternative methods such as II or SVI; it cannot be better on all MDP. Concretely, we can choose

1.
a stopping criterion for the iteration phase,

2.
how to guess candidate upper values from the result of the iteration phase, and

3.
how much to reduce \(\alpha \) when going back from verification to iteration.
Algorithm 2 shows the choices made by our implementation. We employ the standard stopping criteria used by probabilistic model checkers for VI, and the “weakest” guessing heuristics that satisfies properties H1, H2, and H3 (i.e. guessing any higher values would violate one of these properties). The only arbitrary choice is how to reduce \(\alpha \), which we at least halve on every retry. We experimentally found this to be a good compromise on benchmarks that we consider in Sect. 5, where

(a)
reducing \(\alpha \) further causes more and potentially unnecessary iterations in GSVI (continuing to iterate when switching to the verification phase would already result in upper values sufficient for termination), and

(b)
reducing \(\alpha \) less results in more verification phases (whose iterations are computationally more expensive than those of GSVI) being started before the values in v are high enough such that we manage to guess a u with \(\textsf {lfp}\,\varPhi \preceq u\).
Example 4
We now use the version of \(\varPhi \) to compute \(\mathrm {P}_{\!\mathrm {max}}\) and call
Table 1 shows the values in v and u during this run, assuming that we use nonGaussSeidel iterations. The first iteration phase lasts from \(i = 0\) to 4. At this point, u is initialised with the values shown in italics. The first verification phase needs only one iteration to realise that u is actually a lower bound (to a fixed point which is not the least fixed point, due to the uncollapsed end component). Blocked states are marked with a \(\overline{\text {bar}}\); unblocked states have a lower uvalue than in the previous iteration. We resume GSVI from \(i = 6\). The error in GSVI is again below \(\alpha \), which had been reduced to 0.008, during iteration \(i = 9\). We thus start another verification phase, which immediately (in one iteration) finds the newly guessed vector u to be an upper bound, with \( diff (v(s_0), u(s_0)) < 2\epsilon \).
4.1 Termination of OVI
We showed above that OVI returns an \(\epsilon \)correct result when it terminates. We now show that it terminates in all cases except for \(\mathrm {P}_{\!\mathrm {max}}\) with multiple fixed points. Note that this is a stronger result than what II and SVI can achieve.
Let us first consider the situations where \(\textsf {lfp}\,\varPhi \) is the unique fixed point of \(\varPhi \). First, GSVI terminates by Eq. 1. Let us now write \(v_i\) and \(u_i\) for the vectors u and v as they are at the beginning of verification phase iteration i. We know that \(v_0 \preceq u_0\). We distinguish three cases relating the initial guess \(u_0\) to \(\textsf {lfp}\,\varPhi \).

1.
\(u_0 \not \sim \textsf {lfp}\,\varPhi \) or \(u_0 \prec \textsf {lfp}\,\varPhi \), i.e. there is a state s with \(u_0(s) < (\textsf {lfp}\,\varPhi )(s)\). Since we use \(\varPhi _\mathrm {min}\) on the upper values, it follows \(u_i(s) \le u_0(s) < (\textsf {lfp}\,\varPhi )(s)\) for all i. By Eq. 1, there must thus be a j such that \(v_j(s) > u_j(s)\), triggering a retry with reduced \(\alpha \) in line 14. Such a retry could also be triggered earlier in line 16. Due to the reduction of \(\alpha \) and Eq. 1, every call to GSVI will further increase some values in v or reach \(v = \textsf {lfp}\,\varPhi \) (in special cases), and for some subsequent guess u we must have \(u_0(s) < u(s)\). Consequently, after some repetitions of this case 1, we must eventually guess a u with \(\textsf {lfp}\,\varPhi \preceq u\).

2.
\(\textsf {lfp}\,\varPhi \prec u_0\). Observe that operators \(\varPhi \) and \(\varPhi _\mathrm {min}\) are local [9], i.e. a state’s value can only change if a direct successor’s value changes. In particular, a state’s value can only decrease (increase) if a direct successor’s value decreases (increases). If \(u_i(s) < u_{i1}(s)\), then s cannot be blocked again in any later iteration \(j > i\): for it to become blocked, a successor’s upper value would have to increase, but \(\varPhi _\mathrm {min}\) ensures nonincreasing upper values for all states. Analogously to Eq. 1, we know that [3, Lemma 3.3 (c)]
$$ \textsf {lfp}\,\varPhi \preceq u \quad \text {implies}\quad \lim _{n\rightarrow \infty } \varPhi _\mathrm {min}^n(u) = \textsf {lfp}\,\varPhi $$(for the unique fixpoint case, since [3] assumes contracting MDP as usual). Thus, for all states s, there must be an i such that \(u_i(s) < u_{i1}(s)\); in consequence, there is also an iteration j where no state is blocked any more. Then the condition in line 15 will be true and OVI terminates.

3.
\(\textsf {lfp}\,\varPhi \preceq u_0\) but not \(\textsf {lfp}\,\varPhi \prec u_0\), i.e. there is a state s with \(u_0(s) = (\textsf {lfp}\,\varPhi )(s)\). If there is an i where no state, including s, is blocked, then OVI terminates as above. For \(\mathrm {P}_{\!\mathrm {min}}\) and \(\mathrm {P}_{\!\mathrm {max}}\), if \(u_0(s) = 1\), s cannot be blocked, so we can w.l.o.g. exclude such s. For other s not to be blocked in iteration i, we must have \(u_i(s') = (\textsf {lfp}\,\varPhi )(s')\) for all states \(s'\) reachable from s under the optimal scheduler, i.e. all of those states must reach the fixed point. This cannot be guaranteed on general MDP. Since this case is a very particular situation unlikely to be encountered in practice with our heuristics, OVI adopts a pragmatic solution: it bounds the number of iterations in every verification phase (cf. line 4). Due to property H3 of our heuristics, \(u_0(s) = (\textsf {lfp}\,\varPhi )(s)\) requires \(v_0(s) < (\textsf {lfp}\,\varPhi )(s)\), thus some subsequent guess u will have \(u(s) > u_0(s)\), and eventually we must get a u with \(\textsf {lfp}\,\varPhi \prec u\), which is case 2. Since we strictly increase the iteration bound on every retry, we will eventually encounter case 2 with a sufficiently high bound for termination.
Three of the four situations with multiple fixed points reduce to the corresponding unique fixed point situation due to property H1 of our guessing heuristics:

1.
For \(\mathrm {P}_{\!\mathrm {min}}\), recall from Sect. 3.2 that the fixed point is unique if we fix the values of all \(S_\mathrm {min}^0\) states to 0. In OVI without preprocessing, such states are in \(S_?\), thus they initially have value 0. \(\varPhi \) will not increase their values, neither will guessing due to H1, and neither will \(\varPhi _\mathrm {min}\). Thus OVI here operates on a sublattice of \(\langle \mathbb {V},\, {\preceq } \rangle \) where the fixed point of \(\varPhi \) is unique.

2.
For \(\mathrm {E}_\mathrm {min}\), after the preprocessing steps of Table 2, we only need to fix the values of all goal states to 0. Then the argument is the same as for \(\mathrm {P}_{\!\mathrm {min}}\).

3.
For \(\mathrm {E}_\mathrm {max}\), we reduce to a unique fixed point sublattice in the same way, too.
The only case where OVI may not terminate is for \(\mathrm {P}_{\!\mathrm {max}}\) without ECC. Here, end components may cause states to be permanently blocked. However, we did not encounter this on any benchmark used in Sect. 5, so in contrast to e.g. II, OVI is still practically useful in this case despite the lack of a termination guarantee.
Example 5
We turn \(M_e\) of Fig. 1 into \(M_e'\) by replacing the clabelled transition from \(s_2\) by transition \(\{\, \langle 0, s_2 \rangle \mapsto \frac{1}{2}, \langle 0, s_+ \rangle \mapsto \frac{1}{4}, \langle 1, s_ \rangle \mapsto \frac{1}{4} \,\}\), i.e. we can now go from \(s_2\) back to \(s_2\) with probability \(\frac{1}{2}\) and to each of \(s_+\), \(s_\) with probability \(\frac{1}{4}\). The probability1 transition from \(s_2\) to \(s_1\) remains. Then Table 3 shows a run of OVI for \(\mathrm {P}_{\!\mathrm {max}}\) with and \(\alpha = 0.1\). \(s_0\) is forever blocked from iteration 6 on.
4.2 Variants of OVI
While the core idea of OVI rests on classic results from domain theory, Algorithm 2 includes several particular choices that work together to achieve good performance and ensure termination. We sketch two variants to motivate these choices.
First, let us use \(\varPhi \) instead of \(\varPhi _\mathrm {min}\) for the upper values, i.e. move the assignment \(u(s) := u_ new \) down into line 13. Then we cannot prove termination because the arguments of case 2 for \(\textsf {lfp}\,\varPhi \prec u_0\) no longer hold. Consider DTMC \(M_d\) of Fig. 2 and \(\mathrm {P}_{\!\mathrm {max}}(\diamond \, s_+) = \mathrm {P}_{\!\mathrm {min}}(\diamond \, s_+)\). Let
Iterating \(\varPhi \), we then get the following sequence of pairs \(\langle u(s_0), u(s_1) \rangle \):
Observe how the value of \(s_0\) increases iff \(s_1\) decreases and viceversa. Thus we never encounter an inductive upper or lower bound. In Algorithm 2, we use GaussSeidel VI, which would not show the same effect on this model; however, if we insert another state between \(s_0\) and \(s_1\) that is updated last, Algorithm 2 would behave in the same alternating way. This particular u is contrived, but we could have guessed one with a similar relationship of the values leading to similar behaviour.
An alternative that allows us to use \(\varPhi \) instead of \(\varPhi _\mathrm {min}\) is to change the conditions that lead to retrying and termination: We separately store the initial guess of a verification phase as \(u_0\), and then compare each newly calculated u with \(u_0\). If \(u \preceq u_0\), then we know that there is an i such that \(u = \varPhi ^i(u) \preceq u_0\). \(\varPhi ^i\) retains all properties of \(\varPhi \) needed for Park induction, so this would also be a proof of \(\textsf {lfp}\,\varPhi \preceq u\). The other conditions and the termination proofs can be adapted analogously. However, this variant needs \(\approx \)50 % more memory (to store an additional vector of values), and we found it to be significantly slower than Algorthm 2 and the first variant on almost all benchmark instances of Sect. 5.
5 Experimental Evaluation
We have implemented interval iteration (II) (using the “variant 2” approach of [3] to compute initial overapproximations for expected rewards), sound value iteration (SVI), and now optimistic value iteration (OVI) precisely as described in the previous section, in the mcsta model checker of the Modest Toolset [20], which is publicly available at modestchecker.net. It is crossplatform, implemented in C#, and built around the Modest [17] highlevel modelling language. Via support for the Jani format [8], mcsta can exchange models with other tools like Epmc [18] and Storm [10]. Its performance is competitive with Storm and Prism [16]. We tried to spend equal effort performancetuning our VI, II, SVI, and OVI implementations to avoid unfairly comparing highlyoptimised OVI code with naïve implementations of the competing algorithms.
In the following, we report on our experimental evaluation of OVI using mcsta on all applicable models of the Quantitative Verification Benchmark Set (QVBS) [21]. All models in the QVBS are available in Jani and can thus be used by mcsta. Most are parameterised, and come with multiple properties of different types. Aside from MDP models, the QVBS also includes DTMCs (which are a special case of MDP), continuoustime Markov chains (CTMC, for which the analysis of unbounded properties reduces to checking the embedded DTMC), Markov automata (MA [11], on which the embedded MDP suffices for unbounded properties), and probabilistic timed automata (PTA [26], some of which can be converted into MDP via the digital clocks semantics [25]). We use all of these model types. The QVBS thus gives rise to a large number of benchmark instances: combinations of a model, a parameter valuation, and a property to check. For every model, we chose one instance per probabilistic reachability and expectedreward property such that state space exploration did not run out of memory and VI took at least 10 s where possible. We only excluded

2 models with multiple initial states (which mcsta does not yet support),

4 PTA with open clock constraints (they cannot be converted to MDP),

29 probabilistic reachability properties for which the result is 0 or 1 (they are easily solved by the graphbased precomputations and do not challenge VI),

16 instances for which VI very quickly reaches the fixed point, which indicates that (the relevant part of) the MDP is acyclic and thus trivial to solve,

3 models for which no parameter valuation allowed state space exploration to complete without running out of memory or taking more than 600 s,

7 instances where, on the largest state space we could explore, no iterative algorithm took more than 1 s (which does not allow reliable comparisons), and

the oscillators model due to its very large model files,
As a result, we considered 38 instances with probabilistic reachability and 41 instances with expectedreward properties, many comprising several million states.
We ran all experiments on an Intel Core i74790 workstation (3.6–4.0 GHz) with 8 GB of memory and 64bit Ubuntu Linux 18.04. By default, we request a relative halfwidth of \(\epsilon = 10^{6}\) for the result probability or reward value, and configure OVI to use the relativeerror criterion with \(\alpha = 10^{6}\) in the iteration phase. We use a 600 s timeout (“TO”). Due to the number of instances, we show most results as scatter plots like in Fig. 3. Each such plot compares two methods in terms of runtime or number of iterations. Every point \(\langle x, y \rangle \) corresponds to an instance and indicates that the method noted on the xaxis took x seconds or iterations to solve this instance while the method noted on the yaxis took y seconds or iterations. Thus points above the solid diagonal line correspond to instances where the xaxis method was faster (or needed fewer iterations); points above (below) the upper (lower) dotted diagonal line are where the xaxis method took less than half (more than twice) as long or as many iterations.
5.1 Comparison with VI
All methods except VI delivered correct results up to \(\epsilon \). VI offers low runtime at the cost of occasional incorrect results, and in general the absence of any guarantee about the result. We thus compare with VI separately to judge the overhead caused by performing additional verification, and possibly iteration, phases. This is similar to the comparison done for II in [3]. Figures 3 and 4 show the results. The unfilled shapes indicate instances where VI produced an incorrect result. In terms of runtime, we see that OVI does not often take more than twice as long as VI, and frequently requires less than 50% extra time. On several instances where OVI incurs most overhead, VI produces an incorrect result, indicating that they are “hard” instances for value iteration. The unfilled CTMCs where OVI takes much longer to compute probabilities are all instances of the embedded model; the DTMC on the xaxis is haddadmonmege, an adversarial model built to highlight the convergence problem of VI in [14]. The problematic cases for expected rewards include most MA instances, the two expectedreward instances of the embedded CTMC, and again haddadmonmege. In terms of iterations, the overhead of OVI is even less than in runtime.
5.2 Comparison with II and SVI
We compare the runtime of OVI with the runtime of II and that of SVI separately for reachability probabilities (shown in Fig. 5) and expected rewards (shown in Fig. 6). As shown in Table 2, OVI has almost the same requirements on precomputations as VI, while II and SVI require extra precomputations and ECC for reachability probabilities. The precomputations and ECC need extra runtime (which turned out to be negligible in some cases but significant enough to cause a timeout in others) prior to the numeric iterations. However, doing the precomputations can reduce the size of the set \(S_?\), and ECC can reduce the size of the MDP itself. Both can thus reduce the runtime needed for the numeric iterations. For the overall runtime, we found that none of these effects dominates the other over all models. Thus sometimes it may be better to perform only the required precomputations and transformations, while on other models performing all applicable ones may lead to lower total runtime. For reachability probabilities, we thus compare OVI, II, and SVI in two scenarios: once in the default (“std”) setting of mcsta that uses only required preprocessing steps (without ECC for OVI; we report the total runtime for preprocessing and iterations), and once with all of them enabled (“pre”, where we report only the runtime for numeric iterations, plus the computation of initial upper bounds in case of II).
For probabilistic reachability, we see in Fig. 5 that there is no clear winner among the three methods in the “std” setting (top plots). In some cases, the extra precomputations take long enough to give an advantage to OVI, while in others they speed up II and SVI significantly, compensating for their overhead. The “pre” setting (bottom), in which all three algorithms operate on exactly the same input w.r.t. to MDP M and set \(S_?\), however, shows a clearer picture: now OVI is faster, sometimes significantly so, than II and SVI on most instances.
Expectedreward properties were more challenging for all three methods (as well as for VI, which produced more errors here than for probabilities). The plots in Fig. 6 paint a very clear picture of OVI being significantly faster for expected rewards than II (which suffers from the need to precompute initial upper bounds that then turn out to be rather conservative), and faster (though by a lesser margin and with few exceptions) than SVI.
In Fig. 7, we give a summary view combining the data from Figs. 3 to 6. For each algorithm, we plot the instances sorted by runtime, i.e. a point \(\langle x, y \rangle \) on the line for algorithm z means that some instance took y seconds to solve via z, and there are x instances that z solves in less time. Note in particular that the times are not cumulative. The righthand plot zooms into the lefthand one. We clearly see the speedup offered by OVI over SVI and especially II. Where the scatter plots merely show that OVI often does not obtain more than a \(2\times \) speedup compared to SVI, these plots provide an explanation: the VI line is a rough bound on the performance that any extension of VI can deliver. Comparing the SVI and VI lines, over much of the plot’s range, OVI thus cannot take less than half the runtime of SVI without outperforming VI itself.
5.3 On the Effect of \(\epsilon \) and \(\alpha \)
We also compared the four algorithms for different values of \(\epsilon \) and, where applicable, \(\alpha \). We show a selection of the results in Fig. 8. The axis labels are of the form “algorithm, \(\epsilon \)/\(\alpha \)”. On the left, we see that the runtime of OVI changes if we set \(\alpha \) to values different from \(\epsilon \), however there is no clear trend: some instances are checked faster, some slower. We obtained similar plots for other combinations of \(\alpha \) values, with only a slight tendency towards longer runtimes as \(\alpha > \epsilon \). mcsta thus uses \(\alpha = \epsilon \) as a default that can be changed by the user.
In the middle, we study the impact of reducing the desired precision by setting \(\epsilon \) to \(10^{3}\). This allows OVI to speed up by factors mostly between 1 and 2; the same comparison for SVI and II resulted in similar plots, however VI was able to more consistently achieve higher speedups. When we compare the right plot with the righthand plot of Fig. 6, we consequently see that the overall result of our comparison between OVI and SVI does not change significantly with the lower precision, although OVI does gain slightly more than SVI.
5.4 Comparing Relative and Absolute Error
In Fig. 9, we show comparison plots for the runtime when using instead of . Requiring absoluteerrorcorrect results may make instances with low result values much easier and instances with high results much harder. We chose \(\epsilon = 10^{2}\) as a compromise, and the leftmost plot confirms that we indeed chose an \(\epsilon \) that keeps the expectedreward benchmarks on average roughly as hard as with \(10^{6}\) relative error. In the middle and right plots, we again see OVI compared with II and SVI. Compared to Fig. 6, both II and SVI gain a little, but there are no significant differences overall. Our experiments thus confirm that the relative performance of OVI is stable under varying precision requirements.
5.5 Verification Phases
On the right, we show histograms of the number of verification phases started (top, from 1 phase on the left to 20 on the right) and the percentage of iterations that are done in verification phases (bottom) over all benchmark instances (probabilities and rewards). We see that, in the vast majority of cases, we need few verification attempts, with many succeeding in the first attempt, and most iterations are performed in the iteration phases.
6 Conclusion
We have presented optimistic value iteration (OVI), a new approach to making nonexact probabilistic model checking via iterative numeric algorithms sound in the sense of delivering results within a prescribed interval around the true value (modulo floatingpoint and implementation errors). Compared to interval (II) and sound value iteration (SVI), OVI has slightly stronger termination guarantees in presence of multiple fixed points, and works in practice for max. probabilities without collapsing end components despite the lack of a guarantee. Like II, it can be combined with alternative methods for dealing with end components such as the new deflating technique of [23]. OVI is a simple algorithm that is easy to add to any tool that already implements value iteration, and it is fast, further closing the performance gap between VI and sound methods.
Data Availability
A dataset to replicate our experimental evaluation is archived and available at DOI 10.4121/uuid:3df859e6edc64e2d92f393e478bbe8dc [19].
Notes
 1.
This can be done via Algs. 2 (for \(S_\mathrm {min}^1\)) and 4 (for \(S_\mathrm {max}^1\)) of [12], respectively. These algorithms do not consider the probabilities, but only whether there is a transition and branch (with positive probability) from one state to another or not. We thus call them graphbased algorithms, as opposed to numeric algorithms like VI itself.
References
Abramsky, S., Jung, A.: Domain theory. In: Handbook of Logic in Computer Science, vol. 3, pp. 1–168. Oxford University Press (1994). http://www.cs.bham.ac.uk/~axj/pub/papers/handy1.pdf (corrected and expanded version)
Ashok, P., Křetínský, J., Weininger, M.: PAC statistical model checking for Markov decision processes and stochastic games. In: Dillig, I., Tasiran, S. (eds.) CAV 2019. LNCS, vol. 11561, pp. 497–519. Springer, Cham (2019). https://doi.org/10.1007/9783030255404_29
Baier, C., Klein, J., Leuschner, L., Parker, D., Wunderlich, S.: Ensuring the reliability of your model checker: interval iteration for Markov decision processes. In: Majumdar, R., Kunčak, V. (eds.) CAV 2017. LNCS, vol. 10426, pp. 160–180. Springer, Cham (2017). https://doi.org/10.1007/9783319633879_8
Balaji, N., Kiefer, S., Novotný, P., Pérez, G.A., Shirmohammadi, M.: On the complexity of value iteration. In: 46th International Colloquium on Automata, Languages, and Programming (ICALP). LIPIcs, vol. 132, pp. 102:1–102:15. Schloss Dagstuhl  LeibnizZentrum für Informatik (2019). https://doi.org/10.4230/LIPIcs.ICALP.2019.102
Bauer, M.S., Mathur, U., Chadha, R., Sistla, A.P., Viswanathan, M.: Exact quantitative probabilistic model checking through rational search. In: FMCAD, pp. 92–99. IEEE (2017). https://doi.org/10.23919/FMCAD.2017.8102246
Bianco, A., de Alfaro, L.: Model checking of probabilistic and nondeterministic systems. In: Thiagarajan, P.S. (ed.) FSTTCS 1995. LNCS, vol. 1026, pp. 499–513. Springer, Heidelberg (1995). https://doi.org/10.1007/3540606920_70
Brázdil, T., et al.: Verification of Markov decision processes using learning algorithms. In: Cassez, F., Raskin, J.F. (eds.) ATVA 2014. LNCS, vol. 8837, pp. 98–114. Springer, Cham (2014). https://doi.org/10.1007/9783319119366_8
Budde, C.E., Dehnert, C., Hahn, E.M., Hartmanns, A., Junges, S., Turrini, A.: JANI: quantitative model and tool interaction. TACAS. LNCS 10206, 151–168 (2017). https://doi.org/10.1007/9783662545805_9
Chatterjee, K., Henzinger, T.A.: Value iteration. In: Grumberg, O., Veith, H. (eds.) 25 Years of Model Checking. LNCS, vol. 5000, pp. 107–138. Springer, Heidelberg (2008). https://doi.org/10.1007/9783540698500_7
Dehnert, C., Junges, S., Katoen, J.P., Volk, M.: A Storm is coming: a modern probabilistic model checker. In: Majumdar, R., Kunčak, V. (eds.) CAV 2017. LNCS, vol. 10427, pp. 592–600. Springer, Cham (2017). https://doi.org/10.1007/9783319633909_31
Eisentraut, C., Hermanns, H., Zhang, L.: On probabilistic automata in continuous time. In: LICS, pp. 342–351. IEEE Computer Society (2010). https://doi.org/10.1109/LICS.2010.41
Forejt, V., Kwiatkowska, M., Norman, G., Parker, D.: Automated verification techniques for probabilistic systems. In: Bernardo, M., Issarny, V. (eds.) SFM 2011. LNCS, vol. 6659, pp. 53–113. Springer, Heidelberg (2011). https://doi.org/10.1007/9783642214554_3
Fränzle, M., Hahn, E.M., Hermanns, H., Wolovick, N., Zhang, L.: Measurability and safety verification for stochastic hybrid systems. In: HSCC, pp. 43–52. ACM (2011). https://doi.org/10.1145/1967701.1967710
Haddad, S., Monmege, B.: Reachability in MDPs: refining convergence of value iteration. In: Ouaknine, J., Potapov, I., Worrell, J. (eds.) RP 2014. LNCS, vol. 8762, pp. 125–137. Springer, Cham (2014). https://doi.org/10.1007/9783319114392_10
Haddad, S., Monmege, B.: Interval iteration algorithm for MDPs and IMDPs. Theor. Comput. Sci. 735, 111–131 (2018). https://doi.org/10.1016/j.tcs.2016.12.003
Hahn, E.M., et al.: The 2019 comparison of tools for the analysis of quantitative formal models. In: Beyer, D., Huisman, M., Kordon, F., Steffen, B. (eds.) TACAS 2019. LNCS, vol. 11429, pp. 69–92. Springer, Cham (2019). https://doi.org/10.1007/9783030175023_5
Hahn, E.M., Hartmanns, A., Hermanns, H., Katoen, J.P.: A compositional modelling and analysis framework for stochastic hybrid systems. Formal Methods Syst. Des. 43(2), 191–232 (2013). https://doi.org/10.1007/s107030120167z
Hahn, E.M., Li, Y., Schewe, S., Turrini, A., Zhang, L.: iscasMc: a webbased probabilistic model checker. In: Jones, C., Pihlajasaari, P., Sun, J. (eds.) FM 2014. LNCS, vol. 8442, pp. 312–317. Springer, Cham (2014). https://doi.org/10.1007/9783319064109_22
Hartmanns, A.: Optimistic value iteration (artifact). 4TU.Centre for Research Data (2019). https://doi.org/10.4121/uuid:3df859e6edc64e2d92f393e478bbe8dc
Hartmanns, A., Hermanns, H.: The Modest Toolset: an integrated environment for quantitative modelling and verification. In: Ábrahám, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 593–598. Springer, Heidelberg (2014). https://doi.org/10.1007/9783642548628_51
Hartmanns, A., Klauck, M., Parker, D., Quatmann, T., Ruijters, E.: The quantitative verification benchmark set. In: Vojnar, T., Zhang, L. (eds.) TACAS 2019. LNCS, vol. 11427, pp. 344–350. Springer, Cham (2019). https://doi.org/10.1007/9783030174620_20
Hensel, C.: The probabilistic model checker Storm: symbolic methods for probabilistic model checking. Ph.D. thesis, RWTH Aachen University, Germany (2018)
Kelmendi, E., Krämer, J., Křetínský, J., Weininger, M.: Value iteration for simple stochastic games: stopping criterion and learning algorithm. In: Chockler, H., Weissenbacher, G. (eds.) CAV 2018. LNCS, vol. 10981, pp. 623–642. Springer, Cham (2018). https://doi.org/10.1007/9783319961453_36
Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic realtime systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585–591. Springer, Heidelberg (2011). https://doi.org/10.1007/9783642221101_47
Kwiatkowska, M.Z., Norman, G., Parker, D., Sproston, J.: Performance analysis of probabilistic timed automata using digital clocks. Formal Methods Syst. Des. 29(1), 33–78 (2006). https://doi.org/10.1007/s1070300600052
Kwiatkowska, M.Z., Norman, G., Segala, R., Sproston, J.: Automatic verification of realtime systems with discrete probability distributions. Theor. Comput. Sci. 282(1), 101–150 (2002). https://doi.org/10.1016/S03043975(01)000469
Lassez, J.L., Nguyen, V.L., Sonenberg, L.: Fixed point theorems and semantics: a folk tale. Inf. Process. Lett. 14(3), 112–116 (1982)
McMahan, H.B., Likhachev, M., Gordon, G.J.: Bounded realtime dynamic programming: RTDP with monotone upper bounds and performance guarantees. In: ICML, ACM International Conference Proceeding Series, vol. 119, pp. 569–576. ACM (2005). https://doi.org/10.1145/1102351.1102423
Park, D.: Fixpoint induction and proofs of program properties. Mach. Intell. 5 (1969)
Puterman, M.L.: Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley Series in Probability and Mathematical Statistics: Applied Probability and Statistics. Wiley, New York (1994)
Quatmann, T., Katoen, J.P.: Sound value iteration. In: Chockler, H., Weissenbacher, G. (eds.) CAV 2018. LNCS, vol. 10981, pp. 643–661. Springer, Cham (2018). https://doi.org/10.1007/9783319961453_37
Acknowledgments
The authors thank Tim Quatmann (RWTH Aachen) for fruitful discussions when the idea of OVI initially came up in late 2018, and for his help in implementing and optimising the SVI implementation in mcsta.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2020 The Author(s)
About this paper
Cite this paper
Hartmanns, A., Kaminski, B.L. (2020). Optimistic Value Iteration. In: Lahiri, S., Wang, C. (eds) Computer Aided Verification. CAV 2020. Lecture Notes in Computer Science(), vol 12225. Springer, Cham. https://doi.org/10.1007/9783030532918_26
Download citation
DOI: https://doi.org/10.1007/9783030532918_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 9783030532901
Online ISBN: 9783030532918
eBook Packages: Computer ScienceComputer Science (R0)