-
Protocol insecurity with finitely many sessions and XOR
Authors:
R Ramanujam,
Vaishnavi Sundararajan,
S P Suresh
Abstract:
We present a different proof of the insecurity problem for XOR, solved in by Chevalier, Kuesters, Rusinowitch and Turuani (2005). Our proof uses the notion of typed terms and well-typed proofs, and removes a restriction on the class of protocols to which the [CKRT05] proof applies, by introducing a slightly different (but very natural) notion of protocols, where honest agent sends are derivable fr…
▽ More
We present a different proof of the insecurity problem for XOR, solved in by Chevalier, Kuesters, Rusinowitch and Turuani (2005). Our proof uses the notion of typed terms and well-typed proofs, and removes a restriction on the class of protocols to which the [CKRT05] proof applies, by introducing a slightly different (but very natural) notion of protocols, where honest agent sends are derivable from previous receives in the same session.
△ Less
Submitted 30 June, 2025;
originally announced June 2025.
-
A Computationally Aware Multi Objective Framework for Camera LiDAR Calibration
Authors:
Venkat Karramreddy,
Rangarajan Ramanujam
Abstract:
Accurate extrinsic calibration between LiDAR and camera sensors is important for reliable perception in autonomous systems. In this paper, we present a novel multi-objective optimization framework that jointly minimizes the geometric alignment error and computational cost associated with camera-LiDAR calibration. We optimize two objectives: (1) error between projected LiDAR points and ground-truth…
▽ More
Accurate extrinsic calibration between LiDAR and camera sensors is important for reliable perception in autonomous systems. In this paper, we present a novel multi-objective optimization framework that jointly minimizes the geometric alignment error and computational cost associated with camera-LiDAR calibration. We optimize two objectives: (1) error between projected LiDAR points and ground-truth image edges, and (2) a composite metric for computational cost reflecting runtime and resource usage. Using the NSGA-II \cite{deb2002nsga2} evolutionary algorithm, we explore the parameter space defined by 6-DoF transformations and point sampling rates, yielding a well-characterized Pareto frontier that exposes trade-offs between calibration fidelity and resource efficiency. Evaluations are conducted on the KITTI dataset using its ground-truth extrinsic parameters for validation, with results verified through both multi-objective and constrained single-objective baselines. Compared to existing gradient-based and learned calibration methods, our approach demonstrates interpretable, tunable performance with lower deployment overhead. Pareto-optimal configurations are further analyzed for parameter sensitivity and innovation insights. A preference-based decision-making strategy selects solutions from the Pareto knee region to suit the constraints of the embedded system. The robustness of calibration is tested across variable edge-intensity weighting schemes, highlighting optimal balance points. Although real-time deployment on embedded platforms is deferred to future work, this framework establishes a scalable and transparent method for calibration under realistic misalignment and resource-limited conditions, critical for long-term autonomy, particularly in SAE L3+ vehicles receiving OTA updates.
△ Less
Submitted 25 June, 2025;
originally announced June 2025.
-
Solving the insecurity problem for assertions
Authors:
R Ramanujam,
Vaishnavi Sundararajan,
S P Suresh
Abstract:
In the symbolic verification of cryptographic protocols, a central problem is deciding whether a protocol admits an execution which leaks a designated secret to the malicious intruder. Rusinowitch & Turuani (2003) show that, when considering finitely many sessions, this ``insecurity problem'' is NP-complete. Central to their proof strategy is the observation that any execution of a protocol can be…
▽ More
In the symbolic verification of cryptographic protocols, a central problem is deciding whether a protocol admits an execution which leaks a designated secret to the malicious intruder. Rusinowitch & Turuani (2003) show that, when considering finitely many sessions, this ``insecurity problem'' is NP-complete. Central to their proof strategy is the observation that any execution of a protocol can be simulated by one where the intruder only communicates terms of bounded size. However, when we consider models where, in addition to terms, one can also communicate logical statements about terms, the analysis of the insecurity problem becomes tricky when both these inference systems are considered together. In this paper we consider the insecurity problem for protocols with logical statements that include {\em equality on terms} and {\em existential quantification}. Witnesses for existential quantifiers may be unbounded, and obtaining small witness terms while maintaining equality proofs complicates the analysis considerably. We extend techniques from Rusinowitch & Turuani (2003) to show that this problem is also in NP.
△ Less
Submitted 26 January, 2024; v1 submitted 26 August, 2023;
originally announced August 2023.
-
Data, geometry and homology
Authors:
Jens Agerberg,
Wojciech Chacholski,
Ryan Ramanujam
Abstract:
Homology-based invariants can be used to characterize the geometry of datasets and thereby gain some understanding of the processes generating those datasets. In this work we investigate how the geometry of a dataset changes when it is subsampled in various ways. In our framework the dataset serves as a reference object; we then consider different points in the ambient space and endow them with a…
▽ More
Homology-based invariants can be used to characterize the geometry of datasets and thereby gain some understanding of the processes generating those datasets. In this work we investigate how the geometry of a dataset changes when it is subsampled in various ways. In our framework the dataset serves as a reference object; we then consider different points in the ambient space and endow them with a geometry defined in relation to the reference object, for instance by subsampling the dataset proportionally to the distance between its elements and the point under consideration. We illustrate how this process can be used to extract rich geometrical information, allowing for example to classify points coming from different data distributions.
△ Less
Submitted 15 March, 2022;
originally announced March 2022.
-
Insecurity problem for assertions remains in NP
Authors:
R. Ramanujam,
Vaishnavi Sundararajan,
S. P. Suresh
Abstract:
In the symbolic verification of cryptographic protocols, a central problem is deciding whether a protocol admits an execution which leaks a designated secret to the malicious intruder. Rusinowitch and Turuani (2003) show that, when considering finitely many sessions and a protocol model where only terms are communicated, this ``insecurity problem'' is NP-complete. Central to their proof strategy i…
▽ More
In the symbolic verification of cryptographic protocols, a central problem is deciding whether a protocol admits an execution which leaks a designated secret to the malicious intruder. Rusinowitch and Turuani (2003) show that, when considering finitely many sessions and a protocol model where only terms are communicated, this ``insecurity problem'' is NP-complete. Central to their proof strategy is the observation that any execution of a protocol can be simulated by one where the intruder only communicates terms of bounded size.
However, when we consider models where, in addition to terms, one can also communicate logical formulas, the analysis of the insecurity problem becomes tricky. In this paper we consider the insecurity problem for protocols with logical statements that include equality on terms and existential quantification. Witnesses for existential quantifiers may be of unbounded size, and obtaining small witnesses while maintaining equality proofs complicates the analysis. We use a notion of "typed" equality proofs, and extend techniques from [RT03] to show that this problem is also in NP. We also show that these techniques can be used to analyze the insecurity problem for systems such as the one proposed in Ramanujam, Sundararajan and Suresh (2017).
△ Less
Submitted 25 January, 2023; v1 submitted 9 February, 2022;
originally announced February 2022.
-
Are Bundles Good Deals for FOML?
Authors:
Mo Liu,
Anantha Padmanabha,
R Ramanujam,
Yanjing Wang
Abstract:
Bundled products are often offered as good deals to customers. When we bundle quantifiers and modalities together (as in $\exists x \Box$, $\Diamond \forall x$ etc.) in first-order modal logic (FOML), we get new logical operators whose combinations produce interesting fragments of FOML without any restriction on the arity of predicates, the number of variables, or the modal scope. It is well-known…
▽ More
Bundled products are often offered as good deals to customers. When we bundle quantifiers and modalities together (as in $\exists x \Box$, $\Diamond \forall x$ etc.) in first-order modal logic (FOML), we get new logical operators whose combinations produce interesting fragments of FOML without any restriction on the arity of predicates, the number of variables, or the modal scope. It is well-known that finding decidable fragments of FOML is hard, so we may ask: do bundled fragments that exploit the distinct expressivity of FOML constitute good deals in balancing the expressivity and complexity? There are a few positive earlier results on some particular fragments. In this paper, we try to fully map the terrain of bundled fragments of FOML in (un)decidability, and in the cases without a definite answer yet, we show that they lack the finite model property. Moreover, whether the logics are interpreted over constant domains (across states/worlds) or increasing domains presents another layer of complexity. We also present the \textit{loosely bundled fragment}, which generalizes the bundles and yet retain decidability (over increasing domain models).
△ Less
Submitted 11 February, 2022; v1 submitted 3 February, 2022;
originally announced February 2022.
-
The 1.28 GHz MeerKAT Galactic Center Mosaic
Authors:
I. Heywood,
I. Rammala,
F. Camilo,
W. D. Cotton,
F. Yusef-Zadeh,
T. D. Abbott,
R. M. Adam,
G. Adams,
M. A. Aldera,
K. M. B. Asad,
E. F. Bauermeister,
T. G. H. Bennett,
H. L. Bester,
W. A. Bode,
D. H. Botha,
A. G. Botha,
L. R. S. Brederode,
S. Buchner,
J. P. Burger,
T. Cheetham,
D. I. L. de Villiers,
M. A. Dikgale-Mahlakoana,
L. J. du Toit,
S. W. P. Esterhuyse,
B. L. Fanaroff
, et al. (86 additional authors not shown)
Abstract:
The inner $\sim$200 pc region of the Galaxy contains a 4 million M$_{\odot}$ supermassive black hole (SMBH), significant quantities of molecular gas, and star formation and cosmic ray energy densities that are roughly two orders of magnitude higher than the corresponding levels in the Galactic disk. At a distance of only 8.2 kpc, the region presents astronomers with a unique opportunity to study a…
▽ More
The inner $\sim$200 pc region of the Galaxy contains a 4 million M$_{\odot}$ supermassive black hole (SMBH), significant quantities of molecular gas, and star formation and cosmic ray energy densities that are roughly two orders of magnitude higher than the corresponding levels in the Galactic disk. At a distance of only 8.2 kpc, the region presents astronomers with a unique opportunity to study a diverse range of energetic astrophysical phenomena, from stellar objects in extreme environments, to the SMBH and star-formation driven feedback processes that are known to influence the evolution of galaxies as a whole. We present a new survey of the Galactic center conducted with the South African MeerKAT radio telescope. Radio imaging offers a view that is unaffected by the large quantities of dust that obscure the region at other wavelengths, and a scene of striking complexity is revealed. We produce total intensity and spectral index mosaics of the region from 20 pointings (144 hours on-target in total), covering 6.5 square degrees with an angular resolution of 4$"$,at a central frequency of 1.28 GHz. Many new features are revealed for the first time due to a combination of MeerKAT's high sensitivity, exceptional $u,v$-plane coverage, and geographical vantage point. We highlight some initial survey results, including new supernova remnant candidates, many new non-thermal filament complexes, and enhanced views of the Radio Arc Bubble, Sgr A and Sgr B regions. This project is a SARAO public legacy survey, and the image products are made available with this article.
△ Less
Submitted 27 January, 2022; v1 submitted 25 January, 2022;
originally announced January 2022.
-
Reasoning about Emergence of Collective Memory
Authors:
R. Ramanujam
Abstract:
We offer a very simple model of how collective memory may form. Agents keep signalling within neighbourhoods, and depending on how many support each signal, some signals "win" in that neighbourhood. By agents interacting between different neighbourhoods, 'influence' spreads and sometimes, a collective signal emerges. We propose a logic in which we can reason about such emergence of memory and pres…
▽ More
We offer a very simple model of how collective memory may form. Agents keep signalling within neighbourhoods, and depending on how many support each signal, some signals "win" in that neighbourhood. By agents interacting between different neighbourhoods, 'influence' spreads and sometimes, a collective signal emerges. We propose a logic in which we can reason about such emergence of memory and present preliminary technical results on the logic.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Reasoning about Social Choice and Games in Monadic Fixed-Point Logic
Authors:
Ramit Das,
R. Ramanujam,
Sunil Simon
Abstract:
Whether it be in normal form games, or in fair allocations, or in voter preferences in voting systems, a certain pattern of reasoning is common. From a particular profile, an agent or a group of agents may have an incentive to shift to a new one. This induces a natural graph structure that we call the improvement graph on the strategy space of these systems. We suggest that the monadic fixed-point…
▽ More
Whether it be in normal form games, or in fair allocations, or in voter preferences in voting systems, a certain pattern of reasoning is common. From a particular profile, an agent or a group of agents may have an incentive to shift to a new one. This induces a natural graph structure that we call the improvement graph on the strategy space of these systems. We suggest that the monadic fixed-point logic with counting, an extension of monadic first-order logic on graphs with fixed-point and counting quantifiers, is a natural specification language on improvement graphs, and thus for a class of properties that can be interpreted across these domains. The logic has an efficient model checking algorithm (in the size of the improvement graph).
△ Less
Submitted 21 July, 2019;
originally announced July 2019.
-
Two variable fragment of Term Modal Logic
Authors:
Anantha Padmanabha,
R. Ramanujam
Abstract:
Term modal logics (TML) are modal logics with unboundedly many modalities, with quantification over modal indices, so that we can have formulas of the form $\exists y. \forall x. (\Box_x P(x,y) \supset\Diamond_y P(y,x))$. Like First order modal logic, TML is also "notoriously" undecidable, in the sense that even very simple fragments are undecidable. In this paper, we show the decidability of one…
▽ More
Term modal logics (TML) are modal logics with unboundedly many modalities, with quantification over modal indices, so that we can have formulas of the form $\exists y. \forall x. (\Box_x P(x,y) \supset\Diamond_y P(y,x))$. Like First order modal logic, TML is also "notoriously" undecidable, in the sense that even very simple fragments are undecidable. In this paper, we show the decidability of one interesting fragment, that of two variable TML. This is in contrast to two-variable First order modal logic, which is undecidable.
△ Less
Submitted 27 June, 2019; v1 submitted 23 April, 2019;
originally announced April 2019.
-
A topological data analysis based classification method for multiple measurements
Authors:
Henri Riihimäki,
Wojciech Chachólski,
Jakob Theorell,
Jan Hillert,
Ryan Ramanujam
Abstract:
Machine learning models for repeated measurements are limited. Using topological data analysis (TDA), we present a classifier for repeated measurements which samples from the data space and builds a network graph based on the data topology. When applying this to two case studies, accuracy exceeds alternative models with additional benefits such as reporting data subsets with high purity along with…
▽ More
Machine learning models for repeated measurements are limited. Using topological data analysis (TDA), we present a classifier for repeated measurements which samples from the data space and builds a network graph based on the data topology. When applying this to two case studies, accuracy exceeds alternative models with additional benefits such as reporting data subsets with high purity along with feature values. For 300 examples of 3 tree species, the accuracy reached 80% after 30 datapoints, which was improved to 90% after increased sampling to 400 datapoints. Using data from 100 examples of each of 6 point processes, the classifier achieved 96.8% accuracy. In both datasets, the TDA classifier outperformed an alternative model. This algorithm and software can be beneficial for repeated measurement data common in biological sciences, as both an accurate classifier and a feature selection tool.
△ Less
Submitted 5 April, 2019;
originally announced April 2019.
-
Propositional modal logic with implicit modal quantification
Authors:
Anantha Padmanabha,
R Ramanujam
Abstract:
Propositional term modal logic is interpreted over Kripke structures with unboundedly many accessibility relations and hence the syntax admits variables indexing modalities and quantification over them. This logic is undecidable, and we consider a variable-free propositional bi-modal logic with implicit quantification. Thus $[\forall] α$ asserts necessity over all accessibility relations and…
▽ More
Propositional term modal logic is interpreted over Kripke structures with unboundedly many accessibility relations and hence the syntax admits variables indexing modalities and quantification over them. This logic is undecidable, and we consider a variable-free propositional bi-modal logic with implicit quantification. Thus $[\forall] α$ asserts necessity over all accessibility relations and $[\exists] α$ is classical necessity over some accessibility relation. The logic is associated with a natural bisimulation relation over models and we show that the logic is exactly the bisimulation invariant fragment of a two sorted first order logic. The logic is easily seen to be decidable and admits a complete axiomatization of valid formulas. Moreover the decision procedure extends naturally to the `bundled fragment' of full term modal logic.
△ Less
Submitted 29 December, 2018; v1 submitted 23 November, 2018;
originally announced November 2018.
-
Bundled fragments of first-order modal logic: (un)decidability
Authors:
Anantha Padmanabha,
R. Ramanujam,
Yanjing Wang
Abstract:
Quantified modal logic provides a natural logical language for reasoning about modal attitudes even while retaining the richness of quantification for referring to predicates over domains. But then most fragments of the logic are undecidable, over many model classes. Over the years, only a few fragments (such as the monodic) have been shown to be decidable. In this paper, we study fragments that b…
▽ More
Quantified modal logic provides a natural logical language for reasoning about modal attitudes even while retaining the richness of quantification for referring to predicates over domains. But then most fragments of the logic are undecidable, over many model classes. Over the years, only a few fragments (such as the monodic) have been shown to be decidable. In this paper, we study fragments that bundle quantifiers and modalities together, inspired by earlier work on epistemic logics of know-how/why/what. As always with quantified modal logics, it makes a significant difference whether the domain stays the same across worlds, or not. In particular, we show that the bundle $\forall \Box$ is undecidable over constant domain interpretations, even with only monadic predicates, whereas $\exists \Box$ bundle is decidable. On the other hand, over increasing domain interpretations, we get decidability with both $\forall \Box$ and $\exists \Box$ bundles with unrestricted predicates. In these cases, we also obtain tableau based procedures that run in \PSPACE. We further show that the $\exists \Box$ bundle cannot distinguish between constant domain and increasing domain interpretations.
△ Less
Submitted 28 March, 2018;
originally announced March 2018.
-
Deviator Detection under Imperfect Monitoring
Authors:
Dietmar Berwanger,
R. Ramanujam
Abstract:
Grim-trigger strategies are a fundamental mechanism for sustaining equilibria in iterated games: the players cooperate along an agreed path, and as soon as one player deviates, the others form a coalition to play him down to his minmax level. A precondition to triggering such a strategy is that the identity of the deviating player becomes common knowledge among the other players. This can be diffi…
▽ More
Grim-trigger strategies are a fundamental mechanism for sustaining equilibria in iterated games: the players cooperate along an agreed path, and as soon as one player deviates, the others form a coalition to play him down to his minmax level. A precondition to triggering such a strategy is that the identity of the deviating player becomes common knowledge among the other players. This can be difficult or impossible to attain in games where the information structure allows only imperfect monitoring of the played actions or of the global state.
We study the problem of synthesising finite-state strategies for detecting the deviator from an agreed strategy profile in games played on finite graphs with different information structures. We show that the problem is undecidable in the general case where the global state cannot be monitored. On the other hand, we prove that under perfect monitoring of the global state and imperfect monitoring of actions, the problem becomes decidable, and we present an effective synthesis procedure that covers infinitely repeated games with private monitoring.
△ Less
Submitted 27 December, 2017;
originally announced December 2017.
-
Proceedings of the Ninth Workshop on Methods for Modalities
Authors:
Sujata Ghosh,
R. Ramanujam
Abstract:
Methods for Modalities is a series aimed at bringing together researchers interested in developing proof methods, verification methods, algorithms and tools based on modal logic. Here the term "modal logics" is conceived broadly, including description logic, guarded fragments, conditional logic, temporal and hybrid logic, dynamic logic, etc. The first workshop was held in May 1999 in Amsterdam, a…
▽ More
Methods for Modalities is a series aimed at bringing together researchers interested in developing proof methods, verification methods, algorithms and tools based on modal logic. Here the term "modal logics" is conceived broadly, including description logic, guarded fragments, conditional logic, temporal and hybrid logic, dynamic logic, etc. The first workshop was held in May 1999 in Amsterdam, and since then it has travelled the world. Please see https://cs.famaf.unc.edu.ar/~careces/M4M for information on past editions of M4M.
The 9th Methods for Modalities Workshop is being held at the Indian Institute of Technology (IIT) Kanpur, from January 8 to 10, 2017, co-located with the Indian Conference on Logic and its Applications (ICLA), January 5 to 7, 2017. For details, see https://www.cse.iitk.ac.in/users/icla/M4M/
This volume constitutes the proceedings of the workshop and given the substantial instructional content, should be of interest especially to young researchers and students looking for tools and techniques as well as exciting problems related to logics and computation.
△ Less
Submitted 13 March, 2017; v1 submitted 6 March, 2017;
originally announced March 2017.
-
Existential Assertions for Voting Protocols
Authors:
R. Ramanujam,
Vaishnavi Sundararajan,
S. P. Suresh
Abstract:
In earlier work, we extend the Dolev-Yao model with assertions. We build on that work and add existential abstraction to the language, which allows us to translate common constructs used in voting protocols into proof properties. We also give an equivalence-based definition of anonymity in this model, and prove anonymity for the FOO voting protocol.
In earlier work, we extend the Dolev-Yao model with assertions. We build on that work and add existential abstraction to the language, which allows us to translate common constructs used in voting protocols into proof properties. We also give an equivalence-based definition of anonymity in this model, and prove anonymity for the FOO voting protocol.
△ Less
Submitted 16 February, 2017;
originally announced February 2017.
-
Proceedings Fifteenth Conference on Theoretical Aspects of Rationality and Knowledge
Authors:
R Ramanujam
Abstract:
The 15th Conference on Theoretical Aspects of Rationality and Knowledge (TARK) took place in Carnegie Mellon University, Pittsburgh, USA from June 4 to 6, 2015.
The mission of the TARK conferences is to bring together researchers from a wide variety of fields, including Artificial Intelligence, Cryptography, Distributed Computing, Economics and Game Theory, Linguistics, Philosophy, and Psycholog…
▽ More
The 15th Conference on Theoretical Aspects of Rationality and Knowledge (TARK) took place in Carnegie Mellon University, Pittsburgh, USA from June 4 to 6, 2015.
The mission of the TARK conferences is to bring together researchers from a wide variety of fields, including Artificial Intelligence, Cryptography, Distributed Computing, Economics and Game Theory, Linguistics, Philosophy, and Psychology, in order to further our understanding of interdisciplinary issues involving reasoning about rationality and knowledge.
These proceedings consist of a subset of the papers / abstracts presented at the TARK conference.
△ Less
Submitted 23 June, 2016;
originally announced June 2016.
-
A Retraction Theorem for Distributed Synthesis
Authors:
Dietmar Berwanger,
Anup Basil Mathew,
R. Ramanujam
Abstract:
We present a general theorem for distributed synthesis problems in coordination games with $ω$-regular objectives of the form: If there exists a winning strategy for the coalition, then there exists an "essential" winning strategy, that is obtained by a retraction of the given one. In general, this does not lead to finite-state winning strategies, but when the knowledge of agents remains bounded,…
▽ More
We present a general theorem for distributed synthesis problems in coordination games with $ω$-regular objectives of the form: If there exists a winning strategy for the coalition, then there exists an "essential" winning strategy, that is obtained by a retraction of the given one. In general, this does not lead to finite-state winning strategies, but when the knowledge of agents remains bounded, we can solve the synthesis problem. Our study is carried out in a setting where objectives are expressed in terms of events that may \emph{not} be observable. This is natural in games of imperfect information, rather than the common assumption that objectives are expressed in terms of events that are observable to all agents. We characterise decidable distributed synthesis problems in terms of finiteness of knowledge states and finite congruence classes induced by them.
△ Less
Submitted 26 April, 2016;
originally announced April 2016.
-
Multidimensional Persistence and Noise
Authors:
Martina Scolamiero,
Wojciech Chachólski,
Anders Lundman,
Ryan Ramanujam,
Sebastian Öberg
Abstract:
In this paper we study multidimensional persistence modules [5,13] via what we call tame functors and noise systems. A noise system leads to a pseudo-metric topology on the category of tame functors. We show how this pseudo-metric can be used to identify persistent features of compact multidimensional persistence modules. To count such features we introduce the feature counting invariant and prove…
▽ More
In this paper we study multidimensional persistence modules [5,13] via what we call tame functors and noise systems. A noise system leads to a pseudo-metric topology on the category of tame functors. We show how this pseudo-metric can be used to identify persistent features of compact multidimensional persistence modules. To count such features we introduce the feature counting invariant and prove that assigning this invariant to compact tame functors is a 1-Lipschitz operation. For 1-dimensional persistence, we explain how, by choosing an appropriate noise system, the feature counting invariant identifies the same persistent features as the classical barcode construction.
△ Less
Submitted 15 August, 2016; v1 submitted 26 May, 2015;
originally announced May 2015.
-
A Local Logic for Realizability in Web Service Choreographies
Authors:
R. Ramanujam,
S. Sheerazuddin
Abstract:
Web service choreographies specify conditions on observable interactions among the services. An important question in this regard is realizability: given a choreography C, does there exist a set of service implementations I that conform to C ? Further, if C is realizable, is there an algorithm to construct implementations in I ? We propose a local temporal logic in which choreographies can be spec…
▽ More
Web service choreographies specify conditions on observable interactions among the services. An important question in this regard is realizability: given a choreography C, does there exist a set of service implementations I that conform to C ? Further, if C is realizable, is there an algorithm to construct implementations in I ? We propose a local temporal logic in which choreographies can be specified, and for specifications in the logic, we solve the realizability problem by constructing service implementations (when they exist) as communicating automata. These are nondeterministic finite state automata with a coupling relation. We also report on an implementation of the realizability algorithm and discuss experimental results.
△ Less
Submitted 9 September, 2014;
originally announced September 2014.
-
Imitation in Large Games
Authors:
Soumya Paul,
R. Ramanujam
Abstract:
In games with a large number of players where players may have overlapping objectives, the analysis of stable outcomes typically depends on player types. A special case is when a large part of the player population consists of imitation types: that of players who imitate choice of other (optimizing) types. Game theorists typically study the evolution of such games in dynamical systems with imitati…
▽ More
In games with a large number of players where players may have overlapping objectives, the analysis of stable outcomes typically depends on player types. A special case is when a large part of the player population consists of imitation types: that of players who imitate choice of other (optimizing) types. Game theorists typically study the evolution of such games in dynamical systems with imitation rules. In the setting of games of infinite duration on finite graphs with preference orderings on outcomes for player types, we explore the possibility of imitation as a viable strategy. In our setup, the optimising players play bounded memory strategies and the imitators play according to specifications given by automata. We present algorithmic results on the eventual survival of types.
△ Less
Submitted 7 June, 2010;
originally announced June 2010.