Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daniel Wonisch is active.

Publication


Featured researches published by Daniel Wonisch.


international colloquium on automata languages and programming | 2011

A new approach for analyzing convergence algorithms for mobile robots

Andreas Cord-Landwehr; Bastian Degener; Matthias Fischer; Martina Hüllmann; Barbara Kempkes; Alexander Klaas; Peter Kling; Sven Kurras; Marcus Märtens; Friedhelm Meyer auf der Heide; Christoph Raupach; Kamil Swierkot; Daniel Warner; Christoph Weddemann; Daniel Wonisch

Given a set of n mobile robots in the d-dimensional Euclidean space, the goal is to let them converge to a single not predefined point. The challenge is that the robots are limited in their capabilities. Robots can, upon activation, compute the positions of all other robots using an individual affine coordinate system. The robots are indistinguishable, oblivious and may have different affine coordinate systems. A very general discrete time model assumes that robots are activated in arbitrary order. Further, the computation of a new target point may happen much earlier than the movement, so that the movement is based on outdated information about other robots positions. Time is measured as the number of rounds, where a round ends as soon as each robot has moved at least once. In [6], the Center of Gravity is considered as target function, convergence was proven, and the number of rounds needed for halving the diameter of the convex hull of the robots positions was shown to be O(n2) and Ω(n). We present an easy-to-check property of target functions that guarantee convergence and yields upper time bounds. This property intuitively says that when a robot computes a new target point, this point is significantly within the current axes aligned minimal box containing all robots. This property holds, e.g., for the above-mentioned target function, and improves the above O(n2) to an asymptotically optimal O(n) upper bound. Our technique also yields a constant time bound for a target function that requires all robots having identical coordinate axes.


conference on current trends in theory and practice of informatics | 2011

Collisionless gathering of robots with an extent

Andreas Cord-Landwehr; Bastian Degener; Matthias Fischer; Martina Hüllmann; Barbara Kempkes; Alexander Klaas; Peter Kling; Sven Kurras; Marcus Märtens; Friedhelm Meyer auf der Heide; Christoph Raupach; Kamil Swierkot; Daniel Warner; Christoph Weddemann; Daniel Wonisch

Gathering n mobile robots in one single point in the Euclidean plane is a widely studied problem from the area of robot formation problems. Classically, the robots are assumed to have no physical extent, and they are able to share a position with other robots. We drop these assumptions and investigate a similar problem for robots with (a spherical) extent: the goal is to gather the robots as close together as possible. More exactly, we want the robots to form a sphere with minimum radius around a predefined point. We propose an algorithm for this problem which synchronously moves the robots towards the center of the sphere unless they block each other. In this case, if possible, the robots spin around the center of the sphere. We analyze this algorithm experimentally in the plane. If R is the distance of the farthest robot to the center of the sphere, the simulations indicate a runtime which is linear in n and R. Additionally, we prove a theoretic upper bound for the runtime of O(nR) for a discrete version of the problem. Simulations also suggest a runtime of O(n + R) for the discrete version.


computer aided verification | 2013

Programs from Proofs --- A PCC Alternative

Daniel Wonisch; Alexander Schremmer; Heike Wehrheim

Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space.


tools and algorithms for construction and analysis of systems | 2012

Block abstraction memoization for CPAchecker

Daniel Wonisch

Block Abstraction Memoization (ABM) is a technique in software model checking that exploits the modularity of programs during verification by caching. To this end, ABM records the results of block analyses and reuses them if possible when revisiting the same block again. In this paper we present an implementation of ABM into the predicate-analysis component of the software-verification framework CPAchecker. With our participation at the Competition on Software Verification we aim at providing evidence that ABM can not only substantially increase the efficiency of predicate analysis but also enables verification of a wider range of programs.


formal methods | 2009

Three-Valued Spotlight Abstractions

Jonas Schrieb; Heike Wehrheim; Daniel Wonisch

Spotlight abstractions in verification focus on one specific component in a parallel system while disregarding most information about the rest. Existing spotlight abstractions are either based on over- or on underapproximations of the parallel system, thus either preserving existential or universal properties. In this paper we present three-valued spotlight abstractions for parallel systems which preserve both existential and universal properties. We show correctness of the abstraction technique as well as present a procedure for abstraction refinement. The technique has been implemented on top of an existing three-valued model checker. Experimental results show that our technique can outperform existing predicate abstraction tools on certain classes of parallel systems.


formal methods | 2008

Decomposition for Compositional Verification

Björn Metzler; Heike Wehrheim; Daniel Wonisch

Compositional verification is based on the idea that the correctness check of a complex system can be divided into smaller verification tasks for its components. In this paper, we show how to decomposea specification into components when either no such decomposition is given, or when the given composition does not lend itself to an efficient compositional verification. Our decomposition is the starting point for an application of the L*learning algorithm, generating assumptions for an assume-guarantee reasoning. We prove correctness of the decomposition as well as present experimental results using the model checker FDR2 as the teacher during learning.


international conference on software engineering | 2013

Zero Overhead Runtime Monitoring

Daniel Wonisch; Alexander Schremmer; Heike Wehrheim

Runtime monitoring aims at ensuring program safety by monitoring the programs behaviour during execution and taking appropriate action before a program violates some property. Runtime monitoring is in particular important when an exhaustive formal verification fails. While the approach allows for a safe execution of programs, it may impose a significant runtime overhead. In this paper, we propose a novel technique combining verification and monitoring which incurs no overhead during runtime at all. The technique proceeds by using the inconclusive result of a verification run as the basis for transforming the program into one where all potential points of failure are replaced by HALT statements. The new program is safe by construction, behaviourally equivalent to the original program except for unsafe behaviour, and has the same performance characteristics.


formal methods | 2011

Sound and complete abstract graph transformation

Dominik Steenken; Heike Wehrheim; Daniel Wonisch

Graph transformation systems (GTS) are a widely used technique for the formal modeling of structures and structure changes of systems. To verify properties of GTS, model checking techniques have been developed, and to cope with the inherent infinity arising in GTS state spaces, abstraction techniques are employed. In this paper, we introduce a novel representation for abstract graphs (which are shape graphs together with shape constraints) and define transformations (execution steps) on abstract graphs. We show that these abstract transformations are sound and complete in the sense that they capture exactly the transformations on the concrete graph level. Furthermore, abstract transformation can be carried out fully automatically. We thus obtain an effectively computable “best transformer” for abstract graphs which can be employed in an abstraction-based verification technique for GTS.


Electronic Notes in Theoretical Computer Science | 2009

Compositional CSP Traces Refinement Checking

Heike Wehrheim; Daniel Wonisch

Compositional verification using assume-guarantee reasoning has recently seen an uprise due to the introduction of automatic techniques for learning assumptions. In this paper, we transfer this technique to a setting with CSP as modelling and property specification language, and present an approach to compositional traces refinement checking. The approach has been implemented using the CSP model checker FDR as teacher during learning. The implementation shows that the compositional approach can both drastically outperform as well as underperform FDRs performance, depending on the example at hand.


international conference on industrial informatics | 2011

Using shape analysis to verify graph transformations in model driven design

Dominik Steenken; Daniel Wonisch

In model driven design processes, graph transformation systems are frequently used to model dynamic behaviour. Many complex models induce arbitratily large state spaces. Since the systems they model are often safety-critical, they need to be verified. Explicit modelchecking fails here, since it requires the construction of the entire state space. In this paper, we present a verification technique that can handle arbitrarily large state spaces. Furthermore we show that it can easily be integrated in existing model driven design processes.

Collaboration


Dive into the Daniel Wonisch's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge