Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sumit Kumar Jha is active.

Publication


Featured researches published by Sumit Kumar Jha.


computational methods in systems biology | 2009

A Bayesian Approach to Model Checking Biological Systems

Sumit Kumar Jha; Edmund M. Clarke; Christopher James Langmead; Axel Legay; André Platzer; Paolo Zuliani

Recently, there has been considerable interest in the use of Model Checking for Systems Biology. Unfortunately, the state space of stochastic biological models is often too large for classical Model Checking techniques. For these models, a statistical approach to Model Checking has been shown to be an effective alternative. Extending our earlier work, we present the first algorithm for performing statistical Model Checking using Bayesian Sequential Hypothesis Testing. We show that our Bayesian approach outperforms current statistical Model Checking techniques, which rely on tests from Classical (aka Frequentist) statistics, by requiring fewer system simulations. Another advantage of our approach is the ability to incorporate prior Biological knowledge about the model being verified. We demonstrate our algorithm on a variety of models from the Systems Biology literature and show that it enables faster verification than state-of-the-art techniques, even when no prior knowledge is available.


computational methods in systems biology | 2008

Statistical Model Checking in BioLab: Applications to the Automated Analysis of T-Cell Receptor Signaling Pathway

Edmund M. Clarke; James R. Faeder; Christopher James Langmead; Leonard A. Harris; Sumit Kumar Jha; Axel Legay

We present an algorithm, called BioLab , for verifying temporal properties of rule-based models of cellular signalling networks. n n BioLab models are encoded in the BioNetGen language, and properties are expressed as formulae in probabilistic bounded linear temporal logic. Temporal logic is a formalism for representing and reasoning about propositions qualified in terms of time. Properties are then verified using sequential hypothesis testing on executions generated using stochastic simulation. BioLab is optimal, in the sense that it generates the minimum number of executions necessary to verify the given property. BioLab also provides guarantees on the probability of it generating Type-I (i.e., false-positive) and Type-II (i.e., false-negative) errors. Moreover, these error bounds are pre-specified by the user. We demonstrate BioLab by verifying stochastic effects and bistability in the dynamics of the T-cell receptor signaling network.


international workshop on hybrid systems computation and control | 2008

A Counterexample-Guided Approach to Parameter Synthesis for Linear Hybrid Automata

Goran Frehse; Sumit Kumar Jha; Bruce H. Krogh

Our goal is to find the set of parameters for which a given linear hybrid automaton does not reach a given set of bad states. The problem is known to be semi-solvable (if the algorithm terminates the result is correct) by introducing the parameters as state variables and computing the set of reachable states. This is usually too expensive, however, and in our experiments only possible for very simple systems with few parameters. We propose an adaptation of counterexample-guided abstraction refinement (CEGAR) with which one can obtain an underapproximation of the set of good parameters using linear programming. The adaptation is generic and can be applied on top of any CEGAR method where the counterexamples correspond to paths in the concrete system. For each counterexample, the cost incurred by underapproximating the parameters is polynomial in the number of variables, parameters, and the length of counterexample. We identify a syntactic condition for which the approach is complete in the sense that the underapproximation is empty only if the problem has no solution. Experimental results are provided for two CEGAR methods, a simple discrete version and iterative relaxation abstraction (IRA), both of which show a drastic improvement in performance compared to standard reachability.


international conference on hybrid systems computation and control | 2007

Reachability for linear hybrid automata using iterative relaxation abstraction

Sumit Kumar Jha; Bruce H. Krogh; James Weimer; Edmund M. Clarke

This paper introduces iterative relaxation abstraction (IRA), a new method for reachability analysis of LHA that aims to improve scalability by combining the capabilities of current tools for analysis of low-dimensional LHA with the power of linear programming (LP) for large numbers of constraints and variables. IRA is inspired by the success of counterexample guided abstraction refinement (CEGAR) techniques in verification of discrete systems. On each iteration, a low-dimensional LHA called a relaxation abstraction is constructed using a subset of the continuous variables from the original LHA. Hybrid system reachability analysis then generates a regular language called the discrete path abstraction containing all possible counterexamples (paths to the bad locations) in the relaxation abstraction. If the discrete path abstraction is non-empty, a particular counterexample is selected and LP infeasibility analysis determines if the counterexample is spurious using the constraints along the path from the original high-dimensional LHA. If the counterexample is spurious, LP techniques identify an irreducible infeasible subset (IIS) of constraints from which the set of continuous variables is selected for the the construction of the next relaxation abstraction. IRA stops if the discrete path abstraction is empty or a legitimate counterexample is found. The effectiveness of the approach is illustrated with an example.


Journal of Bioinformatics and Computational Biology | 2009

Symbolic Approaches for Finding Control Strategies in Boolean Networks

Christopher James Langmead; Sumit Kumar Jha

We present an exact algorithm, based on techniques from the field of Model Checking, for finding control policies for Boolean Networks (BN) with control nodes. Given a BN, a set of starting states, I, a set of goal states, F, and a target time, t, our algorithm automatically finds a sequence of control signals that deterministically drives the BN from I to F at, or before time t, or else guarantees that no such policy exists. Despite recent hardness-results for finding control policies for BNs, we show that, in practice, our algorithm runs in seconds to minutes on over 13,400 BNs of varying sizes and topologies, including a BN model of embryogenesis in Drosophila melanogaster with 15,360 Boolean variables. We then extend our method to automatically identify a set of Boolean transfer functions that reproduce the qualitative behavior of gene regulatory networks. Specifically, we automatically learn a BN model of D. melanogaster embryogenesis in 5.3 seconds, from a space containing 6.9 x 10(10) possible models.


international conference on hybrid systems computation and control | 2005

Refining abstractions of hybrid systems using counterexample fragments

Ansgar Fehnker; Edmund M. Clarke; Sumit Kumar Jha; Bruce H. Krogh

Counterexample guided abstraction refinement, a powerful technique for verifying properties of discrete-state systems, has been extended recently to hybrid systems verification. Unlike in discrete systems, however, establishing the successor relation for hybrid systems can be a fairly expensive step since it requires evaluation and over-approximation of the continuous dynamics. It has been observed that it is often sufficient to consider fragments of counterexamples rather than complete counterexamples. In this paper we further develop the idea of fragments. We extend the notion of cut sets in directed graphs to cutting sets of fragments in abstractions. Cutting sets of fragments are then used to guide the abstraction refinement in order to prove safety properties for hybrid systems.


workshop on algorithms in bioinformatics | 2007

Predicting protein folding kinetics via temporal logic model checking

Christopher James Langmead; Sumit Kumar Jha

We present a novel approach for predicting protein folding kinetics using techniques from the field of model checking. This represents the first time model checking has been applied to a problem in the field of structural biology. The proteins energy landscape is encoded symbolically using Binary Decision Diagrams and related data structures. Questions regarding the kinetics of folding are encoded as formulas in the temporal logic CTL. Model checking algorithms are then used to make quantitative predictions about the kinetics of folding. We show that our approach scales to state spaces as large as 1023 when using exact algorithms for model checking. This is at least 14 orders of magnitude larger than the number of configurations considered by comparable techniques. Furthermore, our approach scales to state spaces at least as large as 1032 unique configurations when using approximation algorithms for model checking. We tested our method on 19 test proteins. The quantitative predictions regarding folding rates for these test proteins are in good agreement with experimentally measured values, achieving a correlation coefficient of 0.87.


Handbook of Networked and Embedded Control Systems | 2005

Temporal Logic Model Checking

Edmund M. Clarke; Ansgar Fehnker; Sumit Kumar Jha; Helmut Veith

ion reduces the state space by removing irrelevant features of a Kripke structure. Given a Kripke structure K, an abstraction is a Kripke structure K̂ such that K̂ is significantly smaller than K, and K̂ preserves a useful class of specifications for K. Consequently, the expensive task of model checking K can be reduced to the more feasible task of model checking K̂. We know from above that in order to preserve all CTL specifications, K and K̂ must be bisimilar. But bisimilarity, by its very definition, expresses that K and K̂ are behaviorally equivalent. Consequently, K̂ still models a lot of irrelevant behavior and will therefore be quite large in general. Temporal Logic Model Checking 551 A more practical approach is to employ the fact explained in Section 2 that simulation preserves ACTL! formulas, i.e., A * B and B |= φ imply A |= φ. Consequently, for an abstract system K̂ where K * K̂ holds, a successful run of the model checker over K̂ implies correctness over the original Kripke structure K, without model checking K. The converse implication, however, will not hold in general: an ACTL! property which is false in K̂ may still be true in K. In this case, the abstract counterexample obtained over K̂ cannot be reconstructed for the concrete Kripke structure K, and is called a spurious counterexample [10], or a false negative. An important instance of simulation-based abstraction is existential abstraction [11, 14] where the abstract states are essentially equivalence classes of concrete states; a transition between two abstract states holds if there was a transition between any two concrete member states in the corresponding equivalence classes. Formally, an abstraction function h is a surjection h : S → Ŝ where Ŝ is the set of abstract states. The surjection h induces an equivalence relation ≡ on the state space S where d ≡ e iff h(d) = h(e). The abstract Kripke structure K̂ = (Ŝ, Ŝ0, R̂, L̂,AP) derived from h is defined as follows:Kripke structure K̂ = (Ŝ, Ŝ0, R̂, L̂,AP) derived from h is defined as follows: Ŝ0 = {d̂ | ∃d ∈ S0 . h(d) = d̂} R̂ = {(d̂1, d̂2) | ∃d1, d2 ∈ S . h(d1) = d̂1 ∧ h(d2) = d̂2 ∧ R(d1, d2)}


international workshop on hybrid systems computation and control | 2008

d-IRA: A Distributed Reachability Algorithm for Analysis of Linear Hybrid Automata

Sumit Kumar Jha

This paper presents the design of a novel distributed algorithm d-IRA for the reachability analysis of linear hybrid automata. Recent work on iterative relaxation abstraction(IRA) is leveraged to distribute the reachability problem among multiple computational nodes in a non-redundant manner by performing careful infeasibility analysis of linear programs corresponding to spurious counterexamples. The d-IRA algorithm is resistant to failure of multiple computational nodes. The experimental results provide promising evidence for the possible successful application of this technique.


design, automation, and test in europe | 2011

When to stop verification?: Statistical trade-off between expected loss and simulation cost

Sumit Kumar Jha; Christopher James Langmead; Swarup Mohalik; Sethu Ramesh

Exhaustive state space exploration based verification of embedded system designs remains a challenge despite three decades of active research into Model Checking. On the other hand, simulation based verification of even critical embedded system designs is often subject to financial budget considerations in practice. In this paper, we suggest an algorithm that minimizes the overall cost of producing an embedded system including the cost of testing the embedded system and expected losses from an incompletely tested design. We seek to quantify the trade-off between the budget for testing and the potential financial loss from an incorrect design. We demonstrate that our algorithm needs only a logarithmic number of test samples in the cost of the potential loss from an incorrect validation result. We also show that our approach remains sound when only upper bounds on the potential loss and lower bounds on the cost of simulation are available. We present experimental evidence to corroborate our theoretical results.

Collaboration


Dive into the Sumit Kumar Jha's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Edmund M. Clarke

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Bruce H. Krogh

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Ansgar Fehnker

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Alexandre Donzé

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

André Platzer

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Arvind Ramanathan

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Axel Legay

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge