About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Book chapter

On the relationship between LTL normal forms and Büchi automata

From

East China Normal University1

Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Language-Based Technology, Department of Applied Mathematics and Computer Science, Technical University of Denmark3

Aalborg University4

In this paper, we revisit the problem of translating LTL formulas to Büchi automata. We first translate the given LTL formula into a special disjuctive-normal form (DNF). The formula will be part of the state, and its DNF normal form specifies the atomic properties that should hold immediately (labels of the transitions) and the formula that should hold afterwards (the corresponding successor state).

If the given formula is Until-free or Release-free, the Büchi automaton can be obtained directly in this manner. For a general formula, the construction is more involved: an additional component will be needed for each formula that helps us to identify the set of accepting states. Notably, our construction is an on-the-fly construction, which starts with the given formula and explores successor states according to the normal forms.

We implement our construction and compare the tool with SPOT [3]. The comparision results are very encouraging and show our construction is quite innovative.

Language: English
Publisher: Springer
Year: 2013
Pages: 256-270
Series: Lecture Notes in Computer Science
Journal subtitle: Essays Dedicated To Jifeng He on the Occasion of His 70th Birthday
ISBN: 3642396976 , 3642396984 , 9783642396977 and 9783642396984
ISSN: 16113349 and 03029743
Types: Book chapter
DOI: 10.1007/978-3-642-39698-4_16

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis