Abstract 1 Introduction 2 Preliminaries 3 Strategy Projections 4 Verification Objectives for pPAs 5 Assume-Guarantee Reasoning for pPA 6 Compositional Reasoning about Monotonicity 7 Related Work 8 Conclusion References

Compositional Reasoning for Parametric Probabilistic Automata

Hannah Mertens111Corresponding author ORCID RWTH Aachen University, Germany Tim Quatmann ORCID RWTH Aachen University, Germany Joost-Pieter Katoen ORCID RWTH Aachen University, Germany
Abstract

We establish an assume-guarantee (AG) framework for compositional reasoning about multi-objective queries in parametric probabilistic automata (pPA) – an extension to probabilistic automata (PA), where transition probabilities are functions over a finite set of parameters. We lift an existing framework for PA to the pPA setting, incorporating asymmetric, circular, and interleaving proof rules. Our approach enables the verification of a broad spectrum of multi-objective queries for pPA, encompassing probabilistic properties and (parametric) expected total rewards. Additionally, we introduce a rule for reasoning about monotonicity in composed pPAs.

Keywords and phrases:
Verification, Probabilistic systems, Assume-guarantee reasoning, Parametric Probabilistic Automata, Parameter synthesis
Funding:
Tim Quatmann: This research was funded by a KI-Starter grant from the Ministerium für Kultur und Wissenschaft NRW.
Copyright and License:
[Uncaptioned image] © Hannah Mertens, Tim Quatmann, and Joost-Pieter Katoen; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Logic
Related Version:
Full Version: https://arxiv.org/abs/2506.08525 [38]
Editors:
Patricia Bouyer and Jaco van de Pol

1 Introduction

Probabilistic Model Checking [21, 31] studies the automated verification of Markov models for systems with random behavior. Applications include network and security protocols, biochemical processes, and planning under uncertainty [40, 33, 20]. Common properties such as reachability probabilities in Markov decision processes (MDPs) can often be verified efficiently in PTIME [3].

When the probabilities with which the system evolves are not known exactly, verification results must be robust towards slight perturbations. Parametric Markov models [14, 28] allow representing uncertain model quantities – for example the bias of a coin-flip or the probability of a sensor misreading – using parameters. Feasibility is a fundamental verification problem for parametric systems and asks whether there is an instantiation of the parameters under which a given specification holds. Deciding feasibility for reachability probability specifications in parametric MDPs is ETR-complete, i.e., at least NP-hard and within PSPACE [29]. The dual verification problem that asks if the specification holds under all instantiations is co-ETR complete. Checking parametric Markov models is therefore significantly more complex compared to Markov models without parameters.

The number of system states grows exponentially with the number of system components. The resulting state-space explosion is an omnipresent challenge when model checking complex systems, often rendering analysis computationally infeasible. Compositional verification techniques such as assume-guarantee (AG) reasoning [26, 44] address this problem by decomposing the verification task into smaller sub-tasks that consider individual components in isolation. This modular verification approach has been successfully applied in various domains, including service-based workflow verification [6], large-scale IT systems [7], and autonomous systems incorporating deep neural networks [42, 43]. Recent advancements include circular AG reasoning [16] and verification-repair techniques [22]. Extensions to probabilistic systems have further expanded the scope of AG reasoning, as demonstrated in works such as [35], where AG reasoning was applied to Segala’s probabilistic automata (PA) [47] – a compositional extension of Markov decision processes. Automated approaches to AG reasoning for probabilistic systems have also been explored [19, 36], enabling more scalable verification. Other works have considered parametric, but non-probabilistic timed automata [2] as well as parameterized programs [4, 48, 39] – where the concurrent system is parameterized by the number of processes or threads in a configured instance.

This work introduces a framework for compositional reasoning about parametric probabilistic automata (pPA). The case studies presented by Kwiatkowska et al. [35] demonstrate the practical applicability of AG reasoning within a non-parametric setting. These findings provide strong motivation for extending this approach to the parametric domain. In this work, we develop the theoretical foundations of an AG reasoning framework for pPAs, leveraging results from (non-parametric) PAs [35]. Due to the aforementioned ETR-hardness, compositional reasoning has a large potential and can be crucial to verify complex parameterized systems that are too large to handle monolithically.

Example 1.

Consider a communication system, where a sender 𝒮 broadcasts messages to a receiver through a broadcast channel . The system is modeled by the parallel composition 𝒮. The components are faulty: 𝒮 might face a collision, broadcasting in might fail due to message loss, and might miss broadcasts. The reliability of 𝒮, , and is influenced by parameters and the precise values of these parameters vary depending on network conditions, interference, or other factors. Our goal is to verify that under all parameter instantiations in a given parameter space R, the message is successfully received with at least probability 0.7, formally denoted by

(𝒮),R0.7(𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑).

AG reasoning allows to verify the specification without explicitly considering the (potentially large) composition 𝒮. To this end, assume that we have established the following statements:

  • 𝒮,R<0.1(𝑐𝑜𝑙𝑙𝑖𝑠𝑖𝑜𝑛) – the probability that 𝒮 faces a collision is below 0.1

  • ,R<0.1(𝑐𝑜𝑙𝑙𝑖𝑠𝑖𝑜𝑛)0.8(𝑏𝑟𝑜𝑎𝑑𝑐𝑎𝑠𝑡) – if observes a collision with probability below 0.1, the message is broadcast with probability at least 0.8

  • ,R0.8(𝑏𝑟𝑜𝑎𝑑𝑐𝑎𝑠𝑡)0.7(𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑) – If the message is broadcast with probability at least 0.8, then receives the message with probability at least 0.7

We reason about the composed system using the AG rule stated in Theorem 33 in Section 5:

𝒮,R<0.1(𝑐𝑜𝑙𝑙𝑖𝑠𝑖𝑜𝑛),R<0.1(𝑐𝑜𝑙𝑙𝑖𝑠𝑖𝑜𝑛)0.8(𝑏𝑟𝑜𝑎𝑑𝑐𝑎𝑠𝑡)(𝒮),R0.8(𝑏𝑟𝑜𝑎𝑑𝑐𝑎𝑠𝑡)(𝒮),R0.8(𝑏𝑟𝑜𝑎𝑑𝑐𝑎𝑠𝑡),R0.8(𝑏𝑟𝑜𝑎𝑑𝑐𝑎𝑠𝑡)0.7(𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑)(𝒮),R0.7(𝑟𝑒𝑐𝑒𝑖𝑣𝑒𝑑)

Contributions.

To the best of our knowledge, we provide the first framework for compositional reasoning of parametric Markov models. Our main contributions are as follows.

  • We introduce and formalize pPAs, i.e., compositional probabilistic automata with parametric transitions.

  • We provide a conservative extension of strategy projections [46, 35] to pPAs, including a more natural definition based on conditional probabilities. Strategy projections are essential for correctness of compositional reasoning as they allow to link measures of a composed model to measures of its constituting components.

  • We present rules for assume-guarantee reasoning, generalizing an established framework by Kwiatkowska et al. [35] to the parametric setting – which requires some technically intricate proofs. The framework applies to ω-regular and expected total reward properties as well as multi-objective combinations thereof.

  • We provide a new rule for compositional reasoning about monotonicity in pPAs. Knowing that a measure of interest – either the probability to satisfy an ω-regular specification or an expected total reward – is monotone in one or more parameters can significantly speed up verification [28, 50]. Our rule allows to derive monotonicity w.r.t. a composed pPA by only determining monotonicity for its components.

We introduce pPAs in Section 2 and discuss strategy projections in Section 3. Section 4 outlines properties of interest and Section 5 presents our AG rules. We outline results for monotonicity in Section 6 and related work in Section 7. Section 8 concludes the paper. Proofs omitted in the main part of the paper are given in the extended version [38].

2 Preliminaries

For sets X and Y, let f:XY denote a partial function from X to Y with domain 𝑑𝑜𝑚(f)X. The projection of f to a set Z is written as fZ:(XZ)Y. Iverson brackets φ{0,1} map a Boolean condition φ to 1 if φ holds and 0 otherwise.

[V] denotes the set of (multivariate) polynomials over a finite set of real-valued parameters V={p1,,pn}. A (parameter) valuation for V is a function 𝓋:𝒱. Evaluating a polynomial f[V] at 𝓋 yields f[𝓋]. A region R for V is a set of valuations. For pV, we define the valuation 𝓅 with 𝓅(𝓆)=𝓅=𝓆 for qV.

A parametric distribution222We use the term parametric distribution – rather than parametric function – to emphasize that we are typically interested in functions μ where μ[𝓋] is a (sub)probability distribution. for V over a finite set S is a function μ:S([V]). Applying valuation 𝓋 to μ yields μ[𝓋]:𝒮 with μ[𝓋](𝓈)=μ(𝓈)[𝓋] for all sS. We call μ:S[0,1] a subdistribution if sSμ(s)1 and a distribution if sSμ(s)=1. The sets of parametric distributions, subdistributions, and distributions over S are denoted by 𝐷𝑖𝑠𝑡V(S), 𝑆𝑢𝑏𝐷𝑖𝑠𝑡(S), and 𝐷𝑖𝑠𝑡(S), respectively. For sS, 𝟙s𝐷𝑖𝑠𝑡(S) is the Dirac distribution with 𝟙s(s)=s=s. For sets S1,S2, the product of μ1𝐷𝑖𝑠𝑡V(S1) and μ2𝐷𝑖𝑠𝑡V(S2) is the distribution μ1×μ2𝐷𝑖𝑠𝑡V(S1×S2) with (μ1×μ2)(s1,s2)=μ1(s1)μ2(s2).

2.1 Parametric Probabilistic Automata

We combine probabilistic automata (PA) [47, 52] with parametric Markov models [28].

Definition 2.

A parametric probabilistic automaton (pPA) over a finite alphabet Σ is a tuple =(S,s𝑖𝑛𝑖𝑡,V,𝐴𝑐𝑡,𝐏,L), where S, V, and 𝐴𝑐𝑡 are finite sets of states, parameters, and actions, respectively, s𝑖𝑛𝑖𝑡S is an initial state, 𝐏:(S×𝐴𝑐𝑡)𝐷𝑖𝑠𝑡V(S) is a parametric transition function, and L:𝑑𝑜𝑚(𝐏)Σ is a labeling function.

Let =(S,s𝑖𝑛𝑖𝑡,V,𝐴𝑐𝑡,𝐏,L) be a pPA. For sS, 𝐴𝑐𝑡(s)={α𝐴𝑐𝑡(s,α)𝑑𝑜𝑚(𝐏)} denotes the set of enabled actions in s and s is the pPA where the initial state is set to s. We set 𝐏(s,α,s)=𝐏(s,α)(s) if (s,α)𝑑𝑜𝑚(𝐏) and otherwise 𝐏(s,α,s)=0. is a (non-parametric) PA if 𝐏(s,α)𝐷𝑖𝑠𝑡(S) for all (s,α)𝑑𝑜𝑚(𝐏). In this case, 𝐏(s,α,s) is the probability to transition to successor state s when action α is selected at state s.

The instantiation of at valuation 𝓋 for V is the pPA [𝓋]=(𝒮,𝓈𝑖𝑛𝑖𝑡,,𝐴𝑐𝑡,𝐏[𝓋],), where 𝑑𝑜𝑚(𝐏[𝓋])=𝑑𝑜𝑚(𝐏) and 𝐏[𝓋](𝓈,α)=𝐏(𝓈,α)[𝓋]. If [𝓋] is a non-parametric PA, we say 𝓋 is well-defined for . A valuation 𝓋 is graph-preserving for if it is well-defined and for all s,sS and α𝐴𝑐𝑡: 𝐏(s,α,s)[𝓋]=0 iff 𝐏(s,α,s)=0. A region R is well-defined (graph-preserving) if all its valuations 𝓋 are well-defined (graph-preserving).

(a) pPA 1.
(b) pPA 2.
Figure 1: Example pPAs 1 and 2.
Example 3 (pPA).

Consider the pPA 1 in Figure 1(a) and 2 in Figure 1(b). 1=(S1,s1𝑖𝑛𝑖𝑡,V1,𝐴𝑐𝑡1,𝐏1,L1), where S1={s0,s1}, s1𝑖𝑛𝑖𝑡=s0 and V1={p}. Actions 𝐴𝑐𝑡1={𝖺,𝖻,𝖼} and alphabet Σ1={𝖺,𝖻,𝖼}. In this example, the alphabet coincides with actions as these uniquely define the transitions. Similarly, 2=(S2,s2𝑖𝑛𝑖𝑡,V2,𝐴𝑐𝑡2,𝐏2,L2), where S2={t0,,t4}, s2𝑖𝑛𝑖𝑡=t0, and V2={p,q}. Again, 𝐴𝑐𝑡2=Σ2={𝖺,𝖼,}.

An infinite path of is an alternating sequence π=s0,α0,s1,α1, of states siS and actions αi𝐴𝑐𝑡 such that (si,αi)𝑑𝑜𝑚(𝐏) for all i0. A finite path of length n is a prefix π^=s0,α0,,sn of an infinite path, ending in a state 𝑙𝑎𝑠𝑡(π^)=snS. Pathsinf and Pathsfin are the sets of infinite and finite paths of , respectively. For a (finite or infinite) path πPathsinfPathsfin, we write |π|{} for its length and π[0,j] for its prefix of length j|π|. We deliberately allow paths that take transitions with probability 0. As a consequence, a path of a pPA M is always also a path of any of its instantiations [𝓋] – even if 𝓋 is not graph-preserving.

Strategies – also known as schedulers or adversaries – resolve nondeterminism by assigning (sub-)distributions over enabled actions based on the history – i.e., a finite path – observed so far. We allow for partial strategies that, intuitively, can choose none of the enabled actions to reflect the case that no further transition is executed.

Definition 4.

A (partial) strategy for is a function σ:Pathsfin𝑆𝑢𝑏𝐷𝑖𝑠𝑡(𝐴𝑐𝑡) such that σ(π^)(α)>0 implies (𝑙𝑎𝑠𝑡(π^),α)𝑑𝑜𝑚(𝐏). A strategy σ:Pathsfin𝐷𝑖𝑠𝑡(𝐴𝑐𝑡) is called complete. The set of all partial and complete strategies on are denoted by Str, where {𝑝𝑟𝑡,𝑐𝑚𝑝}, respectively. A memoryless strategy only depends on the last state of π^. The set of memoryless strategies on is denoted by Str𝑚𝑙𝑒𝑠𝑠,.

For a strategy σ for , we may write σ(π^,α) instead of σ(π^)(α). If σ is memoryless, we write σ(sn,α) instead of σ(π^,α), where sn=𝑙𝑎𝑠𝑡(π^).

A well-defined instantiation 𝓋 and a strategy σ for yield a purely probabilistic process described by the (sub)probability measure Pr𝓋,σ on the measurable subsets of Pathsinf, which is obtained by a standard cylinder set construction [3]:

Cyl(π^)={πPathsinfπ^ is a prefix of π}

is the cylinder set of a finite path π^=s0,α0,,sn of and we set

Pr𝓋,σ(Cyl(π^))=s0=s𝑖𝑛𝑖𝑡i=0n1σ(π^[0,i],αi)𝐏(si,αi,si+1)[𝓋].

This definition extends uniquely to a probability measure on all measurable sets of infinite paths. We further lift Pr𝓋,σ to (sets of) finite paths and write, e.g., Pr𝓋,σ(π^) for π^Pathsfin or Pr𝓋,σ(Π) for ΠPathsfin – implicitly referring to (unions of) cylinder sets. If is a (non-parametric) PA, we may omit 𝓋 and write Prσ. Well-defined 𝓋 yields Pr[𝓋]σ=Pr𝓋,σ.

Example 5.

For the pPA 2 from Figure 1(b) and a well-defined valuation 𝓋, the probability to reach the state t3 under valuation 𝓋 is (1𝓋(𝓅))𝓋(𝓆)+𝓋(𝓅)110.

 Remark 6.

Our definition of PA slightly deviates from related work [47, 35, 32, 36], which commonly define a transition relation δS×Σ×𝐷𝑖𝑠𝑡(S) instead of functions 𝐏 and L. In our setting, a pair (s,α)𝑑𝑜𝑚(𝐏) uniquely identifies both, a label L(s,α)Σ, and a distribution over successor states 𝐏(s,α)𝐷𝑖𝑠𝑡(S), which significantly simplifies formalizations related to pPAs. In particular, any strategy for immediately also applies to instantiations of and vice versa, i.e., we have Str=Str[𝓋] for any valuation v. On the other hand, our variant does not affect expressiveness of non-parametric PA as one can convert between the two formalisms.

We lift parallel composition of PA [47] to pPAs. Composed pPAs synchronize on common transition labels while behaving autonomously on non-common labels. For simplicity, we assume that composed pPAs consider a common set of parameters V.333If two pPAs have different parameter sets V1V2, the assumption can be established by considering V=V1V2 instead, potentially adding (unused) parameters to the individual pPAs.

Definition 7 (Parallel Composition).

For i=1,2, let i=(Si,si𝑖𝑛𝑖𝑡,V,𝐴𝑐𝑡i,𝐏i,Li) be two pPAs over alphabets Σi with 𝐴𝑐𝑡i(Σ1Σ2)=. The parallel composition of 1 and 2 is given by the pPA 12=(S1×S2,(s1𝑖𝑛𝑖𝑡,s2𝑖𝑛𝑖𝑡),V,𝐴𝑐𝑡,𝐏,L) over Σ1Σ2, where

  • 𝐴𝑐𝑡=(𝐴𝑐𝑡1×𝐴𝑐𝑡2)Γ(𝐴𝑐𝑡1×Σ1Σ2)Γ(Σ2Σ1×𝐴𝑐𝑡2),

  • for each (s1,α1)𝑑𝑜𝑚(𝐏1), (s2,α2)𝑑𝑜𝑚(𝐏2) with L1(s1,α1)=L2(s2,α2)Σ1Σ2:

    𝐏((s1,s2),(α1,α2))=𝐏1(s1,α1)×𝐏2(s2,α2)andL((s1,s2),(α1,α2))=L1(s1,α1),
  • for each (s1,α1)𝑑𝑜𝑚(𝐏1), s2S2 with L1(s1,α1)=𝖺1Σ1Σ2:

    𝐏((s1,s2),(α1,𝖺1))=𝐏1(s1,α1)×𝟙s2andL((s1,s2),(α1,𝖺1))=𝖺1=L1(s1,α1),
  • for each s1S1, (s2,α2)𝑑𝑜𝑚(𝐏2) with L2(s2,α2)=𝖺2Σ2Σ1:

    𝐏((s1,s2),(𝖺2,α2))=𝟙s1×𝐏2(s2,α2)andL((s1,s2),(𝖺2,α2))=𝖺2=L2(s2,α2).

The parallel composition of parametric probabilistic automata (pPAs) is associative, meaning that (12)3 and 1(23) are equivalent up to state renaming. Therefore, we denote this composition as 123.

Figure 2: Parallel composition of pPAs 1 and 2 from Figure 1.
Example 8 (Parallel Composition).

Figure 2 shows the composition of pPAs 1 and 2 from Figure 1. Actions with labels 𝖺 or 𝖼 are synchronized while 𝖻 and are asynchronous.

Similar to [35, Section 3.5], we sometimes assume fairness of strategies, meaning that specific sets of labels ΣiΣ are visited infinitely often.

Definition 9 (Fair Strategy).

Let 𝒞2Σ and 𝓋 be a well-defined valuation for over Σ. A complete strategy σStr[𝓋]𝑐𝑚𝑝 is fair w.r.t. 𝒞 (denoted 𝑓𝑎𝑖𝑟𝒞) if

Pr𝓋,σ({s0,α0,s1,α1,Pathsinf|Σi𝒞:j:kj:L(sk,αk)Σi})=1.

The set of all 𝑓𝑎𝑖𝑟𝒞 strategies of [𝓋] is denoted Str[𝓋]𝑓𝑎𝑖𝑟𝒞.

Almost-sure repeated reachability in PA only depends on the graph structure, which yields:

Proposition 10.

For any graph-preserving valuations 𝓋,𝓋 for we have Str[𝓋]𝑓𝑎𝑖𝑟𝒞=Str[𝓋]𝑓𝑎𝑖𝑟𝒞, i.e., a strategy is 𝑓𝑎𝑖𝑟𝒞 for [𝓋] iff it is 𝑓𝑎𝑖𝑟𝒞 for [𝓋].

3 Strategy Projections

In this section, we define the projection of a strategy of a composite pPA =12 onto a single component i for i=1,2. Projections for PA are defined in [35, Definition 6] and originate from [46, page 65, Definition of Projection]. They are intuitively used to relate probability measures for and i.

The projection of a finite path πPathsfin onto component i is the finite path πiPathsifin obtained by restricting π to the steps performed by i. Formally, (s1𝑖𝑛𝑖𝑡,s2𝑖𝑛𝑖𝑡)i=si𝑖𝑛𝑖𝑡 and for π=π,(α1,α2),(s1,s2):

πi={πi,αi,siif αi𝐴𝑐𝑡iπiotherwise.

Path projections are neither injective nor surjective, i.e., we might have πi=πi for two distinct paths ππ of , and for some πiPathsifin there might not be any πPathsfin with πi=πi. We define the set of paths of 12 that are projected to πiPathsifin as

πi3i={πPathsfinπi=πi}.

We first focus on strategy projections for non-parametric PA. Then, we lift our notions to the parametric setting.

3.1 Projections for non-parametric PAs

We fix the parallel composition 𝒩=𝒩1𝒩2=(S,s𝑖𝑛𝑖𝑡,𝐴𝑐𝑡,𝐏,L) of (non-parametric) PAs 𝒩1 and 𝒩2 with 𝒩i=(Si,si𝑖𝑛𝑖𝑡,𝐴𝑐𝑡i,𝐏i,Li) and alphabets Σi for i=1,2.

Definition 11 (Strategy Projection for PA).

The projection of a strategy σStr𝒩𝑝𝑟𝑡 to 𝒩i is the strategy σi𝒩Str𝒩i𝑝𝑟𝑡, where for πiPathsifin and αi𝐴𝑐𝑡i:

σi𝒩(πi,αi)={siSiPr𝒩σ((πi,αi,si)𝒩3i)Pr𝒩σ(πi𝒩3i)if Pr𝒩σ(πi𝒩3i)>00otherwise.

If 𝒩 is clear, we simply write σi instead of σi𝒩. Lemmas 12 and 13 below yield that Definition 11 is equivalent to the projection defined in [35, Def. 6]. We argue that our variant is more intuitive since the numerator and denominator of the fraction consider the same probability measure Pr𝒩σ. Intuitively, σi(πi,αi) coincides with the conditional probability that – under Pr𝒩σ and given that a path π with projection πi=πi is observed – the next action of component 𝒩i is αi. We now provide an alternative characterization for the numerator given in Definition 11.

Lemma 12.

For σStr𝒩𝑝𝑟𝑡, πiPaths𝒩ifin, and αi𝐴𝑐𝑡i:

siSiPr𝒩σ((πi,αi,si)𝒩3i)=π(πi𝒩3i)(α^1,α^2)𝐴𝑐𝑡,α^i=αiPr𝒩σ(π)σ(π,(α^1,α^2)).

The next lemma is the key observation for strategy projections as it connects the probability measure Pr𝒩σ for 𝒩 and Pr𝒩iσi for each component 𝒩i.

Lemma 13.

For σStr𝒩𝑝𝑟𝑡 and πiPaths𝒩ifin: Pr𝒩iσi(πi)=Pr𝒩σ(πi𝒩3i).

The following result lifts [35, Lemma 2] to our setting and states that fair (and therefore also complete) strategies have fair and complete projections.

Lemma 14.

Let 𝒞12Σ1 and 𝒞22Σ2. If σStr𝒩𝑓𝑎𝑖𝑟𝒞1𝒞2, then σiStr𝒩i𝑓𝑎𝑖𝑟𝒞i.

The converse of Lemma 14 does not hold: The projection σi might not be a complete strategy for 𝒩i, even though σ is complete for 𝒩. Furthermore, σi might not be memoryless, even if σ is memoryless. The following example shows both cases.

Example 15 (Strategy Projection for pPA).

Consider the pPA =12 from Figure 2, using 1 and 2 depicted in Figure 1. We fix the valuation 𝓋 with 𝓋(𝓅)=𝓋(𝓆)=0.1 and set 𝒩=[𝓋] and 𝒩i=i[𝓋] for i=1,2. Let σStr𝒩1𝒩2𝑚𝑙𝑒𝑠𝑠,𝑐𝑚𝑝 that always selects the actions with label 𝖺, 𝖼, or with probability 1 when available; otherwise, it chooses 𝖻.

We compute the projection σ2 to the PA 2[𝓋]:

  • σ2(t0,𝖺)=1

  • σ2((t0,𝖺,t2),𝖼)=(𝓋(𝓅))2𝓋(𝓅)=𝓋(𝓅)=0.1

  • σ2((t0,𝖺,t2,𝖼,t3),)=(𝓋(𝓅))2110𝓋(𝓅)110=𝓋(𝓅)=0.1

Similarly, σ2((t0,𝖺,t1),𝖺)=𝓋(𝓅)=0.1 and σ2((t0,𝖺,t1,𝖺,t3),)=𝓋(𝓅)=0.1. We observe that the projection is not a complete strategy as is the only available action in t3 for 2. Moreover, the projection is not memoryless, because, for example, σ2((t0,𝖺,t2,𝖼,t4),𝖼)=𝓋(𝓅)=0.1 is not equal to σ2((t0,𝖺,t1,𝖺,t4),𝖼)=1.

3.2 Projections for Parametric PAs

We now lift strategy projections to the parametric case. We fix the parallel composition =12 of two pPAs 1 and 2 with a common set of parameters V. Let i=1,2 and let 𝓋𝒾:𝒱 be a well-defined valuation for i. We define strategy projections for pPAs in terms of the instantiated PAs.

Definition 16 (Strategy Projection for pPA).

The projection of a strategy σStr𝑝𝑟𝑡 to pPA i w.r.t. 𝓋1,𝓋2 is the strategy σi𝓋1,𝓋2Stri𝑝𝑟𝑡, defined by σi𝓋1,𝓋2=σi1[𝓋1]2[𝓋2].

If the valuations coincide, i.e., 𝓋1=𝓋2=𝓋, we write σi𝓋 instead of σi𝓋1,𝓋2. Strategy projections depend on the parameter instantiations as the following example illustrates. Such strategies are also referred to as (parameter) dependent strategies [49, Def. 2.6].

Example 17 (Strategy Projection for pPA).

Consider 12 from Figure 2 and the strategy σ as in Example 15. Let 𝓋1 and 𝓋2 be the valuations used for 1 and 2, respectively, with 𝓋1(𝓅)=𝓋1(𝓆)=0.1, and 𝓋2(𝓅)=𝓋2(𝓆)=0.9. For the projection σ2𝓋1,𝓋2 to 2, the following values are obtained:

  • σ2𝓋1,𝓋2(t0,𝖺)=1

  • σ2𝓋1,𝓋2((t0,𝖺,t2),𝖼)=𝓋1(𝓅)𝓋2(𝓅)𝓋2(𝓅)=𝓋1(𝓅)=0.1

  • σ2𝓋1,𝓋2((t0,𝖺,t2,𝖼,t3),)=𝓋1(𝓅)𝓋2(𝓅)110𝓋2(𝓅)110=𝓋1(𝓅)=0.1,

  • σ2𝓋1,𝓋2((t0,𝖺,t1),𝖺)=𝓋1(𝓅)=0.1, and

  • σ2𝓋1,𝓋2((t0,𝖺,t1,𝖺,t3),)=𝓋1(𝓅)=0.1.

Note that the resulting projection coincides with the one computed in Example 15, where both components were instantiated using 𝓋1, i.e., σ2𝓋1,𝓋2=σ2𝓋1=σ2𝓋1,𝓋1.

The next lemma states that – when restricting to valuations that yield the same non-zero transitions – the strategy projection to i only depends on the parameter instantiation applied to 3i. This observation is the key insight for the correctness of the proof rule in Theorem 41, which enables compositional reasoning about monotonicity.

Lemma 18.

For i=1,2, and well-defined valuations 𝓋𝒾,𝓋𝒾:𝒱 for i such that 𝐏i(si,αi,si)[𝓋𝒾]=0 iff 𝐏i(si,αi,si)[𝓋𝒾]=0 we have: σ1𝓋1,𝓋2=σ1𝓋1,𝓋2 and σ2𝓋1,𝓋2=σ2𝓋1,𝓋2.

4 Verification Objectives for pPAs

We define properties of interest for pPA verification. Let Σ be a finite alphabet. Σ=ΣΣω denotes the set of all finite and infinite words over Σ. For a word ρ=𝖺0,𝖺1,Σ and another alphabet Σ^, let ρΣ^Σ^ denote the projection of ρ onto Σ^ – obtained by dropping all 𝖺iΣΣ^ from ρ. The restriction ρΣ^ can be finite, even if ρ is infinite.

We fix a pPA =(S,s𝑖𝑛𝑖𝑡,V,𝐴𝑐𝑡,𝐏,L). The trace of π=s0,α0,s1,α1,Pathsinf is the sequence 𝑡𝑟(π)=L(s0,α0),L(s1,α1), of transition labels. The probability of a language Σ at a well-defined valuation 𝓋 under strategy σ of is given by

Pr𝓋,σ()=Pr𝓋,σ({πPathsinf𝑡𝑟(π)Σ}).

We also consider (parametric) expected total reward properties. Let V be a set of parameters. A reward function :Σ[V]0 over Σ assigns a (potentially parametric) reward to each symbol 𝖺Σ. Instantiation of at a valuation 𝓋:𝒱 yields [𝓋] with [𝓋](𝖺)=(𝖺)[𝓋] for all 𝖺Σ. Valuation 𝓋 is well-defined for if [𝓋]:Σ0. In this case, the accumulated reward for a word ρ=𝖺0,𝖺1,Σ is given by [𝓋](ρ)=𝒾=0|ρ|[𝓋](𝖺𝒾)0{}.

When applied to a pPA , a reward function assigns the reward (L(s,α)) to the enabled state-action-pairs (s,α)𝑑𝑜𝑚(𝐏) with L(s,α)Σ. For a well-defined valuation 𝓋 for and , we define the expected total reward under strategy σ as

Ex𝓋,σ()=πPathsinf[𝓋](𝑡𝑟(π)Σ)𝒹𝒫𝓇𝓋,σ(π).

We consider probabilistic and reward-based objectives as well as their multi-objective combinations.

Definition 19 (Objectives).

For {>,,<,}, p[0,1], and r0, we denote

  • a probabilistic objective over Σ by p() and

  • a reward objective over :Σ[V]0 by 𝔼r().

Their satisfaction for a well-defined valuation 𝓋 and strategy σ is defined by

,𝓋,σ𝓅()𝒫𝓇𝓋,σ()𝓅 and,𝓋,σ𝔼𝓇()𝓍𝓋,σ()𝓇.

Let φ{p(),𝔼r()} refer to a (probabilistic or reward) objective. If neither nor φ consider any parameters, we may drop the valuation from the notation and just write ,σφ. We lift the satisfaction relation to regions, i.e., sets of valuations.

Definition 20 (Region Satisfaction Relation).

Let {𝑝𝑟𝑡,𝑐𝑚𝑝}{𝑓𝑎𝑖𝑟𝒞𝒞2Σ}. For objective φ and well-defined region R for – and if φ=𝔼r() – the region satisfaction relation is given by:

,Rφ𝓋:σ𝒮𝓉𝓇:,𝓋,σφ.

Satisfaction under memoryless strategies – denoted by 𝑚𝑙𝑒𝑠𝑠, – is defined similarly.

 Remark 21.

For {𝑝𝑟𝑡,𝑐𝑚𝑝} and any well-defined valuation 𝓋 we have Str[𝓋]=Str. Thus, for well-defined R, we can swap the quantifiers in Definition 20:

,RφσStr:𝓋:,𝓋,σφ.

However, this is not the case for fair strategies and regions that are not graph-preserving: A strategy that is not 𝑓𝑎𝑖𝑟𝒞 for (under graph-preserving instantiations) might be 𝑓𝑎𝑖𝑟𝒞 for [𝓋] if 𝓋 is not graph-preserving, because states that violate the fairness condition might not be reachable in [𝓋]. For a graph-preserving region R and all 𝓋, we have Str𝑓𝑎𝑖𝑟𝒞=Str[𝓋]𝑓𝑎𝑖𝑟𝒞. Thus, we can swap quantifiers as above.

Our framework also handles conjunctions of multiple objectives.

Definition 22 (MO-Query).

A multi-objective query (mo-query) is a set X={φ,1,φ}n of n probabilistic or reward objectives with ,𝓋,σX,𝓋,σφ𝒾 for all φiX.

The conjunction of two mo-queries is a union of sets: X1X2=X1X2. We lift objective satisfaction for regions (Definition 20) to mo-queries in a straightforward way.

 Remark 23.

In [38] it is shown that model checking under partial strategies in for probabilistic properties, rewards, and multi-objective queries reduces to model checking under complete strategies in a modified pPA, denoted τ. This result extends [35, Proposition 2] to pPA while preserving memorylessness of the strategies.

We consider safety objectives as a special type of probabilistic objectives.

Definition 24 (Safety Objective).

p() is a safety objective444Note that safety objectives contain all finite prefixes of words in , i.e., they are prefix-closed. This is different in [35], where only infinite words are considered, leading to technical problems. See [38]. if can be characterized by a DFA 𝒜bad accepting a language of finite words (bad prefixes):

={wΣno prefix of w is accepted by 𝒜bad}.

A mo-query is called safe, denoted X𝑠𝑎𝑓𝑒, if each φi is a probabilistic safety objective.

For PA, computing the probability for a safety objective reduces to maximal reachability properties in the PA-DFA product [35, Lemma 1]. This result can be lifted to pPA in a straightforward manner; see [38]. For reachability and safety objectives, it is equivalent to quantify over complete or partial strategies. Lemma 25 lifts [35, Proposition 1] to pPA.

Lemma 25.

Let be a pPA, let R be a well-defined region and let p() be a safety objective for . It holds that: ,R𝑐𝑚𝑝p(),R𝑝𝑟𝑡p(). Same for 𝑚𝑙𝑒𝑠𝑠,.

4.1 Preservation Under Projection

We generalize the result from [35, Lemma 3] – originally stated in [46, Lemma 7.2.6] – to the parametric setting. In particular, we show that probabilistic and reward properties in a composed pPA =12 under a strategy σ are preserved when projecting to either component i over Σi, assuming a well-defined valuation 𝓋.

Theorem 26.

For i=1,2, let be a language over Σi and be a reward function over Σi. Then, for a well-defined valuation 𝓋:

Pri𝓋,σ𝒾𝓋()=Pr12𝓋,σ() and Exi𝓋,σ𝒾𝓋()=Ex12𝓋,σ()
Example 27.

Let ={w{𝖺,𝖼,}i:wi=} be the language of words in which occurs. Reconsider the strategy σ of 12 from Example 17 and the projection σ2𝓋 to 2. We have Pr12𝓋,σ()=Pr2𝓋,σ2𝓋()=(𝓋(𝓅))2110+𝓋(𝓅)(1𝓋(𝓅))𝓋(𝓆)).

Theorem 26 assumes that the property only involves action labels from a single component i. To allow objectives over arbitrary alphabets Σ, we can add a self-loop labeled 𝖺 at every state, for each label 𝖺Σi.

Definition 28 (Alphabet Extension).

Let =(S,s𝑖𝑛𝑖𝑡,V,𝐴𝑐𝑡,𝐏,L) be a pPA over Σ and let Σ be an alphabet with 𝐴𝑐𝑡(ΣΣ)=. The alphabet extension of with respect to Σ is the pPA Σ=(S,s𝑖𝑛𝑖𝑡,V,𝐴𝑐𝑡Γ(ΣΣ),𝐏Σ,LΣ) over alphabet ΣΣ, where

  • 𝐏Σ(s,α)=𝐏(s,α) and LΣ(s,α)=L(s,α) for all (s,α)𝑑𝑜𝑚(𝐏) and

  • 𝐏Σ(s,𝖺)=𝟙s and LΣ(s,𝖺)=𝖺 for all sS and 𝖺ΣΣ.

Figure 3: Alphabet extension 2{𝖺,𝖻} of the pPA 2 from Figure 1(b) to the alphabet {𝖺,𝖻}.
Example 29 (Alphabet Extension).

Figure 3 shows 2{𝖺,𝖻} for pPA 2 over Σ2={𝖺,𝖼,} from Figure 1(b). Transitions with label 𝖺 remain unchanged as 𝖺Σ2, but an additional self-loop with action 𝖻Σ2 is added to every state.

We now lift [35, Lemma 3] to the parametric setting, covering properties and mo-queries over an alphabet that is not necessarily shared by i:

Theorem 30.

Let ΣΣ12, and σ be a strategy for 1Σ2Σ. Let be a language over Σ and be a reward function over Σ. Then, for well-defined valuation 𝓋:

PriΣ𝓋,σ𝒾𝓋()=Pr1Σ2Σ𝓋,σ() and ExiΣ𝓋,σ𝒾𝓋()=Ex1Σ2Σ𝓋,σ()

Let X be a mo-query over Σ. Then, for any well-defined valuation 𝓋:

iΣ,𝓋,σ𝒾𝓋X(1Σ2Σ),𝓋,σX
 Remark 31.

Since alphabet extensions add self-loop transitions for new labels, and thus do not change the system’s state, the pPAs 1Σ2Σ and 12 satisfy the same properties and mo-queries over the alphabet ΣΣ12.

Theorems 26 and 30 play a key role in the proof of the AG framework for reasoning about mo-queries and monotonicity, which will be established in Sections 5 and 6.

5 Assume-Guarantee Reasoning for pPA

Kwiatkowska et al. [35] introduced assume-guarantee (AG) reasoning proof rules for PA. This section extends their proof rules to the parametric setting. We first generalize the concept of AG triples to pPAs in Section 5.1. Then, we extend the asymmetric and circular proof rule in Section 5.2. Additional proof rules from [35] are presented in [38].

5.1 Assume-Guarantee Triples for pPA

We extend compositional reasoning to the parametric setting by generalizing assume-guarantee (AG) triples. Intuitively, an AG triple states that if a component satisfies an assumption, it also satisfies the guarantee under the same strategy and valuation.

Definition 32 (AG Triple).

The assume-guarantee triple for , (parametric) mo-queries A (assumption) and G (guarantee), well-defined region R, and {𝑐𝑚𝑝,𝑝𝑟𝑡,𝑓𝑎𝑖𝑟𝒞} is

,RAG (𝓋:σ𝒮𝓉𝓇[𝓋]:,𝓋,σA,𝓋,σG)

5.2 Assume-Guarantee Rules for pPA

We present AG proof rules for the compositional verification of parametric probabilistic automata (pPAs). In the remainder of this section, we fix two pPAs 1 and 2 with alphabets Σ1, and Σ2, respectively. Further, let Ri be a well-defined region for i.

First, we establish the asymmetric proof rule for safety and mo-queries – based on [35, Theorem 1 and 2], respectively – for pPA.

Theorem 33 (Asymmetric Rule).

Let A and G be mo-queries over ΣAΣ1 and ΣGΣ2ΣA, respectively. Let 𝒞12Σ1 and 𝒞22Σ2ΣA. Then, the two proof rules holds:

1,R1𝑐𝑚𝑝A𝑠𝑎𝑓𝑒2ΣA𝑠𝑎𝑓𝑒,R2𝑝𝑟𝑡A𝑠𝑎𝑓𝑒G𝑠𝑎𝑓𝑒12,R1R2𝑐𝑚𝑝G𝑠𝑎𝑓𝑒 1,R1𝑓𝑎𝑖𝑟𝒞1A2ΣA,R2𝑓𝑎𝑖𝑟𝒞2AG12,R1R2𝑓𝑎𝑖𝑟𝒞1𝒞2G

Proof sketch.

Let 𝓋12, and σ be a strategy for the composed pPA 12. To prove validity of the rule, we need to show that 12 instantiated with 𝓋 satisfies G𝑠𝑎𝑓𝑒.

  1. 1.

    Since 𝓋1, the first premise implies 1,𝓋𝑐𝑚𝑝A𝑠𝑎𝑓𝑒, which is equivalent to 1,𝓋𝑝𝑟𝑡A𝑠𝑎𝑓𝑒 by Lemma 25. This implies that 1 under the partial strategy σ1𝓋 also satisfies A𝑠𝑎𝑓𝑒. Since strategies and their projections satisfy the same properties (as shown in Theorem 30), we conclude that 12 instantiated at 𝓋 under the strategy σ satisfies A𝑠𝑎𝑓𝑒.

  2. 2.

    As 𝓋2, the second premise implies that 2[𝓋] under the strategy σ2𝓋 satisfies G𝑠𝑎𝑓𝑒. Again, Theorem 30 implies that (12)[𝓋] under the strategy σ satisfies G𝑠𝑎𝑓𝑒.

Thus, we conclude that 12 instantiated at 𝓋 under σ satisfies G𝑠𝑎𝑓𝑒. The rule on the right holds by a similar reasoning, where, in addition, Lemma 14 is used to establish that projections of fair strategies remain fair.

Example 34 (Asymmetric Rule).

We illustrate the left proof rule from Theorem 33 for the pPA 12 in Figure 2 – composed of the pPAs 1 and 2 depicted in Figure 1 – and w.r.t. G=0.8(G), where G={w{𝖺,𝖻,𝖼,}|w|=0}. Let A={0.9(A)}, where A={w{𝖺,𝖻}|w|𝖺1}. The pPA 2{𝖺,𝖻} is depicted in Figure 3. For the premises of the proof rule, we obtain that the (largest) region R for which 1,R1𝑐𝑚𝑝0.9(A) is R1={𝓋:{𝓅,𝓆}𝓋(𝓅)[0,0.1]} and the (largest) region R2 for which 2{𝖺,𝖻},R2𝑝𝑟𝑡AG holds, is R={𝓋:{𝓅,𝓆}(𝓋(𝓅)[0,0.5],𝓋(𝓆)[0,1])(𝓋(𝓅)(0.5,1),𝓋(𝓆)[0,22𝓅])}. The intersection R1R2 – for which 12,R1R2𝑝𝑟𝑡G holds by [38, Theorem 52] – contains all valuations with 𝓋(𝓅)[0,0.1],𝓋(𝓆)[0,1]. The (largest) region R for which 12,R𝑝𝑟𝑡G is R={𝓋:𝓅,𝓆(𝓋(𝓅)([0,14]{1}),𝓋(𝓆)[0,1])(𝓋(𝓅)(14,1),𝓋(𝓆)[0,𝓅+15𝓅])}. This satisfies (R1R2)R.

The proof rules in Theorem 33 can be extended to systems with more than two components, as detailed in [38, Theorem 52]. Next, we lift the circular proof rule given in [35, Theorem 5] to pPAs:

Theorem 35 (Circular Rule).

Let A1,A2 and G be (parametric) mo-queries over ΣA1Σ2, ΣA2Σ1ΣA1 and ΣGΣ2ΣA2, respectively. Let 𝒞i2ΣiΣAi for i{1,2}, and 𝒞32Σ2. Then:

1ΣA1𝑠𝑎𝑓𝑒,R1𝑝𝑟𝑡A1𝑠𝑎𝑓𝑒A2𝑠𝑎𝑓𝑒2ΣA2𝑠𝑎𝑓𝑒,R2𝑝𝑟𝑡A2𝑠𝑎𝑓𝑒G𝑠𝑎𝑓𝑒2,R3𝑐𝑚𝑝A1𝑠𝑎𝑓𝑒12,R1R2R3𝑐𝑚𝑝G𝑠𝑎𝑓𝑒    1ΣA1,R1𝑓𝑎𝑖𝑟𝒞1A1A22ΣA2,R2𝑓𝑎𝑖𝑟𝒞2A2G2,R3𝑓𝑎𝑖𝑟𝒞3A112,R1R2R3𝑓𝑎𝑖𝑟𝒞1𝒞2𝒞3G

Proof sketch.

Similar to Theorem 33, the proof of the circular rules makes use of Theorem 30, which establishes that the composition under a strategy satisfies the same properties as the individual components under their corresponding projections. For safety, Lemma 25 allows us to verify the condition for complete strategies rather than partial strategies in the third premise. For fairness, Lemma 14 ensures that strategy projections remain fair.

 Remark 36.

The inclusion of fairness in the premises of the right rules in Theorem 33 and Theorem 35 enables recursive application and thus supports the compositional verification of systems with more than two components. In the case of a single application of one of the rules, it is sufficient to verify with respect to complete strategies, which, while a stronger condition, simplifies the verification process.

6 Compositional Reasoning about Monotonicity

Exploiting monotonicity can significantly enhance the efficiency of parameter synthesis [51]. However, determining monotonicity is computationally hard555For deterministic pPA (Markov chains) determining monotonicity is coETR-hard [49, Sec. 3.4]. and it would be beneficial to determine monotonicity in a compositional way. Additionally, monotonicity in composed pPA is challenging due to the complexities introduced by parameter dependencies and interactions among components. While we focus on global monotonicity, the following results can be extended to local monotonicity, which considers only the first transition from a given state. See [49, Definitions 4.4 and 4.5].

The probability of a language or the expected total reward for a pPA can be viewed as a function – called solution function – that maps a well-defined parameter valuation to the corresponding probability or expected total reward, respectively [27, Definition 4.7].

Definition 37 (Solution Function).

Let be a pPA over Σ, let σStr and let R be a well-defined region. The solution function for and language Σ is sol,σPr():R[0,1], where sol,σPr()(𝓋)=𝒫𝓇𝓋,σ(). The solution function for and a reward function over Σ is sol,σEx():R0, where sol,σEx()(𝓋)=𝓍𝓋,σ().

When referring to a solution function without specifying whether it pertains to probabilities or expected rewards, we simply write sol,σ.

Example 38 (Solution Function).

Consider the pPA 12 in Figure 2 and the region R={𝓋:{𝓅,𝓆}[0,1]} which is well-defined for 12. Let ={w{𝖺,𝖼,}|w|=0} be the language of words over {𝖺,𝖻,𝖼,} that do not contain . Let σ be the complete strategy of 12 from Example 17, which always selects action 𝖺,𝖼 or with probability 1 whenever any of them is enabled; otherwise, it chooses 𝖻 with probability 1. The solution function sol12,σPr():R[0,1] is defined by sol12,σPr()(p,q)=1(p2110+p(1p)(pq+(1p)q))=1(p2110+(pp2)q).

We extend the standard notion of monotonicity [49] by differentiating between different strategy classes, including complete, partial, and fair strategies.

Definition 39 (Monotonicity).

Let σ be a strategy of . A solution function sol,σ is monotonic increasing in pV on region R – denoted sol,σp,R – if for all 𝓋,𝓋+ with 𝓋+(𝓆)=𝓋(𝓆)+𝓍𝓅=𝓆 for qV and some x0, we have: sol,σ(𝓋)sol,σ(𝓋+).

For {𝑝𝑟𝑡,𝑐𝑚𝑝}, we write solp,R if sol,σp,R for all σStr. If R is graph-preserving, we write solp,R𝑓𝑎𝑖𝑟𝒞 if sol,σp,R holds for all fair strategies σStr[𝓋]𝑓𝑎𝑖𝑟𝒞, 𝓋.
Notations sol,σp,R and solp,R for monotonic decreasing sol,σ are defined analogously.

We require the region to be graph-preserving when defining monotonicity w.r.t. fair strategies. This ensures that for any two valuations, 𝓋,𝓋+, we have Str[𝓋]𝑓𝑎𝑖𝑟𝒞=Str[𝓋+]𝑓𝑎𝑖𝑟𝒞; see Proposition 10.

 Remark 40.

Monotonicity for partial strategies w.r.t. general properties is equivalent to monotonicity for complete strategies in a modified pPA; see [38].

The following theorem states that monotonicity of a composed system can be verified by analyzing its individual components.

Theorem 41 (Monotonicity).

Let 1, 2 be pPAs with alphabets Σ1 and Σ2 and Ri be a graph-preserving region for i. Let sol{solPr(),solEx()} be a solution function w.r.t. the language or reward function over Σ(Σ1Σ2) and let {,}. Let 𝒞i2Σ1Σ. Then the following two proof rules hold:

   sol1Σp,R1𝑝𝑟𝑡sol2Σp,R2𝑝𝑟𝑡sol12p,R1R2𝑝𝑟𝑡    sol1Σp,R1𝑓𝑎𝑖𝑟𝒞1sol2Σp,R2𝑓𝑎𝑖𝑟𝒞2sol12p,R1R2𝑓𝑎𝑖𝑟𝒞1𝒞2

Proof.

We show the premises imply sol1Σ2Σp,R1R2 for {𝑝𝑟𝑡,𝑓𝑎𝑖𝑟𝒞1𝒞2}, which directly implies that sol12p,R1R2 holds, see Remark 31. We focus on the left rule, i.e., =𝑝𝑟𝑡.

 Remark 42.

The proof for =𝑓𝑎𝑖𝑟𝒞1𝒞2 is similar but additionally requires Lemma 14 in [38, Appendix A.4].

We further consider =. The case = follows analogously. Our proof is by contradiction. Assume that the premises hold but sol1Σ2Σp,R1R2 does not hold. Thus, there is a strategy σStr(1Σ2Σ) and valuations 𝓋,𝓋+12 with 𝓋+(𝓆)=𝓋(𝓆)+𝓍𝓅=𝓆 for qV and some x0 and

sol(1Σ2Σ),σ(𝓋)>sol(1Σ2Σ),σ(𝓋+). (1)

Theorem 30 yields sol(1Σ2Σ),σ(𝓋)=sol1Σ,σ1𝓋,𝓋(𝓋). We have 𝐏1Σ(s,α,s)[𝓋]=0 iff 𝐏1Σ(s,α,s)[𝓋+]=0 as 𝓋 and 𝓋+ are graph preserving for 1. Thus, we can apply Lemma 18 and obtain

sol1Σ,σ1𝓋,𝓋(𝓋) =sol1Σ,σ1𝓋+,𝓋(𝓋) (by Lemma 18)
sol1Σ,σ1𝓋+,𝓋(𝓋+) ( σ1𝓋+,𝓋Str1Σ𝑝𝑟𝑡, sol1Σp,R1𝑝𝑟𝑡)
=sol(1Σ2Σ[𝓋]),σ(𝓋+) (by Theorem 30)

We observe that

(1Σ2Σ[𝓋])[𝓋+]=(1Σ[𝓋+]2Σ[𝓋])=(1Σ[𝓋+]2Σ)[𝓋].

Consequently, sol(1Σ2Σ[𝓋]),σ(𝓋+)=sol(1Σ[𝓋+]2Σ,σ(𝓋). By a similar reasoning as above, we obtain

sol(1Σ[𝓋+]2Σ),σ(𝓋) =sol2Σ,σ2𝓋+,𝓋(𝓋) (by Theorem 30)
sol2Σ,σ2𝓋+,𝓋(𝓋+) ( σ2𝓋+,𝓋Str2Σ𝑝𝑟𝑡, sol2Σp,R2𝑝𝑟𝑡)
=sol2Σ,σ2𝓋+,𝓋+(𝓋+) (by Lemma 18 )
=sol(1Σ2Σ),σ(𝓋+) (by Theorem 30)

Thus, sol(1Σ2Σ),σ(𝓋)sol(1Σ2Σ),σ(𝓋+), violating Equation 1.

Example 43.

Reconsider the pPA 12 in Figure 2, the region R={𝓋:{𝓅,𝓆}[0,1]}, and the language ={w{a,c,}|w|=0} from Example 38. The pPA 12 is composed of the pPAs 1 and 2 shown in Figure 1. The region R is well-defined for 1 and 2. We check whether sol12Pr() is monotonic in q on R via Theorem 41. Since the premises soliΣPr()q,R𝑝𝑟𝑡 for i{1,2} are satisfied, we conclude sol12Pr()q,R𝑝𝑟𝑡.

7 Related Work

Compositional verification has been widely studied in both probabilistic and non-probabilistic systems. We summarize key contributions related to our work.

Jones’ rely-guarantee method [26] and Pnueli’s compositional proof system [44] for temporal logic laid the foundation for AG reasoning. Subsequent work focused on AG rules for systems using CTL [12] and developed AG reasoning for reactive modules [25, 1]. Automated AG reasoning techniques – developed by Pasareanu et al. [13, 41] – include learning-based assumption generation. More recent work has focused on circular AG reasoning [16] and verification-repair approaches [22].

AG reasoning has been lifted to probabilistic settings. Initial work by de Alfaro et al. [15] introduced AG rules for a probabilistic extension of reactive modules [25, 1]. Their model is similar to PA [47, 46], but limited to synchronous composition.

Kwiatkowska et al. [34, 21] generalized AG verification for PA, allowing more flexible parallel compositions and extending AG reasoning to probabilistic safety properties. Their approach reduces AG verification to multi-objective model checking, as proposed by Etessami et al. [17]. This was further refined in [35], enabling AG reasoning over a broader class of quantitative properties, including conjunctions over probabilistic liveness and expected rewards. Algorithmic learning-based assumption generation techniques [13, 23] were later adapted for AG reasoning in probabilistic settings [18, 19, 36]. Other assumption generation approaches include abstraction-refinement methods [32, 10], based on the CEGAR paradigm [11], and symbolic learning-based methods [24, 5]. AG reasoning has been applied to various real-world domains, including service-based workflow verification [6], large-scale IT systems [7], and autonomous systems with deep neural networks [42, 43].

AG reasoning has also been extended to systems with uncertainty, for example, [55] introduced an AG framework for verifying systems with components modeled by MDPs and partially observable MDPs (POMDPs). In contrast, our work considers a different type of uncertainty; We extend AG reasoning to parametric probabilistic automata (PA), leveraging research on parametric MDPs [27, 45, 28] and previous AG verification techniques [35]. Our framework allows to reason about monotonicity [49, 50, 51] in a compositional manner. To the best of our knowledge, this the first AG-based compositional verification framework for parametric PA. Existing modular proof systems have focused on parametric timed automata [2] or non-probabilistic parameterized systems [4, 48, 39], where concurrent programs are parameterized by the number of processes or threads in a configured instance.

Another recent line of research focuses on the sequential composition of MDPs rather than parallel decomposition: Junges and Spaan [30] introduced an abstraction-refinement approach for hierarchical probabilistic models, leveraging parametric MDPs to represent sets of similar subroutines. Recent work by Watanabe et al. [53] on mean-payoff games, applies category-theoretic string diagrams to the verification of sequentially composed MDPs.

8 Conclusion

We presented an assume-guarantee framework for compositional verification of parametric probabilistic automata, building on the proof rules for Segala’s PA by Kwiatkowska et al. [35]. In addition, we introduced new compositional proof rules to reason about monotonicity in composed systems. These contributions lay the theoretical foundations for modular verification of pPA. To the best of our knowledge, these are the first AG proof rules for probabilistic models with parametric transition probabilities.

Future work involves implementing the framework and demonstrating its effectiveness through case studies. Another direction is to deduce additional assume-guarantee rules – for example, reasoning about robust valuations or strategies, i.e, properties of the form: 𝓋:σ𝒮𝓉𝓇:[𝓋],σX. Additionally, interesting directions include the modular verification of other properties, such as long-run average rewards or expected visiting times [37]. Other areas include extending verification to logics such as parametric LTL [9] and probabilistic CTL. Further research could also explore Markov automata with parameters, building on preliminary work in modular reasoning for continuous-time and continuous-space models [8]. Another interesting direction is adapting assume-guarantee reasoning for stochastic games [54] to a parametric setting.

References

  • [1] Rajeev Alur and Thomas A. Henzinger. Reactive modules. Formal Methods Syst. Des., 15(1):7–48, 1999. doi:10.1023/A:1008739929481.
  • [2] Lacramioara Astefanoaei, Saddek Bensalem, Marius Bozga, Chih-Hong Cheng, and Harald Ruess. Compositional parameter synthesis. In John S. Fitzgerald, Constance L. Heitmeyer, Stefania Gnesi, and Anna Philippou, editors, FM 2016: Formal Methods - 21st International Symposium, Limassol, Cyprus, November 9-11, 2016, Proceedings, volume 9995 of Lecture Notes in Computer Science, pages 60–68, 2016. doi:10.1007/978-3-319-48989-6_4.
  • [3] Christel Baier and Joost-Pieter Katoen. Principles of model checking. MIT Press, 2008.
  • [4] Samik Basu and C. R. Ramakrishnan. Compositional analysis for verification of parameterized systems. Theor. Comput. Sci., 354(2):211–229, 2006. doi:10.1016/J.TCS.2005.11.016.
  • [5] Redouane Bouchekir and Mohand Cherif Boukala. Toward implicit learning for the compositional verification of Markov decision processes. In Mohamed Faouzi Atig, Saddek Bensalem, Simon Bliudze, and Bruno Monsuez, editors, Verification and Evaluation of Computer and Communication Systems - 12th International Conference, VECoS 2018, Grenoble, France, September 26-28, 2018, Proceedings, volume 11181 of Lecture Notes in Computer Science, pages 200–217. Springer, 2018. doi:10.1007/978-3-030-00359-3_13.
  • [6] Redouane Bouchekir, Saïda Boukhedouma, and Mohand Cherif Boukala. Automatic compositional verification of probabilistic safety properties for inter-organisational workflow processes. In Yuri Merkuryev, Tuncer I. Ören, and Mohammad S. Obaidat, editors, Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2016), Lisbon, Portugal, July 29-31, 2016, pages 244–253. SciTePress, 2016. doi:10.5220/0005978602440253.
  • [7] Radu Calinescu, Shinji Kikuchi, and Kenneth Johnson. Compositional reverification of probabilistic safety properties for large-scale complex IT systems. In Radu Calinescu and David Garlan, editors, Large-Scale Complex IT Systems. Development, Operation and Management - 17th Monterey Workshop 2012, Oxford, UK, March 19-21, 2012, Revised Selected Papers, volume 7539 of Lecture Notes in Computer Science, pages 303–329. Springer, 2012. doi:10.1007/978-3-642-34059-8_16.
  • [8] Luca Cardelli, Kim G. Larsen, and Radu Mardare. Modular Markovian logic. In Luca Aceto, Monika Henzinger, and Jirí Sgall, editors, Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part II, volume 6756 of Lecture Notes in Computer Science, pages 380–391. Springer, 2011. doi:10.1007/978-3-642-22012-8_30.
  • [9] Souymodip Chakraborty and Joost-Pieter Katoen. Parametric LTL on Markov chains. In Josep Díaz, Ivan Lanese, and Davide Sangiorgi, editors, Theoretical Computer Science - 8th IFIP TC 1/WG 2.2 International Conference, TCS 2014, Rome, Italy, September 1-3, 2014. Proceedings, volume 8705 of Lecture Notes in Computer Science, pages 207–221. Springer, 2014. doi:10.1007/978-3-662-44602-7_17.
  • [10] Krishnendu Chatterjee, Martin Chmelik, and Przemyslaw Daca. CEGAR for compositional analysis of qualitative properties in Markov decision processes. Formal Methods Syst. Des., 47(2):230–264, 2015. doi:10.1007/S10703-015-0235-2.
  • [11] Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, and Helmut Veith. Counterexample-guided abstraction refinement. In E. Allen Emerson and A. Prasad Sistla, editors, Computer Aided Verification, 12th International Conference, CAV 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings, volume 1855 of Lecture Notes in Computer Science, pages 154–169. Springer, 2000. doi:10.1007/10722167_15.
  • [12] Edmund M. Clarke, David E. Long, and Kenneth L. McMillan. Compositional model checking. In Proceedings of the Fourth Annual Symposium on Logic in Computer Science (LICS ’89), Pacific Grove, California, USA, June 5-8, 1989, pages 353–362. IEEE Computer Society, 1989. doi:10.1109/LICS.1989.39190.
  • [13] Jamieson M. Cobleigh, Dimitra Giannakopoulou, and Corina S. Pasareanu. Learning assumptions for compositional verification. In Hubert Garavel and John Hatcliff, editors, Tools and Algorithms for the Construction and Analysis of Systems, 9th International Conference, TACAS 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings, volume 2619 of Lecture Notes in Computer Science, pages 331–346. Springer, 2003. doi:10.1007/3-540-36577-X_24.
  • [14] Conrado Daws. Symbolic and parametric model checking of discrete-time Markov chains. In ICTAC, volume 3407 of Lecture Notes in Computer Science, pages 280–294. Springer, 2004. doi:10.1007/978-3-540-31862-0_21.
  • [15] Luca de Alfaro, Thomas A. Henzinger, and Ranjit Jhala. Compositional methods for probabilistic systems. In Kim Guldstrand Larsen and Mogens Nielsen, editors, CONCUR 2001 - Concurrency Theory, 12th International Conference, Aalborg, Denmark, August 20-25, 2001, Proceedings, volume 2154 of Lecture Notes in Computer Science, pages 351–365. Springer, 2001. doi:10.1007/3-540-44685-0_24.
  • [16] Karam Abd Elkader, Orna Grumberg, Corina S. Pasareanu, and Sharon Shoham. Automated circular assume-guarantee reasoning. Formal Aspects Comput., 30(5):571–595, 2018. doi:10.1007/S00165-017-0436-0.
  • [17] Kousha Etessami, Marta Z. Kwiatkowska, Moshe Y. Vardi, and Mihalis Yannakakis. Multi-objective model checking of Markov decision processes. Log. Methods Comput. Sci., 4(4), 2008. doi:10.2168/LMCS-4(4:8)2008.
  • [18] Lu Feng, Marta Z. Kwiatkowska, and David Parker. Compositional verification of probabilistic systems using learning. In QEST 2010, Seventh International Conference on the Quantitative Evaluation of Systems, Williamsburg, Virginia, USA, 15-18 September 2010, pages 133–142. IEEE Computer Society, 2010. doi:10.1109/QEST.2010.24.
  • [19] Lu Feng, Marta Z. Kwiatkowska, and David Parker. Automated learning of probabilistic assumptions for compositional reasoning. In Dimitra Giannakopoulou and Fernando Orejas, editors, Fundamental Approaches to Software Engineering - 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26-April 3, 2011. Proceedings, volume 6603 of Lecture Notes in Computer Science, pages 2–17. Springer, 2011. doi:10.1007/978-3-642-19811-3_2.
  • [20] Lu Feng, Clemens Wiltsche, Laura R. Humphrey, and Ufuk Topcu. Controller synthesis for autonomous systems interacting with human operators. In ICCPS, pages 70–79. ACM, 2015. doi:10.1145/2735960.2735973.
  • [21] Vojtech Forejt, Marta Z. Kwiatkowska, Gethin Norman, and David Parker. Automated verification techniques for probabilistic systems. In Marco Bernardo and Valérie Issarny, editors, Formal Methods for Eternal Networked Software Systems - 11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011, Bertinoro, Italy, June 13-18, 2011. Advanced Lectures, volume 6659 of Lecture Notes in Computer Science, pages 53–113. Springer, 2011. doi:10.1007/978-3-642-21455-4_3.
  • [22] Hadar Frenkel, Orna Grumberg, Corina S. Pasareanu, and Sarai Sheinvald. Assume, guarantee or repair: a regular framework for non regular properties. Int. J. Softw. Tools Technol. Transf., 24(5):667–689, 2022. doi:10.1007/S10009-022-00669-9.
  • [23] Anubhav Gupta, Kenneth L. McMillan, and Zhaohui Fu. Automated assumption generation for compositional verification. Formal Methods Syst. Des., 32(3):285–301, 2008. doi:10.1007/S10703-008-0050-0.
  • [24] Fei He, Xiaowei Gao, Miaofei Wang, Bow-Yaw Wang, and Lijun Zhang. Learning weighted assumptions for compositional verification of Markov decision processes. ACM Trans. Softw. Eng. Methodol., 25(3):21:1–21:39, 2016. doi:10.1145/2907943.
  • [25] Thomas A. Henzinger, Shaz Qadeer, and Sriram K. Rajamani. You assume, we guarantee: Methodology and case studies. In Alan J. Hu and Moshe Y. Vardi, editors, Computer Aided Verification, 10th International Conference, CAV ’98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings, volume 1427 of Lecture Notes in Computer Science, pages 440–451. Springer, 1998. doi:10.1007/BFB0028765.
  • [26] Cliff B. Jones. Tentative steps toward a development method for interfering programs. ACM Trans. Program. Lang. Syst., 5(4):596–619, 1983. doi:10.1145/69575.69577.
  • [27] Sebastian Junges. Parameter synthesis in Markov models. PhD thesis, RWTH Aachen University, Germany, 2020. URL: https://publications.rwth-aachen.de/record/783179.
  • [28] Sebastian Junges, Erika Ábrahám, Christian Hensel, Nils Jansen, Joost-Pieter Katoen, Tim Quatmann, and Matthias Volk. Parameter synthesis for Markov models: covering the parameter space. Formal Methods Syst. Des., 62(1):181–259, 2024. doi:10.1007/S10703-023-00442-X.
  • [29] Sebastian Junges, Joost-Pieter Katoen, Guillermo A. Pérez, and Tobias Winkler. The complexity of reachability in parametric Markov decision processes. J. Comput. Syst. Sci., 119:183–210, 2021. doi:10.1016/J.JCSS.2021.02.006.
  • [30] Sebastian Junges and Matthijs T. J. Spaan. Abstraction-refinement for hierarchical probabilistic models. In Sharon Shoham and Yakir Vizel, editors, Computer Aided Verification - 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I, volume 13371 of Lecture Notes in Computer Science, pages 102–123. Springer, 2022. doi:10.1007/978-3-031-13185-1_6.
  • [31] Joost-Pieter Katoen. The probabilistic model checking landscape. In LICS, pages 31–45. ACM, 2016. doi:10.1145/2933575.2934574.
  • [32] Anvesh Komuravelli, Corina S. Pasareanu, and Edmund M. Clarke. Assume-guarantee abstraction refinement for probabilistic systems. In P. Madhusudan and Sanjit A. Seshia, editors, Computer Aided Verification - 24th International Conference, CAV 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, volume 7358 of Lecture Notes in Computer Science, pages 310–326. Springer, 2012. doi:10.1007/978-3-642-31424-7_25.
  • [33] Marta Z. Kwiatkowska, Gethin Norman, and David Parker. Using probabilistic model checking in systems biology. SIGMETRICS Perform. Evaluation Rev., 35(4):14–21, 2008. doi:10.1145/1364644.1364651.
  • [34] Marta Z. Kwiatkowska, Gethin Norman, David Parker, and Hongyang Qu. Assume-guarantee verification for probabilistic systems. In Javier Esparza and Rupak Majumdar, editors, Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, TACAS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings, volume 6015 of Lecture Notes in Computer Science, pages 23–37. Springer, 2010. doi:10.1007/978-3-642-12002-2_3.
  • [35] Marta Z. Kwiatkowska, Gethin Norman, David Parker, and Hongyang Qu. Compositional probabilistic verification through multi-objective model checking. Inf. Comput., 232:38–65, 2013. doi:10.1016/J.IC.2013.10.001.
  • [36] Rui Li and Yang Liu. Compositional stochastic model checking probabilistic automata via symmetric assume-guarantee rule. In 17th IEEE International Conference on Software Engineering Research, Management and Applications, SERA 2019, Honolulu, HI, USA, May 29-31, 2019, pages 110–115. IEEE, 2019. doi:10.1109/SERA.2019.8886808.
  • [37] Hannah Mertens, Joost-Pieter Katoen, Tim Quatmann, and Tobias Winkler. Accurately computing expected visiting times and stationary distributions in Markov chains. In Bernd Finkbeiner and Laura Kovács, editors, Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part II, volume 14571 of Lecture Notes in Computer Science, pages 237–257. Springer, 2024. doi:10.1007/978-3-031-57249-4_12.
  • [38] Hannah Mertens, Tim Quatmann, and Joost-Pieter Katoen. Compositional reasoning for parametric probabilistic automata, 2025. arXiv:2506.08525.
  • [39] Kedar S. Namjoshi and Richard J. Trefler. Parameterized compositional model checking. In Marsha Chechik and Jean-François Raskin, editors, Tools and Algorithms for the Construction and Analysis of Systems - 22nd International Conference, TACAS 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, volume 9636 of Lecture Notes in Computer Science, pages 589–606. Springer, 2016. doi:10.1007/978-3-662-49674-9_39.
  • [40] Gethin Norman and Vitaly Shmatikov. Analysis of probabilistic contract signing. J. Comput. Secur., 14(6):561–589, 2006. doi:10.3233/jcs-2006-14604.
  • [41] Corina S. Pasareanu, Dimitra Giannakopoulou, Mihaela Gheorghiu Bobaru, Jamieson M. Cobleigh, and Howard Barringer. Learning to divide and conquer: applying the L* algorithm to automate assume-guarantee reasoning. Formal Methods Syst. Des., 32(3):175–205, 2008. doi:10.1007/S10703-008-0049-6.
  • [42] Corina S. Pasareanu, Divya Gopinath, and Huafeng Yu. Compositional verification for autonomous systems with deep learning components. CoRR, abs/1810.08303, 2018. arXiv:1810.08303.
  • [43] Corina S. Pasareanu, Ravi Mangal, Divya Gopinath, and Huafeng Yu. Assumption generation for learning-enabled autonomous systems. In Panagiotis Katsaros and Laura Nenzi, editors, Runtime Verification - 23rd International Conference, RV 2023, Thessaloniki, Greece, October 3-6, 2023, Proceedings, volume 14245 of Lecture Notes in Computer Science, pages 3–22. Springer, 2023. doi:10.1007/978-3-031-44267-4_1.
  • [44] Amir Pnueli. In transition from global to modular temporal reasoning about programs. In Krzysztof R. Apt, editor, Logics and Models of Concurrent Systems - Conference proceedings, Colle-sur-Loup (near Nice), France, 8-19 October 1984, volume 13 of NATO ASI Series, pages 123–144. Springer, 1984. doi:10.1007/978-3-642-82453-1_5.
  • [45] Tim Quatmann, Christian Dehnert, Nils Jansen, Sebastian Junges, and Joost-Pieter Katoen. Parameter synthesis for Markov models: Faster than ever. In Cyrille Artho, Axel Legay, and Doron Peled, editors, Automated Technology for Verification and Analysis - 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings, volume 9938 of Lecture Notes in Computer Science, pages 50–67, 2016. doi:10.1007/978-3-319-46520-3_4.
  • [46] Roberto Segala. Modeling and verification of randomized distributed real-time systems. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 1995. URL: https://hdl.handle.net/1721.1/36560.
  • [47] Roberto Segala and Nancy A. Lynch. Probabilistic simulations for probabilistic processes. Nord. J. Comput., 2(2):250–273, 1995.
  • [48] Antti Siirtola and Keijo Heljanko. Parametrised compositional verification with multiple process and data types. In Josep Carmona, Mihai T. Lazarescu, and Marta Pietkiewicz-Koutny, editors, 13th International Conference on Application of Concurrency to System Design, ACSD 2013, Barcelona, Spain, 8-10 July, 2013, pages 60–69. IEEE Computer Society, 2013. doi:10.1109/ACSD.2013.9.
  • [49] Jip Spel. Monotonicity in Markov models. PhD thesis, RWTH Aachen University, Germany, 2023. URL: https://publications.rwth-aachen.de/record/974903.
  • [50] Jip Spel, Sebastian Junges, and Joost-Pieter Katoen. Are parametric Markov chains monotonic? In Yu-Fang Chen, Chih-Hong Cheng, and Javier Esparza, editors, Automated Technology for Verification and Analysis - 17th International Symposium, ATVA 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings, volume 11781 of Lecture Notes in Computer Science, pages 479–496. Springer, 2019. doi:10.1007/978-3-030-31784-3_28.
  • [51] Jip Spel, Sebastian Junges, and Joost-Pieter Katoen. Finding provably optimal Markov chains. In Jan Friso Groote and Kim Guldstrand Larsen, editors, Tools and Algorithms for the Construction and Analysis of Systems - 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 - April 1, 2021, Proceedings, Part I, volume 12651 of Lecture Notes in Computer Science, pages 173–190. Springer, 2021. doi:10.1007/978-3-030-72016-2_10.
  • [52] Mariëlle Stoelinga. An introduction to probabilistic automata. Bull. EATCS, 78:176–198, 2002.
  • [53] Kazuki Watanabe, Clovis Eberhart, Kazuyuki Asada, and Ichiro Hasuo. Compositional solution of mean payoff games by string diagrams. In Nils Jansen, Sebastian Junges, Benjamin Lucien Kaminski, Christoph Matheja, Thomas Noll, Tim Quatmann, Mariëlle Stoelinga, and Matthias Volk, editors, Principles of Verification: Cycling the Probabilistic Landscape - Essays Dedicated to Joost-Pieter Katoen on the Occasion of His 60th Birthday, Part III, volume 15262 of Lecture Notes in Computer Science, pages 423–445. Springer, 2024. doi:10.1007/978-3-031-75778-5_20.
  • [54] Clemens Wiltsche. Assume-guarantee strategy synthesis for stochastic games. PhD thesis, University of Oxford, UK, 2015. URL: https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.719857.
  • [55] Xiaobin Zhang, Bo Wu, and Hai Lin. Assume-guarantee reasoning framework for MDP-POMDP. In 55th IEEE Conference on Decision and Control, CDC 2016, Las Vegas, NV, USA, December 12-14, 2016, pages 795–800. IEEE, 2016. doi:10.1109/CDC.2016.7798365.