Introduction Phased mission system (PMS) consists of consecutive, non-overlapping time periods, called phases during which the system conguration, suc
|
|
- Horatio Webb
- 5 years ago
- Views:
Transcription
1 A BDD-Based Algorithm for Reliability Evaluation of Phased Mission System Xinyu Zang, Hairong Sun and Kishor S. Trivedi fxzang, hairong, Center for Advanced Computing and Communications Department of Electrical and Computer Engineering Duke University Durham, NC 2778 Abstract In this paper, a new algorithm based on Binary Decision Diagram (BDD) for reliability evaluation of Phased Mission System (PMS) is proposed. This algorithm uses phase algebra to deal with the dependence among the phases, and a new BDD operation is proposed to incorporate the phase algebra. Due to the nature of BDD, cancelation of common components among the phases can be combined with the BDD generation without additional operations, and the sum of disjoint products (SDP) can be implicitly represented by the nal BDD, so that it can avoid huge storage for large number of SDPs. Several examples and experiments show the eciency of this algorithm. This paper also presents the expression for the transient behavior of PMS when the failure function of components are general rather than exponential. Index Terms: Phased Mission System (PMS), Reliability Evaluation, Transient Analysis, Fault Trees, Binary Decision Diagram (BDD) This research was supported in part by the National Science Foundation under Grant No. EEC948765, and by the Department of Defense as an enhancement project to the Center for Advanced Computing and Communications in Duke University.
2 Introduction Phased mission system (PMS) consists of consecutive, non-overlapping time periods, called phases during which the system conguration, success criteria, and component behavior may vary from phase to phase. Many practical systems are actually phased mission systems, e.g., the voyage of an aircraft can be divided into several phases, such as take o, cruise and landing, each with completely dierent reliability requirements and behaviors. Compared with single phased systems, the reliability evaluation of PMS is much more complex, because of the dependence across the phases. For instance, the state of a component at the beginning of a new phase is identical to its state at the end of the previous phase[]. The dynamic structure and conguration of the PMS usually requires a distinct model for each phase, which also increases the complexity of modeling and analysis. Although reliability evaluation of PMS has been studied for more than twenty years, the size of problems that can be solved is still very small due to the high computational complexity of the methods for the evaluation of PMS. Generally, there are two classes of models to address PMS problems: Markov chain based models [,, 9, 4, 2, 2, 5, 22, 3] and combinatorial models [23,, 6, 2, 6, 2]. The main idea of Markov chain based models is to directly or indirectly (e.g., starting with a Petri Net) construct a Markov chain to represent the system behavior. These models at once take into account of the dependence among the components within a phase and the dependence across phases. However, the Markov chain based models suer from state explosion problem especially when the number of components becomes large. The assumption of combinatorial models for PMS is that all the components in system are independent. This assumption can simplify the analysis, however limits the application of the models because the dependence does exists in some PMSs. Special methods have 2
3 to be used to address the dependence across phases. In [], Esary and Ziehms introduced a method which can deal with the dependence across phases, i.e., using a series of independent mini-components to replace the component in each phase. However, this method causes the size of the problem to become very large as the number of phases increases. Cancelation method was introduced by Pedar and Sarma in [6], which, however, needs additional calculation on mincuts. In [23], Somani and Trivedi used phase algebra to address such dependence. Based on this, Ma and Trivedi [2] combined the idea of phase algebra with cancelation method, but still needed to obtain the sum of disjoint product (SDP) explicitly. As the number of components becomes large, the number of SDPs also increases rapidly, which subsequently increases the amount of storage and computation time. The computational complexity of combinatorial models is much less than that of Markov chain based models. However, these models normally need to nd mincuts of systems and calculate the sum of disjoint products, which is still computationally-intensive. Binary Decision Diagrams (BDD) were, at rst, used in VLSI design and verication as an ecient method to manipulate Boolean expressions [5, 4]. Bryant [5] and other researchers have shown that, in most cases, BDDs use less memory to represent large Boolean expressions than representing them explicitly. Because BDDs are based on Shannon's decomposition, reliability expression is easily from the BDD format. Several researchers have used BDD to do reliability analysis for fault trees [7, 7, 8, 9, 8]. In this paper, a new algorithm for PMS based on BDD is proposed. As in [23], this algorithm uses phase algebra to deal with the dependence across phases. The nature of BDD ensures that the cancelation of components from an earlier phase when it is accounted in a later phase is automatic and does not increas any extra computations. The nal BDD of the system can represent the SDPs implicitly, avoiding the huge storage for large number 3
4 of SDPs. Thus there is considerable reduction in computing and storage requirements over the earlier approaches. The paper is organized as follows. Section 2 presents some preliminary concepts, such BDD, phase algebra, etc. Section 3 presents our PMS algorithm based on BDDs. Several examples are provided in Section 4 to show the eciency of the algorithm. Section 5 presents the advantage of BDD algorithm by comparison with other approaches. The last section gives the conclusion and future work. 2 Preliminary concepts 2. Binary Decision Diagrams (BDD) In [5], Bryant gave the basic denitions for BDD (also known as function graph). A subset of general BDD, reduced ordered binary decision diagrams (ROBDD) were introduced as ecient means to manipulate the Boolean expressions. Several researchers [7, 7, 8] applied BDD to reliability evaluation for fault trees. Here we will review some basic concepts of BDD. 2.. Shannon's decomposition and ite format Theorem Shannon's Decomposition: let f be a Boolean expression on X, and x be a variable of X, then, f = x f x= + x f x= () where f evaluated in x = v is denoted by f x=v. 4
5 Shannon's decomposition is the basis of using BDD. In order to express Shannon's decomposition concisely, the If-Then-Else (ite) format is dened as: f = ite(x; F ; F 2 ) = x F + x F 2 (2) where F = f x= and F 2 = f x= BDD A BDD is a directed acyclic graph (DAG) that is based on Shannon's decomposition. The graph has two sink nodes, labeled and, representing the two corresponding constant and. Each non-sink node is labeled with a Boolean variable x and has two outgoing edges that represent the two corresponding expressions in the Shannon's decomposition. These two edges are called -edge (or else-edge) and -edge (or then-edge). The node linked by -edge represents the Boolean expression when x =, i.e., f x= in Eqn. (), while the node linked by -edge represents the Boolean expression when x =, i.e., f x= in Eqn. (). Thus, each non-sink node in BDD encodes an ite format. Obviously, one of the key feature of BDD is the disjoint nature of the two subexpressions. An ordered binary decision diagram (OBDD) is a BDD with the constraint that the variables are ordered and every source to sink path in the OBDD visits the variables in ascending order. A reduced ordered binary decision diagram (ROBDD) is an OBDD where each node represents a distinct Boolean expression. In practice, ROBDDs are widely used. Actually, to generate a ROBDD, the ordering of the variables has to be selected rst and this order of variables is not changed during the generation. In this paper, we denote x i < x j as variable x j is behind variable x i in the order of variables. Fig. shows the ROBDD for several Boolean expressions. We do not consider the dynamic reordering of BDD in this paper 5
6 G b a G2 c H c a H2 b (a) g = a c + b c (b) h = a b + c Figure : BDD representation of Boolean expressions 2..3 Manipulation of BDDs BDDs represent Boolean expressions graphically. The manipulation of BDDs using logical operations is very easy. For instance, consider a logic operation AN D on two Boolean expressions g and h. We rst generate two BDDs for g and h respectively using the same ordering of variables. We assume that the rst variable is common to g and h. Let this common variable be denoted by x,. Using Eqn. (2), the ite formats of the expressions are g = ite(x; g x= ; g x= ) = ite(x; G ; G 2 ) The g + h represented by ite format will be: h = ite(x; h x= ; h x= ) = ite(x; H ; H 2 ) ite(x; G ; G 2 ) + ite(x; H ; H 2 ) = g + h 6
7 a G+H G2+H2 a b b REDUCE b +H G2+H H+G2 +G2 c c c Figure 2: OR operation of two BDDs 7
8 = ite(x; (g + h) x= ; (g + h) x= ) = ite(x; (g x= + h x= ); (g x= + h x= )) = ite(x; (G + H ); (G 2 + H 2 )) (3) The recursive method can be used for G + H and G 2 + H 2 till one of them becomes a constant expression, or, or they do not have the rst variable in common. Next we assume h does not have variable x, but has variable y, and x < y in order of variables. The ite formats of the expressions are The g + h represented by ite format will be: g = ite(x; g x= ; g x= ) = ite(x; G ; G 2 ) h = ite(y; h y= ; h y= ) = ite(y; H ; H 2 ) ite(x; G ; G 2 ) + ite(y; H ; H 2 ) = g + h = ite(x; (g + h) x= ; (g + h) x= ) = ite(x; (g x= + h); (g x= + h)) = ite(x; (G + h); (G 2 + h)) (4) In the above example, we used OR operation, but any other logical operation can be used and the only dierence is to use the dierent truth tables when one of the operands becomes constant expression. Actually, in practice, the BDD is generated by using logical operations on variables rather than using Shannon's decomposition directly. Fig. 2 shows the OR operation of two Boolean expressions in Fig.. Note that two reductions are made \on-the-y" while carrying out the operation: 8
9 Because the result of +H and G2+H is the same, node b at left becomes irrelevant and can be removed. Because the -edge of node b at right is linked to the same subtree as the -edge of node a(the node b at left is reduced), these two subtrees can be reduced to a single one. 2.2 Failure function of a component in a specic phase As stated in Section, the dependence across phases for a given component increases the complexity of reliability analysis for PMS. Esary and Ziehms [] introduced a method to deal with such dependence, i.e., by using a series of independent mini-components to replace the component in a specic phase. For instance, a component A in phase j can be replaced by a system of mini-components a, a 2,, a j in series. Fig 3 shows the reliability block diagram (RBD) and fault tree (FT) format of Esary's solution. The component A is operational in phase j if and only if it functioned in all previous phases. In [23], the failure function of component A in phase j, i.e., F A;j (t) was given assuming the failure function is exponential. We wprovide here F A;j (t) when the failure function is general. Let p A;i (t) be the failure function of mini-component a i, dened as: 8 >< P [X A (t) = ] i = p A;i (t) = >: P [X A (t + T i?) = j X A (T i?) = ] < i j where T i is the duration time of phase i. Because all a i ; i = ; 2; : : : ; j are in series, the failure function for component A in phase j is given by: 9
10 Aj Aj a a2 aj a a a 2 j Figure 3: RBD and FT format of Esary's solution Lemma j? Y F A;j (t) =? ( (? p A;i (T i )))(? p A;j (t)) i= j? Y j? Y = (? (? p A;i (T i ))) + ( (? p A;i (T i )))p A;j (t) (5) i= Here time t is measured from the beginning of phase j so that t T k. T i represents the duration for phase i. The rst term in Exp. (5) represents the probability that component has already failed in the previous phases (phase ; 2; : : : ; j? ). The second term represents the failure probability distribution of the component in phase j. The time origin for phase j is reinitialized to the beginning of the phase. Exp. (5) can be used to study the transient behavior of the phased mission system. i=
11 Failure Failure Failure A B C A B C A B C Phase X Phase Y Phase Z Figure 4: System conguration in three phases 2.3 Phase algebra In [], after replacing the component A by a series system of independent mini-components a, a 2, and a i, a new equivalent system is formed by subsystems in series. In [], it is shown that the ordinary reliability of this equivalent system is the same as the phasedmission reliability of the original system. Consider a simple example: Example : The system has three phases X, Y and Z whose congurations are shown in Fig. 4 in FT format. The equivalent system is shown in Fig. 5. Let A = (or A = ) mean that component A has failed and A = mean that component A is operational. Using this notation, we can use Boolean expression to describe the failure combinations for each phase. Let E i denote the Boolean expression specifying the failure combinations for phase i, the system unreliability is then given by: n[ UR = P [ E i ] (6) i= As in [23], we use a variable A i whose failure function is F A;i in Exp. (5) to represent behavior of component A in phase i. Because the dependence exists among A i
12 Failure a b c a a 2 b b 2 c c 2 a a 2 a 3 b b b c c c Figure 5: Equivalent system for the end of mission (i = ; 2; : : : ; j? ), special treatment is needed for the combination terms which contain more than one A i ; i n. Phase algebra can be used to deal with this. Let i and j be two phases (i < j). The rules of phase algebra are listed in Table. Twocombinations, A iaj and Ai + A j, are not given in [23]. The rst combination, i.e., A iaj, means that component A is operational until the end of phase i and then fails sometime during phase j. The probability of this term is iy jy P (A iaj ) = ( (? p A;k (T k )))(? (? p A;k (T k ))) = k= iy (? p A;k (T k ))? k=i+ (? p A;k (T k )) k= k= = F A;i (T i )? F A;j (T j ) = P (A i )? P (A j ) (7) The second term, i.e., Ai + A j, has no physical meaning. 2 jy
13 A i A j! A j Ai + Aj! Aj A i Aj! Ai A i + A j! A i A i A j! A i + Aj! Table : Rules of phase algebra Note that the phase algebra rules are to be applied to variables belonging to the same component. The ordinary Boolean relations still hold for the variables representing dierent components. Note also that the variables such as A i and B j are independent. 3 BDD algorithm for phased mission system 3. BDD operation for phase algebra The relations of phase algebra in Table are dierent from the ordinary logical relations. A special BDD operation should be derived for these relations. We call these BDD operations as phase dependent operations (PDO). Because BDD operations heavily depend on the order of variables, there are two classes of PDOs: forward PDO: the order of variables is the same as the phase order, i.e., A, A 2,, A n. backward PDO: the order of variables is the reverse of the phase oder, i.e., A n, A n?,, A. Let E i and E j denote the Boolean expressions specifying the failure combinations for phases i and j (i < j), respectively, and assume Ai exists in E i and Aj exists in E j. Using 3
14 ite format, E i and E j can be written as: E i = ite( Ai ; (E i ) Ai = ; (E i) Ai =) = ite( Ai ; G ; G 2 ) E j = ite( Aj ; (E j ) Aj = ; (E j) Aj =) = ite( Aj ; H ; H 2 ) We use to denote logical operations AND or OR. Lemma 2 For the forward PDO, ite( Ai ; G ; G 2 ) ite( Aj ; H ; H 2 ) = ite( Ai ; G H ; G 2 E j ) (8) Proof: Because component A must be in failed state in phase j if it has already failed in phase i, i.e., Ai = implies Aj =, hence 2 ite( Ai ; G ; G 2 ) ite( Aj ; H ; H 2 ) = E i E j = ite( Ai ; (E i E j ) Ai = ; (E i E j ) Ai = ) = ite( Ai ; (E i ) Ai = (E j) Aj = ; (E i) Ai = (E j) Ai = ) = ite( Ai ; G H ; G 2 E j ) (9) Lemma 3 For the backward PDO, ite( Ai ; G ; G 2 ) ite( Aj ; H ; H 2 ) = ite( Aj ; E i H ; G 2 H 2 ) () Proof: Because component A must be operational in phase i if it is operational in phase j, i.e., Aj = implies Ai =, hence ite( Ai ; G ; G 2 ) ite( Aj ; H ; H 2 ) = E i E j = ite( Aj ; (E i E j ) Aj = ; (E i E j ) Aj = ) = ite( Aj ; (E i ) Aj = (E j) Aj = ; (E i) Ai = (E j) Aj =) = ite( Aj ; E i H ; G 2 H 2 ) () 4
15 2 Fig 6 shows the algorithm for the forward and backward PDO. The function of the computed-table and unique-table are explained in [4]. 3.2 Ordering strategy The order of variables is very important for BDD generation. The size of BDD (the number of nodes in BDD) heavily depends on the order. But the problem of computing an ordering that minimizes the size of BDD is itself a co NP-complete problem. The previous study showed that a set of heuristics may be used to select an adequate ordering [5]. We us heuristic H 4 [3] to decide the order of each component. After ordering the components, we replace each component with a series of variables that represent this component in each phase. As stated in the preceeding section, there are two classes of PDO available, each one requires a specic ordering of these variables that belong to the same component. Checking the sizes of nal BDDs (shown in Fig. 7) generated by forward PDO and backward PDO, we nd that the size of BDD generated by backward PDO is smaller than that generated by forward PDO. Observing the BDD in Fig. 7(b), we note that variable A does not occur in it. This means that A is a common component which is accounted for in later phases. Therefore, if backward PDO is used to generate the BDD for PMS, the cancelation of common components can be done automatically during the generation of BDD without any additional operations. 5
16 pdo(op, F, G) { if ((F == ) or (F == ) or (G == ) or (G == )) return op(f, G) /* call to the truth table of op */ else if (cpomupted-table has entry {(op, F, G),R}) return R else { x = the top variable of F y = the top variable of G v = top of x and y if (x, y are the variables of different components) { F = F(v=), F2 = F(v=) G = G(v=), G2 = G(v=) } else if (x == v) { F = F(x=), F2 = F(x=) if (forward PDO) G = G(y=), G2 = G else G = G, G2 = G(y=) } else { if (forward PDO) F = F(x=), F2 = F else F = F, F2 = F(x=) G = G(y=), G2 = G(y=) } T = dpo(op, F, G) E = dpo(op, F2, G2) if (T == E) return T R = find_or_add_unique_table(v, T, E) insert_computed_table({(op, F, G), R}) return R } } Figure 6: Algorithm for PDO 6
17 A A 2 A 3 A 3 A 2 B B B 3 B 2 B 2 B 2 B 3 B B C C C C 3 C 2 C 2 C 3 C (a) forward PDO (b) backward PDO Figure 7: BDD generated by PDO 7
18 . Use Exp.(5) to obtain the value for each variable 2. Order components and their corresponding variables 3. Generate BDD for each phase 4. Using PDO combine these BDDs to obtain the nal BDD 5. Evaluate the nal BDD to obtain the result. Figure 8: BDD algorithm for PMS 3.3 BDD algorithm for PMS Fig. 8 gives the main procedure of reliability evaluation of PMS using BDD. First step is to order the variables using the heuristics mentioned in the preceeding section. BDDs can be generated for each phase by using ordinary logical operations. Then phase algebra and the corresponding backward PDO operation is applied to generate the nal BDD from the BDDs of each phase. Finally, an evaluation algorithm is used to obtain the unreliability of the PMS. All the procedures except evaluation algorithm are discussed in the preceding sections. Now we will present an evaluation algorithm which deals with the dependence among the variables that belong to the same component. Fig. 9 shows the details of the evaluation algorithm. Observing the BDD generated by backward PDO, we see that the -edge always links two variables that belong to dierent components. But for the -edge, there are two cases which need to be evaluated dierently: the -edge linking the variables of dierent components and the -edge linking the variables of the same component. 8
19 Prob(G) { if (G == ) return else if (G == ) return else if (computed-table has entry {G, P_G}) return P_G else { /* G = ite(x, G, G2), G = ite(y, H, H2) */ P_G = Prob(G), P_G2 = Prob(G2) if (x, y are variables of different components) P_G = P_G + ( - P(x)) * (P_G2 - P_G) else P_G = P_G + ( - P(x)) * (P_G2 - Prob(H2)) } insert_computed_table({g, P_G}) return P_G } Figure 9: Algorithm for evaluation of BDD of PMS For the -edge linking the variables of dierent components, it is the same as the ordinary BDD. Ordinary evaluation method for BDD can be used as: G = ite( Aj ; G ; G 2 ) = Aj G + A j G 2 P (G) = P (ite( Aj ; G ; G 2 )) = P ( Aj G + A j G 2 ) = P ( Aj )P (G ) + P (A j )P (G 2 ) = P (G ) + (? P ( Aj ))(P (G 2 )? P (G )) (2) For the -edge linking the variables of the same component, because A i and A j are not independent, a special treatment is needed for this case: G = ite( Aj ; G ; G 2 ) = Aj G + A j G 2 9
20 G = ite( Ai ; H ; H 2 ) = Ai H + A i H 2 P (G) = P (ite( Aj ; G ; G 2 )) = P ( Aj G + A i G 2 ) = P ( Aj ( Ai H + A i H 2 )) + P (A j )P (G 2 ) = P ( Aj Ai H + Aj A i H 2 ) + (? P ( Aj ))P (G 2 ) (3) According to rules of phase algebra A i = Aj Ai and We can obtain A i = A j + A i = A j + Aj A i P (G ) = P ( Ai H + A i H 2 ) = P ( Aj Ai H + ( Aj A i + A j )H 2 ) = P (A j H 2 ) + P ( Aj Ai H + Aj A i H 2 ) therefore, P ( Aj Ai H + Aj A i H 2 ) = P (G )? P (A j H 2 ) = P (G )? (? P ( Aj ))P (H 2 ) (4) Substituting Exp. (4) to Exp. (3), we have P (G) = P (G )? (? P ( Aj ))P (H 2 ) + (? P ( Aj ))P (G 2 ) = P (G ) + (? P ( Ai ))(P (G 2 )? P (H 2 )) (5) 2
21 Therefore, according to the type of the variables linked by -edge, Exp. (2) or Exp. (5) is chosen to evaluate each node in BDD. The probability of the root node of the nal BDD gives the unreliability of the PMS. 3.4 Transient analysis Transient analysis refers to reliability of PMS at any time during the mission. Let t be the time point at which the reliability of a system is considered. Assume the system has completed phase i? (i.e., P i? k= T k < t, where T k is the duration of phase k), and is in phase i. Using the same algorithm in preceeding section and Exp.(5), we can generate the BDD of PMS upto phase i and evaluate its unreliability at time t. In [2], latent failures were dened to address the upwards change in the unreliability value at the phase transition time which corresponds the case that some of the success states in phase i may be failed states in phase i +. It should be noted that the time point t might happen to be the phase transition time, i.e., t = P i? k= T k. In this case, we evaluate the unreliability: at t?, i.e., the system being at the end of the phase i?. at t +, i.e., the system being at the beginning of the phase i. 4 Examples Example 2: In Example, the phase order is X Y Z. The BDDs for the other ve permutations, i.e., X Z Y, Y X Z, Y Z X, Z X Y, Z Y X, are shown in Fig.. We assume that the durations of all the three phases are hours each and the failure rate of each component is :/hour. The unreliability of six permutations is listed in Table 2. Note 2
22 Perm t = t = ()? t = () + t = (2)? t = (2) + t = 3 X Y Z.e e e e e e-3 X Z Y.e e e e e e-3 Y X Z.e+.4987e e e e e-3 Y Z X.e+.4987e e-3.56e e e-3 Z X Y.e e e e e e-3 Z Y X.e e-.4987e e e e-3 Table 2: Unreliability of six permutations in Example 2 that there are some latent failures at the phase transition times. For example, at t = and t = 2 in permutation Z Y X, there are jumps in the unreliability function. Example 3: Modifying the space application in [5], we get an example whose mission alternates between operational phases Launch, Asteroid, Comet, with Hibernation phases. There are four types of equipments: La and Lb: only needed for Launch, at least one of them should be functional during the Launch phase. Aa and Ab: only needed for Asteroid, at least one of them should be functional during the Asteroid phase. Ca and Cb: only needed for Comet, at least one of them should be functional during the Comet phase. Ha, Hb, Hc, Hd: Ha and Hb work during all phases, and Hc and Hd only work during the operational phases. During the operational phases, at least three of them should be functional, and during the hibernation phases, at least one of them should be functional. The system conguration is shown in Fig. (a). The BDD of the system at the end of 22
23 A 3 A 3 A 2 B 3 B 3 B B 2 B 2 C 3 C 3 C C 2 (a) X Z Y (b) Y X Z A 3 B 3 A 3 B 2 A 3 B 3 C 3 B 3 C 3 C 2 C 3 (c) Y Z X (d) Z X Y (e) Z Y X Figure : BDD of ve permutations of phase X, Y and Z 23
24 Phase Name Launch Hibern Asteroid Hibern2 Comet Duration(Hours) Failure rate of Lx.5 Failure rate of Ax. Failure rate of Cx. Failure rate of Hx..... Table 3: System parameters in Example 3 the mission is shown in Fig. (b). The failure rate of each equipment is listed in Table 3. The unreliability of the system during the mission, i.e., the transient behavior, is shown in Fig. 2. From this gure, we can also observe that there are latent failures at some phase transition points, i.e., at the transition from Hibern2 to Comet, and at the transition from Hibern to Asteriod (which is insignicant). At the other transition points, no latent failure occurs. 5 Advantages of BDD algorithm for PMS As seen in preceeding sections, BDDs have some advantages in reliability evaluation of PMS: Cancelation can be done automatically by backward PDO without additional operations. In most cases, the sizes of nal BDDs are not very large. Because BDD is based on Shannon's Decomposition, the evaluation of nal BDD is easy and fast. Let n be the number of nodes in the nal BDD, the evaluation procedure only needs n multiplications and 2n additions. 24
25 Failure Failure 2/4 Ha Hb Ca 5 Ha Hb Hc Hd La Lb Phase 2: Hibern. Cb 5 Phase : Launch Failure Failure Ha 5 Hb 5 Hb 5 2/4 Ha Hb Hc 5 Hc 5 Ha Hb Hc Hd Aa Ab Phase 4: Hibern.2 Hd 5 Phase 3: Asteroid Failure Aa 3 Ab 3 2/4 La Ha Hb Hc Hd Ca Cb Lb Phase 5: Comet (a) System conguration (b) BDD representation Figure : System conguration and its BDD represtation 25
26 .2. Operational Phase Non Operational Phase.8 Unreliability Time (hours) x 4 Figure 2: Unreliability of space application 26
27 Mission Name Phase Number Mission Conguration M 2 Phase A, Phase E M 2 3 Phase A, Phase B, Phase E M 3 4 Phase A, Phase B, Phase C, Phase E M 4 5 Phase A, Phase B, Phase C, Phase D, Phase E Table 4: Mission conguration In this section, we will give some experimental results to show the eciency of our algorithm. At least in one case 2 we also provide a comparison with the MT algorithm in [2]. The latter is based on an MVI SDP method of solving fault trees. Consider a system consists of 7 groups of components and each group has n components, some system congurations are shown in Fig. 3 and Fig. 4, and the mission congurations are listed in Table 4. We vary the value of n from 2 to 5 amd obtain the experimental results shown in Table 5. 6 Conclusion We presented a BDD-based algorithm for reliability evaluation of phased mission systems. Phase dependent operations were developed for BDD to realize the phase algebra, and a special evaluation procedure was proposed for these phase dependent BDDs. Due to the natures of BDD, this algorithm is more ecient than the algorithm based on SDP method in both computation time and storage space, which makes it possible for us to study some practically large phased mission systems. 2 For the case n = 2 and mission M, the MT algorithm needed :59 seconds and produced 232 disjoint phase products 27
28 Failure x, x,n x2, x2,n x3, x3,n x4, x4,n x5, x5,n x6, x6,n x7, x7,n Phase A Failure x, x,n x x x x x x x x x x x x 2, 2,n 3, 3,n 4, 4,n 5, 5,n 6, 6,n 7, 7,n Phase B Failure x, x,n x2, x2,n x3, x3,n x4, x4,n x5, x5,n x6, x6,n x 7, x 7,n Phase C Figure 3: System conguration 28
29 Failure x, x,n x x x x x x x x x x x x 2, 2,n 3, 3,n 4, 4,n 5, 5,n 6, 6,n 7, 7,n Phase D Failure x, x,n x x 2, 2,n x x 3, 3,n x x 4, 4,n x x 5, 5,n x x 6, 6,n x x 7, 7,n Phase E Figure 4: System conguration (continued) 29
30 n Mission # of Nodes Time(s) M M 2 7. M M M M 2 4. M M M M M M M M M M Table 5: Experimental results 3
31 References [] M. Alam and U.M. Al-Saggaf. Quantitative reliability evaluation of repairable phasedmission systems using markov approach. IEEE Transaction on Reliability, R-35(5):498{ 53, 986. [2] J. Arlat, T. Eliasson, K. Kanoun, D. Noyes, D. Powell, and J. Torin. Evaluation of fault-tolerant data handling systems for spacecraft: Measures, techniques and example applications. Technical Report 86.32, LAAS-CNRS, 986. [3] A. Bondavalli, I. Mura, and M. Nelli. Analytical modeling and evaluation of phasedmission systems for space applications. Proceedings IEEE High-Assurance System Engineering Workshop (HASE-97), Bethesda, Maryland, 997. [4] K. Brace, R. Rudell, and R. Bryant. Ecient implementation of a bdd package. Proc. 27th ACM/IEEE Design Automation Conference, pages 4{45, 99. [5] R. Bryant. Graph based algorithms for boolean function manipulation. IEEE Transactions on Computer, 35(8):677{69, 987. [6] G. R. Burdick, J.B. Fussel, D.M. Rasmussen, and J.R. Wilson. Phased mission analysis: A review of new developments and an application. IEEE Transaction on Reliability, 26():43{49, 977. [7] O. Coudert and J.C. Madre. Metaprime: An interactive fault-tree analyzer. IEEE Transactions on Reliability, 43():2{27,
32 [8] S.A. Doyle and J.B. Dugan. Dependability assessment using binary decision diagrams. Proc. 25th International Symposium on Fault-Tolerant Computing, pages 249{258, 995. [9] J.B. Dugan. Automated analysis of phased-mission reliability. IEEE Transaction on Reliability, 4():45{52, 99. [] J.D. Esary and H. Ziehms. Reliability analysis of phased missions. Proc. Conference on Reliability and Fault Tree Analysis, pages 23{236, 975. [] K. Kim and K.S. Park. Phased-mission system reliability under markov environment. IEEE Transaction on Reliability, 43(2):3{39, 994. [2] Y. Ma and K.S. Trivedi. An algorithm for reliability analysis of phased-mission systems. accepted subject to revision, Reliability Engineering. [3] M.Bouissou. An ordering heuristic for building binary decision diagrams from faulttrees. Proc. 996 Annual Reliability and Maintainability Symposium, pages 28{24, 996. [4] J.F. Meyer, D.G. Furchgott, and L.T. Wu. Performability evaluation of the sift computer. Proc. 979 IEEE Fault-Tolerant Computing Symposium (FTCS-79), Madison Wisconsin, pages 43{5, 979. [5] I. Mura, A. Bondavalli, X. Zang, and K.S. Trivedi. Dependability modeling and evaluation of phased mission systems: a dspn approach. accepted, Proc. Dependable Computing for Critical Applications (DCCA) 7. [6] A. Pedar and V.V.S. Sarma. Phased-mission analysis for evaluating the eectiveness of aerospace computing systems. IEEE Transaction on Reliability, 3(5):429{437,
33 [7] A. Rauzy. New algorithms for fault tree analysis. Reliability Engineering and System Safety, 4:23{2, 993. [8] R.M. Sinnamon and J.D. Andrews. Improved accuracy in quantitative fault tree analysis. Quality and Reliability Engineering International, 3:285{292, 997. [9] R.M. Sinnamon and J.D. Andrews. Improved eciency in qualitative fault tree analysis. Quality and Reliability Engineering International, 3:293{298, 997. [2] M. Smotherman and K. Zemoudeh. A non-homogeneous markov model for phasedmission reliability analysis. IEEE Transaction on Reliability, 38(5):585{59, 989. [2] A.K. Somani. Simplied phased-mission system analysis for systems with independent component repairs. International Journal of Reliability, Quality and Safety Engineering, 4(2):67{89, 997. [22] A.K. Somani, J.A. Ritcey, and S.H.L. Au. Computationally ecient phased-mission reliability analysis for systems with variable congurations. IEEE Transaction on Reliability, 4(4):54{5, 992. [23] A.K. Somani and K.S. Trivedi. Phased-mission systems using boolean algebraic methods. Performance Evaluation Review: Proc. 994 ACM SIGMETRICS Conference, 22():98{7,
A binary decision diagram method for phased mission analysis of non-repairable systems
Loughborough University Institutional Repository binary decision diagram method for phased mission analysis of non-repairable systems This item was submitted to Loughborough University's Institutional
More informationfor Systems with Independent Component Repairs Arun K. Somani University ofwashington POBox Seattle, WA
Simplied Phased-Mission System Analysis for Systems with Independent Component Repairs Arun K. Somani Dept. of Electrical Eng., and Dept. of Computer Sci. and Eng. University ofwashington POBox 352500
More informationSafety and Reliability of Embedded Systems
(Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Mathematical Background and Algorithms Prof. Dr. Liggesmeyer, 0 Content Definitions of Terms Introduction to Combinatorics General
More informationA ternary decision diagram method to calculate the component contributions to the failure of systems undergoing phased missions
73 A ternary decision diagram method to calculate the component contributions to the failure of systems undergoing phased missions J D Andrews Department of Aeronautical and Automotive Engineering, Loughborough
More informationReliability Analysis of k-out-of-n Systems with Phased- Mission Requirements
International Journal of Performability Engineering, Vol. 7, No. 6, November 2011, pp. 604-609. RAMS Consultants Printed in India Reliability Analysis of k-out-of-n Systems with Phased- Mission Requirements
More informationBinary Decision Diagrams
Binary Decision Diagrams Logic Circuits Design Seminars WS2010/2011, Lecture 2 Ing. Petr Fišer, Ph.D. Department of Digital Design Faculty of Information Technology Czech Technical University in Prague
More informationMulti-State Availability Modeling in Practice
Multi-State Availability Modeling in Practice Kishor S. Trivedi, Dong Seong Kim, Xiaoyan Yin Depart ment of Electrical and Computer Engineering, Duke University, Durham, NC 27708 USA kst@ee.duke.edu, {dk76,
More informationSafety and Reliability of Embedded Systems. (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Obscurities and Open Issues
(Sicherheit und Zuverlässigkeit eingebetteter Systeme) Fault Tree Analysis Obscurities and Open Issues Content What are Events? Examples for Problematic Event Semantics Inhibit, Enabler / Conditioning
More informationCOMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS
QUALITATIVE ANALYIS METHODS, OVERVIEW NET REDUCTION STRUCTURAL PROPERTIES COMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS LINEAR PROGRAMMING place / transition invariants state equation
More informationEECS 219C: Computer-Aided Verification Boolean Satisfiability Solving III & Binary Decision Diagrams. Sanjit A. Seshia EECS, UC Berkeley
EECS 219C: Computer-Aided Verification Boolean Satisfiability Solving III & Binary Decision Diagrams Sanjit A. Seshia EECS, UC Berkeley Acknowledgments: Lintao Zhang Announcement Project proposals due
More informationDEPTH-FIRST EVENT ORDERING IN BDD-BASED FAULT TREE ANALYSIS. Yuchang Mo, Farong Zhong, Huawen Liu. Quansheng Yang. Gang Cui
Computing and Informatics, Vol. 31, 2012, 1401 1416 DEPTH-FIRST EVENT ORDERING IN BDD-BASED FAULT TREE ANALYSIS Yuchang Mo, Farong Zhong, Huawen Liu Department of Computer Science Zhejiang Normal University
More informationAssessing system reliability through binary decision diagrams using bayesian techniques.
Loughborough University Institutional Repository Assessing system reliability through binary decision diagrams using bayesian techniques. This item was submitted to Loughborough University's Institutional
More informationBasing Decisions on Sentences in Decision Diagrams
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu
More informationBinary Decision Diagrams Boolean Functions
Binary Decision Diagrams Representation of Boolean Functions BDDs, OBDDs, ROBDDs Operations Model-Checking over BDDs 72 Boolean functions:b = {0,1}, f :B B B Boolean Functions Boolean expressions: t ::=
More informationBinary Decision Diagrams
Binary Decision Diagrams Literature Some pointers: H.R. Andersen, An Introduction to Binary Decision Diagrams, Lecture notes, Department of Information Technology, IT University of Copenhagen Tools: URL:
More informationReduced Ordered Binary Decision Diagrams
Reduced Ordered Binary Decision Diagrams Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de June 5, 2012 c JPK Switching
More informationSymbolic Model Checking with ROBDDs
Symbolic Model Checking with ROBDDs Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 14, 2016 c JPK Symbolic
More information4.1 Notation and probability review
Directed and undirected graphical models Fall 2015 Lecture 4 October 21st Lecturer: Simon Lacoste-Julien Scribe: Jaime Roquero, JieYing Wu 4.1 Notation and probability review 4.1.1 Notations Let us recall
More informationApplication of Common Cause Failure Methodology to Aviation Safety Assessment Model
Application of Common Cause Failure Methodology to Aviation Safety Assessment Model Seungwon Noh Systems Engineering and Operations Research George Mason University Fairfax, VA, USA snoh2@gmu.edu Abstract
More information1 Preliminaries We recall basic denitions. A deterministic branching program P for computing a Boolean function h n : f0; 1g n! f0; 1g is a directed a
Some Separation Problems on Randomized OBDDs Marek Karpinski Rustam Mubarakzjanov y Abstract We investigate the relationships between complexity classes of Boolean functions that are computable by polynomial
More informationA Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver
A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver J.C. Madre and O. Coudert Bull Corporate Research Center Rue Jean Jaurès 78340 Les Clayes-sous-bois FRANCE Abstract
More informationImproving the Efficiency of Dynamic Fault Tree Analysis by Considering Gate FDEP as Static
Improving the Efficiency of Dynamic Fault Tree Analysis by Considering Gate FDEP as Static Guillaume Merle, Jean-Marc Roussel, Jean-Jacques Lesage To cite this version: Guillaume Merle, Jean-Marc Roussel,
More informationKirsten Lackner Solberg. Dept. of Math. and Computer Science. Odense University, Denmark
Inference Systems for Binding Time Analysis Kirsten Lackner Solberg Dept. of Math. and Computer Science Odense University, Denmark e-mail: kls@imada.ou.dk June 21, 1993 Contents 1 Introduction 4 2 Review
More informationSpecial Classes of Fuzzy Integer Programming Models with All-Dierent Constraints
Transaction E: Industrial Engineering Vol. 16, No. 1, pp. 1{10 c Sharif University of Technology, June 2009 Special Classes of Fuzzy Integer Programming Models with All-Dierent Constraints Abstract. K.
More informationAnew index of component importance
Operations Research Letters 28 (2001) 75 79 www.elsevier.com/locate/dsw Anew index of component importance F.K. Hwang 1 Department of Applied Mathematics, National Chiao-Tung University, Hsin-Chu, Taiwan
More informationby Symbolic Spectral Analysis of Boolean Functions Politecnico di Torino Torino. ITALY 10129
Predicting the Functional Complexity of Combinational Circuits by Symbolic Spectral Analysis of Boolean Functions Enrico Macii Massimo Poncino Politecnico di Torino Dip. di Automatica e Informatica Torino.
More informationof an algorithm for automated cause-consequence diagram construction.
Loughborough University Institutional Repository Development of an algorithm for automated cause-consequence diagram construction. This item was submitted to Loughborough University's Institutional Repository
More informationRepresentations of All Solutions of Boolean Programming Problems
Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland
More informationApplication of the Cause-Consequence Diagram Method to Static Systems
Application of the ause-onsequence Diagram Method to Static Systems L.M.Ridley and J.D.Andrews Department of Mathematical Sciences Loughborough University Loughborough Leicestershire LE11 3TU Keywords:
More informationOn the Sizes of Decision Diagrams Representing the Set of All Parse Trees of a Context-free Grammar
Proceedings of Machine Learning Research vol 73:153-164, 2017 AMBN 2017 On the Sizes of Decision Diagrams Representing the Set of All Parse Trees of a Context-free Grammar Kei Amii Kyoto University Kyoto
More information13th International Conference on Relational and Algebraic Methods in Computer Science (RAMiCS 13)
13th International Conference on Relational and Algebraic Methods in Computer Science (RAMiCS 13) Relation Algebras, Matrices, and Multi-Valued Decision Diagrams Francis Atampore and Dr. Michael Winter
More informationBoolean decision diagrams and SAT-based representations
Boolean decision diagrams and SAT-based representations 4th July 200 So far we have seen Kripke Structures 2 Temporal logics (and their semantics over Kripke structures) 3 Model checking of these structures
More informationRisk Analysis of Highly-integrated Systems
Risk Analysis of Highly-integrated Systems RA II: Methods (FTA, ETA) Fault Tree Analysis (FTA) Problem description It is not possible to analyse complicated, highly-reliable or novel systems as black box
More informationFault tree analysis (FTA) is an important approach for system reliability analysis. It has been widely used in many applications and has
Research Article (wileyonlinelibrary.com) OI: 1.12/qre.1245 Published online 19 September 211 in Wiley Online Library A New Ordering Method of asic Events in Fault Tree Analysis Hong-Zhong Huang* Hua Zhang
More informationBOOLEAN ALGEBRA INTRODUCTION SUBSETS
BOOLEAN ALGEBRA M. Ragheb 1/294/2018 INTRODUCTION Modern algebra is centered around the concept of an algebraic system: A, consisting of a set of elements: ai, i=1, 2,, which are combined by a set of operations
More informationDynamic Fault Tree Analysis Based On The Structure Function
Author manuscript, published in "Annual Reliability and Maintainability Symposium 2011 (RAMS 2011), Orlando, FL : United States (2011)" Dynamic Fault Tree Analysis Based On The Structure Function Guillaume
More informationDegradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #
Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine
More informationASTRA 3.0: LOGICAL AND PROBABILISTIC ANALYSIS METHODS
ASTRA 3.: LOGICAL AND PROBABILISTIC ANALYSIS METHODS Description of the main phases and algorithms of the fault tree analysis procedure implemented in ASTRA 3. Sergio Contini and Vaidas Matuzas EUR 2452
More informationBinary decision diagrams for security protocols
for Instytut Informatyki Teoretycznej i Stosowanej Politechnika Częstochowska 4 czerwca 2012 roku 1 2 3 4 Infrastructure with Intruder Threat template 5 References BDD definition Definition An BDD G
More informationReliability analysis of static and dynamic fault-tolerant systems subject to probabilistic common-cause failures
43 Reliability analysis of static and dynamic fault-tolerant systems subject to probabilistic common-cause failures L Xing 1 *, P Boddu 1, Y Sun 2, and W Wang 3 1 University of Massachusetts Dartmouth,
More informationThe Nonapproximability of OBDD Minimization
The Nonapproximability of OBDD Minimization Detlef Sieling FB Informatik, LS II, Univ. Dortmund 44221 Dortmund, Fed. Rep. of Germany sieling@ls2.cs.uni-dortmund.de Abstract The size of Ordered Binary Decision
More informationArun K. Somani. University of Washington, Box Seattle, WA Tele: (206)
Reliability Modeling of Structured Systems: Exploring Symmetry in State-Space Generation Arun K. Somani Department of Electrical Engineering, and Department of Computer Science and Engineering University
More informationBinary Decision Diagrams and Symbolic Model Checking
Binary Decision Diagrams and Symbolic Model Checking Randy Bryant Ed Clarke Ken McMillan Allen Emerson CMU CMU Cadence U Texas http://www.cs.cmu.edu/~bryant Binary Decision Diagrams Restricted Form of
More informationThe size of decision table can be understood in terms of both cardinality of A, denoted by card (A), and the number of equivalence classes of IND (A),
Attribute Set Decomposition of Decision Tables Dominik Slezak Warsaw University Banacha 2, 02-097 Warsaw Phone: +48 (22) 658-34-49 Fax: +48 (22) 658-34-48 Email: slezak@alfa.mimuw.edu.pl ABSTRACT: Approach
More informationTitle. Citation Information Processing Letters, 112(16): Issue Date Doc URLhttp://hdl.handle.net/2115/ Type.
Title Counterexamples to the long-standing conjectur Author(s) Yoshinaka, Ryo; Kawahara, Jun; Denzumi, Shuhei Citation Information Processing Letters, 112(16): 636-6 Issue Date 2012-08-31 Doc URLhttp://hdl.handle.net/2115/50105
More informationFault Collapsing in Digital Circuits Using Fast Fault Dominance and Equivalence Analysis with SSBDDs
Fault Collapsing in Digital Circuits Using Fast Fault Dominance and Equivalence Analysis with SSBDDs Raimund Ubar, Lembit Jürimägi (&), Elmet Orasson, and Jaan Raik Department of Computer Engineering,
More informationBinary Decision Diagrams. Graphs. Boolean Functions
Binary Decision Diagrams Graphs Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant
More informationOlivier Coudert Jean Christophe Madre Henri Fraisse. Bull Corporate Research Center. Rue Jean Jaures Les Clayes-sous-bois, FRANCE
A New Viewpoint on Two-Level Logic Minimization Olivier Coudert Jean Christophe Madre Henri Fraisse Bull Corporate Research Center Rue Jean Jaures 78340 Les Clayes-sous-bois, FRANCE Abstract This paper
More information1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT
1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations
More informationBounds on the OBDD-Size of Integer Multiplication via Universal Hashing
Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing Philipp Woelfel Dept. of Computer Science University Dortmund D-44221 Dortmund Germany phone: +49 231 755-2120 fax: +49 231 755-2047
More informationADVANCES in computer technology and the need to
Bounds on Reliability of Parallel Computer Interconnection Systems Ranjan Kumar Dash and Chita Ranjan Tripathy Abstract The evaluation of residual reliability of large sized parallel computer interconnection
More informationA Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications
A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications Beate Bollig and Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany
More informationDegraded Performance Analysis of Phased Mission System
5 th International & 26 th All India Manufacturing Technology, Design and Research Conference (AIMTDR 2014) December 12 th 14 th, 2014, IIT Guwahati, Assam, India Degraded Performance Analysis of Phased
More informationReduced Ordered Binary Decision Diagrams
Reduced Ordered Binary Decision Diagrams Lecture #12 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 13, 2016 c JPK
More informationCounter Examples to the Conjecture on the Complexity of BDD Binary Operations
TCS -TR-A-11-52 TCS Technical Report Counter Examples to the Conjecture on the Complexity of BDD Binary Operations by Ryo Yoshinaka, Jun Kawahara, Shuhei Denzumi, Hiroki Arimura and Shin-ichi Minato Division
More informationOverview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?
Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits
More informationSums of Products. Pasi Rastas November 15, 2005
Sums of Products Pasi Rastas November 15, 2005 1 Introduction This presentation is mainly based on 1. Bacchus, Dalmao and Pitassi : Algorithms and Complexity results for #SAT and Bayesian inference 2.
More informationComputing Consecutive-Type Reliabilities Non-Recursively
IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 3, SEPTEMBER 2003 367 Computing Consecutive-Type Reliabilities Non-Recursively Galit Shmueli Abstract The reliability of consecutive-type systems has been
More informationBDD Based Upon Shannon Expansion
Boolean Function Manipulation OBDD and more BDD Based Upon Shannon Expansion Notations f(x, x 2,, x n ) - n-input function, x i = or f xi=b (x,, x n ) = f(x,,x i-,b,x i+,,x n ), b= or Shannon Expansion
More informationReliability Evaluation of Phased-Mission Systems Using Stochastic Computation
> REPLE THIS LINE WITH YOUR PPER IENTIFITION NUMBER (OUBLE-LIK HERE TO EIT) < 1 Reliability Evaluation of Phased-Mission Systems Using Stochastic omputation Peican Zhu, Jie Han, Member, IEEE, Leibo Liu,
More informationReverse Edge Cut-Set Bounds for Secure Network Coding
Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology
More informationPreprint from Workshop Notes, International Workshop on Logic Synthesis (IWLS 97), Tahoe City, California, May 19-21, 1997
Preprint from Workshop Notes, International Workshop on Logic Synthesis (IWLS 97), Tahoe City, California, May 19-21, 1997 Multi-output Functional Decomposition with Exploitation of Don't Cares Christoph
More informationUpper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology
More informationUnit 1A: Computational Complexity
Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if
More information7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing-
7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing- Constrained Systems, Proc. 4th Workshop Computer-Aided Verication, Lecture Notes in Computer Science 663, Springer-Verlag,
More informationLecture 14 - P v.s. NP 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation
More information1. Berichterstatter: Prof. Dr. Ch. Meinel (Universitat Trier) 2. Berichterstatter: Prof. Dr. B. Becker (Albert-Ludwigs-Universitat Freiburg) Datum der
Transformation Techniques for Decision Diagrams in Computer-Aided Design Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften vorgelegt beim Fachbereich IV der Universitat Trier von Thorsten
More informationBinary Decision Diagrams
Binary Decision Diagrams Binary Decision Diagrams (BDDs) are a class of graphs that can be used as data structure for compactly representing boolean functions. BDDs were introduced by R. Bryant in 1986.
More informationUndirected Graphical Models
Undirected Graphical Models 1 Conditional Independence Graphs Let G = (V, E) be an undirected graph with vertex set V and edge set E, and let A, B, and C be subsets of vertices. We say that C separates
More informationBinary Decision Diagrams
Binary Decision Diagrams Sungho Kang Yonsei University Outline Representing Logic Function Design Considerations for a BDD package Algorithms 2 Why BDDs BDDs are Canonical (each Boolean function has its
More informationThe Minimum Reservation Rate Problem in Digital. Audio/Video Systems. Abstract
The Minimum Reservation Rate Problem in Digital Audio/Video Systems Dave Anderson y Nimrod Megiddo z Moni Naor x Abstract The \Minimum Reservation Rate Problem" arises in distributed systems for handling
More informationLecture 15 - NP Completeness 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 29, 2018 Lecture 15 - NP Completeness 1 In the last lecture we discussed how to provide
More informationChapter 1. Comparison-Sorting and Selecting in. Totally Monotone Matrices. totally monotone matrices can be found in [4], [5], [9],
Chapter 1 Comparison-Sorting and Selecting in Totally Monotone Matrices Noga Alon Yossi Azar y Abstract An mn matrix A is called totally monotone if for all i 1 < i 2 and j 1 < j 2, A[i 1; j 1] > A[i 1;
More informationNader H. Bshouty Lisa Higham Jolanta Warpechowska-Gruca. Canada. (
Meeting Times of Random Walks on Graphs Nader H. Bshouty Lisa Higham Jolanta Warpechowska-Gruca Computer Science University of Calgary Calgary, AB, T2N 1N4 Canada (e-mail: fbshouty,higham,jolantag@cpsc.ucalgary.ca)
More informationVariable Elimination: Algorithm
Variable Elimination: Algorithm Sargur srihari@cedar.buffalo.edu 1 Topics 1. Types of Inference Algorithms 2. Variable Elimination: the Basic ideas 3. Variable Elimination Sum-Product VE Algorithm Sum-Product
More informationOn the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms
On the Complexity of Mapping Pipelined Filtering Services on Heterogeneous Platforms Anne Benoit, Fanny Dufossé and Yves Robert LIP, École Normale Supérieure de Lyon, France {Anne.Benoit Fanny.Dufosse
More informationEcient and improved implementations of this method were, for instance, given in [], [7], [9] and [0]. These implementations contain more and more ecie
Triangular Heaps Henk J.M. Goeman Walter A. Kosters Department of Mathematics and Computer Science, Leiden University, P.O. Box 95, 300 RA Leiden, The Netherlands Email: fgoeman,kostersg@wi.leidenuniv.nl
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015
More informationOptimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi.
Optimal Rejuvenation for Tolerating Soft Failures Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi Abstract In the paper we address the problem of determining the optimal time
More information2 THE COMPUTABLY ENUMERABLE SUPERSETS OF AN R-MAXIMAL SET The structure of E has been the subject of much investigation over the past fty- ve years, s
ON THE FILTER OF COMPUTABLY ENUMERABLE SUPERSETS OF AN R-MAXIMAL SET Steffen Lempp Andre Nies D. Reed Solomon Department of Mathematics University of Wisconsin Madison, WI 53706-1388 USA Department of
More informationEVMDD-Based Analysis and Diagnosis Methods of Multi-State Systems with Multi-State Components
J. of Mult.-Valued Logic & Soft Computing, Vol., pp. 2 23 Old City Publishing, Inc. Reprints available directly from the publisher Published by license under the OCP Science imprint, Photocopying permitted
More informationBinary Decision Diagrams
Binary Decision Diagrams An Introduction and Some Applications Manas Thakur PACE Lab, IIT Madras Manas Thakur (IIT Madras) BDDs 1 / 25 Motivating Example Binary decision tree for a truth table Manas Thakur
More informationQuIDD-Optimised Quantum Algorithms
QuIDD-Optimised Quantum Algorithms by S K University of York Computer science 3 rd year project Supervisor: Prof Susan Stepney 03/05/2004 1 Project Objectives Investigate the QuIDD optimisation techniques
More informationMathematik / Informatik
.. UNIVERSITAT TRIER Mathematik / Informatik Forschungsbericht Nr. 93-12 Ecient Boolean Manipulation with OBDD's Can be Extended to FBDD's Jordan Gergov and Christoph Meinel FB IV { Informatik Universitat
More informationSequence Algebra, Sequence Decision Diagrams and Dynamic Fault Trees
Sequence Algebra, Sequence Decision Diagrams and Dynamic Fault Trees Antoine B. Rauzy LIX CNRS École polytechnique 91128 Palaiseau Cedex France Antoine.Rauzy@lix.polytechnique.fr Abstract: Dynamic Fault
More informationNovel determination of dierential-equation solutions: universal approximation method
Journal of Computational and Applied Mathematics 146 (2002) 443 457 www.elsevier.com/locate/cam Novel determination of dierential-equation solutions: universal approximation method Thananchai Leephakpreeda
More informationA New Look at BDDs for Pseudo-Boolean Constraints
Journal of Artificial Intelligence Research 45 (22) 443-48 Submitted 3/2; published /2 A New Look at BDDs for Pseudo-Boolean Constraints Ignasi Abío Robert Nieuwenhuis Albert Oliveras Enric Rodríguez-Carbonell
More informationPrimary Outputs. Primary Inputs. Combinational Logic. Latches. Next States. Present States. Clock R 00 0/0 1/1 1/0 1/0 A /1 0/1 0/0 1/1
A Methodology for Ecient Estimation of Switching Activity in Sequential Logic Circuits Jose Monteiro, Srinivas Devadas Department of EECS, MIT, Cambridge Bill Lin IMEC, Leuven Abstract We describe a computationally
More informationElectronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim
Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free
More informationQuantum Multiple-Valued Decision Diagrams Containing Skipped Variables
Quantum Multiple-Valued Decision Diagrams Containing Skipped Variables DAVID Y. FEINSTEIN 1, MITCHELL A. THORNTON 1 Innoventions, Inc., 1045 Bissonnet Street, Houston, TX, USA Dept. of Computer Science
More informationMassachusetts Institute of Technology
Massachusetts Institute of Technology 6.034 Articial Intelligence Solutions # Final96 6034 Item # 33 Problem 1 Rules Step Ready to fire Selected Rule Assertion Added 1 R1 R3 R7 R1 Fuzzy is a mammal 2 R5
More information[3] R.M. Colomb and C.Y.C. Chung. Very fast decision table execution of propositional
- 14 - [3] R.M. Colomb and C.Y.C. Chung. Very fast decision table execution of propositional expert systems. Proceedings of the 8th National Conference on Articial Intelligence (AAAI-9), 199, 671{676.
More informationComputational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30)
Computational Logic Davide Martinenghi Free University of Bozen-Bolzano Spring 2010 Computational Logic Davide Martinenghi (1/30) Propositional Logic - sequent calculus To overcome the problems of natural
More informationICML '97 and AAAI '97 Tutorials
A Short Course in Computational Learning Theory: ICML '97 and AAAI '97 Tutorials Michael Kearns AT&T Laboratories Outline Sample Complexity/Learning Curves: nite classes, Occam's VC dimension Razor, Best
More informationDiagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E.
In CADE-1 Workshop on Visual Reasoning, New Brunswick, NJ, July 1996. Diagram-based Formalisms for the Verication of Reactive Systems Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas
More informationGroup Theory Based Synthesis of Binary Reversible Circuits
Group Theory Based Synthesis of Binary Reversible Circuits Guowu Yang 1,XiaoyuSong 2, William N.N. Hung 2,FeiXie 1, and Marek A. Perkowski 2 1 Dept. of Computer Science, Portland State University, Portland,
More informationTEL AVIV UNIVERSITY THE IBY AND ALADAR FLEISCHMAN FACULTY OF ENGINEERING Department of Electrical Engineering - Systems
TEL AVIV UNIVERSITY THE IBY AND ALADAR FLEISCHMAN FACULTY OF ENGINEERING Department of Electrical Engineering - Systems ON THE EXPECTED CLASSIFICATION SPEED OF BOOLEAN FUNCTIONS Thesis submitted toward
More informationOn Qualitative Analysis of Fault Trees Using Structurally Persistent Nets
On Qualitative Analysis of Fault Trees Using Structurally Persistent Nets Ricardo J. Rodríguez rj.rodriguez@unileon.es Research Institute of Applied Sciences in Cybersecurity University of León, Spain
More informationVariable Elimination: Algorithm
Variable Elimination: Algorithm Sargur srihari@cedar.buffalo.edu 1 Topics 1. Types of Inference Algorithms 2. Variable Elimination: the Basic ideas 3. Variable Elimination Sum-Product VE Algorithm Sum-Product
More informationLinear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space
Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................
More information