Management of Time Requirements in Component-based Systems
|
|
- Jesse Morris Anthony
- 5 years ago
- Views:
Transcription
1 Management of Time Requirements in Component-based Systems Yi Li 1 Tian Huat Tan 2 Marsha Chechik 1 1. University of Toronto 2. Singapore University of Technology and Design FM 2014 Singapore May 14,
2 Component-based Software Engineering 2
3 Business Goals & System Requirements Component-based Software Engineering 2
4 Business Goals & System Requirements Component-based Software Engineering modularity, reusability, separation of concerns 2
5 Timing Requirements 3
6 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) 3
7 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) Smart Phones 3
8 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) Smart Phones Sensors - motion tracking 3
9 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) Smart Phones Sensors - motion tracking Web Service Compositions Ticket Booking Stock Quotes 3
10 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) Smart Phones Sensors - motion tracking Web Service Compositions Ticket Booking Stock Quotes 3
11 Existing Approach: LTR? 4
12 Existing Approach: LTR? 4
13 Existing Approach: LTR? 4
14 Existing Approach: LTR? 4
15 Existing Approach: LTR? 4
16 Existing Approach: LTR? Failure! 4
17 Existing Approach: LTR Must finish within 4s! 4
18 Existing Approach: LTR Must finish within 4s! Previous Work: [ICSE 13] Local Timing Requirements (LTR) synthesis Web Services - BPEL tds tfs tps Monolithic representation 4
19 Existing Approach: LTR Must finish within 4s! Previous Work: [ICSE 13] Local Timing Requirements (LTR) synthesis Web Services - BPEL tds tfs tps Monolithic representation LTR: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) 4
20 Existing Approach: LTR LTR: Previous Work: Must finish within 4s! Pros: + distills complicated composition structures into a single formula + precisely captures all feasible combinations tds tfs tps LTR - monolithic constraint (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) [ICSE 13] Local Timing Requirements (LTR) synthesis Web Services - BPEL Cons: - imposes dependencies across components - lacks support for localized debugging/repairing Monolithic representation 4
21 Existing Approach: LTR Must finish within 4s! Previous Work: [ICSE 13] Local Timing Requirements (LTR) synthesis Web Services - BPEL tds tfs tps Monolithic representation LTR: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) ultr: (0 t DS <1 0 t FS <1) (0 t DS <1 0 t PS <1) 4
22 LTR vs. ultr LTR: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) Component-dependent timing requirement Linear real arithmetic Precise Monolithic ultr: (0 t DS <1 0 t FS <1) (0 t DS <1 0 t PS <1) Component-independent under-approximated LTR Intervals Under-approximated Localized 5
23 LTR vs. ultr All possible timing configurations, e.g., tds = 1, tfs = 0.5, tps = 0.8 Precision 6
24 LTR vs. ultr unsafe safe LTR All possible timing configurations, e.g., tds = 1, tfs = 0.5, tps = 0.8 Precision 6
25 LTR vs. ultr LTR false negatives All possible timing configurations, underultr approximation e.g., tds = 1, tfs = 0.5, tps = 0.8 Precision Precision(uLTR) = #configurations satisfied by ultr #configurations satisfied by LTR 100% 6
26 LTR vs. ultr LTR All possible timing configurations, ultr e.g., tds = 1, tfs = 0.5, tps = 0.8 Precision Precision(uLTR) = #configurations satisfied by ultr #configurations satisfied by LTR 100% 6
27 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 7
28 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 7
29 Compute ultr from LTR φ: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) t PS t FS t DS 8
30 Compute ultr from LTR φ: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) t PS t FS t DS 8
31 Compute ultr from LTR φ: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) t PS B: (0 t DS <1 0 t FS <1) (0 t DS <1 0 t PS <1) t FS t DS 8
32 Compute ultr from LTR t PS t FS t DS 8
33 Compute ultr from LTR B1= MaxCube(φ) t PS t FS t DS 8
34 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) t PS t FS t DS 8
35 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) B2= MaxCube(φ) t PS t FS t DS 8
36 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) B2= MaxCube(φ) B=Merge(B1,,Bi) t PS t FS t DS 8
37 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) B2= MaxCube(φ) B=Merge(B1,,Bi) t PS if (h(bi)<ω) return; 3 2 t FS t DS 8
38 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) B2= MaxCube(φ) t PS 1 Soundness Termination Precision B=Merge(B1,,Bi) 0 1 if (h(bi)<ω) return; 3 2 t FS t DS 8
39 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume InfCube(φ,B) //relax in one direction if possible 9
40 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle, 8Vars(') (( V v i 2Vars(') l i apple v i apple u i ) ) ') InfCube(φ,B) //relax in one direction if possible 9
41 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle, 8Vars(') (( // sample maximal hyper-cube Optimize( ^ ( InfCube(φ,B) //relax in one direction if possible V v i 2Vars(') V v i 2Vars(') l i apple v i apple u i ) ) ') (u i l i = h)), h) 9
42 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle Symbolic Optimization, 8Vars(') (( v i 2Vars(') [POPL 14] // sample maximal hyper-cube Optimize( ^ ( InfCube(φ,B) //relax in one direction if possible V V v i 2Vars(') l i apple v i apple u i ) ) ') (u i l i = h)), h) 9
43 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle, 8Vars(') (( // sample maximal hyper-cube Optimize( ^ ( InfCube(φ,B) //relax in one direction if possible V v i 2Vars(') V v i 2Vars(') unsat? ( (B[l i /1] ) ')) unsat? ( (B[u i /1] ) ')) l i apple v i apple u i ) ) ') (u i l i = h)), h) // relax lower bound // relax upper bound 9
44 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle, 8Vars(') (( // sample maximal hyper-cube Optimize( ^ ( InfCube(φ,B) //relax in one direction if possible V v i 2Vars(') V v i 2Vars(') unsat? ( (B[l i /1] ) ')) unsat? ( (B[u i /1] ) ')) l i apple v i apple u i ) ) ') (u i l i = h)), h) // relax lower bound // relax upper bound // heights of sampled hyper-cubes form a non-increasing sequence 9
45 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 10
46 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 10
47 ultr for component selection 11
48 ultr for component selection publish 11
49 ultr for component selection LTR:(tFS<1 tds 3 tds+tfs 3) publish 11
50 ultr for component selection LTR:(tFS<1 tds 3 tds+tfs 3) publish 11
51 ultr for component selection Carminati et al., 2005 Al-Masri & Mahmoud, 2007 Rajendran et al., 2010 request retrieve publish 11
52 ultr for component selection tfs<1s finds the best match given localized constraints request retrieve publish 11
53 ultr for component selection tfs<1s finds the best match given localized constraints request retrieve publish 11
54 ultr for component selection Real-world Web Service data: QWS dataset Case studies: online booking service, Evaluate the percentage of false-negatives (precision) w.r.t. size of the ultr model Precision of ultr model (%) QWS, T e =0.9s Rand, T e 10.8s Precision of ultr model (%) QWS, T e =2.7s Rand, T e 242.2s Precision of ultr model (%) QWS, T e = 10.8s Rand, T e 201.4s Size of ultr model ( BS ) Size of ultr model ( BS ) Size of ultr model ( BS ) 12
55 ultr for component selection Real-world Web Service data: QWS dataset Case studies: online booking service, Precision of ultr model (%) Evaluate the percentage of false-negatives (precision) w.r.t. size of the ultr model Strong dependency in QWS, T e =0.9s Rand, T e 10.8s Size of ultr model ( BS ) Precision of ultr model (%) t1+t2+3t3-2t4< Size of ultr model ( BS ) the original LTR: QWS, T e =2.7s Rand, T e 242.2s Precision of ultr model (%) QWS, T e = 10.8s Rand, T e 201.4s Size of ultr model ( BS ) 12
56 ultr for runtime adaptation and recovery Must finish within 4s! Monitor 13
57 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time 13
58 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time 13
59 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan 13
60 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan 13
61 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan (0 tds 1 tfs 1 tps) ((0 tds 0 tfs 0 tps) tds 3) ((0 tds 0 tfs 1 0 tps) tds+tfs 3) ((0 tds 1 tfs 0 tps 1) tds+tps 2) 13
62 ultr for runtime adaptation and recovery Must finish within 4s! response time Monitor (0 tds 1 tfs 1 tps) ((0 tds 0 tfs 0 tps) tds 3) ((0 tds 0 tfs 1 0 tps) tds+tfs 3) ((0 tds 1 tfs 0 tps 1) tds+tps 2) repairing plan? Have to replace both DS and FS. 13
63 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan tds<1 tfs< tps<1 13
64 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan tds<1 tfs< tps<1 Replacing DS is enough! 13
65 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan tds<1 tfs< tps<1 Replacing DS is enough! The meaning of LTR: safe if one of tfs and tps is less than 1. 13
66 ultr for runtime adaptation and recovery Experiments: Use real service response time Simulate violations by adding uniform random delays to components Compare the length of recovery plans generated by LTR and ultr In ~90% cases, ultr discovers shorter repairs 14
67 Limitations & Future Work Limited evaluation Need to look at other domains Proof of concept, not the silver bullet Generalize the sampling algorithm: allow arbitrary hyper-rectangles Scalability issues: Quantifier elimination Balance between precision and performance 15
68 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 16
69 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 16
70 Questions? Thank you! 17
71 References Li, Y., Albarghouthi, A., Gurfinkel, A., Kincaid, Z., Chechik, M.: Symbolic Optimization with SMT Solvers. In: Proc. of POPL 2014 (2014) Tan, T.H., André, E., Sun, J., Liu, Y., Dong, J.S., Chen, M.: Dynamic Synthesis of Local Time Requirement for Service Composition. In: Proc. of ICSE 2013, pp (2013) Al-Masri,E.,Mahmoud,Q.H.:QoS-based Discovery and Ranking of Web Services.In:Proc. of ICCCN 2007, pp IEEE (2007) Wang, S., Rho, S., Mai, Z., Bettati, R., Zhao, W.: Real-time Componentbased Systems. In: Proc. of RTETAS 2005, pp (2005) Carminati, B., Ferrari, E., Hung, P.C.: Exploring Privacy Issues in Web Services Discovery Agencies. IEEE Security & Privacy 3(5), (2005) 18
Linear Arithmetic Satisfiability via Strategy Improvement
Linear Arithmetic Satisfiability via Strategy Improvement Azadeh Farzan 1 Zachary Kincaid 1,2 1 University of Toronto 2 Princeton University July 13, 2016 The problem: satisfiability modulo the theory
More informationInformation Flow Analysis via Path Condition Refinement
Information Flow Analysis via Path Condition Refinement Mana Taghdiri, Gregor Snelting, Carsten Sinz Karlsruhe Institute of Technology, Germany FAST September 16, 2010 KIT University of the State of Baden-Wuerttemberg
More informationTeaching vs. Learning, and Course Wrap-Up
Teaching vs. Learning, and Course Wrap-Up Sanjit A. Seshia EECS 219C EECS Department UC Berkeley Teaching vs. Learning Learning: Examples Concept Teaching: Concept Examples Given a concept, give a good
More informationScalable and Accurate Verification of Data Flow Systems. Cesare Tinelli The University of Iowa
Scalable and Accurate Verification of Data Flow Systems Cesare Tinelli The University of Iowa Overview AFOSR Supported Research Collaborations NYU (project partner) Chalmers University (research collaborator)
More informationAlgorithmic Verification of Stability of Hybrid Systems
Algorithmic Verification of Stability of Hybrid Systems Pavithra Prabhakar Kansas State University University of Kansas February 24, 2017 1 Cyber-Physical Systems (CPS) Systems in which software "cyber"
More informationNon-linear Interpolant Generation and Its Application to Program Verification
Non-linear Interpolant Generation and Its Application to Program Verification Naijun Zhan State Key Laboratory of Computer Science, Institute of Software, CAS Joint work with Liyun Dai, Ting Gan, Bow-Yaw
More informationAlgorithmic verification
Algorithmic verification Ahmed Rezine IDA, Linköpings Universitet Hösttermin 2018 Outline Overview Model checking Symbolic execution Outline Overview Model checking Symbolic execution Program verification
More informationProperty Directed Equivalence via Abstract Simulation. Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina
Property Directed Equivalence via Abstract Simulation Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina CAV, Jul 23, 2016 Motivation / Goals Little Leaks Add Up to Big Bills software safety must
More informationQuantifying Cyber Security for Networked Control Systems
Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin
More informationFMCAD 2013 Parameter Synthesis with IC3
FMCAD 2013 Parameter Synthesis with IC3 A. Cimatti, A. Griggio, S. Mover, S. Tonetta FBK, Trento, Italy Motivations and Contributions Parametric descriptions of systems arise in many domains E.g. software,
More informationTutorial 1: Modern SMT Solvers and Verification
University of Illinois at Urbana-Champaign Tutorial 1: Modern SMT Solvers and Verification Sayan Mitra Electrical & Computer Engineering Coordinated Science Laboratory University of Illinois at Urbana
More informationFrequency-hiding Dependency-preserving Encryption for Outsourced Databases
Frequency-hiding Dependency-preserving Encryption for Outsourced Databases ICDE 17 Boxiang Dong 1 Wendy Wang 2 1 Montclair State University Montclair, NJ 2 Stevens Institute of Technology Hoboken, NJ April
More informationOptimal Time and Random Inspection Policies for Computer Systems
Appl. Math. Inf. Sci. 8, No. 1L, 413-417 214) 413 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/1.12785/amis/81l51 Optimal Time and Random Inspection Policies for
More informationHSQE Briefing November 2017
HSQE Briefing November 2017 Our Safety Vision: Our vision of preventing harm to all is at the centre of our Safety Strategy and is synonymous with our commitment to resourcing and working safely. We believe
More informationStability and Stabilization of polynomial dynamical systems. Hadi Ravanbakhsh Sriram Sankaranarayanan University of Colorado, Boulder
Stability and Stabilization of polynomial dynamical systems Hadi Ravanbakhsh Sriram Sankaranarayanan University of Colorado, Boulder Proving Asymptotic Stability: Lyapunov Functions Lyapunov Function:
More informationOn the Probabilistic Symbolic Analysis of Software. Corina Pasareanu CMU-SV NASA Ames
On the Probabilistic Symbolic Analysis of Software Corina Pasareanu CMU-SV NASA Ames Probabilistic Symbolic Execution Quantifies the likelihood of reaching a target event e.g., goal state or assert violation
More informationCSC501 Operating Systems Principles. Deadlock
CSC501 Operating Systems Principles Deadlock 1 Last Lecture q Priority Inversion Q Priority Inheritance Protocol q Today Q Deadlock 2 The Deadlock Problem q Definition Q A set of blocked processes each
More informationBounded Integer Linear Constraint Solving via Lattice Search
Bounded Integer Linear Constraint Solving via Lattice Search Joe Hendrix and Ben Jones Galois, Inc Overview 2 We present an algorithm for solving systems of integer linear constraints where each linear
More informationTopics in Model-Based Reasoning
Towards Integration of Proving and Solving Dipartimento di Informatica Università degli Studi di Verona Verona, Italy March, 2014 Automated reasoning Artificial Intelligence Automated Reasoning Computational
More informationApproximate Rewriting of Queries Using Views
Approximate Rewriting of Queries Using Views Foto Afrati 1, Manik Chandrachud 2, Rada Chirkova 2, and Prasenjit Mitra 3 1 School of Electrical and Computer Engineering National Technical University of
More informationSimply Typed Lambda Calculus
Simply Typed Lambda Calculus Language (ver1) Lambda calculus with boolean values t ::= x variable x : T.t abstraction tt application true false boolean values if ttt conditional expression Values v ::=
More informationDynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection
Dynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection Dr. Kaibo Liu Department of Industrial and Systems Engineering University of
More informationAnalysis Based on SVM for Untrusted Mobile Crowd Sensing
Analysis Based on SVM for Untrusted Mobile Crowd Sensing * Ms. Yuga. R. Belkhode, Dr. S. W. Mohod *Student, Professor Computer Science and Engineering, Bapurao Deshmukh College of Engineering, India. *Email
More informationEsri and GIS Education
Esri and GIS Education Organizations Esri Users 1,200 National Government Agencies 11,500 States & Regional Agencies 30,800 Cities & Local Governments 32,000 Businesses 8,500 Utilities 12,600 NGOs 11,000
More informationOverview, cont. Overview, cont. Logistics. Optional Reference #1. Optional Reference #2. Workload and Grading
Course staff CS389L: Automated Logical Reasoning Lecture 1: ntroduction and Review of Basics şıl Dillig nstructor: şil Dillig E-mail: isil@cs.utexas.edu Office hours: Thursday after class until 6:30 pm
More informationSEVERE WEATHER PLAN FOR INSTITUTE OF TECHNOLOGY TALLAGHT
SEVERE WEATHER PLAN FOR INSTITUTE OF TECHNOLOGY TALLAGHT I. GENERAL A. This plan identifies IT Tallaght s response to severe weather warnings or conditions as experienced on campus or as communicated by
More informationIntegrating Induction, Deduction and Structure for Synthesis
Integrating Induction, Deduction and Structure for Synthesis Sanjit A. Seshia Associate Professor EECS Department UC Berkeley Students & Postdocs: S. Jha, W.Li, A. Donze, L. Dworkin, B. Brady, D. Holcomb,
More informationFormally Analyzing Adaptive Flight Control
Formally Analyzing Adaptive Flight Control Ashish Tiwari SRI International 333 Ravenswood Ave Menlo Park, CA 94025 Supported in part by NASA IRAC NRA grant number: NNX08AB95A Ashish Tiwari Symbolic Verification
More informationSatisfiability Modulo Theories
Satisfiability Modulo Theories Bruno Dutertre SRI International Leonardo de Moura Microsoft Research Satisfiability a > b + 2, a = 2c + 10, c + b 1000 SAT a = 0, b = 3, c = 5 Model 0 > 3 + 2, 0 = 2 5 +
More informationSymbolic Optimization with SMT Solvers
Symbolic Optimization with SMT Solvers Yi Li University of Toronto liyi@cs.toronto.edu Aws Albarghouthi University of Toronto aws@cs.toronto.edu Zachary Kincaid University of Toronto zkincaid@cs.toronto.edu
More informationPredicate Abstraction and Refinement for Verifying Multi-Threaded Programs
Predicate Abstraction and Refinement for Verifying Multi-Threaded Programs Ashutosh Gupta Corneliu Popeea Andrey Rybalchenko Institut für Informatik, Technische Universität München Germany {guptaa,popeea,rybal}@in.tum.de
More informationController Synthesis for Hybrid Systems using SMT Solving
Controller Synthesis for Hybrid Systems using SMT Solving Ulrich Loup AlgoSyn (GRK 1298) Hybrid Systems Group Prof. Dr. Erika Ábrahám GRK Workshop 2009, Schloss Dagstuhl Our model: hybrid system Discrete
More informationSystems of Nonlinear Equations and Inequalities: Two Variables
Systems of Nonlinear Equations and Inequalities: Two Variables By: OpenStaxCollege Halley s Comet ([link]) orbits the sun about once every 75 years. Its path can be considered to be a very elongated ellipse.
More informationFinding Conflicting Instances of Quantified Formulas in SMT. Andrew Reynolds Cesare Tinelli Leonardo De Moura July 18, 2014
Finding Conflicting Instances of Quantified Formulas in SMT Andrew Reynolds Cesare Tinelli Leonardo De Moura July 18, 2014 Outline of Talk SMT solvers: Efficient methods for ground constraints Heuristic
More informationNotes. Corneliu Popeea. May 3, 2013
Notes Corneliu Popeea May 3, 2013 1 Propositional logic Syntax We rely on a set of atomic propositions, AP, containing atoms like p, q. A propositional logic formula φ Formula is then defined by the following
More informationApplying Predicate Logic to Monitoring Network Traffic
Applying Predicate Logic to Monitoring Network Traffic Wolfgang Schreiner Wolfgang.Schreiner@risc.jku.at Research Institute for Symbolic Computation (RISC) Johannes Kepler University, Linz, Austria http://www.risc.jku.at
More informationA computational study of Gomory cut generators
A computational study of Gomory cut generators Gerard Cornuéjols 1, François Margot 1, Giacomo Nannicini 2 1. CMU Tepper School of Business, Pittsburgh, PA. 2. Singapore University of Technology and Design,
More informationEE C128 / ME C134 Feedback Control Systems
EE C128 / ME C134 Feedback Control Systems Lecture Additional Material Introduction to Model Predictive Control Maximilian Balandat Department of Electrical Engineering & Computer Science University of
More informationSymbolic Reachability Analysis of Lazy Linear Hybrid Automata. Susmit Jha, Bryan Brady and Sanjit A. Seshia
Symbolic Reachability Analysis of Lazy Linear Hybrid Automata Susmit Jha, Bryan Brady and Sanjit A. Seshia Traditional Hybrid Automata Traditional Hybrid Automata do not model delay and finite precision
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #20 IoT Security & Privacy 1 Class #20 What is the IoT? the WoT? IoT Internet, WoT Web Examples of potential security and privacy problems in current
More informationSolving and Verifying Hard Problems using SAT
Solving and Verifying Hard Problems using SAT Marijn J.H. Heule 1/22 SAT Solving and Verification Solving Framework for Hard Problems The Future: Verified SAT via Proofs 2/22 SAT Solving and Verification
More informationMACHINE COMPUTING. the limitations
MACHINE COMPUTING the limitations human computing stealing brain cycles of the masses word recognition: to digitize all printed writing language education: to translate web content games with a purpose
More informationSafety and Liveness. Thread Synchronization: Too Much Milk. Critical Sections. A Really Cool Theorem
Safety and Liveness Properties defined over an execution of a program Thread Synchronization: Too Much Milk Safety: nothing bad happens holds in every finite execution prefix Windows never crashes No patient
More informationAn Operational Semantics for Model Checking Long Running Transactions
An Operational Semantics for Model Checking Long Running Transactions Hengbiao Yu, Zhenbang Chen, Ji Wang zbchen@nudt.edu.cn School of Computer, National University of Defense Technology, Changsha, China
More informationThe Projected Power Method: An Efficient Algorithm for Joint Alignment from Pairwise Differences
The Projected Power Method: An Efficient Algorithm for Joint Alignment from Pairwise Differences Yuxin Chen Emmanuel Candès Department of Statistics, Stanford University, Sep. 2016 Nonconvex optimization
More informationInterpolation. Seminar Slides. Betim Musa. 27 th June Albert-Ludwigs-Universität Freiburg
Interpolation Seminar Slides Albert-Ludwigs-Universität Freiburg Betim Musa 27 th June 2015 Motivation program add(int a, int b) { var x,i : int; l 0 assume(b 0); l 1 x := a; l 2 i := 0; while(i < b) {
More informationEstimation of Tire-Road Friction by Tire Rotational Vibration Model
53 Research Report Estimation of Tire-Road Friction by Tire Rotational Vibration Model Takaji Umeno Abstract Tire-road friction is the most important piece of information used by active safety systems.
More informationarxiv: v1 [cs.lo] 29 May 2014
Under consideration for publication in Theory and Practice of Logic Programming 1 arxiv:1405.7739v1 [cs.lo] 29 May 2014 (Quantified) Horn Constraint Solving for Program Verification and Synthesis Andrey
More informationChapter 2: Simplification, Optimization and Implication. Simplification, Optimization and Implication. Constraint Simplification
Chapter : Simplification, Optimization and Implication Where we learn more fun things we can do with constraints. Simplification, Optimization and Implication Constraint Simplification Projection Constraint
More informationProving Real-time Properties of Embedded Software Systems 0-0
Proving Real-time Properties of Embedded Software Systems 0-0 Outline of Presentation Introduction and Preliminaries Previous Related Work Held For Operator Sensor Lock System Verified Design for Timing
More informationExplain: A Tool for Performing Abductive Inference
Explain: A Tool for Performing Abductive Inference Isil Dillig and Thomas Dillig {idillig, tdillig}@cs.wm.edu Computer Science Department, College of William & Mary Abstract. This paper describes a tool
More informationDeadlock. CSE 2431: Introduction to Operating Systems Reading: Chap. 7, [OSC]
Deadlock CSE 2431: Introduction to Operating Systems Reading: Chap. 7, [OSC] 1 Outline Resources Deadlock Deadlock Prevention Deadlock Avoidance Deadlock Detection Deadlock Recovery 2 Review: Synchronization
More informationTalk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016
Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Vadim Makarov www.vad1.com/lab Security model of QKD Security proof.laws of physics & Model of equipment Hack Integrate
More informationAlgorithm-Hardware Co-Optimization of Memristor-Based Framework for Solving SOCP and Homogeneous QCQP Problems
L.C.Smith College of Engineering and Computer Science Algorithm-Hardware Co-Optimization of Memristor-Based Framework for Solving SOCP and Homogeneous QCQP Problems Ao Ren Sijia Liu Ruizhe Cai Wujie Wen
More informationSymbolic Computation and Theorem Proving in Program Analysis
Symbolic Computation and Theorem Proving in Program Analysis Laura Kovács Chalmers Outline Part 1: Weakest Precondition for Program Analysis and Verification Part 2: Polynomial Invariant Generation (TACAS
More informationChapter 2: Simplification, Optimization and Implication
Chapter : Simplification, Optimization and Implication Where we learn more fun things we can do with constraints. 1 Simplification, Optimization and Implication Constraint Simplification Projection Constraint
More informationFrom SAT To SMT: Part 1. Vijay Ganesh MIT
From SAT To SMT: Part 1 Vijay Ganesh MIT Software Engineering & SMT Solvers An Indispensable Tactic for Any Strategy Formal Methods Program Analysis SE Goal: Reliable/Secure Software Automatic Testing
More informationA Brief Introduction to Model Checking
A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:
More informationEMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others
EMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others Lorenzo De Simone, GIS Expert/ EMMA Project Manager 2014 GIS Workshop,
More informationSMT: Satisfiability Modulo Theories
SMT: Satisfiability Modulo Theories Ranjit Jhala, UC San Diego April 9, 2013 Decision Procedures Last Time Propositional Logic Today 1. Combining SAT and Theory Solvers 2. Theory Solvers Theory of Equality
More informationR E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.
R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E
More informationPolynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems
Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems Alberto Puggelli DREAM Seminar - November 26, 2013 Collaborators and PIs:
More informationIncremental Proof-Based Verification of Compiler Optimizations
Incremental Proof-Based Verification of Compiler Optimizations Grigory Fedyukovich joint work with Arie Gurfinkel and Natasha Sharygina 5 of May, 2015, Attersee, Austria counter-example change impact Big
More informationInternals of SMT Solvers. Leonardo de Moura Microsoft Research
Internals of SMT Solvers Leonardo de Moura Microsoft Research Acknowledgements Dejan Jovanovic (SRI International, NYU) Grant Passmore (Univ. Edinburgh) Herbrand Award 2013 Greg Nelson What is a SMT Solver?
More informationConstraint Solving for Program Verification: Theory and Practice by Example
Constraint Solving for Program Verification: Theory and Practice by Example Andrey Rybalchenko Technische Universität München Abstract. Program verification relies on the construction of auxiliary assertions
More informationA Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH 2007 1 A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir Abstract We present a simple algorithm
More informationCharter for the. Information Transfer and Services Architecture Focus Group
for the Information Transfer and Services Architecture Focus Group 1. PURPOSE 1.1. The purpose of this charter is to establish the Information Transfer and Services Architecture Focus Group (ITSAFG) as
More informationConstruction Operation Simulation
Construction Operation Simulation Lecture #8 Output analysis Amin Alvanchi, PhD Construction Engineering and Management Department of Civil Engineering, Sharif University of Technology Outline 2 Introduction
More informationOn Content Indexing for Off-Path Caching in Information-Centric Networks
On Content Indexing for Off-Path Caching in Information-Centric Networks Suzan Bayhan, Liang Wang, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft University of Helsinki (Finland), TU Munich
More informationExploiting resolution proofs to speed up LTL vacuity detection for BMC
Int J Softw Tools Technol Transfer (20) 12:319 335 DOI.07/s009-009-0134-1 REGULAR PAPER Exploiting resolution proofs to speed up LTL vacuity detection for BMC Jocelyn Simmonds Jessica Davies Arie Gurfinkel
More informationExistence and Consistency in Bounded Arithmetic
Existence and Consistency in Bounded Arithmetic Yoriyuki Yamagata National Institute of Advanced Science and Technology (AIST) Kusatsu, August 30, 2011 Outline Self introduction Summary Theories of PV
More informationResilient Formal Synthesis
Resilient Formal Synthesis Calin Belta Boston University CDC 2017 Workshop: 30 years of the Ramadge-Wonham Theory of Supervisory Control: A Retrospective and Future Perspectives Outline Formal Synthesis
More informationMotion planning applications of Satisfiability Modulo Convex Optimization
Motion planning applications of Satisfiability Modulo Convex Optimization Yasser Shoukry (1) and Paulo Tabuada (2) (1) Department of Electrical and Computer Engineering, UMD (2) Electrical and Computer
More informationReactive Synthesis. Swen Jacobs VTSA 2013 Nancy, France u
Reactive Synthesis Nancy, France 24.09.2013 u www.iaik.tugraz.at 2 Property Synthesis (You Will Never Code Again) 3 Construct Correct Systems Automatically Don t do the same
More informationUSV TEST FLIGHT BY STRATOSPHERIC BALLOON: PRELIMINARY MISSION ANALYSIS
USV TEST FLIGHT BY STRATOSPHERIC BALLOON: PRELIMINARY MISSION ANALYSIS A. Cardillo a, I. Musso a, R. Ibba b, O.Cosentino b a Institute of Information Science and Technologies, National Research Council,
More informationEnhance Security, Safety and Efficiency With Geospatial Visualization
Areas within 10 minutes of an exit are emphasized on this map, to give an indication of how accessible neighborhoods are by highway. The colors represent 1, 3, 5 and 10 minute increments from the exits.
More informationIntegrating Induction and Deduction for Verification and Synthesis
Integrating Induction and Deduction for Verification and Synthesis Sanjit A. Seshia Associate Professor EECS Department UC Berkeley DATE 2013 Tutorial March 18, 2013 Bob s Vision: Exploit Synergies between
More informationApplication of Tensor and Matrix Completion on Environmental Sensing Data
Application of Tensor and Matrix Completion on Environmental Sensing Data Michalis Giannopoulos 1,, Sofia Savvaki 1,, Grigorios Tsagkatakis 1, and Panagiotis Tsakalides 1, 1- Institute of Computer Science
More informationHoare Logic I. Introduction to Deductive Program Verification. Simple Imperative Programming Language. Hoare Logic. Meaning of Hoare Triples
Hoare Logic I Introduction to Deductive Program Verification Işıl Dillig Program Spec Deductive verifier FOL formula Theorem prover valid contingent Example specs: safety (no crashes), absence of arithmetic
More informationOnline Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems
Online Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems Song Han 1 Deji Chen 2 Ming Xiong 3 Aloysius K. Mok 1 1 The University of Texas at Austin 2 Emerson Process Management
More informationUniversity of Toronto
Waiting Time Correlations on Disorderly Streetcar Routes by Jeffrey S. Rosenthal Department of Statistics University of Toronto Technical Report No. 0701 February 1, 2007 TECHNICAL REPORT SERIES University
More informationSoftware Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based Methods Ákos Hajdu PhD student Department of Measurement and Information Systems, Budapest University of Technology and Economics MTA-BME Lendület Cyber-Physical
More informationStatistical Privacy For Privacy Preserving Information Sharing
Statistical Privacy For Privacy Preserving Information Sharing Johannes Gehrke Cornell University http://www.cs.cornell.edu/johannes Joint work with: Alexandre Evfimievski, Ramakrishnan Srikant, Rakesh
More informationCoding for loss tolerant systems
Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon
More informationIntroduction of Recruit
Apr. 11, 2018 Introduction of Recruit We provide various kinds of online services from job search to hotel reservations across the world. Housing Beauty Travel Life & Local O2O Education Automobile Bridal
More informationFeedback Control Theory: Architectures and Tools for Real-Time Decision Making
Feedback Control Theory: Architectures and Tools for Real-Time Decision Making Richard M. Murray California Institute of Technology Real-Time Decision Making Bootcamp Simons Institute for the Theory of
More informationStatic Program Analysis using Abstract Interpretation
Static Program Analysis using Abstract Interpretation Introduction Static Program Analysis Static program analysis consists of automatically discovering properties of a program that hold for all possible
More informationAttack Graph Modeling and Generation
Attack Graph Modeling and Generation Ratnesh Kumar, Professor, IEEE Fellow Electrical and Computer Engineering, Iowa State University PhD Students: Mariam Ibrahim German Jordanian University Attack Graph:
More informationLOGARITHMS. Examples of Evaluating Logarithms by Using the Definition:
LOGARITHMS Definition of Logarithm: Given: a is a (real) number > 0 but a 1, called the base of the logarithm, and x is a (real) number > 0. log a x is defined to be the number y such that: y is the exponent
More informationr. Matthias Bretschneider amburg - Dept. Safety Fehleranalyse mit Hilfe von Model Checkern
r. Matthias Bretschneider amburg - Dept. Safety Fehleranalyse mit Hilfe von Model Checkern otivation: Design of safe embedded systems X y Sensor(s) Controller Actuator Design Phase Study the effect of
More informationA METHOD OF FINDING IMAGE SIMILAR PATCHES BASED ON GRADIENT-COVARIANCE SIMILARITY
IJAMML 3:1 (015) 69-78 September 015 ISSN: 394-58 Available at http://scientificadvances.co.in DOI: http://dx.doi.org/10.1864/ijamml_710011547 A METHOD OF FINDING IMAGE SIMILAR PATCHES BASED ON GRADIENT-COVARIANCE
More information2nd International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT-2012)
Estimation of Vehicle State and Road Coefficient for Electric Vehicle through Extended Kalman Filter and RS Approaches IN Cheng 1, WANG Gang 1, a, CAO Wan-ke 1 and ZHOU Feng-jun 1, b 1 The National Engineering
More informationLeonardo de Moura Microsoft Research
Leonardo de Moura Microsoft Research Logic is The Calculus of Computer Science (Z. Manna). High computational complexity Naïve solutions will not scale Is formula F satisfiable modulo theory T? SMT solvers
More informationWolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig
Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 14 Indexes for Multimedia Data 14 Indexes for Multimedia
More informationSupervisory Control: Advanced Theory and Applications
Supervisory Control: Advanced Theory and Applications Dr Rong Su S1-B1b-59, School of EEE Nanyang Technological University Tel: +65 6790-6042, Email: rsu@ntu.edu.sg EE6226, Discrete Event Systems 1 Introduction
More informationVinter: A Vampire-Based Tool for Interpolation
Vinter: A Vampire-Based Tool for Interpolation Kryštof Hoder 1, Andreas Holzer 2, Laura Kovács 2, and Andrei Voronkov 1 1 University of Manchester 2 TU Vienna Abstract. This paper describes the Vinter
More informationA STUDY OF ASYMPTOTIC AVAILABILITY MODELING FOR A FAILURE AND A REPAIR RATES FOLLOWING A WEIBULL DISTRIBUTION
A STUDY OF ASYMPTOTIC AVAILABILITY MODELING FOR A FAILURE AND A REPAIR RATES FOLLOWING A WEIBULL DISTRIBUTION Salem Bahri a, Fethi Ghribi b, Habib Ben Bacha a,c a Electro Mechanical systems laboratory
More informationEuropean Location Framework data in the ArcGIS platform
European Location Framework data in the ArcGIS platform Presentation to: Author: Date: INSPIRE Conference 2016 Clemens Portele 26 September 2016 Why ELF? Global (e.g. UN GGIM) Regional Europe (INSPIRE
More informationArcGIS Online Routing and Network Analysis. Deelesh Mandloi Matt Crowder
ArcGIS Online Routing and Network Analysis Deelesh Mandloi Matt Crowder Introductions Who are we? - Members of the Network Analyst development team Who are you? - Network Analyst users? - ArcGIS Online
More informationLinear Systems Theory
ME 3253 Linear Systems Theory Review Class Overview and Introduction 1. How to build dynamic system model for physical system? 2. How to analyze the dynamic system? -- Time domain -- Frequency domain (Laplace
More information