Management of Time Requirements in Component-based Systems

Size: px
Start display at page:

Download "Management of Time Requirements in Component-based Systems"

Transcription

1 Management of Time Requirements in Component-based Systems Yi Li 1 Tian Huat Tan 2 Marsha Chechik 1 1. University of Toronto 2. Singapore University of Technology and Design FM 2014 Singapore May 14,

2 Component-based Software Engineering 2

3 Business Goals & System Requirements Component-based Software Engineering 2

4 Business Goals & System Requirements Component-based Software Engineering modularity, reusability, separation of concerns 2

5 Timing Requirements 3

6 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) 3

7 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) Smart Phones 3

8 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) Smart Phones Sensors - motion tracking 3

9 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) Smart Phones Sensors - motion tracking Web Service Compositions Ticket Booking Stock Quotes 3

10 Timing Requirements Vehicle Control Systems Electronic Stability Control (ESC) Anti-lock braking system (ABS) Smart Phones Sensors - motion tracking Web Service Compositions Ticket Booking Stock Quotes 3

11 Existing Approach: LTR? 4

12 Existing Approach: LTR? 4

13 Existing Approach: LTR? 4

14 Existing Approach: LTR? 4

15 Existing Approach: LTR? 4

16 Existing Approach: LTR? Failure! 4

17 Existing Approach: LTR Must finish within 4s! 4

18 Existing Approach: LTR Must finish within 4s! Previous Work: [ICSE 13] Local Timing Requirements (LTR) synthesis Web Services - BPEL tds tfs tps Monolithic representation 4

19 Existing Approach: LTR Must finish within 4s! Previous Work: [ICSE 13] Local Timing Requirements (LTR) synthesis Web Services - BPEL tds tfs tps Monolithic representation LTR: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) 4

20 Existing Approach: LTR LTR: Previous Work: Must finish within 4s! Pros: + distills complicated composition structures into a single formula + precisely captures all feasible combinations tds tfs tps LTR - monolithic constraint (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) [ICSE 13] Local Timing Requirements (LTR) synthesis Web Services - BPEL Cons: - imposes dependencies across components - lacks support for localized debugging/repairing Monolithic representation 4

21 Existing Approach: LTR Must finish within 4s! Previous Work: [ICSE 13] Local Timing Requirements (LTR) synthesis Web Services - BPEL tds tfs tps Monolithic representation LTR: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) ultr: (0 t DS <1 0 t FS <1) (0 t DS <1 0 t PS <1) 4

22 LTR vs. ultr LTR: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) Component-dependent timing requirement Linear real arithmetic Precise Monolithic ultr: (0 t DS <1 0 t FS <1) (0 t DS <1 0 t PS <1) Component-independent under-approximated LTR Intervals Under-approximated Localized 5

23 LTR vs. ultr All possible timing configurations, e.g., tds = 1, tfs = 0.5, tps = 0.8 Precision 6

24 LTR vs. ultr unsafe safe LTR All possible timing configurations, e.g., tds = 1, tfs = 0.5, tps = 0.8 Precision 6

25 LTR vs. ultr LTR false negatives All possible timing configurations, underultr approximation e.g., tds = 1, tfs = 0.5, tps = 0.8 Precision Precision(uLTR) = #configurations satisfied by ultr #configurations satisfied by LTR 100% 6

26 LTR vs. ultr LTR All possible timing configurations, ultr e.g., tds = 1, tfs = 0.5, tps = 0.8 Precision Precision(uLTR) = #configurations satisfied by ultr #configurations satisfied by LTR 100% 6

27 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 7

28 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 7

29 Compute ultr from LTR φ: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) t PS t FS t DS 8

30 Compute ultr from LTR φ: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) t PS t FS t DS 8

31 Compute ultr from LTR φ: (0 t DS 1 t FS 1 t PS ) ((0 t DS 0 t FS 0 t PS ) t DS 3) ((0 t DS 0 t FS 1 0 t PS ) t DS +t FS 3) ((0 t DS 1 t FS 0 t PS 1) t DS +t PS 2) t PS B: (0 t DS <1 0 t FS <1) (0 t DS <1 0 t PS <1) t FS t DS 8

32 Compute ultr from LTR t PS t FS t DS 8

33 Compute ultr from LTR B1= MaxCube(φ) t PS t FS t DS 8

34 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) t PS t FS t DS 8

35 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) B2= MaxCube(φ) t PS t FS t DS 8

36 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) B2= MaxCube(φ) B=Merge(B1,,Bi) t PS t FS t DS 8

37 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) B2= MaxCube(φ) B=Merge(B1,,Bi) t PS if (h(bi)<ω) return; 3 2 t FS t DS 8

38 Compute ultr from LTR B1= MaxCube(φ) InfCube(φ,B1) B2= MaxCube(φ) t PS 1 Soundness Termination Precision B=Merge(B1,,Bi) 0 1 if (h(bi)<ω) return; 3 2 t FS t DS 8

39 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume InfCube(φ,B) //relax in one direction if possible 9

40 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle, 8Vars(') (( V v i 2Vars(') l i apple v i apple u i ) ) ') InfCube(φ,B) //relax in one direction if possible 9

41 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle, 8Vars(') (( // sample maximal hyper-cube Optimize( ^ ( InfCube(φ,B) //relax in one direction if possible V v i 2Vars(') V v i 2Vars(') l i apple v i apple u i ) ) ') (u i l i = h)), h) 9

42 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle Symbolic Optimization, 8Vars(') (( v i 2Vars(') [POPL 14] // sample maximal hyper-cube Optimize( ^ ( InfCube(φ,B) //relax in one direction if possible V V v i 2Vars(') l i apple v i apple u i ) ) ') (u i l i = h)), h) 9

43 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle, 8Vars(') (( // sample maximal hyper-cube Optimize( ^ ( InfCube(φ,B) //relax in one direction if possible V v i 2Vars(') V v i 2Vars(') unsat? ( (B[l i /1] ) ')) unsat? ( (B[u i /1] ) ')) l i apple v i apple u i ) ) ') (u i l i = h)), h) // relax lower bound // relax upper bound 9

44 SMT Encodings MaxCube(φ) //return the hypercube in φ with maximum volume // sample arbitrary hyper-rectangle, 8Vars(') (( // sample maximal hyper-cube Optimize( ^ ( InfCube(φ,B) //relax in one direction if possible V v i 2Vars(') V v i 2Vars(') unsat? ( (B[l i /1] ) ')) unsat? ( (B[u i /1] ) ')) l i apple v i apple u i ) ) ') (u i l i = h)), h) // relax lower bound // relax upper bound // heights of sampled hyper-cubes form a non-increasing sequence 9

45 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 10

46 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 10

47 ultr for component selection 11

48 ultr for component selection publish 11

49 ultr for component selection LTR:(tFS<1 tds 3 tds+tfs 3) publish 11

50 ultr for component selection LTR:(tFS<1 tds 3 tds+tfs 3) publish 11

51 ultr for component selection Carminati et al., 2005 Al-Masri & Mahmoud, 2007 Rajendran et al., 2010 request retrieve publish 11

52 ultr for component selection tfs<1s finds the best match given localized constraints request retrieve publish 11

53 ultr for component selection tfs<1s finds the best match given localized constraints request retrieve publish 11

54 ultr for component selection Real-world Web Service data: QWS dataset Case studies: online booking service, Evaluate the percentage of false-negatives (precision) w.r.t. size of the ultr model Precision of ultr model (%) QWS, T e =0.9s Rand, T e 10.8s Precision of ultr model (%) QWS, T e =2.7s Rand, T e 242.2s Precision of ultr model (%) QWS, T e = 10.8s Rand, T e 201.4s Size of ultr model ( BS ) Size of ultr model ( BS ) Size of ultr model ( BS ) 12

55 ultr for component selection Real-world Web Service data: QWS dataset Case studies: online booking service, Precision of ultr model (%) Evaluate the percentage of false-negatives (precision) w.r.t. size of the ultr model Strong dependency in QWS, T e =0.9s Rand, T e 10.8s Size of ultr model ( BS ) Precision of ultr model (%) t1+t2+3t3-2t4< Size of ultr model ( BS ) the original LTR: QWS, T e =2.7s Rand, T e 242.2s Precision of ultr model (%) QWS, T e = 10.8s Rand, T e 201.4s Size of ultr model ( BS ) 12

56 ultr for runtime adaptation and recovery Must finish within 4s! Monitor 13

57 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time 13

58 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time 13

59 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan 13

60 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan 13

61 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan (0 tds 1 tfs 1 tps) ((0 tds 0 tfs 0 tps) tds 3) ((0 tds 0 tfs 1 0 tps) tds+tfs 3) ((0 tds 1 tfs 0 tps 1) tds+tps 2) 13

62 ultr for runtime adaptation and recovery Must finish within 4s! response time Monitor (0 tds 1 tfs 1 tps) ((0 tds 0 tfs 0 tps) tds 3) ((0 tds 0 tfs 1 0 tps) tds+tfs 3) ((0 tds 1 tfs 0 tps 1) tds+tps 2) repairing plan? Have to replace both DS and FS. 13

63 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan tds<1 tfs< tps<1 13

64 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan tds<1 tfs< tps<1 Replacing DS is enough! 13

65 ultr for runtime adaptation and recovery Must finish within 4s! Monitor response time repairing plan tds<1 tfs< tps<1 Replacing DS is enough! The meaning of LTR: safe if one of tfs and tps is less than 1. 13

66 ultr for runtime adaptation and recovery Experiments: Use real service response time Simulate violations by adding uniform random delays to components Compare the length of recovery plans generated by LTR and ultr In ~90% cases, ultr discovers shorter repairs 14

67 Limitations & Future Work Limited evaluation Need to look at other domains Proof of concept, not the silver bullet Generalize the sampling algorithm: allow arbitrary hyper-rectangles Scalability issues: Quantifier elimination Balance between precision and performance 15

68 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 16

69 Checklist What is ultr? Component-independent under-approximated LTR Soundness: ensure timing safety How to break up the monolithic constraint? Compute ultr from LTR Precision: preserve as many choices as possible How can localized constraints support the management of timing requirements? ultr for component selection ultr for runtime adaptation and recovery 16

70 Questions? Thank you! 17

71 References Li, Y., Albarghouthi, A., Gurfinkel, A., Kincaid, Z., Chechik, M.: Symbolic Optimization with SMT Solvers. In: Proc. of POPL 2014 (2014) Tan, T.H., André, E., Sun, J., Liu, Y., Dong, J.S., Chen, M.: Dynamic Synthesis of Local Time Requirement for Service Composition. In: Proc. of ICSE 2013, pp (2013) Al-Masri,E.,Mahmoud,Q.H.:QoS-based Discovery and Ranking of Web Services.In:Proc. of ICCCN 2007, pp IEEE (2007) Wang, S., Rho, S., Mai, Z., Bettati, R., Zhao, W.: Real-time Componentbased Systems. In: Proc. of RTETAS 2005, pp (2005) Carminati, B., Ferrari, E., Hung, P.C.: Exploring Privacy Issues in Web Services Discovery Agencies. IEEE Security & Privacy 3(5), (2005) 18

Linear Arithmetic Satisfiability via Strategy Improvement

Linear Arithmetic Satisfiability via Strategy Improvement Linear Arithmetic Satisfiability via Strategy Improvement Azadeh Farzan 1 Zachary Kincaid 1,2 1 University of Toronto 2 Princeton University July 13, 2016 The problem: satisfiability modulo the theory

More information

Information Flow Analysis via Path Condition Refinement

Information Flow Analysis via Path Condition Refinement Information Flow Analysis via Path Condition Refinement Mana Taghdiri, Gregor Snelting, Carsten Sinz Karlsruhe Institute of Technology, Germany FAST September 16, 2010 KIT University of the State of Baden-Wuerttemberg

More information

Teaching vs. Learning, and Course Wrap-Up

Teaching vs. Learning, and Course Wrap-Up Teaching vs. Learning, and Course Wrap-Up Sanjit A. Seshia EECS 219C EECS Department UC Berkeley Teaching vs. Learning Learning: Examples Concept Teaching: Concept Examples Given a concept, give a good

More information

Scalable and Accurate Verification of Data Flow Systems. Cesare Tinelli The University of Iowa

Scalable and Accurate Verification of Data Flow Systems. Cesare Tinelli The University of Iowa Scalable and Accurate Verification of Data Flow Systems Cesare Tinelli The University of Iowa Overview AFOSR Supported Research Collaborations NYU (project partner) Chalmers University (research collaborator)

More information

Algorithmic Verification of Stability of Hybrid Systems

Algorithmic Verification of Stability of Hybrid Systems Algorithmic Verification of Stability of Hybrid Systems Pavithra Prabhakar Kansas State University University of Kansas February 24, 2017 1 Cyber-Physical Systems (CPS) Systems in which software "cyber"

More information

Non-linear Interpolant Generation and Its Application to Program Verification

Non-linear Interpolant Generation and Its Application to Program Verification Non-linear Interpolant Generation and Its Application to Program Verification Naijun Zhan State Key Laboratory of Computer Science, Institute of Software, CAS Joint work with Liyun Dai, Ting Gan, Bow-Yaw

More information

Algorithmic verification

Algorithmic verification Algorithmic verification Ahmed Rezine IDA, Linköpings Universitet Hösttermin 2018 Outline Overview Model checking Symbolic execution Outline Overview Model checking Symbolic execution Program verification

More information

Property Directed Equivalence via Abstract Simulation. Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina

Property Directed Equivalence via Abstract Simulation. Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina Property Directed Equivalence via Abstract Simulation Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina CAV, Jul 23, 2016 Motivation / Goals Little Leaks Add Up to Big Bills software safety must

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

FMCAD 2013 Parameter Synthesis with IC3

FMCAD 2013 Parameter Synthesis with IC3 FMCAD 2013 Parameter Synthesis with IC3 A. Cimatti, A. Griggio, S. Mover, S. Tonetta FBK, Trento, Italy Motivations and Contributions Parametric descriptions of systems arise in many domains E.g. software,

More information

Tutorial 1: Modern SMT Solvers and Verification

Tutorial 1: Modern SMT Solvers and Verification University of Illinois at Urbana-Champaign Tutorial 1: Modern SMT Solvers and Verification Sayan Mitra Electrical & Computer Engineering Coordinated Science Laboratory University of Illinois at Urbana

More information

Frequency-hiding Dependency-preserving Encryption for Outsourced Databases

Frequency-hiding Dependency-preserving Encryption for Outsourced Databases Frequency-hiding Dependency-preserving Encryption for Outsourced Databases ICDE 17 Boxiang Dong 1 Wendy Wang 2 1 Montclair State University Montclair, NJ 2 Stevens Institute of Technology Hoboken, NJ April

More information

Optimal Time and Random Inspection Policies for Computer Systems

Optimal Time and Random Inspection Policies for Computer Systems Appl. Math. Inf. Sci. 8, No. 1L, 413-417 214) 413 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/1.12785/amis/81l51 Optimal Time and Random Inspection Policies for

More information

HSQE Briefing November 2017

HSQE Briefing November 2017 HSQE Briefing November 2017 Our Safety Vision: Our vision of preventing harm to all is at the centre of our Safety Strategy and is synonymous with our commitment to resourcing and working safely. We believe

More information

Stability and Stabilization of polynomial dynamical systems. Hadi Ravanbakhsh Sriram Sankaranarayanan University of Colorado, Boulder

Stability and Stabilization of polynomial dynamical systems. Hadi Ravanbakhsh Sriram Sankaranarayanan University of Colorado, Boulder Stability and Stabilization of polynomial dynamical systems Hadi Ravanbakhsh Sriram Sankaranarayanan University of Colorado, Boulder Proving Asymptotic Stability: Lyapunov Functions Lyapunov Function:

More information

On the Probabilistic Symbolic Analysis of Software. Corina Pasareanu CMU-SV NASA Ames

On the Probabilistic Symbolic Analysis of Software. Corina Pasareanu CMU-SV NASA Ames On the Probabilistic Symbolic Analysis of Software Corina Pasareanu CMU-SV NASA Ames Probabilistic Symbolic Execution Quantifies the likelihood of reaching a target event e.g., goal state or assert violation

More information

CSC501 Operating Systems Principles. Deadlock

CSC501 Operating Systems Principles. Deadlock CSC501 Operating Systems Principles Deadlock 1 Last Lecture q Priority Inversion Q Priority Inheritance Protocol q Today Q Deadlock 2 The Deadlock Problem q Definition Q A set of blocked processes each

More information

Bounded Integer Linear Constraint Solving via Lattice Search

Bounded Integer Linear Constraint Solving via Lattice Search Bounded Integer Linear Constraint Solving via Lattice Search Joe Hendrix and Ben Jones Galois, Inc Overview 2 We present an algorithm for solving systems of integer linear constraints where each linear

More information

Topics in Model-Based Reasoning

Topics in Model-Based Reasoning Towards Integration of Proving and Solving Dipartimento di Informatica Università degli Studi di Verona Verona, Italy March, 2014 Automated reasoning Artificial Intelligence Automated Reasoning Computational

More information

Approximate Rewriting of Queries Using Views

Approximate Rewriting of Queries Using Views Approximate Rewriting of Queries Using Views Foto Afrati 1, Manik Chandrachud 2, Rada Chirkova 2, and Prasenjit Mitra 3 1 School of Electrical and Computer Engineering National Technical University of

More information

Simply Typed Lambda Calculus

Simply Typed Lambda Calculus Simply Typed Lambda Calculus Language (ver1) Lambda calculus with boolean values t ::= x variable x : T.t abstraction tt application true false boolean values if ttt conditional expression Values v ::=

More information

Dynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection

Dynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection Dynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection Dr. Kaibo Liu Department of Industrial and Systems Engineering University of

More information

Analysis Based on SVM for Untrusted Mobile Crowd Sensing

Analysis Based on SVM for Untrusted Mobile Crowd Sensing Analysis Based on SVM for Untrusted Mobile Crowd Sensing * Ms. Yuga. R. Belkhode, Dr. S. W. Mohod *Student, Professor Computer Science and Engineering, Bapurao Deshmukh College of Engineering, India. *Email

More information

Esri and GIS Education

Esri and GIS Education Esri and GIS Education Organizations Esri Users 1,200 National Government Agencies 11,500 States & Regional Agencies 30,800 Cities & Local Governments 32,000 Businesses 8,500 Utilities 12,600 NGOs 11,000

More information

Overview, cont. Overview, cont. Logistics. Optional Reference #1. Optional Reference #2. Workload and Grading

Overview, cont. Overview, cont. Logistics. Optional Reference #1. Optional Reference #2. Workload and Grading Course staff CS389L: Automated Logical Reasoning Lecture 1: ntroduction and Review of Basics şıl Dillig nstructor: şil Dillig E-mail: isil@cs.utexas.edu Office hours: Thursday after class until 6:30 pm

More information

SEVERE WEATHER PLAN FOR INSTITUTE OF TECHNOLOGY TALLAGHT

SEVERE WEATHER PLAN FOR INSTITUTE OF TECHNOLOGY TALLAGHT SEVERE WEATHER PLAN FOR INSTITUTE OF TECHNOLOGY TALLAGHT I. GENERAL A. This plan identifies IT Tallaght s response to severe weather warnings or conditions as experienced on campus or as communicated by

More information

Integrating Induction, Deduction and Structure for Synthesis

Integrating Induction, Deduction and Structure for Synthesis Integrating Induction, Deduction and Structure for Synthesis Sanjit A. Seshia Associate Professor EECS Department UC Berkeley Students & Postdocs: S. Jha, W.Li, A. Donze, L. Dworkin, B. Brady, D. Holcomb,

More information

Formally Analyzing Adaptive Flight Control

Formally Analyzing Adaptive Flight Control Formally Analyzing Adaptive Flight Control Ashish Tiwari SRI International 333 Ravenswood Ave Menlo Park, CA 94025 Supported in part by NASA IRAC NRA grant number: NNX08AB95A Ashish Tiwari Symbolic Verification

More information

Satisfiability Modulo Theories

Satisfiability Modulo Theories Satisfiability Modulo Theories Bruno Dutertre SRI International Leonardo de Moura Microsoft Research Satisfiability a > b + 2, a = 2c + 10, c + b 1000 SAT a = 0, b = 3, c = 5 Model 0 > 3 + 2, 0 = 2 5 +

More information

Symbolic Optimization with SMT Solvers

Symbolic Optimization with SMT Solvers Symbolic Optimization with SMT Solvers Yi Li University of Toronto liyi@cs.toronto.edu Aws Albarghouthi University of Toronto aws@cs.toronto.edu Zachary Kincaid University of Toronto zkincaid@cs.toronto.edu

More information

Predicate Abstraction and Refinement for Verifying Multi-Threaded Programs

Predicate Abstraction and Refinement for Verifying Multi-Threaded Programs Predicate Abstraction and Refinement for Verifying Multi-Threaded Programs Ashutosh Gupta Corneliu Popeea Andrey Rybalchenko Institut für Informatik, Technische Universität München Germany {guptaa,popeea,rybal}@in.tum.de

More information

Controller Synthesis for Hybrid Systems using SMT Solving

Controller Synthesis for Hybrid Systems using SMT Solving Controller Synthesis for Hybrid Systems using SMT Solving Ulrich Loup AlgoSyn (GRK 1298) Hybrid Systems Group Prof. Dr. Erika Ábrahám GRK Workshop 2009, Schloss Dagstuhl Our model: hybrid system Discrete

More information

Systems of Nonlinear Equations and Inequalities: Two Variables

Systems of Nonlinear Equations and Inequalities: Two Variables Systems of Nonlinear Equations and Inequalities: Two Variables By: OpenStaxCollege Halley s Comet ([link]) orbits the sun about once every 75 years. Its path can be considered to be a very elongated ellipse.

More information

Finding Conflicting Instances of Quantified Formulas in SMT. Andrew Reynolds Cesare Tinelli Leonardo De Moura July 18, 2014

Finding Conflicting Instances of Quantified Formulas in SMT. Andrew Reynolds Cesare Tinelli Leonardo De Moura July 18, 2014 Finding Conflicting Instances of Quantified Formulas in SMT Andrew Reynolds Cesare Tinelli Leonardo De Moura July 18, 2014 Outline of Talk SMT solvers: Efficient methods for ground constraints Heuristic

More information

Notes. Corneliu Popeea. May 3, 2013

Notes. Corneliu Popeea. May 3, 2013 Notes Corneliu Popeea May 3, 2013 1 Propositional logic Syntax We rely on a set of atomic propositions, AP, containing atoms like p, q. A propositional logic formula φ Formula is then defined by the following

More information

Applying Predicate Logic to Monitoring Network Traffic

Applying Predicate Logic to Monitoring Network Traffic Applying Predicate Logic to Monitoring Network Traffic Wolfgang Schreiner Wolfgang.Schreiner@risc.jku.at Research Institute for Symbolic Computation (RISC) Johannes Kepler University, Linz, Austria http://www.risc.jku.at

More information

A computational study of Gomory cut generators

A computational study of Gomory cut generators A computational study of Gomory cut generators Gerard Cornuéjols 1, François Margot 1, Giacomo Nannicini 2 1. CMU Tepper School of Business, Pittsburgh, PA. 2. Singapore University of Technology and Design,

More information

EE C128 / ME C134 Feedback Control Systems

EE C128 / ME C134 Feedback Control Systems EE C128 / ME C134 Feedback Control Systems Lecture Additional Material Introduction to Model Predictive Control Maximilian Balandat Department of Electrical Engineering & Computer Science University of

More information

Symbolic Reachability Analysis of Lazy Linear Hybrid Automata. Susmit Jha, Bryan Brady and Sanjit A. Seshia

Symbolic Reachability Analysis of Lazy Linear Hybrid Automata. Susmit Jha, Bryan Brady and Sanjit A. Seshia Symbolic Reachability Analysis of Lazy Linear Hybrid Automata Susmit Jha, Bryan Brady and Sanjit A. Seshia Traditional Hybrid Automata Traditional Hybrid Automata do not model delay and finite precision

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #20 IoT Security & Privacy 1 Class #20 What is the IoT? the WoT? IoT Internet, WoT Web Examples of potential security and privacy problems in current

More information

Solving and Verifying Hard Problems using SAT

Solving and Verifying Hard Problems using SAT Solving and Verifying Hard Problems using SAT Marijn J.H. Heule 1/22 SAT Solving and Verification Solving Framework for Hard Problems The Future: Verified SAT via Proofs 2/22 SAT Solving and Verification

More information

MACHINE COMPUTING. the limitations

MACHINE COMPUTING. the limitations MACHINE COMPUTING the limitations human computing stealing brain cycles of the masses word recognition: to digitize all printed writing language education: to translate web content games with a purpose

More information

Safety and Liveness. Thread Synchronization: Too Much Milk. Critical Sections. A Really Cool Theorem

Safety and Liveness. Thread Synchronization: Too Much Milk. Critical Sections. A Really Cool Theorem Safety and Liveness Properties defined over an execution of a program Thread Synchronization: Too Much Milk Safety: nothing bad happens holds in every finite execution prefix Windows never crashes No patient

More information

An Operational Semantics for Model Checking Long Running Transactions

An Operational Semantics for Model Checking Long Running Transactions An Operational Semantics for Model Checking Long Running Transactions Hengbiao Yu, Zhenbang Chen, Ji Wang zbchen@nudt.edu.cn School of Computer, National University of Defense Technology, Changsha, China

More information

The Projected Power Method: An Efficient Algorithm for Joint Alignment from Pairwise Differences

The Projected Power Method: An Efficient Algorithm for Joint Alignment from Pairwise Differences The Projected Power Method: An Efficient Algorithm for Joint Alignment from Pairwise Differences Yuxin Chen Emmanuel Candès Department of Statistics, Stanford University, Sep. 2016 Nonconvex optimization

More information

Interpolation. Seminar Slides. Betim Musa. 27 th June Albert-Ludwigs-Universität Freiburg

Interpolation. Seminar Slides. Betim Musa. 27 th June Albert-Ludwigs-Universität Freiburg Interpolation Seminar Slides Albert-Ludwigs-Universität Freiburg Betim Musa 27 th June 2015 Motivation program add(int a, int b) { var x,i : int; l 0 assume(b 0); l 1 x := a; l 2 i := 0; while(i < b) {

More information

Estimation of Tire-Road Friction by Tire Rotational Vibration Model

Estimation of Tire-Road Friction by Tire Rotational Vibration Model 53 Research Report Estimation of Tire-Road Friction by Tire Rotational Vibration Model Takaji Umeno Abstract Tire-road friction is the most important piece of information used by active safety systems.

More information

arxiv: v1 [cs.lo] 29 May 2014

arxiv: v1 [cs.lo] 29 May 2014 Under consideration for publication in Theory and Practice of Logic Programming 1 arxiv:1405.7739v1 [cs.lo] 29 May 2014 (Quantified) Horn Constraint Solving for Program Verification and Synthesis Andrey

More information

Chapter 2: Simplification, Optimization and Implication. Simplification, Optimization and Implication. Constraint Simplification

Chapter 2: Simplification, Optimization and Implication. Simplification, Optimization and Implication. Constraint Simplification Chapter : Simplification, Optimization and Implication Where we learn more fun things we can do with constraints. Simplification, Optimization and Implication Constraint Simplification Projection Constraint

More information

Proving Real-time Properties of Embedded Software Systems 0-0

Proving Real-time Properties of Embedded Software Systems 0-0 Proving Real-time Properties of Embedded Software Systems 0-0 Outline of Presentation Introduction and Preliminaries Previous Related Work Held For Operator Sensor Lock System Verified Design for Timing

More information

Explain: A Tool for Performing Abductive Inference

Explain: A Tool for Performing Abductive Inference Explain: A Tool for Performing Abductive Inference Isil Dillig and Thomas Dillig {idillig, tdillig}@cs.wm.edu Computer Science Department, College of William & Mary Abstract. This paper describes a tool

More information

Deadlock. CSE 2431: Introduction to Operating Systems Reading: Chap. 7, [OSC]

Deadlock. CSE 2431: Introduction to Operating Systems Reading: Chap. 7, [OSC] Deadlock CSE 2431: Introduction to Operating Systems Reading: Chap. 7, [OSC] 1 Outline Resources Deadlock Deadlock Prevention Deadlock Avoidance Deadlock Detection Deadlock Recovery 2 Review: Synchronization

More information

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Vadim Makarov www.vad1.com/lab Security model of QKD Security proof.laws of physics & Model of equipment Hack Integrate

More information

Algorithm-Hardware Co-Optimization of Memristor-Based Framework for Solving SOCP and Homogeneous QCQP Problems

Algorithm-Hardware Co-Optimization of Memristor-Based Framework for Solving SOCP and Homogeneous QCQP Problems L.C.Smith College of Engineering and Computer Science Algorithm-Hardware Co-Optimization of Memristor-Based Framework for Solving SOCP and Homogeneous QCQP Problems Ao Ren Sijia Liu Ruizhe Cai Wujie Wen

More information

Symbolic Computation and Theorem Proving in Program Analysis

Symbolic Computation and Theorem Proving in Program Analysis Symbolic Computation and Theorem Proving in Program Analysis Laura Kovács Chalmers Outline Part 1: Weakest Precondition for Program Analysis and Verification Part 2: Polynomial Invariant Generation (TACAS

More information

Chapter 2: Simplification, Optimization and Implication

Chapter 2: Simplification, Optimization and Implication Chapter : Simplification, Optimization and Implication Where we learn more fun things we can do with constraints. 1 Simplification, Optimization and Implication Constraint Simplification Projection Constraint

More information

From SAT To SMT: Part 1. Vijay Ganesh MIT

From SAT To SMT: Part 1. Vijay Ganesh MIT From SAT To SMT: Part 1 Vijay Ganesh MIT Software Engineering & SMT Solvers An Indispensable Tactic for Any Strategy Formal Methods Program Analysis SE Goal: Reliable/Secure Software Automatic Testing

More information

A Brief Introduction to Model Checking

A Brief Introduction to Model Checking A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:

More information

EMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others

EMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others EMMA : ECDC Mapping and Multilayer Analysis A GIS enterprise solution to EU agency. Sharing experience and learning from the others Lorenzo De Simone, GIS Expert/ EMMA Project Manager 2014 GIS Workshop,

More information

SMT: Satisfiability Modulo Theories

SMT: Satisfiability Modulo Theories SMT: Satisfiability Modulo Theories Ranjit Jhala, UC San Diego April 9, 2013 Decision Procedures Last Time Propositional Logic Today 1. Combining SAT and Theory Solvers 2. Theory Solvers Theory of Equality

More information

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E

More information

Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems

Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties and its Application to Cyber-Physical Systems Alberto Puggelli DREAM Seminar - November 26, 2013 Collaborators and PIs:

More information

Incremental Proof-Based Verification of Compiler Optimizations

Incremental Proof-Based Verification of Compiler Optimizations Incremental Proof-Based Verification of Compiler Optimizations Grigory Fedyukovich joint work with Arie Gurfinkel and Natasha Sharygina 5 of May, 2015, Attersee, Austria counter-example change impact Big

More information

Internals of SMT Solvers. Leonardo de Moura Microsoft Research

Internals of SMT Solvers. Leonardo de Moura Microsoft Research Internals of SMT Solvers Leonardo de Moura Microsoft Research Acknowledgements Dejan Jovanovic (SRI International, NYU) Grant Passmore (Univ. Edinburgh) Herbrand Award 2013 Greg Nelson What is a SMT Solver?

More information

Constraint Solving for Program Verification: Theory and Practice by Example

Constraint Solving for Program Verification: Theory and Practice by Example Constraint Solving for Program Verification: Theory and Practice by Example Andrey Rybalchenko Technische Universität München Abstract. Program verification relies on the construction of auxiliary assertions

More information

A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations

A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH 2007 1 A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir Abstract We present a simple algorithm

More information

Charter for the. Information Transfer and Services Architecture Focus Group

Charter for the. Information Transfer and Services Architecture Focus Group for the Information Transfer and Services Architecture Focus Group 1. PURPOSE 1.1. The purpose of this charter is to establish the Information Transfer and Services Architecture Focus Group (ITSAFG) as

More information

Construction Operation Simulation

Construction Operation Simulation Construction Operation Simulation Lecture #8 Output analysis Amin Alvanchi, PhD Construction Engineering and Management Department of Civil Engineering, Sharif University of Technology Outline 2 Introduction

More information

On Content Indexing for Off-Path Caching in Information-Centric Networks

On Content Indexing for Off-Path Caching in Information-Centric Networks On Content Indexing for Off-Path Caching in Information-Centric Networks Suzan Bayhan, Liang Wang, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft University of Helsinki (Finland), TU Munich

More information

Exploiting resolution proofs to speed up LTL vacuity detection for BMC

Exploiting resolution proofs to speed up LTL vacuity detection for BMC Int J Softw Tools Technol Transfer (20) 12:319 335 DOI.07/s009-009-0134-1 REGULAR PAPER Exploiting resolution proofs to speed up LTL vacuity detection for BMC Jocelyn Simmonds Jessica Davies Arie Gurfinkel

More information

Existence and Consistency in Bounded Arithmetic

Existence and Consistency in Bounded Arithmetic Existence and Consistency in Bounded Arithmetic Yoriyuki Yamagata National Institute of Advanced Science and Technology (AIST) Kusatsu, August 30, 2011 Outline Self introduction Summary Theories of PV

More information

Resilient Formal Synthesis

Resilient Formal Synthesis Resilient Formal Synthesis Calin Belta Boston University CDC 2017 Workshop: 30 years of the Ramadge-Wonham Theory of Supervisory Control: A Retrospective and Future Perspectives Outline Formal Synthesis

More information

Motion planning applications of Satisfiability Modulo Convex Optimization

Motion planning applications of Satisfiability Modulo Convex Optimization Motion planning applications of Satisfiability Modulo Convex Optimization Yasser Shoukry (1) and Paulo Tabuada (2) (1) Department of Electrical and Computer Engineering, UMD (2) Electrical and Computer

More information

Reactive Synthesis. Swen Jacobs VTSA 2013 Nancy, France u

Reactive Synthesis. Swen Jacobs VTSA 2013 Nancy, France u Reactive Synthesis Nancy, France 24.09.2013 u www.iaik.tugraz.at 2 Property Synthesis (You Will Never Code Again) 3 Construct Correct Systems Automatically Don t do the same

More information

USV TEST FLIGHT BY STRATOSPHERIC BALLOON: PRELIMINARY MISSION ANALYSIS

USV TEST FLIGHT BY STRATOSPHERIC BALLOON: PRELIMINARY MISSION ANALYSIS USV TEST FLIGHT BY STRATOSPHERIC BALLOON: PRELIMINARY MISSION ANALYSIS A. Cardillo a, I. Musso a, R. Ibba b, O.Cosentino b a Institute of Information Science and Technologies, National Research Council,

More information

Enhance Security, Safety and Efficiency With Geospatial Visualization

Enhance Security, Safety and Efficiency With Geospatial Visualization Areas within 10 minutes of an exit are emphasized on this map, to give an indication of how accessible neighborhoods are by highway. The colors represent 1, 3, 5 and 10 minute increments from the exits.

More information

Integrating Induction and Deduction for Verification and Synthesis

Integrating Induction and Deduction for Verification and Synthesis Integrating Induction and Deduction for Verification and Synthesis Sanjit A. Seshia Associate Professor EECS Department UC Berkeley DATE 2013 Tutorial March 18, 2013 Bob s Vision: Exploit Synergies between

More information

Application of Tensor and Matrix Completion on Environmental Sensing Data

Application of Tensor and Matrix Completion on Environmental Sensing Data Application of Tensor and Matrix Completion on Environmental Sensing Data Michalis Giannopoulos 1,, Sofia Savvaki 1,, Grigorios Tsagkatakis 1, and Panagiotis Tsakalides 1, 1- Institute of Computer Science

More information

Hoare Logic I. Introduction to Deductive Program Verification. Simple Imperative Programming Language. Hoare Logic. Meaning of Hoare Triples

Hoare Logic I. Introduction to Deductive Program Verification. Simple Imperative Programming Language. Hoare Logic. Meaning of Hoare Triples Hoare Logic I Introduction to Deductive Program Verification Işıl Dillig Program Spec Deductive verifier FOL formula Theorem prover valid contingent Example specs: safety (no crashes), absence of arithmetic

More information

Online Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems

Online Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems Online Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems Song Han 1 Deji Chen 2 Ming Xiong 3 Aloysius K. Mok 1 1 The University of Texas at Austin 2 Emerson Process Management

More information

University of Toronto

University of Toronto Waiting Time Correlations on Disorderly Streetcar Routes by Jeffrey S. Rosenthal Department of Statistics University of Toronto Technical Report No. 0701 February 1, 2007 TECHNICAL REPORT SERIES University

More information

Software Verification with Abstraction-Based Methods

Software Verification with Abstraction-Based Methods Software Verification with Abstraction-Based Methods Ákos Hajdu PhD student Department of Measurement and Information Systems, Budapest University of Technology and Economics MTA-BME Lendület Cyber-Physical

More information

Statistical Privacy For Privacy Preserving Information Sharing

Statistical Privacy For Privacy Preserving Information Sharing Statistical Privacy For Privacy Preserving Information Sharing Johannes Gehrke Cornell University http://www.cs.cornell.edu/johannes Joint work with: Alexandre Evfimievski, Ramakrishnan Srikant, Rakesh

More information

Coding for loss tolerant systems

Coding for loss tolerant systems Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon

More information

Introduction of Recruit

Introduction of Recruit Apr. 11, 2018 Introduction of Recruit We provide various kinds of online services from job search to hotel reservations across the world. Housing Beauty Travel Life & Local O2O Education Automobile Bridal

More information

Feedback Control Theory: Architectures and Tools for Real-Time Decision Making

Feedback Control Theory: Architectures and Tools for Real-Time Decision Making Feedback Control Theory: Architectures and Tools for Real-Time Decision Making Richard M. Murray California Institute of Technology Real-Time Decision Making Bootcamp Simons Institute for the Theory of

More information

Static Program Analysis using Abstract Interpretation

Static Program Analysis using Abstract Interpretation Static Program Analysis using Abstract Interpretation Introduction Static Program Analysis Static program analysis consists of automatically discovering properties of a program that hold for all possible

More information

Attack Graph Modeling and Generation

Attack Graph Modeling and Generation Attack Graph Modeling and Generation Ratnesh Kumar, Professor, IEEE Fellow Electrical and Computer Engineering, Iowa State University PhD Students: Mariam Ibrahim German Jordanian University Attack Graph:

More information

LOGARITHMS. Examples of Evaluating Logarithms by Using the Definition:

LOGARITHMS. Examples of Evaluating Logarithms by Using the Definition: LOGARITHMS Definition of Logarithm: Given: a is a (real) number > 0 but a 1, called the base of the logarithm, and x is a (real) number > 0. log a x is defined to be the number y such that: y is the exponent

More information

r. Matthias Bretschneider amburg - Dept. Safety Fehleranalyse mit Hilfe von Model Checkern

r. Matthias Bretschneider amburg - Dept. Safety Fehleranalyse mit Hilfe von Model Checkern r. Matthias Bretschneider amburg - Dept. Safety Fehleranalyse mit Hilfe von Model Checkern otivation: Design of safe embedded systems X y Sensor(s) Controller Actuator Design Phase Study the effect of

More information

A METHOD OF FINDING IMAGE SIMILAR PATCHES BASED ON GRADIENT-COVARIANCE SIMILARITY

A METHOD OF FINDING IMAGE SIMILAR PATCHES BASED ON GRADIENT-COVARIANCE SIMILARITY IJAMML 3:1 (015) 69-78 September 015 ISSN: 394-58 Available at http://scientificadvances.co.in DOI: http://dx.doi.org/10.1864/ijamml_710011547 A METHOD OF FINDING IMAGE SIMILAR PATCHES BASED ON GRADIENT-COVARIANCE

More information

2nd International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT-2012)

2nd International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT-2012) Estimation of Vehicle State and Road Coefficient for Electric Vehicle through Extended Kalman Filter and RS Approaches IN Cheng 1, WANG Gang 1, a, CAO Wan-ke 1 and ZHOU Feng-jun 1, b 1 The National Engineering

More information

Leonardo de Moura Microsoft Research

Leonardo de Moura Microsoft Research Leonardo de Moura Microsoft Research Logic is The Calculus of Computer Science (Z. Manna). High computational complexity Naïve solutions will not scale Is formula F satisfiable modulo theory T? SMT solvers

More information

Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig

Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 14 Indexes for Multimedia Data 14 Indexes for Multimedia

More information

Supervisory Control: Advanced Theory and Applications

Supervisory Control: Advanced Theory and Applications Supervisory Control: Advanced Theory and Applications Dr Rong Su S1-B1b-59, School of EEE Nanyang Technological University Tel: +65 6790-6042, Email: rsu@ntu.edu.sg EE6226, Discrete Event Systems 1 Introduction

More information

Vinter: A Vampire-Based Tool for Interpolation

Vinter: A Vampire-Based Tool for Interpolation Vinter: A Vampire-Based Tool for Interpolation Kryštof Hoder 1, Andreas Holzer 2, Laura Kovács 2, and Andrei Voronkov 1 1 University of Manchester 2 TU Vienna Abstract. This paper describes the Vinter

More information

A STUDY OF ASYMPTOTIC AVAILABILITY MODELING FOR A FAILURE AND A REPAIR RATES FOLLOWING A WEIBULL DISTRIBUTION

A STUDY OF ASYMPTOTIC AVAILABILITY MODELING FOR A FAILURE AND A REPAIR RATES FOLLOWING A WEIBULL DISTRIBUTION A STUDY OF ASYMPTOTIC AVAILABILITY MODELING FOR A FAILURE AND A REPAIR RATES FOLLOWING A WEIBULL DISTRIBUTION Salem Bahri a, Fethi Ghribi b, Habib Ben Bacha a,c a Electro Mechanical systems laboratory

More information

European Location Framework data in the ArcGIS platform

European Location Framework data in the ArcGIS platform European Location Framework data in the ArcGIS platform Presentation to: Author: Date: INSPIRE Conference 2016 Clemens Portele 26 September 2016 Why ELF? Global (e.g. UN GGIM) Regional Europe (INSPIRE

More information

ArcGIS Online Routing and Network Analysis. Deelesh Mandloi Matt Crowder

ArcGIS Online Routing and Network Analysis. Deelesh Mandloi Matt Crowder ArcGIS Online Routing and Network Analysis Deelesh Mandloi Matt Crowder Introductions Who are we? - Members of the Network Analyst development team Who are you? - Network Analyst users? - ArcGIS Online

More information

Linear Systems Theory

Linear Systems Theory ME 3253 Linear Systems Theory Review Class Overview and Introduction 1. How to build dynamic system model for physical system? 2. How to analyze the dynamic system? -- Time domain -- Frequency domain (Laplace

More information