Quantum Computing Approach to V&V of Complex Systems Overview

Size: px
Start display at page:

Download "Quantum Computing Approach to V&V of Complex Systems Overview"

Transcription

1 Quantum Computing Approach to V&V of Complex Systems Overview Summary of Quantum Enabled V&V Technology June, 04 Todd Belote Chris Elliott Flight Controls / VMS Integration

2 Discussion Layout I. Quantum Computing S/W V&V Overview What is this product and who will use it? Why is this tool unique? Where are the cost savings? LM Aero Flight Control Design Process Improvement II. Hypothetical Example Limiter Software Component in a Flight Control Application III. Summary Technical Description of QCITL S/W V&V Method Limiter Example Finite State Model Example in Design Phase IV. Path Forward

3 What is this product? QVTrace*: This technology is a method for Software Verification & Validation using Quantum Computer Assisted Formal Methods. Requirements And Implementation (Software Code) Quantum V&V Classical Computation Defects (Bugs) Req/Code Inconsistency Report to Designer D-Wave Adiabatic Quantum Computer Who will use it? Target Users are System/Software Design Teams interested in: - Reducing development costs - Improving final product quality *Product Developed by Quantum Research Analytics 3

4 Why is this Tool Unique? Hidden Defects in Safety Critical Software Today If not detected w/ specific Checkcase, leads to failure in field Quantum Verification & Validation Method detects this issue without need for creating specific Checkcase Conventional testing to QVV testing Safety Critical Software State Space Checkcase test spotlight investigates specific area of software state space 4

5 Why is this Tool Unique? Hidden Defects in Safety Critical Software Today If not detected w/ specific Checkcase, leads to failure in field Quantum Verification & Validation Method detects this issue without need for creating specific Checkcase Conventional testing to QVV testing Matrix of Testing Safety Critical Software State Space Checkcase test spotlight investigates specific area of software state space 5

6 Why is this Tool Unique? Hidden Defects in Safety Critical Software Today If not detected w/ specific Checkcase, leads to failure in field Quantum Verification & Validation Method detects this issue without need for creating specific Checkcase Conventional testing to QVV testing Safety Critical Software State Space QVV tests state space in entirety with better scaling using quantum hardware* *Improving the scaling problem with the QC is a theory and remains to be proven 6

7 D-Wave Adiabatic Quantum Computer Current State-of-the-Art DW-: 5-qubit Vesuvius Processor 7

8 Where are the Cost Savings? OLD Requirements (Textual) Design Build Test Planning and Development Test Execution Defects Require Rework Fewer Defects NEW Highly Integrated Verification Requirements Modeling Verification Modeling Design & Analysis Test Generation & Analysis Implementation & Integration Test Execution & Analysis Less Rework Lower Risk Shorter Development Schedule QE-VV Approach Reduces Overall Cost 8 8

9 II. Hypothetical Example Simplified Load Factor Control Block diagram Mission and Flight Control Software Limits Maximum Load Factor Load Factor Limits [g s] Mission Computer Store loading info g cmd [g s] Flight Control Computer surfaces Load factor [g s] Airframe Plant Sensed Load factor [g s] Sensors Mission Computer Computes Bounds for Flight Control Computer Limiter 9

10 Limiter: What is it? Requirement: Ensure a Signal is Bounded by [up, lo] 0

11 Limiter: Bounds May Be Dynamic Dynamic Upper Bound

12 Limiter: Failure in the Field Later detection is expensive and could be dangerous Hypothetical Failure: - External Subsystem Provides Invalid Bound (missed in Stand Alone Test!) - Likely found in Integration or Flight Test Can we find this before the Lab? Or Flight!

13 Quantum Enabled V&V Overview Implementation Requirements SMT Instance False = Defect Space Satisfiability (All-SAT) Modulo Theory (Number Domain) Quantum Computer Ising (Binary Optimization) No Feasible? Consistent Yes Reqs/Implementation Defect Detected Inconsistency in Reqs/Implementation 3

14 Quantum Enabled V&V Overview SMT Instance False = Defect Space Requirements + Implementation are melded into a Satisfiability Modulo Theory (SMT) instance describing behavior of entire system 4

15 End to End Overview (Limiter) THE MELDING Requirements: What we want up >= y >= lo Implementation: What we built (u<up) &(u>lo) y = u (u>up) y = up (u<lo) y = lo Statements are melded together Substitute requirement expression for output variable in implementation as follows: (u<up) &(u>lo) (up > u > lo) (u>up) (up > up > lo) (u<lo) (up > lo > lo) [ ] [ ] Conditions Driving State of Code Imply The Output of the Code for that Condition Agrees with the Requirement for that Output ( s s) ( s3 s4) ( s5 s6) where s = (u<up) &(u>lo) and s = (up>u)&(u>lo) where s3 = (u>up) and s4 = (up>up)&(u>up) where s5 = (u<lo) and s6 = (up>lo)&(lo>lo) Melded Problem Now Represents Requirements and Code 5

16 Quantum Enabled V&V Overview Boolean SAT extracted from SMT instance. Transformed to Ising Formula and Solved for ALL satisfying assignments. Satisfiability (All-SAT) Quantum Computer Ising (Binary Optimization) 6

17 End to End Overview (Limiter) Transform the SAT Statement to Ising - Depict the SAT Statement as a Logical Circuit - Auxiliary Variables are Added after each Logical Operator ( s s) ( s3 s4) ( s5 s6) = FALSE The SAT Logical Circuit Note, The Output Z is set to FALSE as Z = - This is in terms of the AQC Computational Basis {-, +} as opposed to the Typical Binary Computational Basis {0, } 7

18 End to End Overview (Limiter) Using Graph and Energy Equations, Formulate Hamiltonian Expanding Scalar Equation Note: Equation will be normalized in following steps (divided by highest coefficient), due to AQC constraints (Coupler/Edges and Qubits/Node coefficients are bound by +/- ) Note: Constant Terms do not impact the solution that minimizes this equation and are dropped Scalar Hamiltonian 8

19 End to End Overview (Limiter) Embed Graph to AQC Embedding, Expand Problem to Sparse Form, Sized for the AQC Chip, m=5 nodes for Vesuvius s5=64 a3=6 s6=65 c3=66 z3p=6 z3= 98 c=0 s3=60 a= 96 z= 97 zp=0 s4=00 Embedding Heuristics a4=03 c4= 99 z= s=06 c=07 a=0 s=05 Problem Graph Vesuvius Vesuvius Embedding 9

20 End to End Overview (Limiter) Solve Ising Problem with AQC (Adiabatic Quantum Computer) Due to the Stochastic Nature of the D-Wave Quantum Annealing Process, the Ising Problem is solved multiple times and a probability distribution of the solution is formulated. The lowest energy groundstate is returned as the potential defect space phase of analysis for the next Elliott.\matlab-pack-.5.-beta4 Analysis 60 The solution represents the Satisfying Argument to the SMT instance. If the solution is determined to be feasible (to be discussed), a defect has been identified. #(QC) Energy (QC) Adiabatic Quantum Computer Stochastic Distribution 0

21 Quantum Enabled V&V Overview Step 3: - Modulo/Number Theory Problem - Classical Solver Conduct Feasibility Analysis Using AQC Output (Adiabatic Quantum Computer Ground State Solution of SMT Instance) Modulo Theory (Number Domain) No Feasible? Consistent Yes Reqs/Implementation Defect Detected Inconsistency in Reqs/Implementation

22 End to End Overview (Limiter) Modulo/Number Theory Problem - Classical Solver Conduct Feasibility Analysis Using AQC Output (Adiabatic Quantum Computer Ground State Solution of SMT Instance) Using a Modulo Theory Solver (MTS) determine feasibility of all ground state solutions (37 in this case) { False, False, False, True, True, False } { s & s & s3 & s4 & s5 & s6 } Given these modulo definitions, Statement Always Unsatisfiable Therefore we conclude an Solution is INFEASIBLE -> DEFECT FREE s = (u<up) &(u>lo) s = (up>u)&(u>lo) s3 = (u>up) s4 = (up>up)&(u>up) s5 = (u<lo) s6 = (up>lo)&(lo>lo) not u < lo or not lo <= up or up < u or not up <= up or lo <= lo and lo <= up or lo <= u and u <= up However, Swapped Bounds Problem is Detected in of the 37 Quantum Solutions up [8,8] (point interval) lo [35,35] (point interval) u [3,3] (point interval) SATISFIABLE Feasible Ground State BUG Detected!

23 QE-V&V Example 0 Constant5 standby request request Constant6 Manual Switch 0 Constant APfailure mode mode Constant Manual Switch 0 Constant8 supported maneuver maneuver Constant7 Manual Switch3 0 Constant4 SENfailure good good Constant3 Manual Switch4 AUTOPILOT 3

24 QE-V&V Example AUTOPILOT SENSOR TRANSITION mode=0; request=; maneuver=0; [supported && good] [!standby] [standby] NOMINAL mode=; request=; maneuver=0; NOMINAL good=; [!request] [request&&mode] [SENfailure] [supported && good] [standby] STANDBY mode=; request=0; maneuver=0; [standby && good] [APfailure] MANEUVER mode=; request=0; %designfix maneuver=; [!good] TRANSITION good=; FAULT good=0; [!request!senfailure] 4

25 QE-V&V Example AUTOPILOT SENSOR TRANSITION mode=0; request=; maneuver=0; [supported && good] [!standby] [standby] NOMINAL mode=; request=; maneuver=0; NOMINAL good=; [!request] [request&&mode] [SENfailure] [supported && good] [standby] STANDBY mode=; request=0; maneuver=0; [standby && good] [APfailure] MANEUVER mode=; request=0; %designfix maneuver=; [!good] TRANSITION good=; FAULT good=0; [!request!senfailure] Two Independently Designed Systems Can Often Create Problems 5

26 QE-V&V Example AUTOPILOT SENSOR TRANSITION mode=0; request=; maneuver=0; [supported && good] [!standby] [standby] NOMINAL mode=; request=; maneuver=0; NOMINAL good=; [!request] [request&&mode] [SENfailure] [supported && good] [standby] STANDBY mode=; request=0; maneuver=0; [standby && good] [APfailure] MANEUVER mode=; request=0; %designfix maneuver=; [!good] TRANSITION good=; FAULT good=0; [!request!senfailure] QE-V&V Detects This Anomalous Behavior And Allows Proactive System Design 6

27 Path Forward LM Aero QE-VV Capability Nearing Point of Testing Realistic Model Examples Established Tool Compatibility with Simulink Primitive Components Models include Nonlinear Algorithms, States, Lookup Tables, and Complex Signal Types Focus on Challenge of Optimizing Temporal Unrolling and Property Proving of Models with Multiple States Sensitivity Studies to Be Conducted on Probability of Determining All Ground States V&V Confidence Benchmark Data on QE-VV Method with DW in the Loop Please Contact Us! TODD BELOTE, CHRIS ELLIOTT,

28 8

29 9

30 30

31 3

Chris Elliott Flight Controls / Quantum Computing. Copyright 2015, Lockheed Martin Corporation. All rights reserved.

Chris Elliott Flight Controls / Quantum Computing. Copyright 2015, Lockheed Martin Corporation. All rights reserved. On Example Models and Challenges Ahead for the Evaluation of Complex Cyber-Physical Systems with State of the Art Formal Methods V&V Research in Quantum Enabled V&V Technology June 9-11, 2015 Chris Elliott

More information

Cyber-Physical V&V Challenges for the Evaluation of State of the Art Model Checkers

Cyber-Physical V&V Challenges for the Evaluation of State of the Art Model Checkers Cyber-Physical V&V Challenges for the Evaluation of State of the Art Model Checkers Research in Quantum Enabled V&V Technology July 12-14, 2016 Chris Elliott Flight Controls / Quantum Computing Overview

More information

A Quantum Computing Approach to the Verification and Validation of Complex Cyber-Physical Systems

A Quantum Computing Approach to the Verification and Validation of Complex Cyber-Physical Systems A Quantum Computing Approach to the Verification and Validation of Complex Cyber-Physical Systems Achieving Quality and Cost Control in the Development of Enormous Systems Safe and Secure Systems and Software

More information

Quantum Annealing and the Satisfiability Problem

Quantum Annealing and the Satisfiability Problem arxiv:1612.7258v1 [quant-ph] 21 Dec 216 Quantum Annealing and the Satisfiability Problem 1. Introduction Kristen L PUDENZ 1, Gregory S TALLANT, Todd R BELOTE, and Steven H ADACHI Lockheed Martin, United

More information

LOCKHEED MARTIN SITE UPDATE

LOCKHEED MARTIN SITE UPDATE LOCKHEED MARTIN SITE UPDATE 25 SEPTEMBER 2018 Julia Kwok Software Engineer Quantum Applications THE USC-LM QUANTUM COMPUTING CENTER Dr. Edward H. Ned Allen Chief Scientist and LM Senior Fellow Lockheed

More information

LOCKHEED MARTIN SITE UPDATE 11 APRIL 2018 MUNICH, GERMANY Kristen Pudenz Senior Quantum Applications Engineer

LOCKHEED MARTIN SITE UPDATE 11 APRIL 2018 MUNICH, GERMANY Kristen Pudenz Senior Quantum Applications Engineer LOCKHEED MARTIN SITE UPDATE 11 APRIL 2018 MUNICH, GERMANY Kristen Pudenz Senior Quantum Applications Engineer THE USC-LM QUANTUM COMPUTING CENTER Dr. Edward H. Ned Allen Chief Scientist and LM Senior Fellow

More information

Information Flow Analysis via Path Condition Refinement

Information Flow Analysis via Path Condition Refinement Information Flow Analysis via Path Condition Refinement Mana Taghdiri, Gregor Snelting, Carsten Sinz Karlsruhe Institute of Technology, Germany FAST September 16, 2010 KIT University of the State of Baden-Wuerttemberg

More information

Scalable and Accurate Verification of Data Flow Systems. Cesare Tinelli The University of Iowa

Scalable and Accurate Verification of Data Flow Systems. Cesare Tinelli The University of Iowa Scalable and Accurate Verification of Data Flow Systems Cesare Tinelli The University of Iowa Overview AFOSR Supported Research Collaborations NYU (project partner) Chalmers University (research collaborator)

More information

V&V of Complex Systems

V&V of Complex Systems V&V of Complex Systems Bill Lanz and Hussein Youssef S5 Symposium- Beavercreek, OH June 14-16, 2011 1 Introduction Current methods of V&V, which certify that the software is fit for use, require a significant

More information

REPORT DOCUMENTATION PAGE

REPORT DOCUMENTATION PAGE REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,

More information

Formal Verification Techniques. Riccardo Sisto, Politecnico di Torino

Formal Verification Techniques. Riccardo Sisto, Politecnico di Torino Formal Verification Techniques Riccardo Sisto, Politecnico di Torino State exploration State Exploration and Theorem Proving Exhaustive exploration => result is certain (correctness or noncorrectness proof)

More information

Interpolation. Seminar Slides. Betim Musa. 27 th June Albert-Ludwigs-Universität Freiburg

Interpolation. Seminar Slides. Betim Musa. 27 th June Albert-Ludwigs-Universität Freiburg Interpolation Seminar Slides Albert-Ludwigs-Universität Freiburg Betim Musa 27 th June 2015 Motivation program add(int a, int b) { var x,i : int; l 0 assume(b 0); l 1 x := a; l 2 i := 0; while(i < b) {

More information

Quantum Classification of Malware

Quantum Classification of Malware Quantum Classification of Malware John Seymour seymour1@umbc.edu Charles Nicholas nicholas@umbc.edu August 24, 2015 Abstract Quantum computation has recently become an important area for security research,

More information

SMT BASICS WS 2017/2018 ( ) LOGIC SATISFIABILITY MODULO THEORIES. Institute for Formal Models and Verification Johannes Kepler Universität Linz

SMT BASICS WS 2017/2018 ( ) LOGIC SATISFIABILITY MODULO THEORIES. Institute for Formal Models and Verification Johannes Kepler Universität Linz LOGIC SATISFIABILITY MODULO THEORIES SMT BASICS WS 2017/2018 (342.208) Armin Biere Martina Seidl biere@jku.at martina.seidl@jku.at Institute for Formal Models and Verification Johannes Kepler Universität

More information

arxiv: v2 [quant-ph] 2 Oct 2014

arxiv: v2 [quant-ph] 2 Oct 2014 A Quantum Annealing Approach for Fault Detection and Diagnosis of Graph-Based Systems Alejandro Perdomo-Ortiz,, 2, a) Joseph Fluegemann,, 3 Sriram Narasimhan, 2 Rupak Biswas, and Vadim N. Smelyanskiy )

More information

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for? Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits

More information

Ranking Verification Counterexamples: An Invariant guided approach

Ranking Verification Counterexamples: An Invariant guided approach Ranking Verification Counterexamples: An Invariant guided approach Ansuman Banerjee Indian Statistical Institute Joint work with Pallab Dasgupta, Srobona Mitra and Harish Kumar Complex Systems Everywhere

More information

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT 1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations

More information

Quantum computing with superconducting qubits Towards useful applications

Quantum computing with superconducting qubits Towards useful applications Quantum computing with superconducting qubits Towards useful applications Stefan Filipp IBM Research Zurich Switzerland Forum Teratec 2018 June 20, 2018 Palaiseau, France Why Quantum Computing? Why now?

More information

Integrating Induction and Deduction for Verification and Synthesis

Integrating Induction and Deduction for Verification and Synthesis Integrating Induction and Deduction for Verification and Synthesis Sanjit A. Seshia Associate Professor EECS Department UC Berkeley DATE 2013 Tutorial March 18, 2013 Bob s Vision: Exploit Synergies between

More information

ISM Evolution. Elscolab. Nederland BV

ISM Evolution. Elscolab. Nederland BV ISM Evolution Agenda Introduction Marketing Strategy ISM Concept & Technology Product Offering Applications Digital Communication and ISM Outlook 1 Agenda Introduction Marketing Strategy ISM Concept &

More information

Gates for Adiabatic Quantum Computing

Gates for Adiabatic Quantum Computing Gates for Adiabatic Quantum Computing Richard H. Warren Abstract. The goal of this paper is to introduce building blocks for adiabatic quantum algorithms. Adiabatic quantum computing uses the principle

More information

Stability and Stabilization of polynomial dynamical systems. Hadi Ravanbakhsh Sriram Sankaranarayanan University of Colorado, Boulder

Stability and Stabilization of polynomial dynamical systems. Hadi Ravanbakhsh Sriram Sankaranarayanan University of Colorado, Boulder Stability and Stabilization of polynomial dynamical systems Hadi Ravanbakhsh Sriram Sankaranarayanan University of Colorado, Boulder Proving Asymptotic Stability: Lyapunov Functions Lyapunov Function:

More information

Real-time Systems: Scheduling Periodic Tasks

Real-time Systems: Scheduling Periodic Tasks Real-time Systems: Scheduling Periodic Tasks Advanced Operating Systems Lecture 15 This work is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License. To view a copy of

More information

Quantum Effect or HPC without FLOPS. Lugano March 23, 2016

Quantum Effect or HPC without FLOPS. Lugano March 23, 2016 Quantum Effect or HPC without FLOPS Lugano March 23, 2016 Electronics April 19, 1965 2016 D-Wave Systems Inc. All Rights Reserved 2 Moore s Law 2016 D-Wave Systems Inc. All Rights Reserved 3 www.economist.com/technology-quarterly/2016-03-12/aftermoores-law

More information

Announcements. Project #1 grades were returned on Monday. Midterm #1. Project #2. Requests for re-grades due by Tuesday

Announcements. Project #1 grades were returned on Monday. Midterm #1. Project #2. Requests for re-grades due by Tuesday Announcements Project #1 grades were returned on Monday Requests for re-grades due by Tuesday Midterm #1 Re-grade requests due by Monday Project #2 Due 10 AM Monday 1 Page State (hardware view) Page frame

More information

ANALYZING REAL TIME LINEAR CONTROL SYSTEMS USING SOFTWARE VERIFICATION. Parasara Sridhar Duggirala UConn Mahesh Viswanathan UIUC

ANALYZING REAL TIME LINEAR CONTROL SYSTEMS USING SOFTWARE VERIFICATION. Parasara Sridhar Duggirala UConn Mahesh Viswanathan UIUC ANALYZING REAL TIME LINEAR CONTROL SYSTEMS USING SOFTWARE VERIFICATION Parasara Sridhar Duggirala UConn Mahesh Viswanathan UIUC Real-Time Systems Linear Control Systems Verification Verification Control

More information

Canary Foundation at Stanford. D-Wave Systems Murray Thom February 27 th, 2017

Canary Foundation at Stanford. D-Wave Systems Murray Thom February 27 th, 2017 Canary Foundation at Stanford D-Wave Systems Murray Thom February 27 th, 2017 Introduction to Quantum Computing Copyright D-Wave Systems Inc. 3 Richard Feynman 1960 1970 1980 1990 2000 2010 2020 Copyright

More information

Generating Hard but Solvable SAT Formulas

Generating Hard but Solvable SAT Formulas Generating Hard but Solvable SAT Formulas T-79.7003 Research Course in Theoretical Computer Science André Schumacher October 18, 2007 1 Introduction The 3-SAT problem is one of the well-known NP-hard problems

More information

SAT-Solvers: propositional logic in action

SAT-Solvers: propositional logic in action SAT-Solvers: propositional logic in action Russell Impagliazzo, with assistence from Cameron Held October 22, 2013 1 Personal Information A reminder that my office is 4248 CSE, my office hours for CSE

More information

Qubits qop Tools Directions

Qubits qop Tools Directions Qubits qop Tools Directions Steve Reinhardt Director of Software Tools D-Wave Systems The qop goals are to establish key abstractions that are valuable for applications and higherlevel tools and effectively

More information

Introduction to Adiabatic Quantum Computation

Introduction to Adiabatic Quantum Computation Introduction to Adiabatic Quantum Computation Vicky Choi Department of Computer Science Virginia Tech April 6, 2 Outline Motivation: Maximum Independent Set(MIS) Problem vs Ising Problem 2 Basics: Quantum

More information

Algorithmic verification

Algorithmic verification Algorithmic verification Ahmed Rezine IDA, Linköpings Universitet Hösttermin 2018 Outline Overview Model checking Symbolic execution Outline Overview Model checking Symbolic execution Program verification

More information

Exploring reverse annealing as a tool for hybrid quantum/classical computing

Exploring reverse annealing as a tool for hybrid quantum/classical computing Exploring reverse annealing as a tool for hybrid quantum/classical computing University of Zagreb QuantiXLie Seminar Nicholas Chancellor October 12, 2018 Talk structure 1. Background Quantum computing:

More information

Opportunities and challenges in quantum-enhanced machine learning in near-term quantum computers

Opportunities and challenges in quantum-enhanced machine learning in near-term quantum computers Opportunities and challenges in quantum-enhanced machine learning in near-term quantum computers Alejandro Perdomo-Ortiz Senior Research Scientist, Quantum AI Lab. at NASA Ames Research Center and at the

More information

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University Algorithms NP -Complete Problems Dong Kyue Kim Hanyang University dqkim@hanyang.ac.kr The Class P Definition 13.2 Polynomially bounded An algorithm is said to be polynomially bounded if its worst-case

More information

DVClub Europe Formal fault analysis for ISO fault metrics on real world designs. Jörg Große Product Manager Functional Safety November 2016

DVClub Europe Formal fault analysis for ISO fault metrics on real world designs. Jörg Große Product Manager Functional Safety November 2016 DVClub Europe Formal fault analysis for ISO 26262 fault metrics on real world designs Jörg Große Product Manager Functional Safety November 2016 Page 1 11/27/2016 Introduction Functional Safety The objective

More information

How can ideas from quantum computing improve or speed up neuromorphic models of computation?

How can ideas from quantum computing improve or speed up neuromorphic models of computation? Neuromorphic Computation: Architectures, Models, Applications Associative Memory Models with Adiabatic Quantum Optimization Kathleen Hamilton, Alexander McCaskey, Jonathan Schrock, Neena Imam and Travis

More information

Reduction of Detected Acceptable Faults for Yield Improvement via Error-Tolerance

Reduction of Detected Acceptable Faults for Yield Improvement via Error-Tolerance Reduction of Detected Acceptable Faults for Yield Improvement via Error-Tolerance Tong-Yu Hsieh and Kuen-Jong Lee Department of Electrical Engineering National Cheng Kung University Tainan, Taiwan 70101

More information

Introduction to Arti Intelligence

Introduction to Arti Intelligence Introduction to Arti Intelligence cial Lecture 4: Constraint satisfaction problems 1 / 48 Constraint satisfaction problems: Today Exploiting the representation of a state to accelerate search. Backtracking.

More information

Incremental Proof-Based Verification of Compiler Optimizations

Incremental Proof-Based Verification of Compiler Optimizations Incremental Proof-Based Verification of Compiler Optimizations Grigory Fedyukovich joint work with Arie Gurfinkel and Natasha Sharygina 5 of May, 2015, Attersee, Austria counter-example change impact Big

More information

Testing System Conformance for Cyber-Physical Systems

Testing System Conformance for Cyber-Physical Systems Testing System Conformance for Cyber-Physical Systems Testing systems by walking the dog Rupak Majumdar Max Planck Institute for Software Systems Joint work with Vinayak Prabhu (MPI-SWS) and Jyo Deshmukh

More information

AFRL-RI-RS-TR

AFRL-RI-RS-TR AFRL-RI-RS-TR-2014-193 A QUANTUM COMPUTING APPROACH TO MODEL CHECKING FOR ADVANCED MANUFACTURING PROBLEMS UNIVERSITY OF SOUTHERN CALIFORNIA INFORMATION SCIENCES INSTITUTE JULY 2014 FINAL TECHNICAL REPORT

More information

PERFORMANCE METRICS. Mahdi Nazm Bojnordi. CS/ECE 6810: Computer Architecture. Assistant Professor School of Computing University of Utah

PERFORMANCE METRICS. Mahdi Nazm Bojnordi. CS/ECE 6810: Computer Architecture. Assistant Professor School of Computing University of Utah PERFORMANCE METRICS Mahdi Nazm Bojnordi Assistant Professor School of Computing University of Utah CS/ECE 6810: Computer Architecture Overview Announcement Jan. 17 th : Homework 1 release (due on Jan.

More information

Symbolic Trajectory Evaluation (STE): Orna Grumberg Technion, Israel

Symbolic Trajectory Evaluation (STE): Orna Grumberg Technion, Israel Symbolic Trajectory Evaluation (STE): Automatic Refinement and Vacuity Detection Orna Grumberg Technion, Israel Marktoberdort 2007 1 Agenda Model checking Symbolic Trajectory Evaluation Basic Concepts

More information

Introduction to Artificial Intelligence Propositional Logic & SAT Solving. UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010

Introduction to Artificial Intelligence Propositional Logic & SAT Solving. UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010 Introduction to Artificial Intelligence Propositional Logic & SAT Solving UIUC CS 440 / ECE 448 Professor: Eyal Amir Spring Semester 2010 Today Representation in Propositional Logic Semantics & Deduction

More information

Validating QBF Invalidity in HOL4

Validating QBF Invalidity in HOL4 Interactive Theorem Proving (ITP) 14 July, 2010 Quantified Boolean Formulae Quantified Boolean Formulae Motivation System Overview Related Work QBF = propositional logic + quantifiers over Boolean variables

More information

PROPOSITIONAL LOGIC. VL Logik: WS 2018/19

PROPOSITIONAL LOGIC. VL Logik: WS 2018/19 PROPOSITIONAL LOGIC VL Logik: WS 2018/19 (Version 2018.2) Martina Seidl (martina.seidl@jku.at), Armin Biere (biere@jku.at) Institut für Formale Modelle und Verifikation BOX Game: Rules 1. The game board

More information

EE 4443/5329. LAB 3: Control of Industrial Systems. Simulation and Hardware Control (PID Design) The Torsion Disks. (ECP Systems-Model: 205)

EE 4443/5329. LAB 3: Control of Industrial Systems. Simulation and Hardware Control (PID Design) The Torsion Disks. (ECP Systems-Model: 205) EE 4443/539 LAB 3: Control of Industrial Systems Simulation and Hardware Control (PID Design) The Torsion Disks (ECP Systems-Model: 05) Compiled by: Nitin Swamy Email: nswamy@lakeshore.uta.edu Email: okuljaca@lakeshore.uta.edu

More information

CMP 338: Third Class

CMP 338: Third Class CMP 338: Third Class HW 2 solution Conversion between bases The TINY processor Abstraction and separation of concerns Circuit design big picture Moore s law and chip fabrication cost Performance What does

More information

of an algorithm for automated cause-consequence diagram construction.

of an algorithm for automated cause-consequence diagram construction. Loughborough University Institutional Repository Development of an algorithm for automated cause-consequence diagram construction. This item was submitted to Loughborough University's Institutional Repository

More information

Sciduction: Combining Induction, Deduction, and Structure for Verification and Synthesis

Sciduction: Combining Induction, Deduction, and Structure for Verification and Synthesis Sciduction: Combining Induction, Deduction, and Structure for Verification and Synthesis Sanjit A. Seshia University of California, Berkeley sseshia@eecs.berkeley.edu Abstract Even with impressive advances

More information

CSE507. Course Introduction. Computer-Aided Reasoning for Software. Emina Torlak

CSE507. Course Introduction. Computer-Aided Reasoning for Software. Emina Torlak Computer-Aided Reasoning for Software CSE507 courses.cs.washington.edu/courses/cse507/14au/ Course Introduction Emina Torlak emina@cs.washington.edu Today What is this course about? Course logistics Review

More information

The Quantum Supremacy Experiment

The Quantum Supremacy Experiment The Quantum Supremacy Experiment John Martinis, Google & UCSB New tests of QM: Does QM work for 10 15 Hilbert space? Does digitized error model also work? Demonstrate exponential computing power: Check

More information

Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods

Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods Sanjit A. Seshia and Randal E. Bryant Computer Science Department Carnegie Mellon University Verifying Timed Embedded Systems

More information

CSE507. Introduction. Computer-Aided Reasoning for Software. Emina Torlak courses.cs.washington.edu/courses/cse507/17wi/

CSE507. Introduction. Computer-Aided Reasoning for Software. Emina Torlak courses.cs.washington.edu/courses/cse507/17wi/ Computer-Aided Reasoning for Software CSE507 courses.cs.washington.edu/courses/cse507/17wi/ Introduction Emina Torlak emina@cs.washington.edu Today What is this course about? Course logistics Review of

More information

An Introduction to Z3

An Introduction to Z3 An Introduction to Z3 Huixing Fang National Trusted Embedded Software Engineering Technology Research Center April 12, 2017 Outline 1 SMT 2 Z3 Huixing Fang (ECNU) An Introduction to Z3 April 12, 2017 2

More information

Plasma: A new SMC Checker. Axel Legay. In collaboration with L. Traonouez and S. Sedwards.

Plasma: A new SMC Checker. Axel Legay. In collaboration with L. Traonouez and S. Sedwards. Plasma: A new SMC Checker Axel Legay In collaboration with L. Traonouez and S. Sedwards. 1 Plasma Lab A PLAtform for Statistical Model Analysis A library of statistical model-checking algorithms (Monte-Carlo,

More information

Testability. Shaahin Hessabi. Sharif University of Technology. Adapted from the presentation prepared by book authors.

Testability. Shaahin Hessabi. Sharif University of Technology. Adapted from the presentation prepared by book authors. Testability Lecture 6: Logic Simulation Shaahin Hessabi Department of Computer Engineering Sharif University of Technology Adapted from the presentation prepared by book authors Slide 1 of 27 Outline What

More information

LOGIC PROPOSITIONAL REASONING

LOGIC PROPOSITIONAL REASONING LOGIC PROPOSITIONAL REASONING WS 2017/2018 (342.208) Armin Biere Martina Seidl biere@jku.at martina.seidl@jku.at Institute for Formal Models and Verification Johannes Kepler Universität Linz Version 2018.1

More information

Propositional Logic: Evaluating the Formulas

Propositional Logic: Evaluating the Formulas Institute for Formal Models and Verification Johannes Kepler University Linz VL Logik (LVA-Nr. 342208) Winter Semester 2015/2016 Propositional Logic: Evaluating the Formulas Version 2015.2 Armin Biere

More information

Lecture 2: Symbolic Model Checking With SAT

Lecture 2: Symbolic Model Checking With SAT Lecture 2: Symbolic Model Checking With SAT Edmund M. Clarke, Jr. School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 (Joint work over several years with: A. Biere, A. Cimatti, Y.

More information

Formal Verification of Mathematical Algorithms

Formal Verification of Mathematical Algorithms Formal Verification of Mathematical Algorithms 1 Formal Verification of Mathematical Algorithms John Harrison Intel Corporation The cost of bugs Formal verification Levels of verification HOL Light Formalizing

More information

VLSI Design I. Defect Mechanisms and Fault Models

VLSI Design I. Defect Mechanisms and Fault Models VLSI Design I Defect Mechanisms and Fault Models He s dead Jim... Overview Defects Fault models Goal: You know the difference between design and fabrication defects. You know sources of defects and you

More information

Special Nodes for Interface

Special Nodes for Interface fi fi Special Nodes for Interface SW on processors Chip-level HW Board-level HW fi fi C code VHDL VHDL code retargetable compilation high-level synthesis SW costs HW costs partitioning (solve ILP) cluster

More information

Latches. October 13, 2003 Latches 1

Latches. October 13, 2003 Latches 1 Latches The second part of CS231 focuses on sequential circuits, where we add memory to the hardware that we ve already seen. Our schedule will be very similar to before: We first show how primitive memory

More information

Embedded Systems Development

Embedded Systems Development Embedded Systems Development Lecture 3 Real-Time Scheduling Dr. Daniel Kästner AbsInt Angewandte Informatik GmbH kaestner@absint.com Model-based Software Development Generator Lustre programs Esterel programs

More information

Binary addition example worked out

Binary addition example worked out Binary addition example worked out Some terms are given here Exercise: what are these numbers equivalent to in decimal? The initial carry in is implicitly 0 1 1 1 0 (Carries) 1 0 1 1 (Augend) + 1 1 1 0

More information

Runtime Model Predictive Verification on Embedded Platforms 1

Runtime Model Predictive Verification on Embedded Platforms 1 Runtime Model Predictive Verification on Embedded Platforms 1 Pei Zhang, Jianwen Li, Joseph Zambreno, Phillip H. Jones, Kristin Yvonne Rozier Presenter: Pei Zhang Iowa State University peizhang@iastate.edu

More information

An Efficient Energy-Optimal Device-Scheduling Algorithm for Hard Real-Time Systems

An Efficient Energy-Optimal Device-Scheduling Algorithm for Hard Real-Time Systems An Efficient Energy-Optimal Device-Scheduling Algorithm for Hard Real-Time Systems S. Chakravarthula 2 S.S. Iyengar* Microsoft, srinivac@microsoft.com Louisiana State University, iyengar@bit.csc.lsu.edu

More information

Software Verification

Software Verification Software Verification Grégoire Sutre LaBRI, University of Bordeaux, CNRS, France Summer School on Verification Technology, Systems & Applications September 2008 Grégoire Sutre Software Verification VTSA

More information

State Space Search Problems

State Space Search Problems State Space Search Problems Lecture Heuristic Search Stefan Edelkamp 1 Overview Different state space formalisms, including labelled, implicit and explicit weighted graph representations Alternative formalisms:

More information

CMOS Ising Computer to Help Optimize Social Infrastructure Systems

CMOS Ising Computer to Help Optimize Social Infrastructure Systems FEATURED ARTICLES Taking on Future Social Issues through Open Innovation Information Science for Greater Industrial Efficiency CMOS Ising Computer to Help Optimize Social Infrastructure Systems As the

More information

Mixed Criticality in Safety-Critical Systems. LS 12, TU Dortmund

Mixed Criticality in Safety-Critical Systems. LS 12, TU Dortmund Mixed Criticality in Safety-Critical Systems Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 18, July, 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 25 Motivation today s embedded systems use complex

More information

CSE370: Introduction to Digital Design

CSE370: Introduction to Digital Design CSE370: Introduction to Digital Design Course staff Gaetano Borriello, Brian DeRenzi, Firat Kiyak Course web www.cs.washington.edu/370/ Make sure to subscribe to class mailing list (cse370@cs) Course text

More information

Introduction to Model Checking. Debdeep Mukhopadhyay IIT Madras

Introduction to Model Checking. Debdeep Mukhopadhyay IIT Madras Introduction to Model Checking Debdeep Mukhopadhyay IIT Madras How good can you fight bugs? Comprising of three parts Formal Verification techniques consist of three parts: 1. A framework for modeling

More information

Financial Portfolio Management using D-Wave s Quantum Optimizer: The Case of Abu Dhabi Securities Exchange

Financial Portfolio Management using D-Wave s Quantum Optimizer: The Case of Abu Dhabi Securities Exchange Financial Portfolio Management using D-Wave s Quantum Optimizer: The Case of Abu Dhabi Securities Exchange Nada Elsokkary and Faisal Shah Khan Quantum Computing Research Group Department of Applied Mathematics

More information

BMS. comemso. Battery Cell Simulator. Battery Cell Simulation virtual Battery. BCS Generation 6. Battery. Battery Management System (BMS)

BMS. comemso. Battery Cell Simulator. Battery Cell Simulation virtual Battery. BCS Generation 6. Battery. Battery Management System (BMS) BCS Generation 6 C Battery Simulation virtual Battery Battery Battery Management System () Copyright 2013. Alle Rechte vorbehalten. (BCS) Features supply range 0.01 8V up to 5A Accuracy +/-500µV 38HU System

More information

COEN6551: Formal Hardware Verification

COEN6551: Formal Hardware Verification COEN6551: Formal Hardware Verification Prof. Sofiène Tahar Hardware Verification Group Electrical and Computer Engineering Concordia University Montréal, Quebec CANADA Accident at Carbide plant, India

More information

The D-Wave 2X Quantum Computer Technology Overview

The D-Wave 2X Quantum Computer Technology Overview The D-Wave 2X Quantum Computer Technology Overview D-Wave Systems Inc. www.dwavesys.com Quantum Computing for the Real World Founded in 1999, D-Wave Systems is the world s first quantum computing company.

More information

Product Quality README file for GOME Level 1b version 5.1 dataset

Product Quality README file for GOME Level 1b version 5.1 dataset Product Quality README file for GOME Level 1b version 5.1 dataset Field Content Document Title Product Quality Readme file: GOME Level 1b version 5.1 dataset Reference ESA-EOPG-MOM-TN-13, issue 1.0, 15/06/2018

More information

System Roadmap. Qubits 2018 D-Wave Users Conference Knoxville. Jed Whittaker D-Wave Systems Inc. September 25, 2018

System Roadmap. Qubits 2018 D-Wave Users Conference Knoxville. Jed Whittaker D-Wave Systems Inc. September 25, 2018 System Roadmap Qubits 2018 D-Wave Users Conference Knoxville Jed Whittaker D-Wave Systems Inc. September 25, 2018 Overview Where are we today? annealing options reverse annealing quantum materials simulation

More information

arxiv: v1 [quant-ph] 17 Apr 2017

arxiv: v1 [quant-ph] 17 Apr 2017 A NASA Perspective on Quantum Computing: Opportunities and Challenges arxiv:1704.04836v1 [quant-ph] 17 Apr 2017 Rupak Biswas, Zhang Jiang, Kostya Kechezhi, Sergey Knysh, Salvatore Mandrà, Bryan O Gorman,

More information

MathCheck2: A SAT+CAS Verifier for Combinatorial Conjectures

MathCheck2: A SAT+CAS Verifier for Combinatorial Conjectures MathCheck2: A SAT+CAS Verifier for Combinatorial Conjectures Curtis Bright University of Waterloo May 13, 2016 1 / 26 Motivation The research areas of SMT [SAT-Modulo-Theories] solving and symbolic computation

More information

ECE 3060 VLSI and Advanced Digital Design. Testing

ECE 3060 VLSI and Advanced Digital Design. Testing ECE 3060 VLSI and Advanced Digital Design Testing Outline Definitions Faults and Errors Fault models and definitions Fault Detection Undetectable Faults can be used in synthesis Fault Simulation Observability

More information

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace Quantum Computing Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September 2010 10:00am PST, Teleplace The Hope All computing is constrained by the laws of Physics and

More information

Digital Systems. Validation, verification. R. Pacalet January 4, 2018

Digital Systems. Validation, verification. R. Pacalet January 4, 2018 Digital Systems Validation, verification R. Pacalet January 4, 2018 2/98 Simulation Extra design tasks Reference model Simulation environment A simulation cannot be exhaustive Can discover a bug Cannot

More information

Requirements Validation. Content. What the standards say (*) ?? Validation, Verification, Accreditation!! Correctness and completeness

Requirements Validation. Content. What the standards say (*) ?? Validation, Verification, Accreditation!! Correctness and completeness Requirements Validation Requirements Management Requirements Validation?? Validation, Verification, Accreditation!! Check if evrything is OK With respect to what? Mesurement associated with requirements

More information

Dynamic simulation of DH house stations

Dynamic simulation of DH house stations Article Dynamic simulation of DH house stations Jan Eric Thorsen, Director, DHS Application Centre, Danfoss A/S www.danfoss.com Jan Eric Thorsen, Director, DHS Application Centre, Danfoss A/S Presented

More information

Common Cause Failure (CCF)

Common Cause Failure (CCF) Common Cause Failure (CCF) 건국대학교컴퓨터공학과 UC Lab. 정혁준 & 박경식 amitajung@naver.com, kyeongsik@konkuk.ac.kr Contents Common Cause Failure (CCF) Types of CCF Examples Reducing CCF Common Cause Failure (CCF) Definition

More information

Introduction to Quantum Computing D-Wave Background D-Wave System Programming Environment Potential Applications

Introduction to Quantum Computing D-Wave Background D-Wave System Programming Environment Potential Applications Topics Introduction to Quantum omputing D-Wave Background D-Wave System Programming Environment Potential Applications opyright D-Wave Systems Inc. 1 D-Wave Software Environment APPLIATIONS Environment/

More information

Tradeoff between Reliability and Power Management

Tradeoff between Reliability and Power Management Tradeoff between Reliability and Power Management 9/1/2005 FORGE Lee, Kyoungwoo Contents 1. Overview of relationship between reliability and power management 2. Dakai Zhu, Rami Melhem and Daniel Moss e,

More information

Hoare Logic I. Introduction to Deductive Program Verification. Simple Imperative Programming Language. Hoare Logic. Meaning of Hoare Triples

Hoare Logic I. Introduction to Deductive Program Verification. Simple Imperative Programming Language. Hoare Logic. Meaning of Hoare Triples Hoare Logic I Introduction to Deductive Program Verification Işıl Dillig Program Spec Deductive verifier FOL formula Theorem prover valid contingent Example specs: safety (no crashes), absence of arithmetic

More information

Chapter 5. System Reliability and Reliability Prediction.

Chapter 5. System Reliability and Reliability Prediction. Chapter 5. System Reliability and Reliability Prediction. Problems & Solutions. Problem 1. Estimate the individual part failure rate given a base failure rate of 0.0333 failure/hour, a quality factor of

More information

Leonardo de Moura Microsoft Research

Leonardo de Moura Microsoft Research Leonardo de Moura Microsoft Research Is formula F satisfiable modulo theory T? SMT solvers have specialized algorithms for T b + 2 = c and f(read(write(a,b,3), c-2)) f(c-b+1) b + 2 = c and f(read(write(a,b,3),

More information

Parallelization of the QC-lib Quantum Computer Simulator Library

Parallelization of the QC-lib Quantum Computer Simulator Library Parallelization of the QC-lib Quantum Computer Simulator Library Ian Glendinning and Bernhard Ömer September 9, 23 PPAM 23 1 Ian Glendinning / September 9, 23 Outline Introduction Quantum Bits, Registers

More information

CS360 Homework 12 Solution

CS360 Homework 12 Solution CS360 Homework 12 Solution Constraint Satisfaction 1) Consider the following constraint satisfaction problem with variables x, y and z, each with domain {1, 2, 3}, and constraints C 1 and C 2, defined

More information

Networked Embedded Systems WS 2016/17

Networked Embedded Systems WS 2016/17 Networked Embedded Systems WS 2016/17 Lecture 2: Real-time Scheduling Marco Zimmerling Goal of Today s Lecture Introduction to scheduling of compute tasks on a single processor Tasks need to finish before

More information

Property Directed Equivalence via Abstract Simulation. Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina

Property Directed Equivalence via Abstract Simulation. Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina Property Directed Equivalence via Abstract Simulation Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina CAV, Jul 23, 2016 Motivation / Goals Little Leaks Add Up to Big Bills software safety must

More information