A General Framework for Architecture Composability
|
|
- Bertha Lang
- 6 years ago
- Views:
Transcription
1 A General Framework for Architecture Composability SEFM, 3 rd of September, 2014 Paul Attie, Eduard Baranov, Simon Bliudze, Mohamad Jaber and Joseph Sifakis
2 Reusable design patterns Systems are not built from scratch Maximal re-use of building blocks (off-the-shelf components) Maximal re-use of solutions (libraries, design patterns, etc.) Express coordination constraints in declarative manner SEFM, Grenoble, 3 rd of September, / 23
3 Applications Concurrency: (a)synchronous, time-triggered, token-ring, mutual exclusion Interface adaptation: communication protocols, data access control Robustness: fault detection & recovery, resource management etc. SEFM, Grenoble, 3 rd of September, / 23
4 Theory of architectures How to model? How to specify? How to combine? How to implement efficiently? Architectures enforce characteristic properties. The crucial question is whether these are preserved by composition? SEFM, Grenoble, 3 rd of September, / 23
5 Example in BIP sleep sleep work work SEFM, Grenoble, 3 rd of September, / 23
6 Example in BIP sleep free sleep work taken work SEFM, Grenoble, 3 rd of September, / 23
7 Example in BIP sleep free sleep work taken work SEFM, Grenoble, 3 rd of September, / 23
8 Example in BIP free taken SEFM, Grenoble, 3 rd of September, / 23
9 Example in BIP free taken 12 = {;,,,, } SEFM, Grenoble, 3 rd of September, / 23
10 Architectures in BIP A =(C,P A, ) free taken SEFM, Grenoble, 3 rd of September, / 23
11 Architectures in BIP A =(C,P A, ) Set of coordinating behaviours free taken SEFM, Grenoble, 3 rd of September, / 23
12 Architectures in BIP A =(C,P A, ) Set of coordinating behaviours Interface (ports) free taken SEFM, Grenoble, 3 rd of September, / 23
13 Architectures in BIP A =(C,P A, ) Set of coordinating behaviours Interface (ports) Interaction model free taken SEFM, Grenoble, 3 rd of September, / 23
14 Architectures in BIP A =(C,P A, ) Set of coordinating behaviours Interface (ports) Interaction model The interface includes all ports of the coordinator components [ P C P A C2C free taken SEFM, Grenoble, 3 rd of September, / 23
15 Constraints intuition SEFM, Grenoble, 3 rd of September, / 23
16 Constraints intuition Bad 1 SEFM, Grenoble, 3 rd of September, / 23
17 Constraints intuition Bad 1 SEFM, Grenoble, 3 rd of September, / 23
18 Constraints intuition Bad 1 Bad 2 SEFM, Grenoble, 3 rd of September, / 23
19 Constraints intuition Bad 1 Bad 2 SEFM, Grenoble, 3 rd of September, / 23
20 Constraints intuition Bad 1 Good Bad 2 SEFM, Grenoble, 3 rd of September, / 23
21 Limits of white magic SEFM, Grenoble, 3 rd of September, / 23
22 Limits of white magic Bad 1 SEFM, Grenoble, 3 rd of September, / 23
23 Limits of white magic Bad 1 SEFM, Grenoble, 3 rd of September, / 23
24 Limits of white magic Bad 1 Bad 2 SEFM, Grenoble, 3 rd of September, / 23
25 Limits of white magic Bad 1 Bad 2 SEFM, Grenoble, 3 rd of September, / 23
26 Limits of white magic Bad 1 Bad 2 SEFM, Grenoble, 3 rd of September, / 23
27 Main idea Characteristic predicate for! (' : B P! B 2 P ' = _ a2 ^ p2a p ^ ^ p62a 1 pa! B SEFM, Grenoble, 3 rd of September, / 23
28 take. From this perspective, architecture composition can be un al state space of the system [3, 5]. More omponent coordination is realised by limiting allowed perspective, architecture composition canconstraints. be the understood as the notion conjunction of their respective This synchroniintuitive ised by limiting the allowed synchroniibilities, thus imposing constraints on the transitions components can heir respective constraints. This intuitive notion is formalised by the two definitions below. ints on the transitions components can Main idea this perspective, architecture composition can be understood as the ns below. composition candefinition be understood as the 5 (Characteristic predicates). Let 2P be n their respective constraints. This intuitive notion is formalised by s. of This intuitive notion is formalised by model over a set of ports P. Its Pcharacteristic predicate (' : B Characteristic 2 be an interaction Characteristic predicate Let for finitions below. predicates). P is defined by putting 0 1 of ports P. Its characteristic predicate (' : B! B) 2 B[P ]! P P ates). Let 2 be an interaction _ ^be an^interaction n 5 (Characteristic predicates). Let 2 ting 0 A. P P^ p ' = p ristic predicate (' : B! B) 2 B[P ] a set of ports P_. Its characteristic predicate (' : B! B) 2 B[P ] ^ ^ a2 p2a p62a by putting 1 ' 0 A p. 1 p^ ^ For any valuation v : P! B, ' (v) = tt if and only if {p 2 P v _ ^ ^ a2 p2a p6 2 a pa. p ^ Interaction back predicate B[Ppredicates ]puniquely interaction model ', suc padefines.and an ' models = ' 2@to ^ n v p6:2pa! B, ' (v) =a2 tt if p2a and only if {p 2 P v(p) = tt} 2. A p62a Definition 6 (Architecture composition). only if {p 2 P v(p) tt} 2. A model ' Pf and ] uniquely defines an = interaction, such that ' 'Let =A '.j = (Bj, 1,'B, 2,B, be' two architectures. The ifcomposition of A and2a2. isa an a uation vmodel :P (v) ='tt'=if and only {p 2 P v(p) =1 tt} '(v) P!! teraction such that =tt '. () A2composition). = (B1 [ B where =such ^that 'for. Architecture Let A),jmodel = (Bj'',,P, 1j ), 2, P 1[P 2, ' 2 B[P ] uniquely defines an interaction = '. 2 'j ' = j' tion). Let Aj = (Bj, Pj, j ), for j = tectures. The composition of A and A is an architecture A 1 2 1model of th The following lemma states that the interaction n of A and A is an architecture A n 6 (Architecture composition). Let Aj = (Bj, Pj, j ), for j = P1 [ P ' consists = ' 1 ^precisely ' 2. of the interactions, such that both the 2,. ' ), where haviour ^ ' 1 2 architectures. The composition of A1 and A2 is an architecture A1 the interfaces of the composed architectures belong to the corr [ginteraction Blemma Pmodel 'interaction = ' be^ ' model. that of the composed be2, P1 [ states 2, ' ), of where thethe composed 1 2 action models. In other words, these are precisely the interact ons, such that their projections on that both their projections on precisely of both the interactions, such the coordination constraints imposed bythe both composedbearchite lowing lemma states that the interaction model of composed ures to the architectures corresponding SEFM, Grenoble, 3 of September, 2014 thebelong composed belong to the corresponding inter- 9 / 23 rd
29 take. From this perspective, architecture composition can be un al state space of the system [3, 5]. More omponent coordination is realised by limiting allowed perspective, architecture composition canconstraints. be the understood as the notion conjunction of their respective This synchroniintuitive ised by limiting the allowed synchroniibilities, thus imposing constraints on the transitions components can heir respective constraints. This intuitive notion is formalised by the two definitions below. ints on the transitions components can Main idea this perspective, architecture composition can be understood as the ns below. composition candefinition be understood as the 5 (Characteristic predicates). Let 2P be n their respective constraints. This intuitive notion is formalised by s. of This intuitive notion is formalised by model over a set of ports P. Its Pcharacteristic predicate (' : B Characteristic 2 be an interaction Characteristic predicate Let for finitions below. predicates). P is defined by putting 0 1 of ports P. Its characteristic predicate (' : B! B) 2 B[P ]! P P ates). Let 2 be an interaction _ ^be an^interaction n 5 (Characteristic predicates). Let 2 ting 0 A. P P^ p ' = p ristic predicate (' : B! B) 2 B[P ] a set of ports P_. Its characteristic predicate (' : B! B) 2 B[P ] ^ ^ a2 p2a p62a by putting 1 ' 0 A p. 1 p^ ^ For any valuation v : P! B, ' (v) = tt if and only if {p 2 P v _ ^ ^ a2 p2a p6 2 a pa. p ^ Interaction back predicate B[Ppredicates ]puniquely interaction model ', suc padefines.and an ' models = ' 2@to ^ n v p6:2pa! B, ' (v) =a2 tt if p2a and only if {p 2 P v(p) = tt} 2. A p62a Definition 6 (Architecture composition). only if {p 2 P v(p) tt} 2. A model ' Pf and ] uniquely defines an = interaction, such that ' 'Let =A '.j = (Bj, 1,'B, 2,B, be' two architectures. The ifcomposition of A and2a2. isa an a uation vmodel :P (v) ='tt'=if and only {p 2 P v(p) =1 tt} '(v) P!! teraction such that =tt '. () A2composition). = (B1 [ B where =such ^that 'for. Architecture Let A),jmodel = (Bj'',,P, 1j ), 2, P 1[P 2, ' 2 B[P ] uniquely defines an interaction = '. 2 'j ' = j' tion). Let Aj = (Bj, Pj, j ), for j = tectures. The composition of A and A is an architecture A 1 2 1model of th The following lemma states that the interaction n of A and A is an architecture A n 6 (Architecture composition). Let Aj = (Bj, Pj, j ), for j = P1 [ P ' consists = ' 1 ^precisely ' 2. of the interactions, such that both the def 2,. ' ), where haviour ^ ' 1 2 A architectures. The composition A2 = (C1 [ C2, of P1A[1 Pand = ' 1 ^ ' A2 1 2 is an'architecture 1 2, A ') the interfaces of the composed architectures belong to the corr [ginteraction Blemma Pmodel 'interaction = ' be^ ' model. that of the composed be2, P1 [ states 2, ' ), of where thethe composed 1 2 action models. In other words, these are precisely the interact ons, such that their projections on that both their projections on precisely of both the interactions, such the coordination constraints imposed bythe both composedbearchite lowing lemma states that the interaction model of composed ures to the architectures corresponding SEFM, Grenoble, 3 of September, 2014 thebelong composed belong to the corresponding inter- 9 / 23 rd
30 Example continued sleep work sleep b 3 f 3 sleep f 3 b 3 work work SEFM, Grenoble, 3 rd of September, / 23
31 Example continued free taken sleep sleep b 3 f 3 sleep f 3 b 3 work work work SEFM, Grenoble, 3 rd of September, / 23
32 Example continued ' 12 ( ) ) ^ ( ) ) ^ ( ) ) ^ ( ) ) ^ ( ) XOR ) ^ ( ) XOR ) ^ ( ) ). sleep sleep b 3 f 3 sleep free f 3 b 3 work work work taken SEFM, Grenoble, 3 rd of September, / 23
33 Example continued ' 12 ( ) ) ^ ( ) ) ^ ( ) ) ^ ( ) ) ^ ^ ^ ( ) XOR ) ^ ( ) XOR ) ^ ( ) ). ) ^ 3, ) ^ 3, ) XOR, ) XOR, ), ) ^ 3, ) ^ 3, 3 ) XOR b 3, 3 ) XOR f 3, 3 ) 3, b 3 ) 3 ^ 3, f 3 ) 3 ^ 3, 3 ) XOR b 3, 3 ) XOR f 3, 3 ) 3. sleep sleep b 3 f 3 sleep free f 3 b 3 work work work taken SEFM, Grenoble, 3 rd of September, / 23
34 Example continued ' 12 ( ) ) ^ ( ) ) ^ ( ) ) ^ ( ) ) ^ ^ ^ ( ) XOR ) ^ ( ) XOR ) ^ ( ) ). ) ^ 3, ) ^ 3, ) XOR, ) XOR, ), ) ^ 3, ) ^ 3, 3 ) XOR b 3, 3 ) XOR f 3, 3 ) 3, b 3 ) 3 ^ 3, f 3 ) 3 ^ 3, 3 ) XOR b 3, 3 ) XOR f 3, 3 ) 3. {;, 3, 3, 3, 3, b 3 3 3, f } sleep sleep b 3 f 3 sleep free f 3 b 3 work work work taken SEFM, Grenoble, 3 rd of September, / 23
35 Example continued free 3 3 taken 3 3 f 3 b 3 free 3 3 free 3 3 taken taken {;, 3, 3, 3, 3, b 3 3 3, f } SEFM, Grenoble, 3 rd of September, / 23
36 Architectures as operators Applying an architecture to a set of behaviours!! A =(C,P A, ) P A P def = [ P B! A(B) def = k 2 P \P A (B [ C) B2B[C SEFM, Grenoble, 3 rd of September, / 23
37 Architectures as operators Applying an architecture to a set of behaviours!! A =(C,P A, ) P A P def = [ P B! A(B) def = k 2 P \P A (B [ C) B2B[C SEFM, Grenoble, 3 rd of September, / 23
38 Architectures as operators Applying an architecture to a set of behaviours!! A =(C,P A, ) P A P def = [ P B! A(B) def = k 2 P \P A (B [ C) B2B[C Partial application is a new architecture B 0 def = A[B] def = B 0,P [ P A, k 2 P \P A P k 2 P \P A (B [ C) P = {a \ P a 2 } SEFM, Grenoble, 3 rd of September, / 23
39 Nice properties Under suitable conditions Architectures can be composed before applying! A 2 (A 1 (B)) = (A 1 A 2 )(B) Architecture application can be restricted!! A 2 (A 1 (B 1, B 2 )) = A 2 (A 1 (B 1 ), B 2 ) Architecture can be applied partially A(B 1, B 2 )=A[B 1 ](B 2 ) SEFM, Grenoble, 3 rd of September, / 23
40 Enforcing properties Consider behaviour B =(Q, q 0,P,!) Q A property: initial: q 0 2 An invariant: 8q 2, 8a 2 2 P, (q a! q 0 ) q 0 2 ) SEFM, Grenoble, 3 rd of September, / 23
41 Enforcing properties Consider behaviour B =(Q, q 0,P,!) Q A property: initial: q 0 2 An invariant: 8q 2, 8a 2 2 P, (q a! q 0 ) q 0 2 ) A An architecture imposes a property on B if is an initial invariant of the projection of the reachable states of A(B) onto B A(B) = SEFM, Grenoble, 3 rd of September, / 23
42 Main results: Safety A 1 (B) = 1 A 2 (B) = 2 ) =) A 1 A 2 (B) = 1 \ 2 SEFM, Grenoble, 3 rd of September, / 23
43 Liveness: Computation An infinite computation is live iff each coordinator is executed sufficiently often A set of idle states Q idle Q Each coordinator not in an idle state must eventually be executed Intuition: idle states do not have pending eventuality Example (mutex): Q idle = {free} free SEFM, Grenoble, 3 rd of September, / 23 taken
44 Liveness: Architecture An architecture is live w.r.t. a set of components iff every computation can be extended to an infinite live one Abadi and Lamport s machine closure SEFM, Grenoble, 3 rd of September, / 23
45 Non-interference An architecture can interfere with the liveness of another Examples: A 1 A 2 repeatedly preempts components that needs to interact with Two architectures conspire against a third one SEFM, Grenoble, 3 rd of September, / 23
46 Non-interference An architecture can interfere with the liveness of another Examples: A 1 repeatedly preempts components that needs to interact with A 2 Two architectures conspire against a third one A 1 is non-interfering with A 2 w.r.t. B iff, for every infinite computation of (A 1 A 2 )(B) C 1 C 2 executes infinitely often => executes sufficiently often SEFM, Grenoble, 3 rd of September, / 23
47 Main results: Liveness ) A live pairwise non-interfering =) M A live {z } w.r.t. B SEFM, Grenoble, 3 rd of September, / 23
48 Conclusions Architectures solve coordination problems by enforcing characteristic properties. First step toward the study of a rigorous concept of architecture and its effective use for achieving correctness by construction in a system design flow. Commutative & associative composition operator Safety properties are preserved Deadlock freedom and liveness can be efficiently checked Bensalem et al. D-Finder 2: Towards efficient correctness of incremental design [NASA Formal Methods 2011] Attie et al. An abstract framework for deadlock prevention in BIP [FMOODS/FORTE 2013] Pair-wise criterion for liveness [This paper] SEFM, Grenoble, 3 rd of September, / 23
49 Future work Study, classification and modelling of architectures in various domains (Embedded systems, web services, enterprise integration, etc.) Improved versatility of the model Specification language for architectures and properties SEFM, Grenoble, 3 rd of September, / 23
50 Thank you for your attention
51 Elevator case-study Elevator cabin = Engine + Doors + Calling System A1: basic functionality + the elevator does not move with open doors A2: make sure doors are opened at each stop A3: full => calls only from the cabin A4: executive floor SEFM, Grenoble, 3 rd of September, / 23
52 Elevator components s 0 s 0 up dn s 2 o c up up o dn dn s 1 s 1 s 2 c Engine is ic fs fc is ic fc Door Caller ic fs system SEFM, Grenoble, 3 rd of September, / 23
53 Elevator coordinators m 1 s c 1 c 1 m 1 o 1 m 2 d 2 o 1 m 1 s 1 e 2 m 2 d 2 e 2 nf3 add 3 nf 3 sub 3 add 3 add 3 fr 4 req 4 fr 4 req 4 fn 4 sub 3 sub 3 nf 3 fn 4 SEFM, Grenoble, 3 rd of September, / 23
A general framework for architecture composability
DOI 0.007/s0065-05-0349-8 The Author(s) 205. This article is published with open access at Springerlink.com Formal Aspects of Computing Formal Aspects of Computing A general framework for architecture
More informationA Constructor-Based Reachability Logic for Rewrite Theories
A Constructor-Based Reachability Logic for Rewrite Theories Stephen Skeirik, Andrei Stefanescu, Jose Meseguer October 10th, 2017 Outline 1 Introduction 2 Reachability Logic Semantics 3 The Invariant Paradox
More informationONE of the key ideas in system engineering
EDIC RESEARCH PROPOSAL 1 Expressiveness and Composability of Glue Operators in BIP Eduard Baranov RISD, I&C, EPFL Abstract We study communication in componentbased design, where basic components are glued
More informationTranslator. Productivity. Functional Correctness. Performance. Efficiency/ Compiler. Correctness. BIP Engine/Linux. Correctness. Multicore Platform
Programming Model Application SW Translator Productivity SW model in BIP Functional Correctness D-Finder System model in BIP DOL Performance Efficiency/ Correctness Correctness Source2Source Distributed
More informationFrom High-Level Component-Based Models to Distributed Implementations
From High-Level Component-Based Models to Distributed Implementations Borzoo Bonakdarpour Marius Bozga Mohamad Jaber Jean Quilbeuf Joseph Sifakis VERIMAG, Centre Équation, 2 avenue de Vignate, 38610, Gières,
More informationSafety and Liveness Properties
Safety and Liveness Properties Lecture #6 of Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling and Verification E-mail: katoen@cs.rwth-aachen.de November 5, 2008 c JPK Overview Lecture
More informationAn Approach to Modelling and Verification of Component Based Systems
An Approach to Modelling and Verification of Component Based Systems G. Gössler (1), S. Graf (2), M. Majster-Cederbaum (3), M. Martens (3), J. Sifakis (2) (1) INRIA Rhône-Alpes (2) VERIMAG (3) University
More informationAutomata-Theoretic Model Checking of Reactive Systems
Automata-Theoretic Model Checking of Reactive Systems Radu Iosif Verimag/CNRS (Grenoble, France) Thanks to Tom Henzinger (IST, Austria), Barbara Jobstmann (CNRS, Grenoble) and Doron Peled (Bar-Ilan University,
More informationModal and Temporal Logics
Modal and Temporal Logics Colin Stirling School of Informatics University of Edinburgh July 23, 2003 Why modal and temporal logics? 1 Computational System Modal and temporal logics Operational semantics
More informationEnsuring Properties of Interaction Systems
Ensuring Properties of Interaction Systems G. Gössler (1), S. Graf (2), M. Majster-Cederbaum (3), M. Martens (3), J. Sifakis (2) (1) INRIA Rhône-Alpes (2) VERIMAG (3) University of Mannheim Montbonnot,
More informationLiveness in L/U-Parametric Timed Automata
Liveness in L/U-Parametric Timed Automata Étienne André and Didier Lime [AL17] Université Paris 13, LIPN and École Centrale de Nantes, LS2N Highlights, 14 September 2017, London, England Étienne André
More informationCommunication and Concurrency: CCS
Communication and Concurrency: CCS R. Milner, A Calculus of Communicating Systems, 1980 cours SSDE Master 1 Why calculi? Prove properties on programs and languages Principle: tiny syntax, small semantics,
More informationComposition for Component-Based Modeling
Composition for Component-Based Modeling Gregor Gössler a, Joseph Sifakis b a INRIA Rhône-Alpes, France b VERIMAG, France Abstract We propose a framework for component-based modeling using an abstract
More informationFinite-State Model Checking
EECS 219C: Computer-Aided Verification Intro. to Model Checking: Models and Properties Sanjit A. Seshia EECS, UC Berkeley Finite-State Model Checking G(p X q) Temporal logic q p FSM Model Checker Yes,
More informationDistributed Semantics and Implementation for Systems with Interaction and Priority
Distributed Semantics and Implementation for Systems with Interaction and Priority Ananda Basu, Philippe Bidinger, Marius Bozga, and Joseph Sifakis Université Grenoble 1 - CNRS - VERIMAG Centre Équation,
More informationTimed Automata. Chapter Clocks and clock constraints Clock variables and clock constraints
Chapter 10 Timed Automata In the previous chapter, we have discussed a temporal logic where time was a discrete entities. A time unit was one application of the transition relation of an LTS. We could
More informationRevising UNITY Programs: Possibilities and Limitations 1
Revising UNITY Programs: Possibilities and Limitations 1 Ali Ebnenasir, Sandeep S. Kulkarni, and Borzoo Bonakdarpour Software Engineering and Network Systems Laboratory Department of Computer Science and
More informationArchitecture Diagrams A Graphical Language for Architecture Style Specification
Architecture Diagrams A Graphical Language for Architecture Style Specification EPFL IC IIF RiSD Technical Report EPFL-REPORT-215210 http://infoscience.epfl.ch/record/215210 Anastasia Mavridou, Eduard
More informationDistributed Algorithms (CAS 769) Dr. Borzoo Bonakdarpour
Distributed Algorithms (CAS 769) Week 1: Introduction, Logical clocks, Snapshots Dr. Borzoo Bonakdarpour Department of Computing and Software McMaster University Dr. Borzoo Bonakdarpour Distributed Algorithms
More informationA Theory for Composing Distributed Components, Based on Temporary Interference
A Theory for Composing Distributed Components, Based on Temporary Interference I.S.W.B. Prasetya T.E.J. Vos S.D. Swierstra B. Widjaja Abstract Compositionality provides the foundation of software modularity,
More informationInterface Automata with Complex Actions - Extended Version
Interface Automata with Complex Actions - Extended Version Shahram Esmaeilsabzali Nancy A. Day Farhad Mavaddat David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, Canada
More informationTemporal Logic of Actions
Advanced Topics in Distributed Computing Dominik Grewe Saarland University March 20, 2008 Outline Basic Concepts Transition Systems Temporal Operators Fairness Introduction Definitions Example TLC - A
More informationIntroduction to Model Checking. Debdeep Mukhopadhyay IIT Madras
Introduction to Model Checking Debdeep Mukhopadhyay IIT Madras How good can you fight bugs? Comprising of three parts Formal Verification techniques consist of three parts: 1. A framework for modeling
More informationarxiv: v1 [cs.dc] 3 Oct 2011
A Taxonomy of aemons in Self-Stabilization Swan ubois Sébastien Tixeuil arxiv:1110.0334v1 cs.c] 3 Oct 2011 Abstract We survey existing scheduling hypotheses made in the literature in self-stabilization,
More information{},{a},{a,c} {},{c} {c,d}
Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au
More informationCommunication and Concurrency: CCS. R. Milner, A Calculus of Communicating Systems, 1980
Communication and Concurrency: CCS R. Milner, A Calculus of Communicating Systems, 1980 Why calculi? Prove properties on programs and languages Principle: tiny syntax, small semantics, to be handled on
More informationThe Algebra of Connectors Structuring Interaction in BIP
1 The Algebra of Connectors Structuring Interaction in BIP Simon Bliudze, Joseph Sifakis Abstract We provide an algebraic formalization of connectors in the BIP component framework. A connector relates
More informationOur Problem. Model. Clock Synchronization. Global Predicate Detection and Event Ordering
Our Problem Global Predicate Detection and Event Ordering To compute predicates over the state of a distributed application Model Clock Synchronization Message passing No failures Two possible timing assumptions:
More informationFormally Correct Monitors for Hybrid Automata. Verimag Research Report n o TR
Formally Correct Monitors for Hybrid Automata Goran Frehse, Nikolaos Kekatos, Dejan Nickovic Verimag Research Report n o TR-2017-5 September 20, 2017 Verimag, University of Grenoble Alpes, Grenoble, France.
More informationA framework based on implementation relations for implementing LOTOS specifications
Published in: Computer Networks and ISDN Systems, 25 (1992), 23-41 A framework based on implementation relations for implementing LOTOS specifications Guy Leduc Research Associate of the National Fund
More informationComponent-Based Construction of Deadlock-Free Systems
Component-Based Construction of Deadlock-Free Systems Extended Abstract Gregor Gössler 1 and Joseph Sifakis 2 1 INRIA Rhône-Alpes, goessler@inrialpes.fr 2 VERIMAG, sifakis@imag.fr Abstract. We propose
More information1 Completeness Theorem for First Order Logic
1 Completeness Theorem for First Order Logic There are many proofs of the Completeness Theorem for First Order Logic. We follow here a version of Henkin s proof, as presented in the Handbook of Mathematical
More informationCharacterizing Fault-Tolerant Systems by Means of Simulation Relations
Characterizing Fault-Tolerant Systems by Means of Simulation Relations TECHNICAL REPORT Ramiro Demasi 1, Pablo F. Castro 2,3, Thomas S.E. Maibaum 1, and Nazareno Aguirre 2,3 1 Department of Computing and
More informationLecture Notes on Software Model Checking
15-414: Bug Catching: Automated Program Verification Lecture Notes on Software Model Checking Matt Fredrikson André Platzer Carnegie Mellon University Lecture 19 1 Introduction So far we ve focused on
More informationBringing class diagrams to life
Bringing class diagrams to life Luis S. Barbosa & Sun Meng DI-CCTC, Minho University, Braga & CWI, Amsterdam UML & FM Workshop 2009 Rio de Janeiro 8 December, 2009 Formal Methods proofs problems structures
More informationClocks in Asynchronous Systems
Clocks in Asynchronous Systems The Internet Network Time Protocol (NTP) 8 Goals provide the ability to externally synchronize clients across internet to UTC provide reliable service tolerating lengthy
More informationLecture 2 Automata Theory
Lecture 2 Automata Theory Ufuk Topcu Nok Wongpiromsarn Richard M. Murray Outline: Transition systems Linear-time properties Regular propereties EECI, 14 May 2012 This short-course is on this picture applied
More informationAnalysis and Optimization of Discrete Event Systems using Petri Nets
Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets
More informationLecture 2 Automata Theory
Lecture 2 Automata Theory Ufuk Topcu Nok Wongpiromsarn Richard M. Murray EECI, 18 March 2013 Outline Modeling (discrete) concurrent systems: transition systems, concurrency and interleaving Linear-time
More informationSymbolic Implementation of Connectors in BIP
Symbolic Implementation of Connectors in BIP Mohamad Jaber Ananda Basu VERIMAG, Centre Équation, 2 av de Vignate, 38610, Gières, France {Mohamad.Jaber,Ananda.Basu}@imag.fr Simon Bluidze CEA, LIST, Boîte
More informationLocal and global deadlock-detection in component-based systems are NP-hard
Information Processing Letters 103 (2007) 105 111 www.elsevier.com/locate/ipl Local and global deadlock-detection in component-based systems are NP-hard Christoph Minnameier Institut für Informatik, Universität
More informationIntroduction to Temporal Logic. The purpose of temporal logics is to specify properties of dynamic systems. These can be either
Introduction to Temporal Logic The purpose of temporal logics is to specify properties of dynamic systems. These can be either Desired properites. Often liveness properties like In every infinite run action
More informationRelating BIP and Reo. 1 Introduction. Kasper Dokter, Sung-Shik Jongmans, Farhad Arbab. Simon Bliudze
Relating BIP and Reo Kasper Dokter, Sung-Shik Jongmans, Farhad Arbab Simon Bliudze Centrum Wiskunde & Informatica, Amsterdam, Netherlands École Polytechnique Fédérale de Lausanne, Lausanne, Switzerland
More informationRevising Distributed UNITY Programs is NP-Complete
Revising Distributed UNITY Programs is NP-Complete Borzoo Bonakdarpour and Sandeep S. Kulkarni Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824, U.S.A. {borzoo,sandeep}@cse.msu.edu
More informationAbstractions and Decision Procedures for Effective Software Model Checking
Abstractions and Decision Procedures for Effective Software Model Checking Prof. Natasha Sharygina The University of Lugano, Carnegie Mellon University Microsoft Summer School, Moscow, July 2011 Lecture
More informationExtended Connectors: Structuring Glue Operators in BIP
Extended Connectors: Structuring Glue Operators in BIP Eduard Baranov and Simon Bliudze École Polytechnique Fédérale de Lausanne Rigorous System Design Laboratory INJ Building, Station 14, 1015 Lausanne,
More informationDesign of Distributed Systems Melinda Tóth, Zoltán Horváth
Design of Distributed Systems Melinda Tóth, Zoltán Horváth Design of Distributed Systems Melinda Tóth, Zoltán Horváth Publication date 2014 Copyright 2014 Melinda Tóth, Zoltán Horváth Supported by TÁMOP-412A/1-11/1-2011-0052
More informationSemantic Equivalences and the. Verification of Infinite-State Systems 1 c 2004 Richard Mayr
Semantic Equivalences and the Verification of Infinite-State Systems Richard Mayr Department of Computer Science Albert-Ludwigs-University Freiburg Germany Verification of Infinite-State Systems 1 c 2004
More informationA Brief Introduction to Model Checking
A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:
More informationA Canonical Contraction for Safe Petri Nets
A Canonical Contraction for Safe Petri Nets Thomas Chatain and Stefan Haar INRIA & LSV (CNRS & ENS Cachan) 6, avenue du Président Wilson 935 CACHAN Cedex, France {chatain, haar}@lsvens-cachanfr Abstract
More informationModeling Synchronous Systems in BIP
Unité Mixte de Recherche 5104 CNRS - INPG - UJF Centre Equation 2, avenue de VIGNATE F-38610 GIERES tel : +33 456 52 03 40 fax : +33 456 52 03 50 http://www-verimag.imag.fr Modeling Synchronous Systems
More informationCS1021. Why logic? Logic about inference or argument. Start from assumptions or axioms. Make deductions according to rules of reasoning.
3: Logic Why logic? Logic about inference or argument Start from assumptions or axioms Make deductions according to rules of reasoning Logic 3-1 Why logic? (continued) If I don t buy a lottery ticket on
More informationDesigning and Evaluating Generic Ontologies
Designing and Evaluating Generic Ontologies Michael Grüninger Department of Industrial Engineering University of Toronto gruninger@ie.utoronto.ca August 28, 2007 1 Introduction One of the many uses of
More informationMODEL CHECKING. Arie Gurfinkel
1 MODEL CHECKING Arie Gurfinkel 2 Overview Kripke structures as models of computation CTL, LTL and property patterns CTL model-checking and counterexample generation State of the Art Model-Checkers 3 SW/HW
More informationPriority Scheduling of Distributed Systems Based on Model Checking
Priority Scheduling of Distributed Systems Based on Model Checking Ananda Basu 1, Saddek Bensalem 1, Doron Peled 2, and Joseph Sifakis 1 1 Centre Equation - VERIMAG, 2 Avenue de Vignate, Gieres, France
More informationConsistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong
Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms CS 249 Project Fall 2005 Wing Wong Outline Introduction Asynchronous distributed systems, distributed computations,
More informationA logical framework to deal with variability
A logical framework to deal with variability (research in progress) M.H. ter Beek joint work with P. Asirelli, A. Fantechi and S. Gnesi ISTI CNR Università di Firenze XXL project meeting Pisa, 21 June
More informationFine Grain Quality Management
Fine Grain Quality Management Jacques Combaz Jean-Claude Fernandez Mohamad Jaber Joseph Sifakis Loïc Strus Verimag Lab. Université Joseph Fourier Grenoble, France DCS seminar, 10 June 2008, Col de Porte
More informationThe assertional versus Tarskian methods
The assertional versus Tarskian methods Uri Abraham May 12, 2014 Abstract In this lecture we analyze Peterson s well known two-process criticalsection protocol [3] and prove that the mutual exclusion property
More informationTowards a Property Preserving Transformation from IEC to BIP
Towards a Property Preserving Transformation from IEC 61131 3 to BIP Jan Olaf Blech, Anton Hattendorf, Jia Huang fortiss GmbH, Guerickestraße 25, 80805 München, Germany September 7, 2010 arxiv:1009.0817v1
More informationSlicing Petri Nets. Astrid Rakow. Department für Informatik, Univeristät Oldenburg
Slicing Petri Nets Astrid Rakow Department für Informatik, Univeristät Oldenburg astrid.rakow@informatik.uni-oldenburg.de Abstract. In this paper we introduce the notion of net-slice to describe a subnet
More informationRevising Distributed UNITY Programs is NP-Complete
Revising Distributed UNITY Programs is NP-Complete Borzoo Bonakdarpour Sandeep S. Kulkarni Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824, USA Email: {borzoo,sandeep}@cse.msu.edu
More informationTransition Systems and Linear-Time Properties
Transition Systems and Linear-Time Properties Lecture #1 of Principles of Model Checking Joost-Pieter Katoen Software Modeling and Verification Group affiliated to University of Twente, Formal Methods
More informationAutomatic Synthesis of Distributed Protocols
Automatic Synthesis of Distributed Protocols Rajeev Alur Stavros Tripakis 1 Introduction Protocols for coordination among concurrent processes are an essential component of modern multiprocessor and distributed
More informationSeamless Model Driven Development and Tool Support for Embedded Software-Intensive Systems
Seamless Model Driven Development and Tool Support for Embedded Software-Intensive Systems Computer Journal Lecture - 22nd June 2009 Manfred Broy Technische Universität München Institut für Informatik
More informationStéphane Lafortune. August 2006
UNIVERSITY OF MICHIGAN DEPARTMENT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE LECTURE NOTES FOR EECS 661 CHAPTER 1: INTRODUCTION TO DISCRETE EVENT SYSTEMS Stéphane Lafortune August 2006 References for
More informationModern Algebra Prof. Manindra Agrawal Department of Computer Science and Engineering Indian Institute of Technology, Kanpur
Modern Algebra Prof. Manindra Agrawal Department of Computer Science and Engineering Indian Institute of Technology, Kanpur Lecture 02 Groups: Subgroups and homomorphism (Refer Slide Time: 00:13) We looked
More informationT (s, xa) = T (T (s, x), a). The language recognized by M, denoted L(M), is the set of strings accepted by M. That is,
Recall A deterministic finite automaton is a five-tuple where S is a finite set of states, M = (S, Σ, T, s 0, F ) Σ is an alphabet the input alphabet, T : S Σ S is the transition function, s 0 S is the
More informationDecentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication
Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Stavros Tripakis Abstract We introduce problems of decentralized control with communication, where we explicitly
More informationLiveness of Communicating Transactions
(joint work with Vasileios Koutavas and Matthew Hennessy) TRINITY COLLEGE DUBLIN COLÁISTE NA TRÍONÓIDE, BAILE ÁTHA CLIATH Dublin Concurrency Workshop 2011 Traditional Transactions Transactions provide
More informationDistributed Algorithms Time, clocks and the ordering of events
Distributed Algorithms Time, clocks and the ordering of events Alberto Montresor University of Trento, Italy 2016/04/26 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
More informationDES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models
4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe
More information1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007
Lecture 1 Introduction 1 Introduction 1.1 The Problem Domain Today, we are going to ask whether a system can recover from perturbation. Consider a children s top: If it is perfectly vertically, you can
More informationGeorg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS
Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Proceedings SDPS, Fifth World Conference on Integrated Design and Process Technologies, IEEE International Conference on Systems Integration, Dallas,
More informationA Context Dependent Equivalence Relation Between Kripke Structures (Extended abstract)
A Context Dependent Equivalence Relation Between Kripke Structures (Extended abstract) Bernhard Josko Computer Science Department, University of Oldenburg 2900 Oldenburg, Federal Republic of Germany Abstract
More informationChapter 3: Linear-Time Properties
Chapter 3: Linear-Time Properties Prof. Ali Movaghar Verification of Reactive Systems Outline n n To verify the transition system model of the system under consideration, we need to specify the property
More informationPrograms, Semantics and Eective Atomicity
Programs, Semantics and Eective Atomicity Shankar April 3, 2014 Outline programs Program Service Programs State transition semantics of systems Assertions and their evaluation Splitting and stitching of
More informationModel for reactive systems/software
Temporal Logics CS 5219 Abhik Roychoudhury National University of Singapore The big picture Software/ Sys. to be built (Dream) Properties to Satisfy (caution) Today s lecture System Model (Rough Idea)
More informationFormal Models of Timed Musical Processes Doctoral Defense
Formal Models of Timed Musical Processes Doctoral Defense Gerardo M. Sarria M. Advisor: Camilo Rueda Co-Advisor: Juan Francisco Diaz Universidad del Valle AVISPA Research Group September 22, 2008 Motivation
More informationA Logical Basis for Component-Based Systems Engineering *
A Logical Basis for Component-Based Systems Engineering * Manfred BROY Institut für Informatik, Technische Universität München, D-80290 München, Germany Abstract. In a systematic development of distributed
More information7. Queueing Systems. 8. Petri nets vs. State Automata
Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models
More informationModeling Synchronous Systems in BIP
Modeling Synchronous Systems in BIP Marius Bozga Vassiliki Sfyrla Joseph Sifakis VERIMAG Centre Equation, 2 Avenue de Vignate, 38610 Gières, France FirstName.LastName@imag.fr ABSTRACT We present a general
More informationSynchronisation and Cancellation in Workflows based on Reset nets
Synchronisation and Cancellation in Workflows based on Reset nets Moe Thandar Wynn 1, W.M.P. van der Aalst 1,2, A.H.M. ter Hofstede 1 and David Edmond 1 Business Process Management Program Faculty of Information
More informationThe Quasi-Synchronous Approach to Distributed Control Systems
The Quasi-Synchronous Approach to Distributed Control Systems Paul Caspi caspi@imag.fr Verimag Laboratory http://www-verimag.imag.fr Crisys Esprit Project http://borneo.gmd.de/ ap/crisys/ The Quasi-Synchronous
More informationBilateral Proofs of Safety and Progress Properties of Concurrent Programs (Working Draft)
Bilateral Proofs of Safety and Progress Properties of Concurrent Programs (Working Draft) Jayadev Misra December 18, 2015 Contents 1 Introduction 3 2 Program and Execution Model 4 2.1 Program Structure..........................
More informationCommunicating Parallel Processes. Stephen Brookes
Communicating Parallel Processes Stephen Brookes Carnegie Mellon University Deconstructing CSP 1 CSP sequential processes input and output as primitives named parallel composition synchronized communication
More informationThe Underlying Semantics of Transition Systems
The Underlying Semantics of Transition Systems J. M. Crawford D. M. Goldschlag Technical Report 17 December 1987 Computational Logic Inc. 1717 W. 6th St. Suite 290 Austin, Texas 78703 (512) 322-9951 1
More informationModels for Concurrency
Models for Concurrency (A revised version of DAIMI PB-429) Glynn Winskel Mogens Nielsen Computer Science Department, Aarhus University, Denmark November 1993 Abstract This is, we believe, the final version
More information6.852: Distributed Algorithms Fall, Class 24
6.852: Distributed Algorithms Fall, 2009 Class 24 Today s plan Self-stabilization Self-stabilizing algorithms: Breadth-first spanning tree Mutual exclusion Composing self-stabilizing algorithms Making
More informationThe State Explosion Problem
The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis
More informationComputer Science Technical Report
Computer Science Technical Report Synthesizing Self-Stabilization Through Superposition and Backtracking Alex Klinkhamer and Ali Ebnenasir Michigan Technological University Computer Science Technical Report
More informationAutomatic Fault Localization for BIP
Automatic Fault Localization for BIP Wang Qiang 1, Lei Yan 2, Simon Bliudze 1, and Mao Xiaoguang 3,4 1 École Polytechnique Fédérale de Lausanne, Switzerland 2 Logistical Engineering University of PLA,
More informationRecent results on Timed Systems
Recent results on Timed Systems Time Petri Nets and Timed Automata Béatrice Bérard LAMSADE Université Paris-Dauphine & CNRS berard@lamsade.dauphine.fr Based on joint work with F. Cassez, S. Haddad, D.
More informationLogic in Automatic Verification
Logic in Automatic Verification Javier Esparza Sofware Reliability and Security Group Institute for Formal Methods in Computer Science University of Stuttgart Many thanks to Abdelwaheb Ayari, David Basin,
More informationReading the Linearizability paper of Herlihy and Wing
Reading the Linearizability paper of Herlihy and Wing Uri Abraham May 28, 2013 Abstract We read Herlihy and Wing important paper on the concept of linearizability, and reconstruct that text in the Tarskian
More informationSymmetry Reductions. A. Prasad Sistla University Of Illinois at Chicago
Symmetry Reductions. A. Prasad Sistla University Of Illinois at Chicago Model-Checking Concurrent PGM Temporal SPEC Model Checker Yes/No Counter Example Approach Build the global state graph Algorithm
More informationCptS 464/564 Fall Prof. Dave Bakken. Cpt. S 464/564 Lecture January 26, 2014
Overview of Ordering and Logical Time Prof. Dave Bakken Cpt. S 464/564 Lecture January 26, 2014 Context This material is NOT in CDKB5 textbook Rather, from second text by Verissimo and Rodrigues, chapters
More informationA Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice
A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice Luis Pino*, Filippo Bonchi** and Frank Valencia* (Presented by: Jorge A. Pe rez) *E quipe Come te, LIX, Laboratoire
More informationTESTING is one of the most important parts of the
IEEE TRANSACTIONS 1 Generating Complete Controllable Test Suites for Distributed Testing Robert M. Hierons, Senior Member, IEEE Abstract A test suite is m-complete for finite state machine (FSM) M if it
More informationCompositional Synthesis with Parametric Reactive Controllers
Compositional Synthesis with Parametric Reactive Controllers Rajeev Alur University of Pennsylvania alur@seas.upenn.edu Salar Moarref University of Pennsylvania moarref@seas.upenn.edu Ufuk Topcu University
More information