Definitions of Logical Causality for Log Analysis

Size: px
Start display at page:

Download "Definitions of Logical Causality for Log Analysis"

Transcription

1 Definitions of Logical Causality for Log Analysis Gregor Gössler 1 Joint work with Daniel Le Métayer 1 and Jean-Baptiste Raclet 2 1 INRIA Grenoble Rhône-Alpes, France 2 IRIT - CNRS, Toulouse, France Synchron 2011 GG, DLM, and JBR (INRIA/IRIT) Logical Causality 1 / 1

2 LISE: Liability Issues in Software Engineering Objectives General objective of the LISE project: Provide a set of methods and tools (both legal and technical) to Define liability in a precise and unambiguous way Establish liability in case of failure Scope: Contractual framework (not tort law) Liability for software defects (not intellectual property infringements) Priority: settle liability issues in an amicable way. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 2 / 1

3 Context A component-based system components are provided by different vendors Each component C i is equipped with a contract (A i, G i ): used according to A i, C i promises to behave like G i. Components are black boxes: only the contracts are known, not the implementation implementations may violate their contract Interactions between components are logged, logs may be distributed Problem: Define notions of causality between contract violations that can be used to establish liability of the component vendors. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 3 / 1

4 Causality in distributed systems A e 2 e 3 B f e 1 C e 4 v Lamport causality too weak for our needs: f v does not mean that failure f causes the violation v of the specification of C. Lamport causality is a necessary but not sufficient condition for causality between contract violations. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 4 / 1

5 Contracts Contract C = pair of automata (A, G). C specifies under which assumption A the component provides guarantee G. clean specification and limitation of the responsibilities of components. Example (Contract satisfaction) A: a cannot reoccur before b G: c never occurs b, c c a, b a b tr: a b a a c c =/ A but = C = (A, G) tr : a b c a = A and =/ G thus =/ C GG, DLM, and JBR (INRIA/IRIT) Logical Causality 5 / 1

6 Causality in Contract Violation: Overview C = (A, G) (A 1, G 1 ) (A 2, G 2 ) (A 3, G 3 ) B 1 B 2 B 3 tr 1 tr 2 tr 3 GG, DLM, and JBR (INRIA/IRIT) Logical Causality 6 / 1

7 Causality in Contract Violation: Overview C = (A, G) (A 1, G 1 ) (A 2, G 2 ) (A 3, G 3 ) B 1 B 2 B 3 tr 1 tr 2 tr 3 GG, DLM, and JBR (INRIA/IRIT) Logical Causality 6 / 1

8 Causality in Contract Violation: Overview C = (A, G) (A 1, G 1 ) (A 2, G 2 ) (A 3, G 3 ) B 1 B 2 B 3 tr 1 tr 2 tr 3 GG, DLM, and JBR (INRIA/IRIT) Logical Causality 6 / 1

9 Causality in Contract Violation: Overview C = (A, G) (A 1, G 1 ) (A 2, G 2 ) (A 3, G 3 ) B 1 B 2 B 3 tr 1 tr 2 tr 3 GG, DLM, and JBR (INRIA/IRIT) Logical Causality 6 / 1

10 Causality in Contract Violation: Overview C = (A, G) (A 1, G 1 ) (A 2, G 2 ) (A 3, G 3 ) B 1 B 2 B 3 tr 1 tr 2 tr 3 GG, DLM, and JBR (INRIA/IRIT) Logical Causality 6 / 1

11 Causality in Contract Violation: Overview C = (A, G) (A 1, G 1 ) (A 2, G 2 ) (A 3, G 3 ) B 1 B 2 B 3 tr 1 tr 2 tr 3 Hypothesis If the implementations B i of all components are correct, then C is respected. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 6 / 1

12 Causality in Contract Violation: Overview C = (A, G) (A 1, G 1 ) (A 2, G 2 ) (A 3, G 3 ) B 1 B 2 B 3 tr 1 tr 2 tr 3 Hypothesis If the implementations B i of all components are correct, then C is respected. Any contract violation is due to some faulty implementation B i. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 6 / 1

13 Logical Causality from Component Trace to Failure Necessary Causality Definition (Necessary causality) Tr n C if tr 1 Tr =/ C k tr n tr =/ C GG, DLM, and JBR (INRIA/IRIT) Logical Causality 7 / 1

14 Logical Causality from Component Trace to Failure Necessary Causality Definition (Necessary causality) Tr n C if tr 1 Tr tr n tr GG, DLM, and JBR (INRIA/IRIT) Logical Causality 7 / 1

15 Logical Causality from Component Trace to Failure Necessary Causality Definition (Necessary causality) Tr n C if tr 1 Tr = C k tr n consistent tr = C GG, DLM, and JBR (INRIA/IRIT) Logical Causality 7 / 1

16 Logical Causality from Component Trace to Failure Necessary Causality Given: (tr 1,..., tr n ) vector of observed traces Tr {tr 1,..., tr n } set of traces to be analyzed jointly Definition (Necessary causality) Tr is a necessary cause of the violation of C if tr Tr: tr C and tr : ( j {1,..., n} \ I : π j (tr ) = tr j where I = {i tr i Tr tr i =/ C i }. k I : π k (tr ) = C k ) = tr = C GG, DLM, and JBR (INRIA/IRIT) Logical Causality 8 / 1

17 Logical Causality from Component Trace to Failure Sufficient Causality Definition (Sufficient causality) Tr s C if tr 1 Tr =/ C k tr n tr =/ C GG, DLM, and JBR (INRIA/IRIT) Logical Causality 9 / 1

18 Logical Causality from Component Trace to Failure Sufficient Causality Definition (Sufficient causality) Tr s C if tr 1 Tr tr n tr GG, DLM, and JBR (INRIA/IRIT) Logical Causality 9 / 1

19 Logical Causality from Component Trace to Failure Sufficient Causality Definition (Sufficient causality) Tr s C if tr 1 = C 1 Tr tr n = C n consistent tr =/ C GG, DLM, and JBR (INRIA/IRIT) Logical Causality 9 / 1

20 Properties Property (Soundness) Necessary and sufficient causality are sound: 1 Any (necessary or sufficient) cause contains at least one component trace violating its contract. 2 Any minimal set of traces forming a cause only contains traces violating the component contracts. Property (Completeness) Every violation of the system-level contract has a necessary and a sufficient cause. Remark Causality defined on contracts and observed traces, not implementations. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 10 / 1

21 Example 1: Adaptive Cruise Control Sensor ssr o sld i SLD sld o HMI throttle brake tck hmi o,on hmi o,off sw i,on sw o,on bsi,user Clock tck Switch bs i,auto BS sw o,on sw o,off tck Radar rdr o or i OR or o acc s i tck acc i,on acc o i ACC acc i,off acc b o ts i,auto TS ts i,user acc t o GG, DLM, and JBR (INRIA/IRIT) Logical Causality 11 / 1

22 Example 1: Adaptive Cruise Control rdr o or i OR Radar tck or o acc s i tck acc i,on acc o i ACC acc i,off acc b o acc t o Obstacle recognition (OR) G OR : output 1 time unit after sensing Adaptive Cruise Control (ACC) G ACC : output 1 time unit after latest input Global guarantee G: ACC output at most 3 time units after data acquisition GG, DLM, and JBR (INRIA/IRIT) Logical Causality 11 / 1

23 Example 1: Adaptive Cruise Control Two necessary causes Consider the following trace excerpts: OR:... or i, tck, tck, or o, tck, tck,... ACC:... tck, tck, acc s i, tck, tck, accb o,... Both OR and ACC violate their contracts ( OR = 2, ACC = 2) = violation of the global timing constraint ( = 4 > 3). Each of the OR and ACC failures is a necessary cause for the global failure. Taken together they are a sufficient cause. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 12 / 1

24 Example 1: Adaptive Cruise Control One necessary and sufficient cause Consider the following trace excerpts: OR:... or i, tck, tck, tck, or o, tck, tck,... ACC:... tck, tck, tck, acc s i, tck, tck, acct o,... Both OR and ACC violate their contracts but OR s violation is more serious ( OR = 3, ACC = 2). OR s violation is a necessary and sufficient cause for the global failure. The violation of ACC is no longer a necessary cause. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 13 / 1

25 Example 2: Travel Agency Travel agency: Hotel 1: GG, DLM, and JBR (INRIA/IRIT) Logical Causality 14 / 1

26 Example 2: Travel Agency Spec 1: at any time, #(debits) #(confirmations) Spec 2: each request is ack ed by either fail or resa i.!resp yes i for i {1, 2} GG, DLM, and JBR (INRIA/IRIT) Logical Causality 15 / 1

27 Example 2: Travel Agency Spec 1: at any time, #(debits) #(confirmations) Spec 2: each request is ack ed by either fail or resa i.!resp yes i for i {1, 2} Observed traces: agency:?proc.!demand 1.?resp no 1.!demand 2.?resp yes 2.!conf GG, DLM, and JBR (INRIA/IRIT) Logical Causality 15 / 1

28 Example 2: Travel Agency Spec 1: at any time, #(debits) #(confirmations) Spec 2: each request is ack ed by either fail or resa i.!resp yes i for i {1, 2} Observed traces: agency:?proc.!demand 1.?resp no 1.!demand 2.?resp yes 2.!conf hotel 1:?demand 1. resa 1.!resp no 1. wait 1. debit 1 GG, DLM, and JBR (INRIA/IRIT) Logical Causality 15 / 1

29 Example 2: Travel Agency Spec 1: at any time, #(debits) #(confirmations) Spec 2: each request is ack ed by either fail or resa i.!resp yes i for i {1, 2} Observed traces: agency:?proc.!demand 1.?resp no 1.!demand 2.?resp yes 2.!conf hotel 1:?demand 1. resa 1.!resp no 1. wait 1. debit 1 hotel 2:?demand 2.!resp yes 2. wait 2. debit 2 GG, DLM, and JBR (INRIA/IRIT) Logical Causality 15 / 1

30 Example 2: Travel Agency Spec 1: at any time, #(debits) #(confirmations) Spec 2: each request is ack ed by either fail or resa i.!resp yes i for i {1, 2} Observed traces: agency:?proc.!demand 1.?resp no 1.!demand 2.?resp yes 2.!conf hotel 1:?demand 1. resa 1.!resp no 1. wait 1. debit 1 hotel 2:?demand 2.!resp yes 2. wait 2. debit 2 Results of causality analysis: spec 1 spec 2 travel agency hotel 1 N, S S hotel 2 S GG, DLM, and JBR (INRIA/IRIT) Logical Causality 15 / 1

31 Causality Analysis with Bounded Past Given: (tr 1,..., tr n ) vector of observed traces tr i a suffix of tr i, i = 1,..., n, such that tr i : π i (tr) = tr i. Tr {tr 1,..., tr n } set of traces to be analyzed jointly Definition (Necessary causality) Tr is a necessary cause of the violation of C if tr Tr: tr C and tr : ( j {1,..., n} \ I : π j (tr ) = tr j where I = {i tr i Tr tr i =/ C i }. k I : π k (tr ) = C k ) = tr = C GG, DLM, and JBR (INRIA/IRIT) Logical Causality 16 / 1

32 Causality Analysis with Bounded Past Given: (tr 1,..., tr n ) vector of observed traces tr i a suffix of tr i, i = 1,..., n, such that tr i : π i (tr) = tr i. Tr {tr 1,..., tr n } set of traces to be analyzed jointly Definition (Necessary causality) Tr is a necessary cause of the violation of C if tr Tr: tr C and tr : ( j {1,..., n} \ I : π j (tr ) = tr j k I : π k (tr ) = C k = tr = C where I = {i tr i Tr tr i =/ C i }. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 16 / 1

33 Causality Analysis with Bounded Past Given: (tr 1,..., tr n ) vector of observed traces tr i a suffix of tr i, i = 1,..., n, such that tr i : π i (tr) = tr i. Tr {tr 1,..., tr n } set of traces to be analyzed jointly Definition (Necessary causality) Tr is a necessary cause of the violation of C if tr Tr: tr : ( j {1,..., n} \ I : π j (tr ) = tr + j tr C = and k I : π k (tr ) = C k = tr = C where I = {i tr i Tr tr i =/ C i = }. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 16 / 1

34 Related Work Actual causality (Halpern & Pearl) for Boolean expressions, no native support for sequential behavior weak notion of logical causality Dependability: fault trees: from failure to potential causes FME(C)A: from cause to potential failures Blaming in contract languages verify satisfaction of assumption and guarantee; no notion of causality, no concurrency. Diagnosis: determine (unobservable) faults from observations no notion of logical causality. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 17 / 1

35 Discussion Contributions: General definitions for logical causality, supporting group causality (vertical) causality: a component causes the violation of a system-level contract. horizontal causality: a component causes the violation of the guarantee provided by another component. Effective decision procedure. Causality analysis on bounded past. Implementation in analysis tool Loca. GG, DLM, and JBR (INRIA/IRIT) Logical Causality 18 / 1

36 Future Work Generalize framework, instantiate with existing models of computation and communication: synchronous, timed automata,... Allow for uncertainty, e.g., partial observability of events. Generalize to a quantitative notion of causality. Constructiveness? GG, DLM, and JBR (INRIA/IRIT) Logical Causality 19 / 1

Sample Log Analysis in E&A - A Legal Framework

Sample Log Analysis in E&A - A Legal Framework A Formal Framework for Specifying and Analyzing Logs as Electronic Evidence Eduardo Mazza 1, Marie-Laure Potet 1, Daniel Le Métayer 2 LISE Project Funded by the Agence Nationale de la Recherce (ANR-07-SESU-00)

More information

Software in safety critical systems

Software in safety critical systems Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions

More information

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when

More information

Liability and Privacy Issues in Business

Liability and Privacy Issues in Business 1 Interactions between law and computer science: privacy and liability Daniel Le Métayer 2 Multidisciplinary approach Growing intermingling of legal and technological issues: privacy, DRM, liability, electronic

More information

Homework 1 (Time, Synchronization and Global State) - 100 Points

Homework 1 (Time, Synchronization and Global State) - 100 Points Homework 1 (Time, Synchronization and Global State) - 100 Points CS25 Distributed Systems, Fall 2009, Instructor: Klara Nahrstedt Out: Thursday, September 3, Due Date: Thursday, September 17 Instructions:

More information

6 Project Planning Matrix (PPM) - Overview (in brief)

6 Project Planning Matrix (PPM) - Overview (in brief) COMIT: ZOPP - PPM (Overview) 76 6 Project Planning Matrix (PPM) - Overview (in brief) 6.1 What is a PPM? The PPM provides a one-page summary: Why What How Which How Where a project is carried out (= who/what

More information

Chapter 6: distributed systems

Chapter 6: distributed systems Chapter 6: distributed systems Strongly related to communication between processes is the issue of how processes in distributed systems synchronize. Synchronization is all about doing the right thing at

More information

Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization.

Synchronization in. Distributed Systems. Cooperation and Coordination in. Distributed Systems. Kinds of Synchronization. Cooperation and Coordination in Distributed Systems Communication Mechanisms for the communication between processes Naming for searching communication partners Synchronization in Distributed Systems But...

More information

Software Active Online Monitoring Under. Anticipatory Semantics

Software Active Online Monitoring Under. Anticipatory Semantics Software Active Online Monitoring Under Anticipatory Semantics Changzhi Zhao, Wei Dong, Ji Wang, Zhichang Qi National Laboratory for Parallel and Distributed Processing P.R.China 7/21/2009 Overview Software

More information

Verification and Validation of Software Components and Component Based Software Systems

Verification and Validation of Software Components and Component Based Software Systems Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research christina.wallin@mdh.se

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality

Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality Current Research Team: Prof. Victor R. Basili Forrest Shull, Ph.D. Guilherme H. Travassos, D.Sc. (1)

More information

Edwin Lindsay Principal Consultant. Compliance Solutions (Life Sciences) Ltd, Tel: + 44 (0) 7917134922 E-Mail: elindsay@blueyonder.co.

Edwin Lindsay Principal Consultant. Compliance Solutions (Life Sciences) Ltd, Tel: + 44 (0) 7917134922 E-Mail: elindsay@blueyonder.co. Edwin Lindsay Principal Consultant, Tel: + 44 (0) 7917134922 E-Mail: elindsay@blueyonder.co.uk There were no guidelines/ regulations There was no training No Procedures No Inspectors Inform All staff of

More information

Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary

Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary Fault Modeling Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults Single stuck-at faults Fault equivalence Fault dominance and checkpoint theorem Classes of stuck-at

More information

Extending AADL for Security Design Assurance of the Internet of Things

Extending AADL for Security Design Assurance of the Internet of Things Extending AADL for Security Design Assurance of the Internet of Things Presented by Rick Kazman, PhD Team: Carol Woody (PI), Rick Kazman, Robert Ellison, John Hudak, Allen Householder Software Engineering

More information

The purpose of this course is to provide practical assistance for defining and managing project scope.

The purpose of this course is to provide practical assistance for defining and managing project scope. Scope Definition and Scope Management Purpose - To provide practical assistance for defining and managing project scope. This course will focus on tips for creating a scope statement rather than a step-by-step

More information

DATAWORX32 V9.2 REDUNDANCY. An ICONICS Whitepaper

DATAWORX32 V9.2 REDUNDANCY. An ICONICS Whitepaper 2010 DATAWORX32 V9.2 REDUNDANCY An ICONICS Whitepaper CONTENTS 1 ABOUT THIS DOCUMENT 1 1.1 SCOPE OF THE DOCUMENT... 1 1.2 REVISION HISTORY... 1 1.3 DEFINITIONS... 1 2 DATAWORX 32 V9 REDUNDANCY 2 2.1 DATAWORX32

More information

EAB Engineering Accreditation Board

EAB Engineering Accreditation Board EAB Engineering Accreditation Board Appendix A: Bachelors and Integrated Masters Degree Learning Outcomes This appendix is based on the 3 rd edition of Accreditation of HE Programmes (AHEP) published May

More information

Transactional Support for SDN Control Planes "

Transactional Support for SDN Control Planes Transactional Support for SDN Control Planes Petr Kuznetsov Telecom ParisTech WTTM, 2015 Software Defined Networking An emerging paradigm in computer network management Separate forwarding hardware (data

More information

Review Manager Guide

Review Manager Guide Review Manager Guide January 26, 2016 - Version 8.2 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

3GPP TS 23.011 V5.0.0 (2002-06)

3GPP TS 23.011 V5.0.0 (2002-06) TS 23.011 V5.0.0 (2002-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; Technical realization of Supplementary Services (Release 5) GLOBAL SYSTEM

More information

Technical Manual Functional Description for S800-RSU-H / S800W-RSU 2CCC413022M0205. 8201 Schaffhausen 1 / 10

Technical Manual Functional Description for S800-RSU-H / S800W-RSU 2CCC413022M0205. 8201 Schaffhausen 1 / 10 ABB ABB Schweiz AG Technical Manual Functional Description for S800-RSU-H / S800W-RSU 2CCC413022M0205 09.04.2014 Page: 8201 Schaffhausen 1 / 10 Please use also the assembly instruction S800-RSU-H Remote

More information

Diagnosis and Fault-Tolerant Control

Diagnosis and Fault-Tolerant Control Mogens Blanke Michel Kinnaert Jan Lunze Marcel Staroswiecki Diagnosis and Fault-Tolerant Control With contributions by Jochen Schroder With 228 Figures Springer 1. Introduction to diagnosis and fault-tolerant

More information

Technical support terms and conditions

Technical support terms and conditions Technical support terms and conditions This AGREEMENT defines the terms and conditions under which ScalAgent Distributed Technologies, hereafter called SCALAGENT, provides the technical support services

More information

A three-dimensional visualization of communications in distributed program environments

A three-dimensional visualization of communications in distributed program environments Engineering Industrial & Management Engineering fields Okayama University Year 2003 A three-dimensional visualization of communications in distributed program environments Mariko Sasakura Okayama University

More information

A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs

A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs A Visualization System and Monitoring Tool to Measure Concurrency in MPICH Programs Michael Scherger Department of Computer Science Texas Christian University Email: m.scherger@tcu.edu Zakir Hussain Syed

More information

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11 Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.

More information

Formal verification of contracts for synchronous software components using NuSMV

Formal verification of contracts for synchronous software components using NuSMV Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

On-line PD Monitoring Makes Good Business Sense

On-line PD Monitoring Makes Good Business Sense On-line PD Monitoring Makes Good Business Sense An essential tool for asset managers to ensure reliable operation, improve maintenance efficiency and to extend the life of their electrical assets. Executive

More information

Introduction to Software Engineering. 8. Software Quality

Introduction to Software Engineering. 8. Software Quality Introduction to Software Engineering 8. Software Quality Roadmap > What is quality? > Quality Attributes > Quality Assurance: Planning and Reviewing > Quality System and Standards 2 Sources > Software

More information

Error Bound for Classes of Polynomial Systems and its Applications: A Variational Analysis Approach

Error Bound for Classes of Polynomial Systems and its Applications: A Variational Analysis Approach Outline Error Bound for Classes of Polynomial Systems and its Applications: A Variational Analysis Approach The University of New South Wales SPOM 2013 Joint work with V. Jeyakumar, B.S. Mordukhovich and

More information

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by

More information

Adaptive Cruise Control System Overview

Adaptive Cruise Control System Overview 5th Meeting of the U.S. Software System Safety Working Group April 12th-14th 2005 @ Anaheim, California USA 1 Introduction Adaptive Cruise System Overview Adaptive Cruise () is an automotive feature that

More information

SN54165, SN54LS165A, SN74165, SN74LS165A PARALLEL-LOAD 8-BIT SHIFT REGISTERS

SN54165, SN54LS165A, SN74165, SN74LS165A PARALLEL-LOAD 8-BIT SHIFT REGISTERS The SN54165 and SN74165 devices SN54165, SN54LS165A, SN74165, SN74LS165A PRODUCTION DATA information is current as of publication date. Products conform to specifications per the terms of Texas Instruments

More information

Continuously Evolving Systems: Towards On-Line Adaptation of Fault Tolerance Software

Continuously Evolving Systems: Towards On-Line Adaptation of Fault Tolerance Software Toulouse France Continuously Evolving Systems: Towards On-Line Adaptation of Fault Tolerance Software Jean-Charles Fabre National Polytechnic Institute, University of Toulouse, France 1 Evolvability The

More information

Context-Bounded Model Checking of LTL Properties for ANSI-C Software. Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole

Context-Bounded Model Checking of LTL Properties for ANSI-C Software. Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole Context-Bounded Model Checking of LTL Properties for ANSI-C Software Jeremy Morse, Lucas Cordeiro, Bernd Fischer, Denis Nicole Model Checking C Model checking: normally applied to formal state transition

More information

Fault Tree Analysis (FTA) and Event Tree Analysis (ETA)

Fault Tree Analysis (FTA) and Event Tree Analysis (ETA) Fault Tree Analysis (FTA) and Event Tree Analysis (ETA) It is easy to get confused between these two techniques. Indeed, the two are in fact complimentary (and are often used together) but focus on opposite

More information

Unit 10: Software Quality

Unit 10: Software Quality Unit 10: Software Quality Objective Ð To introduce software quality management and assurance with particular reference to the requirements of ISO 9000 and associated standards. Ð To introduce QFD, a technique

More information

ISO 27002:2013 Version Change Summary

ISO 27002:2013 Version Change Summary Information Shield www.informationshield.com 888.641.0500 sales@informationshield.com Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category

More information

Model-Checking Verification for Reliable Web Service

Model-Checking Verification for Reliable Web Service Model-Checking Verification for Reliable Web Service Shin NAKAJIMA Hosei University and PRESTO, JST nkjm@i.hosei.ac.jp Abstract Model-checking is a promising technique for the verification and validation

More information

Scalability. We can measure growth in almost any terms. But there are three particularly interesting things to look at:

Scalability. We can measure growth in almost any terms. But there are three particularly interesting things to look at: Scalability The ability of a system, network, or process, to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth. We can measure growth in almost

More information

RAMS Software Techniques in European Space Projects

RAMS Software Techniques in European Space Projects RAMS Software Techniques in European Space Projects An Industrial View J.M. Carranza COMPASS Workshop - York, 29/03/09 Contents Context and organisation of ESA projects Evolution of RAMS Techniques in

More information

Software Test Plan (STP) Template

Software Test Plan (STP) Template (STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This

More information

Keywords: SQA,Black Box Testing( BBT), White Box testing(wbt).

Keywords: SQA,Black Box Testing( BBT), White Box testing(wbt). Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Enhancing Software

More information

Decision-Theoretic Troubleshooting: A Framework for Repair and Experiment

Decision-Theoretic Troubleshooting: A Framework for Repair and Experiment Decision-Theoretic Troubleshooting: A Framework for Repair and Experiment John S. Breese David Heckerman Abstract We develop and extend existing decisiontheoretic methods for troubleshooting a nonfunctioning

More information

Suppor&ng the Design of Safety Cri&cal Systems Using AADL

Suppor&ng the Design of Safety Cri&cal Systems Using AADL Suppor&ng the Design of Safety Cri&cal Systems Using AADL T. Correa, L. B. Becker, J.- M. Farines, J.- P. Bodeveix, M. Filali, F. Vernadat IRIT LAAS UFSC Agenda Introduc&on Proposed Approach Verifica&on

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

Diagnosis of Simple Temporal Networks

Diagnosis of Simple Temporal Networks Diagnosis of Simple Temporal Networks Nico Roos 1 and Cees Witteveen 2 Abstract. In many domains successful execution of plans requires careful monitoring and repair. Diagnosis of plan execution supports

More information

Program Synthesis is a Game

Program Synthesis is a Game Program Synthesis is a Game Barbara Jobstmann CNRS/Verimag, Grenoble, France Outline Synthesis using automata- based game theory. MoBvaBon, comparison with MC and LTL. Basics Terminology Reachability/Safety

More information

Introduction to VLSI Testing

Introduction to VLSI Testing Introduction to VLSI Testing 李 昆 忠 Kuen-Jong Lee Dept. of Electrical Engineering National Cheng-Kung University Tainan, Taiwan, R.O.C. Introduction to VLSI Testing.1 Problems to Think A 32 bit adder A

More information

Software Metrics: Roadmap

Software Metrics: Roadmap Software Metrics: Roadmap By Norman E. Fenton and Martin Neil Presentation by Karim Dhambri Authors (1/2) Norman Fenton is Professor of Computing at Queen Mary (University of London) and is also Chief

More information

Kernel comparison of OpenSolaris, Windows Vista and. Linux 2.6

Kernel comparison of OpenSolaris, Windows Vista and. Linux 2.6 Kernel comparison of OpenSolaris, Windows Vista and Linux 2.6 The idea of writing this paper is evoked by Max Bruning's view on Solaris, BSD and Linux. The comparison of advantages and disadvantages among

More information

Formal Verification and Linear-time Model Checking

Formal Verification and Linear-time Model Checking Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging

More information

Software Architecture & Composition. Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA

Software Architecture & Composition. Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA 1 Software Architecture & Composition Guillaume Waignier, Anne-Françoise Le Meur, Laurence Duchien Project-Team U. Lille 1/CNRS-INRIA http://adam.lille.inria.fr April 2009 2 Scientific context Future applications

More information

CMMI Process Area Compliance with Formal Specification Based Software Development

CMMI Process Area Compliance with Formal Specification Based Software Development CMMI Process Area Compliance with Formal Specification Based Software Development Satish Mishra Institute für Informatik Humboldt University, Berlin mishra@first.fraunhofer.de Bernd-Holger Schlingloff

More information

Decision Logic: if, if else, switch, Boolean conditions and variables

Decision Logic: if, if else, switch, Boolean conditions and variables CS 1044 roject 3 Fall 2009 Decision Logic: if, if else, switch, Boolean conditions and variables This programming assignment uses many of the ideas presented in sections 3 through 5 of the Dale/Weems text

More information

Querying Past and Future in Web Applications

Querying Past and Future in Web Applications Querying Past and Future in Web Applications Daniel Deutch Tel-Aviv University Tova Milo Customer HR System Logistics ERP Bank ecomm CRM Supplier Outline Introduction & Motivation Querying Future [VLDB

More information

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software 1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,

More information

Check List. SAC FCU 402 292 8000 www.sacfcu.com

Check List. SAC FCU 402 292 8000 www.sacfcu.com Check List Welcome to SAC Federal Credit Union ( SAC FCU ). SAC FCU is the largest locally owned financial institution in Sarpy County. SAC FCU offers Savings, Checking, Certificate Accounts, Auto Loans,

More information

Towards a Logical Foundation for Assurance Arguments for Plug & Play Systems

Towards a Logical Foundation for Assurance Arguments for Plug & Play Systems Towards a Logical Foundation for Assurance Arguments for Plug & Play Systems Lu Feng, Andrew King, Insup Lee, Oleg Sokolsky PRECISE Center School of Engineering and Applied Science University of Pennsylvania

More information

VEHICLE TRACKING. Equip your fleet with electronic driver logs and make FMCSA compliance effortless.

VEHICLE TRACKING. Equip your fleet with electronic driver logs and make FMCSA compliance effortless. VEHICLE TRACKING WITH ELECTRONIC LOGS Equip your fleet with electronic driver logs and make FMCSA compliance effortless. The Omnitracs MCP50 and XRS platforms automate the compliance of HOS rules, which

More information

DEPENDABILITY STUDY OF THE ERP SYSTEM

DEPENDABILITY STUDY OF THE ERP SYSTEM Dependability, ERP system, availability Daniel GĄSKA *, Antoni ŚWIĆ ** DEPENDABILITY STUDY OF THE ERP SYSTEM Abstract The paper present the various aspects of the process of testing of the ERP system s

More information

Replication on Virtual Machines

Replication on Virtual Machines Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism

More information

Draft for Discussion Quality Assurance and Configuration Management Requirements March 7, 2007

Draft for Discussion Quality Assurance and Configuration Management Requirements March 7, 2007 Draft for Discussion Quality Assurance and Configuration Management Requirements March 7, 2007 At the December 2006 TGDC Plenary, the TGDC agreed that the ISO 9000/9001 standards should provide the framework

More information

Testing Introduction. IEEE Definitions

Testing Introduction. IEEE Definitions Testing Introduction IEEE Definitions Software testing is the process of analyzing a software item to detect the differences between existing and required conditions (that is, bugs) and to evaluate the

More information

City s.R.P.A.S.R.A.R.A.R.C.A. A.C.B.B.B.A.C.B.A.C.C.A.

City s.R.P.A.S.R.A.R.A.R.C.A. A.C.B.B.B.A.C.B.A.C.C.A. CITY OF NOVI ARCGIS SERVER DEVELOPMENT & HOSTING SERVICES ADDENDUM #1 INTENT: This addendum has been issued to modify and/or interpret the original specifications for the RFP named above. Unless otherwise

More information

Continuous Integration of service applications

Continuous Integration of service applications Continuous Integration of service applications Automotive Diagnostic Systems 2013 Dr.-Ing. Markus A. Stulle IFS IFS Informationstechnik GmbH Trausnitzstraße 8 81671 München Sitz: München Registergericht:

More information

Valid as of January 29, 2013

Valid as of January 29, 2013 1 (10) Contractual terms of RAY Valid as of January 29, 2013 These contractual terms replace the contractual terms of RAY that entered into force on August 28, 2012. These terms shall also be applied to

More information

MEASURES FOR EXCELLENCE. Software Process Improvement: Management. Commitment, Measures. And Motivation

MEASURES FOR EXCELLENCE. Software Process Improvement: Management. Commitment, Measures. And Motivation MEASURES FOR EXCELLENCE Software Process Improvement: Management Commitment, Measures And Motivation J.W.E. Greene QUANTITATIVE SOFTWARE MANAGEMENT LTD 7 rue Fenoux 93 Blythe Road, Paris 75015 London W14

More information

Expert Systems. A knowledge-based approach to intelligent systems. Intelligent System. Motivation. Approaches & Ingredients. Terminology.

Expert Systems. A knowledge-based approach to intelligent systems. Intelligent System. Motivation. Approaches & Ingredients. Terminology. Motivation Expert Systems A knowledge-based approach to intelligent systems Intelligent System Peter Lucas Department of Information and Knowledge Systems Institute for Computing and Information Sciences

More information

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system? 5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling

More information

Terms of Contract and Use Software as a Service Model

Terms of Contract and Use Software as a Service Model Terms of Contract and Use Software as a Service Model These Terms of Contract and Use of Citrix Online Germany GmbH, Erzbergerstr. 117, D-76133 Karlsruhe (hereinafter: Netviewer or Citrix) apply to the

More information

Pocket Verifier Smartphone Edition Release Version 1 User Guide and Tutorial for Windows Mobile 5 Smartphone Motorola Q Samsung i320

Pocket Verifier Smartphone Edition Release Version 1 User Guide and Tutorial for Windows Mobile 5 Smartphone Motorola Q Samsung i320 Pocket Verifier Smartphone Edition Release Version 1 User Guide and Tutorial for Windows Mobile 5 Smartphone Motorola Q Samsung i320 Copyright 2006, Advanced Merchant Solutions Inc. All rights reserved.

More information

Modeling and Validation of a Data Process Unit Control for Space Applications

Modeling and Validation of a Data Process Unit Control for Space Applications Modeling and Validation of a Data Process Unit Control for Space Applications Wan Hai, Huang Chongdi, Wang Yuhui, He Fei and Gu Ming Key Lab of ISS of MOE, TNList, School of Software, Tsinghua University,

More information

General Terms of Purchase. of HAN University of Applied Sciences

General Terms of Purchase. of HAN University of Applied Sciences General Terms of Purchase of HAN University of Applied Sciences HAN-Terms of Purchase; Page 1 of 6 Versie14 september 2010 Content Article 1 Definitions Article 2 Quotation; Creation Article 3 Applicability

More information

Port Trunking. Contents

Port Trunking. Contents 12 Port Trunking Contents Overview..................................................... 12-2................................... 12-2 Port Connections and Configuration.......................... 12-3 Link

More information

(Pessimistic) Timestamp Ordering. Rules for read and write Operations. Pessimistic Timestamp Ordering. Write Operations and Timestamps

(Pessimistic) Timestamp Ordering. Rules for read and write Operations. Pessimistic Timestamp Ordering. Write Operations and Timestamps (Pessimistic) stamp Ordering Another approach to concurrency control: Assign a timestamp ts(t) to transaction T at the moment it starts Using Lamport's timestamps: total order is given. In distributed

More information

A Risk Management System Framework for New Product Development (NPD)

A Risk Management System Framework for New Product Development (NPD) 2011 International Conference on Economics and Finance Research IPEDR vol.4 (2011) (2011) IACSIT Press, Singapore A Risk Management System Framework for New Product Development (NPD) Seonmuk Park, Jongseong

More information

Chapter 2. Multiprocessors Interconnection Networks

Chapter 2. Multiprocessors Interconnection Networks Chapter 2 Multiprocessors Interconnection Networks 2.1 Taxonomy Interconnection Network Static Dynamic 1-D 2-D HC Bus-based Switch-based Single Multiple SS MS Crossbar 2.2 Bus-Based Dynamic Single Bus

More information

Objective. Testing Principle. Types of Testing. Characterization Test. Verification Testing. VLSI Design Verification and Testing.

Objective. Testing Principle. Types of Testing. Characterization Test. Verification Testing. VLSI Design Verification and Testing. VLSI Design Verification and Testing Objective VLSI Testing Mohammad Tehranipoor Electrical and Computer Engineering University of Connecticut Need to understand Types of tests performed at different stages

More information

Timing Methodologies (cont d) Registers. Typical timing specifications. Synchronous System Model. Short Paths. System Clock Frequency

Timing Methodologies (cont d) Registers. Typical timing specifications. Synchronous System Model. Short Paths. System Clock Frequency Registers Timing Methodologies (cont d) Sample data using clock Hold data between clock cycles Computation (and delay) occurs between registers efinition of terms setup time: minimum time before the clocking

More information

Review Manager Guide

Review Manager Guide Review Manager Guide v8.0 May 10, 2013 For the most recent version of this document, visit kcura's Documentation Site. Table of Contents 1 Review Manager overview 4 1.1 Review Manager life cycle 4 1.2

More information

The SPES Methodology Modeling- and Analysis Techniques

The SPES Methodology Modeling- and Analysis Techniques The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München boehmw@in.tum.de Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT

More information

Interaction Diagrams. Use Cases and Actors INTERACTION MODELING

Interaction Diagrams. Use Cases and Actors INTERACTION MODELING Karlstad University Department of Information Systems Adapted for a textbook by Blaha M. and Rumbaugh J. Object Oriented Modeling and Design Pearson Prentice Hall, 2005 INTERACTION MODELING Remigijus GUSTAS

More information

TSL213 64 1 INTEGRATED OPTO SENSOR

TSL213 64 1 INTEGRATED OPTO SENSOR TSL 64 INTEGRATED OPTO SENSOR SOES009A D4059, NOVEMBER 99 REVISED AUGUST 99 Contains 64-Bit Static Shift Register Contains Analog Buffer With Sample and Hold for Analog Output Over Full Clock Period Single-Supply

More information

Open Text ECM Suite. Product Strategy and Overview. Lubor Ptacek. VP Product Marketing Open Text Corporation

Open Text ECM Suite. Product Strategy and Overview. Lubor Ptacek. VP Product Marketing Open Text Corporation Open Text ECM Suite Product Strategy and Overview Lubor Ptacek VP Product Marketing Open Text Corporation Disclaimer Certain statements in this presentation constitute forward-looking statements or forward-looking

More information

2. Information Economics

2. Information Economics 2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many

More information

6.852: Distributed Algorithms Fall, 2009. Class 2

6.852: Distributed Algorithms Fall, 2009. Class 2 .8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

More information

Bosch Packaging Academy Essential Training

Bosch Packaging Academy Essential Training Essential Training Operating Fundamentals Work safely during operation Understand the basic functions of the equipment Get familiar with the operating elements Be able to operate the equipment Get familiar

More information

Software testing. Objectives

Software testing. Objectives Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating

More information

Computer Science Data Science - B.S.

Computer Science Data Science - B.S. Computer Science Data Science - B.S. apping of CSE Courses to Student Outcomes Course CSC 1000 CSC 1100 CSC 1110 CSC 2100 CSC 2800 CSC 3100 CSC 3200 CSC 3220 CSC 3520 CSC 3600 CSC 3610 CEN 3700 CEN 3710

More information

Software quality engineering. Quality assurance. Testing

Software quality engineering. Quality assurance. Testing 4 Software Quality Engineering c Jeff Tian, to be published by John Wiley, 2005 Software quality engineering Quality assurance Testing Figure 1.1. engineering Scope and content hierarchy: Testing, quality

More information

Software Health Management An Introduction. Gabor Karsai Vanderbilt University/ISIS

Software Health Management An Introduction. Gabor Karsai Vanderbilt University/ISIS Software Health Management An Introduction Gabor Karsai Vanderbilt University/ISIS Tutorial at PHM 2009 Outline Definitions Backgrounds Approaches Summary Definitions Software Health Management: A branch

More information

Project Risk Management: IV&V as Insurance for Project Success

Project Risk Management: IV&V as Insurance for Project Success Project Risk Management: IV&V as Insurance for Project Success Introduction Software development projects can be expensive and risky: Ever more complex mission-critical requirements lead to increasingly

More information

Lawrence S. Farey. 193 S.W. Seminole Drive Aloha, OR 97006

Lawrence S. Farey. 193 S.W. Seminole Drive Aloha, OR 97006 Proceedings of the 1996 Winter Simulation Conference. ed. J. 1\1. Charnes, D. J. l\iorrice, D. T. Brunner, and J. J. S,valfl TRWITED ACCELEROMETER WAFER PROCESS PRODUCTION FACILITY: MANUFACTURING SIM:ULATION

More information

Designing Closed Quality Control Loops For Stable Production Systems

Designing Closed Quality Control Loops For Stable Production Systems Designing Closed Quality Control Loops For Stable Production Systems Laboratory for Machine Tools and Production Engineering WZL of RWTH Aachen University, Germany Laboratory on Engineering and Intelligence

More information

Software Testing. Knowledge Base. Rajat Kumar Bal. Introduction

Software Testing. Knowledge Base. Rajat Kumar Bal. Introduction Software Testing Rajat Kumar Bal Introduction In India itself, Software industry growth has been phenomenal. IT field has enormously grown in the past 50 years. IT industry in India is expected to touch

More information

Convention Center Follow-Up Audit November 2013. Craig Terrell, Interim City Auditor Lee Hagelstein, Internal Auditor

Convention Center Follow-Up Audit November 2013. Craig Terrell, Interim City Auditor Lee Hagelstein, Internal Auditor Convention Center Follow-Up Audit November 2013 Craig Terrell, Interim City Auditor Lee Hagelstein, Internal Auditor Convention Center Follow-Up Audit Table of Contents Page Executive Summary...1 Implementation

More information