Interface-based Design 5. Tom Henzinger EPFL and UC Berkeley

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Interface-based Design 5. Tom Henzinger EPFL and UC Berkeley"

Transcription

1 Interface-based Design Tom Henzinger PF and C Berkeley

2 Interface A Interface B Interface A Interface B Code a Code b

3 .. Interface A Interface B Interface A Interface B. Code a Code b. Interface compatibility checking: solving graph games CHIC [Chakrabarti]. Interface refinement checking: alternating simulation relations

4 ... Interface A Interface B Interface A Interface B.. Code a Code b. Interface compatibility checking: solving graph games. Interface refinement checking: alternating simulation relations. Conformance checking of code against interface BAST [Jhala,Majumdar,Sutre]

5 Interface Conformance Checking with BAST example () { : do { ; : if (*) { : ; new ++; } : } while (new!= old); : ; : return; } lock! unlock! Interface Automaton.

6 Interface Conformance Checking with BAST example () { : do { ; : if (*) { : ; new ++; } : } while (new!= old); : ; : return; } Monitor Automaton.

7 Control Flow Graph example () { : do { ; : if (*) { : ; new ++; } : } while (new!= old); : ; : return; } ;

8 Abstract Reachability ;

9 Abstract Reachability ;

10 Abstract Reachability ; ;

11 Abstract Reachability ; ;

12 Abstract Reachability ; ;

13 Concretize rror Trace ; ; true

14 Concretize rror Trace ; ; true true

15 Concretize rror Trace ; new = old ; true true

16 Concretize rror Trace new+ = old ; new = old ; true true

17 Concretize rror Trace new+ = old new+ = old ; new = old ; true true

18 Concretize rror Trace new+ = new new+ = old new+ = old ; new = old ; true true

19 Concretize rror Trace Spurious! new+ = new new+ = old new+ = old ; new = old ; true true

20 Concretize rror Trace Spurious! new+ = new new = old is a relevant predicate new+ = old new+ = old ; new = old ; true true

21 Refined Abstract Reachability, new = old ;

22 Refined Abstract Reachability, new = old, new = old ;, new old ;

23 Refined Abstract Reachability, new = old, new = old ;, new old ;

24 Refined Abstract Reachability, new = old, new = old ;, new old ;, new old

25 Refined Abstract Reachability covered, new = old ;, new = old ;, new old, new old

26 Refined Abstract Reachability, new = old, new = old ;, new old [new!= old], new = old ;, new old

27 Refined Abstract Reachability, new = old, new = old ;, new old [new!= old], new = old, new = old ;, new old

28 Abstract Reachability Tree, new = old ;, new = old ;, new old [new!= old], new = old, new = old, new = old, new old

29 Abstract Reachability Tree = Proof, new = old Inductive invariant: (pc=! Æ new=old) Æ (pc=! Æ new=old) Æ ;, new = old ;, new old [new!= old], new = old, new = old, new = old, new old

30 esson : Automatic Program Verification Abstract + Search Identify relevant facts. Track relevant facts. =

31 A Brief History (and Future) of Model Checking 980s: Theory of finite-state model checking [Clarke/merson, Sifakis, et al.] 990s: Techniques to combat state explosion Finite-state model checking penetrates the hardware industry [Fujitsu, Intel, Motorola, Siemens, etc.] Theory of infinite-state model checking 000s: Techniqes for automatic abstraction Infinite-state model checking penetrates the software industry!

Model Checking of Software

Model Checking of Software Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving

More information

T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

More information

Model Checking: An Introduction

Model Checking: An Introduction Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

CS/ECE 5780/6780: Embedded System Design

CS/ECE 5780/6780: Embedded System Design CS/ECE 5780/6780: Embedded System Design John Regehr Lecture 1: Introduction to Embedded Systems Embedded systems: definition An embedded system is: a special-purpose computer designed to perform dedicated

More information

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Jackie Zheqing Zhang Bill Hopkinson, Ph.D. 12479 Research Parkway Orlando, FL 32826-3248 407-207-0976 jackie.z.zhang@saic.com,

More information

Software Verification: Infinite-State Model Checking and Static Program

Software Verification: Infinite-State Model Checking and Static Program Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,

More information

Program Synthesis is a Game

Program Synthesis is a Game Program Synthesis is a Game Barbara Jobstmann CNRS/Verimag, Grenoble, France Outline Synthesis using automata- based game theory. MoBvaBon, comparison with MC and LTL. Basics Terminology Reachability/Safety

More information

Modeling and Validation of a Data Process Unit Control for Space Applications

Modeling and Validation of a Data Process Unit Control for Space Applications Modeling and Validation of a Data Process Unit Control for Space Applications Wan Hai, Huang Chongdi, Wang Yuhui, He Fei and Gu Ming Key Lab of ISS of MOE, TNList, School of Software, Tsinghua University,

More information

Software Model Checking of Liveness Properties via Transition Invariants

Software Model Checking of Liveness Properties via Transition Invariants I N F O R M A T I K Software Model Checking of Liveness Properties via Transition Invariants Andreas Podelski Andrey Rybalchenko MPI I 2003 2 004 December 2003 FORSCHUNGSBERICHT RESEARCH REPORT M A X -

More information

Model Checking II Temporal Logic Model Checking

Model Checking II Temporal Logic Model Checking 1/32 Model Checking II Temporal Logic Model Checking Edmund M Clarke, Jr School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 2/32 Temporal Logic Model Checking Specification Language:

More information

Verification of Hybrid Systems Based on Counterexample-Guided Abstraction Refinement

Verification of Hybrid Systems Based on Counterexample-Guided Abstraction Refinement Verification of Hybrid Systems Based on Counterexample-Guided Abstraction Refinement Edmund Clarke 1, Ansgar Fehnker 2, Zhi Han 2, Bruce Krogh 2, Olaf Stursberg 2,3, and Michael Theobald 1 1 Computer Science,

More information

Lecture 9 verifying temporal logic

Lecture 9 verifying temporal logic Basics of advanced software systems Lecture 9 verifying temporal logic formulae with SPIN 21/01/2013 1 Outline for today 1. Introduction: motivations for formal methods, use in industry 2. Developing models

More information

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris

More information

InvGen: An Efficient Invariant Generator

InvGen: An Efficient Invariant Generator InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic

More information

15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms

15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms 15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms Maxim Likhachev Robotics Institute Carnegie Mellon University AI Architecture from Artificial Intelligence for Games by

More information

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs. CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express

More information

Model Checking based Software Verification

Model Checking based Software Verification Model Checking based Software Verification 18.5-2006 Keijo Heljanko Keijo.Heljanko@tkk.fi Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24

More information

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system? 5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling

More information

The ProB Animator and Model Checker for B

The ProB Animator and Model Checker for B The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,

More information

Industrial Use of THE B METHOD

Industrial Use of THE B METHOD Industrial Use of THE B METHOD introducing B n a formal method Ë specification method based on a mathematical formalism to build models n with refinement Ë to structure a model step by step from abstract

More information

Mechanical Verification of a Garbage Collector

Mechanical Verification of a Garbage Collector Mechanical Verification of a Garbage Collector by Klaus Havelund FMPPTA 99 Talk by Sibylle Aregger Motivation handwritten proofs are error prone show approach to verify algorithm mechanically 2 Contents

More information

Image Computation and Predicate Refinement for RTL Verilog using Word Level Proofs

Image Computation and Predicate Refinement for RTL Verilog using Word Level Proofs Image Computation and Predicate Refinement for RTL Verilog using Word Level Proofs Daniel Kroening ETH Zurich Natasha Sharygina University of Lugano Abstract Automated abstraction is the enabling technique

More information

Pulse: Plural To EVMDD-SMC

Pulse: Plural To EVMDD-SMC Pulse: Plural To EVMDD-SMC Automated Verification of Specifications with Typestates and Access Permissions Ijaz Ahmed 1 Néstor Cataño 1 Radu I. Siminiceanu 2 1 Carnegie Mellon University - Portugal, The

More information

System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems

System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.

More information

SYNTHESIS FROM PROBABILISTIC COMPONENTS

SYNTHESIS FROM PROBABILISTIC COMPONENTS Logical Methods in Computer Science Vol. 10(2:17)2014, pp. 1 24 www.lmcs-online.org Submitted Feb. 29, 2012 Published Jun. 30, 2014 SYNTHESIS FROM PROBABILISTIC COMPONENTS YOAD LUSTIG a, SUMIT NAIN b,

More information

Second year review WP2 overview SW-based Method. Trento - October 17th, 2008

Second year review WP2 overview SW-based Method. Trento - October 17th, 2008 Second year review WP2 overview SW-based Method Trento - October 17th, 2008 1 Goal To investigate software-only methodologies for remote entrusting implementation 2 Tasks D2.3 D2.4 M0 M3 M6 M9 M12 M15

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

MetaGame: An Animation Tool for Model-Checking Games

MetaGame: An Animation Tool for Model-Checking Games MetaGame: An Animation Tool for Model-Checking Games Markus Müller-Olm 1 and Haiseung Yoo 2 1 FernUniversität in Hagen, Fachbereich Informatik, LG PI 5 Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de

More information

Texas Essential Knowledge and Skills Correlation to Video Game Design Foundations 2011 N130.0993. Video Game Design

Texas Essential Knowledge and Skills Correlation to Video Game Design Foundations 2011 N130.0993. Video Game Design Texas Essential Knowledge and Skills Correlation to Video Game Design Foundations 2011 N130.0993. Video Game Design STANDARD CORRELATING PAGES Standard (1) The student demonstrates knowledge and appropriate

More information

The product. SIMAC a machine simulator. Plan. Presentation of the simulation. Simulation, why? What : SIMAC product. Page 1 SIMAC

The product. SIMAC a machine simulator. Plan. Presentation of the simulation. Simulation, why? What : SIMAC product. Page 1 SIMAC SIMAC a machine simulator SIMAC The product SIMAC 10-2003 - 1 Plan 1 Presentation of the simulation 2 Simulation, why? 3 What : SIMAC product SIMAC 10-2003 - 2 Page 1 SIMAC objectives Different from others

More information

Modeling and Verification of Sampled-Data Hybrid Systems

Modeling and Verification of Sampled-Data Hybrid Systems Modeling and Verification of Sampled-Data Hybrid Systems Abstract B. Izaias Silva and Bruce H. Krogh Dept. of Electrical and Computer Engineering, Carnegie Mellon University (Izaias /krogh)@cmu.edu We

More information

M.S. Computer Science Program

M.S. Computer Science Program M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer

More information

Computer Science. Cabrillo College Catalog 2011-2012

Computer Science. Cabrillo College Catalog 2011-2012 COMPUTER SCIENCE Natural Applied Sciences Division Wa Garner, Division Dean Division Office, Room 701 Susan Nerton, Program Chair, (831) 479-6545 Aptos Counsel: (831) 479-6274 f appointment Watsonville

More information

SHARED HASH TABLES IN PARALLEL MODEL CHECKING

SHARED HASH TABLES IN PARALLEL MODEL CHECKING SHARED HASH TABLES IN PARALLEL MODEL CHECKING IPA LENTEDAGEN 2010 ALFONS LAARMAN JOINT WORK WITH MICHAEL WEBER AND JACO VAN DE POL 23/4/2010 AGENDA Introduction Goal and motivation What is model checking?

More information

A Classification of Model Checking-based Verification Approaches for Software Models

A Classification of Model Checking-based Verification Approaches for Software Models A Classification of Model Checking-based Verification Approaches for Software Models Petra Brosch, Sebastian Gabmeyer, Martina Seidl Sebastian Gabmeyer Business Informatics Group Institute of Software

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Virtual Lock for Corporate IP Telephony v 3.0

Virtual Lock for Corporate IP Telephony v 3.0 Virtual Lock for Corporate IP Telephony v 3.0 2011 ISO 9001 REGISTERED QUALITY SYSTEM When corporate IP telephony becomes a value-adding solution for your company, its optimum use is of primary importance

More information

Formal Software Testing. Terri Grenda, CSTE IV&V Testing Solutions, LLC www.ivvts.com

Formal Software Testing. Terri Grenda, CSTE IV&V Testing Solutions, LLC www.ivvts.com Formal Software Testing Terri Grenda, CSTE IV&V Testing Solutions, LLC www.ivvts.com Scope of Testing Find defects early Remove defects prior to production Identify Risks Unbiased opinion When Should Testing

More information

Advanced Design and Validation Techniques for Electronic Control Units

Advanced Design and Validation Techniques for Electronic Control Units Copyright 1998 Society of Automotive Engineers, Inc. SAE Paper 980199 Advanced Design and Validation Techniques for Electronic Control Units Max Fuchs, Michael Eckrich BMW AG, Systems Engineering, EG-K-3,

More information

Software Model Checking. Equivalence Hierarchy

Software Model Checking. Equivalence Hierarchy Software Equivalence Hierarchy Moonzoo Kim CS Dept. KAIST CS750B Software Korea Advanced Institute of Science and Technology Equivalence semantics and SW design Preliminary Hierarchy Diagram Trace-based

More information

Formal Verification by Model Checking

Formal Verification by Model Checking Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking

More information

Verification of hybrid dynamical systems

Verification of hybrid dynamical systems Verification of hybrid dynamical systems Jüri Vain Tallinn Technical University/Institute of Cybernetics vain@ioc.ee Outline What are Hybrid Systems? Hybrid automata Verification of hybrid systems Verification

More information

Introduction to Automated Testing

Introduction to Automated Testing Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases

More information

Code Coverage Testing Using Hardware Performance Monitoring Support

Code Coverage Testing Using Hardware Performance Monitoring Support Code Coverage Testing Using Hardware Performance Monitoring Support Alex Shye Matthew Iyer Vijay Janapa Reddi Daniel A. Connors Department of Electrical and Computer Engineering University of Colorado

More information

Domains and Competencies

Domains and Competencies Domains and Competencies DOMAIN I TECHNOLOGY APPLICATIONS CORE Standards Assessed: Computer Science 8 12 I VII Competency 001: The computer science teacher knows technology terminology and concepts; the

More information

Model checking test models. Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl

Model checking test models. Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl Model checking test models Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl February 14, 2014 Abstract This thesis is about model checking testing models. These testing

More information

Electoral Commission. Auction # Self Service Password Reset Software

Electoral Commission. Auction # Self Service Password Reset Software Electoral Commission Auction # 10182080 Self Service Password Reset Software IMPORTANT NOTICE Failure to comply with the completion of the auction conditions and the required information (i.e. Make, model

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions The Veterinary Data Logger What is it and what are its capabilities? Typical uses (procedure logging & charting, ECG capture, screen event capture) How does the Data Logger make

More information

Introduction to Formal Methods. Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm

Introduction to Formal Methods. Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm Introduction to Formal Methods Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm Outline Introduction Formal Specification Formal Verification Model Checking Theorem Proving Introduction Good papers to

More information

Generating Models of Infinite-State Communication Protocols using Regular Inference with Abstraction

Generating Models of Infinite-State Communication Protocols using Regular Inference with Abstraction Noname manuscript No. (will be inserted by the editor) Generating Models of Infinite-State Communication Protocols using Regular Inference with Abstraction Fides Aarts Bengt Jonsson Johan Uijen Frits Vaandrager

More information

Cabrillo College Catalog 2015-2016

Cabrillo College Catalog 2015-2016 COMPUTER SCIENCE Natural Applied Sciences Division Wa Garner, Division Dean Division Office, Room 701 Steve Hodges, Program Contact, (831) 479-6494 Aptos Counsel: (831) 479-6274 f appointment Watsonville

More information

tutorial: hardware and software model checking

tutorial: hardware and software model checking tutorial: hardware and software model checking gerard holzmann and anuj puri { gerard anuj } @research.bell-labs.com Bell Labs, USA outline introduction (15 mins) theory and algorithms system modeling

More information

Testing Real-Time Systems Using UPPAAL

Testing Real-Time Systems Using UPPAAL 1 Testing Real-Time Systems Using UPPAAL Anders Hessel, Kim G. Larsen, Marius Mikucionis, Brian Nielsen, Paul Pettersson, and Arne Skou. 2008 Selected Topics Software Technology 2 Jorge Santos Simón u

More information

Model Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007

Model Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Model Based Testing for Security Checking Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Outline Introduction Active/Passive Testing Active Testing

More information

Database Support for PC Software Configuration and Version Management in the START Network

Database Support for PC Software Configuration and Version Management in the START Network Database Support for PC Software Configuration and Version Management in the START Network S. Auerbach *, A. Buchmann, I. Buchmann *, T. Kudraß, K. Lange *, C. Lier *, K. Weidmann * * START Informatik

More information

RATP safety approach for railway signalling systems

RATP safety approach for railway signalling systems RATP safety approach for railway signalling systems ReSIST summer School 007 Pierre CHARTIER Summary. Introduction. Hardware fault detection. 6 Introduction Global railway system Rolling stock Environment

More information

Verification Everywhere: Security, Dependability, Reliability. Lenore D. Zuck Usable Verification, May 25, 2011

Verification Everywhere: Security, Dependability, Reliability. Lenore D. Zuck Usable Verification, May 25, 2011 Verification Everywhere: Security, Dependability, Reliability Lenore D. Zuck Usable Verification, May 25, 2011 1 Trustworthy Protocols: NTLM A suite of Microsoft security protocols Proves authentication,

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

Division of Mathematical Sciences

Division of Mathematical Sciences Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree

More information

From Hybrid Data-Flow Languages to Hybrid Automata: A Complete Translation

From Hybrid Data-Flow Languages to Hybrid Automata: A Complete Translation From Hybrid Data-Flow Languages to Hybrid Automata: A Complete Translation Peter Schrammel peter.schrammel@inria.fr (joint work with Bertrand Jeannet) INRIA Grenoble Rhône-Alpes INRIA large-scale initiative

More information

What methods are used to conduct testing?

What methods are used to conduct testing? What is testing? Testing is the practice of making objective judgments regarding the extent to which the system (device) meets, exceeds or fails to meet stated objectives What the purpose of testing? There

More information

Motivations 1. What is (or should be) the essential preoccupation of computer scientists?

Motivations 1. What is (or should be) the essential preoccupation of computer scientists? Improving Systems Quality Challenges and Trends An Abstract Interpretation Perspective Patrick COUSOT École Normale Supérieure 45 rue d Ulm, 75230 Paris cedex 05, France Patrick.Cousot@ens.fr www.di.ens.fr/

More information

Hagit Attiya and Eshcar Hillel. Computer Science Department Technion

Hagit Attiya and Eshcar Hillel. Computer Science Department Technion Hagit Attiya and Eshcar Hillel Computer Science Department Technion !!" What are highly-concurrent data structures and why we care about them The concurrency of existing implementation techniques Two ideas

More information

Formal Verification and Linear-time Model Checking

Formal Verification and Linear-time Model Checking Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging

More information

CPC31411 Certificate III in Construction Waterproofing

CPC31411 Certificate III in Construction Waterproofing CPC31411 Certificate III in Construction Waterproofing Release 2 CPC31411 Certificate III in Construction Waterproofing Modification History Revised qualification deemed equivalent to CPC31411 Elective

More information

Software Development Technologies for Reactive, Real-Time, and Hybrid Systems. 1996 Progress Report NASA grant NAG2-892

Software Development Technologies for Reactive, Real-Time, and Hybrid Systems. 1996 Progress Report NASA grant NAG2-892 NASA-CR-205329 "/ '"" " Software Development Technologies for Reactive, Real-Time, and Hybrid Systems 1996 Progress Report NASA grant NAG2-892 P.I. : Professor Zohar Manna Computer Science Department Stanford

More information

[Whitepaper] New Generation RISC Processing Power - Green Technology Engenders New Business Opportunities

[Whitepaper] New Generation RISC Processing Power - Green Technology Engenders New Business Opportunities [Whitepaper] New Generation RISC Processing Power - Green Technology Engenders New Business Opportunities In recent years, RISC computing-based products such as smart phones and consumer tablet PCs keep

More information

Formal Verification of Software

Formal Verification of Software Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification

More information

Storage Device Information

Storage Device Information Storage Device Information 1. MSI suggests to ask our local service center for a storage device s approval list before your upgrade in order to avoid any compatibility issues. 2. For having the maximum

More information

Application Note. Network Reporting with Exinda Networks

Application Note. Network Reporting with Exinda Networks Application Note Network Reporting with Exinda Networks Network traffic optimization reduces the reliance of business upon costly capacity bandwidth upgrades. Exinda Networks delivers the means to effectively

More information

510(k) SUMMARY. Epic s Blood Product Administration Module version 0.9

510(k) SUMMARY. Epic s Blood Product Administration Module version 0.9 510(k) SUMMARY Epic s Blood Product Administration Module version 0.9 Contact Person: Maggie Francis Phone: (608) 271 9000 Facsimile: (608) 271 7237 Date Prepared: January 30, 2014 Trade Name: Blood Product

More information

Enrolment. How can I add more practice in the application? In the page "Practice Information", you can press "Add" button to add more practice.

Enrolment. How can I add more practice in the application? In the page Practice Information, you can press Add button to add more practice. Enrolment EN 1. EN 2. May I apply for enrolment in the Health Care Voucher Scheme, Vaccination Subsidy Schemes and/or Primary Care Directory through the ehealth System? The ehealth System caters for the

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Test Case Generation for Ultimately Periodic Paths Joint work with Saddek Bensalem Hongyang Qu Stavros Tripakis Lenore Zuck Accepted to HVC 2007 How to find the condition to execute a path? (weakest precondition

More information

TRANSPONDER HDD 2.5 USB 2.0 SATA ENCRYPTED STORAGE

TRANSPONDER HDD 2.5 USB 2.0 SATA ENCRYPTED STORAGE TRANSPONDER HDD 2.5 USB 2.0 SATA ENCRYPTED STORAGE USER MANUAL HXDU2RFID www.hamletcom.com Dear Customer, thanks for choosing an Hamlet product. Please carefully follow the instructions for its use and

More information

Software Verification with Program-Graph Interpolation and Abstraction. Aws Albarghouthi

Software Verification with Program-Graph Interpolation and Abstraction. Aws Albarghouthi Software Verification with Program-Graph Interpolation and Abstraction by Aws Albarghouthi A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

L - Standard Letter Grade P - Pass/No Pass Repeatability: N - Course may not be repeated

L - Standard Letter Grade P - Pass/No Pass Repeatability: N - Course may not be repeated Course: MATH 26 Division: 10 Also Listed As: 200930, INACTIVE COURSE Short Title: Full Title: DISCRETE MATHEMATIC Discrete Mathematics Contact Hours/Week Lecture: 4 Lab: 0 Other: 0 Total: 4 4 Number of

More information

Overview of E0222: Automata and Computability

Overview of E0222: Automata and Computability Overview of E0222: Automata and Computability Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. August 3, 2011 What this course is about What we study

More information

Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005

Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005 Turing Degrees and Definability of the Jump Theodore A. Slaman University of California, Berkeley CJuly, 2005 Outline Lecture 1 Forcing in arithmetic Coding and decoding theorems Automorphisms of countable

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Process Mining Using BPMN: Relating Event Logs and Process Models

Process Mining Using BPMN: Relating Event Logs and Process Models Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:

More information

The software model checker BLAST

The software model checker BLAST Int J Softw Tools Technol Transfer (2007) 9:505 525 DOI 10.1007/s10009-007-0044-z SPECIAL SECTION FASE 04/05 The software model checker BLAST Applications to software engineering Dirk Beyer Thomas A. Henzinger

More information

MM8000 highest safety and security with intelligent danger management

MM8000 highest safety and security with intelligent danger management MM8000 highest safety and security with intelligent danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive

More information

Combining Sequential and Concurrent Verification - The SMTP Case Study -

Combining Sequential and Concurrent Verification - The SMTP Case Study - Deutsches Forschungszentrum für f r Künstliche K Intelligenz Combining Sequential and Concurrent Verification - The SMTP Case Study - Bruno Langenstein, Werner Stephan (DFKI GmbH) Saarbrücken, Germany

More information

UNLOCK YOUR IEC 61850 TESTING EXCELLENCE

UNLOCK YOUR IEC 61850 TESTING EXCELLENCE IMPROVE EFFICIENCY TEST WITH CONFIDENCE OF KNOW-HOW LEARN AND EXPAND YOUR IEC 61850 SKILLS MASTER YOUR NETWORK KNOWLEDGE GENERATE TEST RESULTS UNLOCK YOUR IEC 61850 TESTING EXCELLENCE Connect To & Read

More information

Approaches to Improve System Dependability From Formal Verification to Model-Based Testing

Approaches to Improve System Dependability From Formal Verification to Model-Based Testing Approaches to Improve System Dependability From Formal Verification to Model-Based Testing Andreas Ulrich, Peter Amthor, Marlon Vieira Siemens AG, Corporate Technology, CT SE/SCR andreas.ulrich@siemens.com

More information

Brno University of Technology. PhD. Thesis. Symbolic Data Structures for Parametric Verification

Brno University of Technology. PhD. Thesis. Symbolic Data Structures for Parametric Verification Brno University of Technology Faculty of Information Technology PhD. Thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Symbolic Data Structures for Parametric

More information

Industrie 4.0? IT-Security 0.1!

Industrie 4.0? IT-Security 0.1! Industrie 4.0? IT-Security 0.1! Prof. Dr. Hartmut Pohl Professional Attacks Example: Stuxnet and Derivatives 100 % Stuxnet 2006 Code Red 2006 Flame 2007 Roter Oktober 2007 Duqu 2009 Mahdi 2011 Gauss 2012

More information

An Overview of a Compiler

An Overview of a Compiler An Overview of a Compiler Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course on Principles of Compiler Design Outline of the Lecture About the course

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

Modeling, Verification and Testing using Timed and Hybrid. Automata. Stavros Tripakis and Thao Dang

Modeling, Verification and Testing using Timed and Hybrid. Automata. Stavros Tripakis and Thao Dang Modeling, Verification and Testing using Timed and Hybrid Automata Stavros Tripakis and Thao Dang September 12, 2008 ii Contents 1 Modeling, Verification and Testing using Timed and Hybrid Automata 1 1.1

More information

Mobile Device Management and Security Glossary

Mobile Device Management and Security Glossary Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

Engineering efficiency in automation for offshore applications

Engineering efficiency in automation for offshore applications Engineering efficiency in automation for offshore applications Reduce engineering time, costs and system maintenance requirements through integrated engineering Introduction Jeff Jensen Oil & Gas Application

More information

Sales Order Changes Tracked for PO-1020 SO-1459

Sales Order Changes Tracked for PO-1020 SO-1459 Sales Order Changes Tracked for PO-1020 SO-1459 Overview This Extended Solution to the Sales Order module creates a new file, which is written to each time a Sales Order line is changed if it contains

More information

COMPSCI 314: SDN: Software Defined Networking

COMPSCI 314: SDN: Software Defined Networking COMPSCI 314: SDN: Software Defined Networking Nevil Brownlee n.brownlee@auckland.ac.nz Lecture 23 Current approach to building a network Buy 802.3 (Ethernet) switches, connect hosts to them using UTP cabling

More information

TRY OUR SOFTWARE TAKE IT FOR A TEST DRIVE PRODUCT CATALOG 2015

TRY OUR SOFTWARE TAKE IT FOR A TEST DRIVE PRODUCT CATALOG 2015 WHO OUR CUSTOMERS ARE PREPARING THE FUTURE WORKFORCE Educational and training facilities all over the world rely on Real Games state-of-the-art training software. Spanning many different levels of education,

More information

Storage Device Information

Storage Device Information Storage Device Information 1. MSI suggests to ask our local service center for a storage device s approval list before your upgrade in order to avoid any compatibility issues. 2. For having the maximum

More information