Monitoring the Execution of Space Craft Flight Software
|
|
|
- Silvester Leon Booth
- 10 years ago
- Views:
Transcription
1 Copyright All rights reserved. Monitoring the Execution of Space Craft Flight Software Klaus Havelund, Alex Groce, Margaret Smith Jet Propulsion Laboratory (JPL), CA USA California Institute of Technology Howard Barringer University of Manchester, UK
2 thanks to members of the MSL flight software team Chris Delp Dave Hecox Gerard Holzmann Rajeev Joshi Cin-Young Lee Alex Moncada Cindy Oda Glenn Reeves Lisa Tatge Hui Ying Wen Jesse Wright Hyejung Yun
3 outline the Mars Science Laboratory suggested testing methodology the LogScope monitoring system relationship to other work
4 our contributions user-friendly temporal quantified logic translation into quantified automata both can be used for specification runtime verification of log files testing of real spacecraft software
5 Mars Science Laboratory (MSL)
6 MSL information planned launch 2011 biggest rover so far to be sent to Mars programmer team of 30 testing team of 10+ people rover compute element (RCE): controls all stages of the integrated spacecraft programming language is C, 2.5 M LOC highly multi-threaded (over 130 threads)
7 testing
8 problems with testing FSW flight software engineers work under tight schedules: hard to access. system = hardware + software: it is cumbersome to run. difficult to determine what properties to define of what events. A.h.c.h B
9 emphasis on offline log analysis log
10 separation of concerns log log log log
11 architecture log LogMaker [e 1,e 2,,e n ] LogScope spec violations
12 log events
13 log events CHANNEL CHANGE COMMAND PRODUCT EVR
14 example log... COMMAND 7308 { Args := ['CLEAR_RELAY_PYRO_STATUS'] Time := Stem := "POWER_HOUSEKEEPING" Number := "4" type := "FSW EVR 7309 { message := "Dispatched immediate command POWER_HOUSEKEEPING: number=4, seconds= , subseconds= " Dispatch := "POWER_HOUSEKEEPING" Time := name := "CMD_DISPATCH" level := "COMMAND" Number := "4... EVR 7311 { name := "POWER_SEND_REQUEST" Time := message := "power_queue_card_requestsending request to PAM 0." level := "DIAGNOSTIC EVR 7312 { message := "Successfully completed command POWER_HOUSEKEEPING: number=4." Success := "POWER_HOUSEKEEPING" Time := name := "CMD_COMPLETED_SUCCESS" level := "COMMAND" Number := "4? EVR 7313 { name := "PWR_REQUEST_CALLBACK" Time := message := "power_card_request - FPGA request successfully sent to RPAM A." level := "DIAGNOSTIC CHANNEL 7314 { channelid := "PWR-3049" DNChange := 67 dnunsignedvalue := 1600 type := "UNSIGNED_INT" Time := ChannelName := "PWR-BCB1-AMP... COMMAND 9626 { Args := ['set_device(1)', 'TRUE'] Time := Stem := "RUN_COMMAND" Number := "18" type := "FSW EVR 9627 { message := "Validation failed for command RUN_COMMAND: number=18." DispatchFailure := "RUN_COMMAND" Time := name := "CMD_DISPATCH_VALIDATION_FAILURE" level := "COMMAND" Number := "18...
15 example log... COMMAND 7308 { Args := ['CLEAR_RELAY_PYRO_STATUS'] Time := Stem := "POWER_HOUSEKEEPING" Number := "4" type := "FSW EVR 7309 { message := "Dispatched immediate command POWER_HOUSEKEEPING: number=4, seconds= , subseconds= " Dispatch := "POWER_HOUSEKEEPING" Time := name := "CMD_DISPATCH" level := "COMMAND" Number := "4... EVR 7311 { name := "POWER_SEND_REQUEST" Time := message := "power_queue_card_requestsending request to PAM 0." level := "DIAGNOSTIC EVR 7312 { message := "Successfully completed command POWER_HOUSEKEEPING: number=4." Success := "POWER_HOUSEKEEPING" Time := name := "CMD_COMPLETED_SUCCESS" level := "COMMAND" Number := "4 EVR 7313 { name := "PWR_REQUEST_CALLBACK" Time := message := "power_card_request - FPGA request successfully sent to RPAM A." level := "DIAGNOSTIC CHANNEL 7314 { channelid := "PWR-3049" DNChange := 67 dnunsignedvalue := 1600 type := "UNSIGNED_INT" Time := ChannelName := "PWR-BCB1-AMP... COMMAND 9626 { Args := ['set_device(1)', 'TRUE'] Time := Stem := "RUN_COMMAND" Number := "18" type := "FSW EVR 9627 { message := "Validation failed for command RUN_COMMAND: number=18." DispatchFailure := "RUN_COMMAND" Time := name := "CMD_DISPATCH_VALIDATION_FAILURE" level := "COMMAND" Number := "18...
16 standard practice logs analyzed by writing Python scripts properties coded up in Python this results in specifications that are: time consuming to write difficult to read, hindering: maintenance communication specification-sharing reuse difficult to auto-generate
17 log = [ {"OBJ_TYPE :"COMMAND", "Type :"FSW,"Stem :"PICT,"Number :231, {"OBJ_TYPE :"EVR, "Dispatch :"PICT,"Number :231, {"OBJ_TYPE :"CHANNEL", "DataNumber" : 5, {"OBJ_TYPE :"EVR", "Success :"PICT, "Number :231, ] {"OBJ_TYPE :"PRODUCT", "ImageSize" : 1200
18 the first scripture trigger consequences look:drill_dmp\ evr(cmd_dispatch,positive)\ evr(cmd_completed_succcess,positive)\ evr(cmd_completed_failure,negative)\ chan(id:cmd-0004,positive,contains opcode of last immediate command)\ chan(id:cmd-0007,positive)\ chan(id:cmd-0001,negative)\ chan(id:cmd-0009,negative)\ prod(name:drillall,1,*)
19 Property P 1 P 1 : Whenever a flight software command is issued, then eventually an EVR should indicate success of that command
20 Property P 1 refined P 1 : Whenever a COMMAND is issued with the Type field having the value "FSW, the Stem field (command name) having some unknown value x, and the Number field having some unknown value y, then eventually an EVR should occur, with the field Success mapped to x and the Number field mapped to y.
21 formalization pattern P1: COMMAND{Type:"FSW", Stem:x, Number:y => EVR{Success:x, Number:y
22 pattern syntax pattern ::= 'pattern' NAME ':' event '=>' consequence consequence ::= event '!' event '[' consequence 1,...,consequence n '] {' consequence 1,...,consequence n '
23 Property P 2 P 2 : Whenever a COMMAND is issued with the Type field having the value "FSW, the Stem field (command name) having some unknown value x, and the Number field having some unknown value y, Then an EVR should thereafter not occur, with the field Failure mapped to x and the Number field mapped to y.
24 formalization pattern P2: COMMAND{Type:"FSW", Stem:x, Number:y =>! EVR{Failure:x, Number:y
25 pattern syntax pattern ::= 'pattern' NAME ':' event '=>' consequence consequence ::= event '!' event '[' consequence 1,...,consequence n '] {' consequence 1,...,consequence n '
26 Property P 3 P 3 : Whenever a flight software command is issued, there should follow a dispatch of that command, and no dispatch failure before that, followed by a success of that command, and no failure before that, and no more successes of that command (exactly one success).
27
28 formalization pattern P3: COMMAND{Type:"FSW", Stem:x, Number:y => [! EVR{DispatchFailure:x, EVR{Dispatch:x, Number:y,! EVR{Failure:x, Number:y, EVR{Success:x, Number:y,! EVR{Success:x, Number:y ]
29 expressed in quantified LTL not as easy to read
30 pattern syntax pattern ::= 'pattern' NAME ':' event '=>' consequence consequence ::= event '!' event '[' consequence 1,...,consequence n '] {' consequence 1,...,consequence n '
31 property P4 P 4 : Whenever a flight software command is issued, there should follow a dispatch of that command, and also a success, but the two events can occur in any order. In addition, there should never at any time (to the end of the log) after the command occur a dispatch failure or a failure of that command. Finally, after a success there should not follow another success for that same command and number.
32 formalized pattern P4: COMMAND{Type:"FSW", Stem:x, Number:y => { EVR{Dispatch:x, Number:y, [ EVR{Success:x, Number:y,! EVR{Success:x, Number:y ],! EVR{DispatchFailure:x,! EVR{Failure:x, Number:y
33 predicates P 5 : The success of a command with a number y should never be followed by the success of a command with an equal or lower number z y. pattern P5: EVR{Success:_, Number:y =>! EVR{Success:_,Number:z where {: z <= y :
34 Python predicate definitions {: def within(t1,t2,max): return (t2-t1) <= max : pattern P6: COMMAND{Type:"FSW",Stem:x,Number:y,Time:t1 where {: x.startswith("pwr_ ) : => EVR{Success:x, Number:y, Time:t2 where within(t1,t2,10000)
35 specialized range predicates pattern P7: COMMAND {Type: "FSW", Stem: "PICT" => [ CHANNEL {DataNumber : {0 : 1, 4 :0, PRODUCT ImageSize : [1000,2000] ] DataNumber bit nr 0 should be 1, and bit nr 4 should be 0 ImageSize should be in the interval
36 event actions {: counter = 0 def count(): global counter;counter = counter + 1 def within(): return counter < 3 : pattern P8 : COMMAND {Name : x where {: within() : do {: count() : => EVR {Success : x do {: print x + " succeeded" :
37 scopes sometimes need for limiting the scope of a property without such scope a pattern is checked from it is triggered until the end of the log for example: check that some command leads to some behavior, but only up to the next command
38 scoped version of P4 pattern P4_: COMMAND{Type:"FSW", Stem:x, Number:y => { EVR{Dispatch:x, Number:y, [ EVR{Success:x, Number:y,! EVR{Success:x, Number:y ],! EVR{DispatchFailure:x,! EVR{Failure:x, Number:y upto COMMAND{Type: "FSW
39 syntax for patterns pattern ::= 'pattern' NAME ':' event '=>' consequence ['upto' event] consequence ::= event '!' event '[' consequence 1,...,consequence n '] {' consequence 1,...,consequence n '
40 from patterns to automata temporal patterns are translated into parameterized universal automata automata language more expressive user can use both, in practice only temporal patterns have been used for testing MSL automaton language forms a subset of the RuleR language (to be discussed)
41 automata characteristics states, transitions and events events are as in patterns: can carry/bind data can have executable Python predicates can have executable Python actions states can be parameterized with data a transition can target multiple states all must lead to success ( -semantics)
42 recall P3 pattern P3: COMMAND{Type:"FSW", Stem:x, Number:y => [! EVR{DispatchFailure:x, EVR{Dispatch:x, Number:y,! EVR{Failure:x, Number:y, EVR{Success:x, Number:y,! EVR{Success:x, Number:y ]
43 automaton A3 { always S1 { COMMAND{Type:"FSW",Stem:x,Number:y => S2(x,y) hot state S2(x,y) { EVR{DispatchFailure:x => error EVR{Dispatch:x, Number:y => S3(x,y) hot state S3(x,y) { EVR{Failure:x, Number:y => error EVR{Success:x, Number:y => S4(x,y) state S4(x,y) { EVR{Success:x, Number:y => error
44
45 recall P4 pattern P4: COMMAND{Type:"FSW", Stem:x, Number:y => { EVR{Dispatch:x, Number:y, [ EVR{Success:x, Number:y,! EVR{Success:x, Number:y ],! EVR{DispatchFailure:x,! EVR{Failure:x, Number:y
46 automaton A4 { always S1 { COMMAND{Type:"FSW",Stem:x,Number:y => S2(x,y), S3(x,y), S4(x,y), S5(x,y) hot state S2(x,y) { EVR{Dispatch:x,Number:y => done hot state S3(x,y) { EVR{Success:x,Number:y => S6(x,y) state S4(x,y) { EVR{DispatchFailure:x => error state S5(x,y) { EVR{Failure:x,Number:y => error state S6(x,y) { EVR{Success:x,Number:y => error
47
48 expressiveness recall syntax for patterns: pattern ::= 'pattern' NAME ':' event '=>' consequence ['upto' event] consequence ::= event '!' event '[' consequence 1,...,consequence n '] {' consequence 1,...,consequence n ' trigger = one event
49 so we cannot write pattern P_with_composite_trigger: [ COMMAND{Type:"FSW", Stem:x, Number:y,! EVR{DispatchFailure:x, EVR{Dispatch:x, Number:y ] => [! EVR{Failure:x, Number:y, EVR{Success:x, Number:y,! EVR{Success:x, Number:y ] we can of course write an automaton that expresses the intended semantics.
50 other automata features success states (dual to hot states) step states: have to be left in next transition
51 running LogScope import logscope log = createlog(fromsomewhere) observer = logscope.observer("$issta/spec") observer.monitor(log)
52 summary of errors ======================== Summary of Errors: ======================== P1 : 1 error P2 : 0 P3 : 1 error P4 : 3 errors P5 : 0 P6 : 0 P7 : 3 errors A3 : 1 error A4 : 3 errors
53 automaton A4 { always S1 { COMMAND{Type:"FSW",Stem:x,Number:y => S2(x,y), S3(x,y), S4(x,y), S5(x,y) hot state S2(x,y) { EVR{Dispatch:x,Number:y => done hot state S3(x,y) { EVR{Success:x,Number:y => S6(x,y) state S4(x,y) { EVR{DispatchFailure:x => error state S5(x,y) { EVR{Failure:x,Number:y => error state S6(x,y) { EVR{Success:x,Number:y => error
54 all errors caused by reaction... COMMAND 7308 { Args := ['CLEAR_RELAY_PYRO_STATUS'] Time := Stem := "POWER_HOUSEKEEPING" Number := "4" type := "FSW EVR 7309 { message := "Dispatched immediate command POWER_HOUSEKEEPING: number=4, seconds= , subseconds= " Dispatch := "POWER_HOUSEKEEPING" Time := name := "CMD_DISPATCH" level := "COMMAND" Number := "4... EVR 7311 { name := "POWER_SEND_REQUEST" Time := message := "power_queue_card_requestsending request to PAM 0." level := "DIAGNOSTIC EVR 7312 { message := "Successfully completed command POWER_HOUSEKEEPING: number=4." Success := "POWER_HOUSEKEEPING" Time := name := "CMD_COMPLETED_SUCCESS" level := "COMMAND" Number := "4 to command 9626 EVR 7313 { name := "PWR_REQUEST_CALLBACK" Time := message := "power_card_request - FPGA request successfully sent to RPAM A." level := "DIAGNOSTIC CHANNEL 7314 { channelid := "PWR-3049" DNChange := 67 dnunsignedvalue := 1600 type := "UNSIGNED_INT" Time := ChannelName := "PWR-BCB1-AMP... COMMAND 9626 { Args := ['set_device(1)', 'TRUE'] Time := Stem := "RUN_COMMAND" Number := "18" type := "FSW EVR 9627 { message := "Validation failed for command RUN_COMMAND: number=18." DispatchFailure := "RUN_COMMAND" Time := name := "CMD_DISPATCH_VALIDATION_FAILURE" level := "COMMAND" Number := "18...
55 *** violated: by event 9627 in state: state S4(x,y) { EVR{DispatchFailure:x => error with bindings: {'y':'18', 'x':'run_command' by transition 1 : EVR{'DispatchFailure':'RUN_COMMAND' => error --- error trace: --- COMMAND 9626 { Args := ['set_dev(1)', 'TRUE'] Number := "18" Stem := "RUN_COMMAND" Time := Type := "FSW" EVR 9627 { name := "CMD_DISPATCH_VALIDATION_FAILURE" level := "COMMAND" Number := "18" DispatchFailure := "RUN_COMMAND" Time := message := "Validation failed for command RUN_COMMAND: number=18."
56 automaton A4 { always S1 { COMMAND{Type:"FSW",Stem:x,Number:y => S2(x,y), S3(x,y), S4(x,y), S5(x,y) hot state S2(x,y) { EVR{Dispatch:x,Number:y => done hot state S3(x,y) { EVR{Success:x,Number:y => S6(x,y) state S4(x,y) { EVR{DispatchFailure:x => error state S5(x,y) { EVR{Failure:x,Number:y => error state S6(x,y) { EVR{Success:x,Number:y => error
57 *** violated: in hot end state: state S2(x,y) { EVR{Number:y,Dispatch:x => done with bindings: {'y':'18', 'x':'run_command' *** violated: in hot end state: state S3(x,y) { EVR{Number:y,Success:x => S6(x,y) with bindings: {'y :'18', 'x : RUN_COMMAND' --- error trace: --- COMMAND 9626 { Args := ['set_device(1),'true'] Number := "18" Stem := "RUN_COMMAND" Time := Type := "FSW" --- error trace: --- COMMAND 9626 { Args := ['set_device(1),'true'] Number := "18" Stem := "RUN_COMMAND" Time := Type := "FSW"
58 dynamic typing checking that specification format is consistent with log format fields in events misspelled in spec types of fields in spec inconsistent with log can of course be handled by static declaration of log event format however, there may be hundreds of different events making it unpractical tool does its best to detect problems
59 specification learning writing specs is time consuming often hard come up with properties one approach is to use already generated log files to get ideas in the extreme case, specifications can be automatically generated from log files
60 architecture spec spec logs learner monitor yes no:
61 import logscope learner API log1 = ; log2 = ; log3 = ; log4 = learner = logscope.concretelearner( P ) learner.learnlog(log1) learner.learnlog(log2) learner.dumpspec(sfile) learner = logscope.concretelearner( P,sfile) learner.learnlog(log3) learner.dumpspec(sfile) obs = logscope.observer(sfile) obs.monitor(log4)
62
63 using step and success states
64 case study tool design focused on test engineers dispatch/success pattern checked on 400 command scenarios part of predefined regression test suite: leading to discovery of double successes. one engineer auto-generated specs, leading to further error discoveries. one engineer used learning capability.
65 methodology observation requirements: events log integration of event-based requirements and logging
66 LogScope s Inspirations : for the automata language, including how to handle parameters : for the emphasis on state machines and for hot states : for the lexical representation of state machines (and automated code instrumentation experience)
67 RuleR R 1 (x) : R 2,R 3 (y),a(x) -> R 4 (x+1),r 5 R 6 (10) includes state machines states as well as events parameterized with data : what we need with rules : one can define temporal operators Petri-net semantics: lhs = conjunct AND + OR nodes : rhs = disjunct of conjuncts
68 requirements capture and analysis RCAT formal Requirements Capture & Analysis Tool integration with idle new command wait validate execute error validate wait success execute result fail wait rejec t reject command custom validate custom validat e done execute SPIN verification and RMOR monitoring done a sample behavioral design requirement Reliable Software Systems Development
69 RMOR monitor OpenClose{ symbol open = before call(main.c:openfile); symbol close = after call(main.c:closefile); state FileClosed{ when open -> FileOpen; 1 1 live state FileOpen{ when open => error; when close -> FileClosed; 2 file = openfile("file42"); if (file!= NULL) { process_file(file); closefile(file); else error_handling(); M_submit(2); file = openfile("file42"); if (file!= NULL) { process_file(file); closefile(file); M_submit(1); else error_handling(); 27 July
70 conclusions introduced temporal quantified patterns translated to quantified universal automata applied to log analysis : easy access suggestion: combine requirements engineering and event logging future work includes: GUI and better output, learning, merge with RuleR system: unifying patterns and automata
71 end
A Scala DSL for Rete-based Runtime Verification
A Scala DSL for Rete-based Runtime Verification Klaus Havelund Jet Propulsion Laboratory California Institute of Technology, California, USA Abstract. Runtime verification (RV) consists in part of checking
REDUCING THE COST OF GROUND SYSTEM DEVELOPMENT AND MISSION OPERATIONS USING AUTOMATED XML TECHNOLOGIES. Jesse Wright Jet Propulsion Laboratory,
REDUCING THE COST OF GROUND SYSTEM DEVELOPMENT AND MISSION OPERATIONS USING AUTOMATED XML TECHNOLOGIES Colette Wilklow MS 301-240, Pasadena, CA phone + 1 818 354-4674 fax + 1 818 393-4100 email: [email protected]
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Programming Languages CIS 443
Course Objectives Programming Languages CIS 443 0.1 Lexical analysis Syntax Semantics Functional programming Variable lifetime and scoping Parameter passing Object-oriented programming Continuations Exception
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
SCADE Suite in Space Applications
SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Outline. hardware components programming environments. installing Python executing Python code. decimal and binary notations running Sage
Outline 1 Computer Architecture hardware components programming environments 2 Getting Started with Python installing Python executing Python code 3 Number Systems decimal and binary notations running
Ball Aerospace s COSMOS Open Source Test System
Ball Aerospace s COSMOS Open Source Test System Ryan J. Melton Ball Aerospace & Technologies Corp. Boulder, CO ABSTRACT Ball Aerospace COSMOS is a free and readily available open source test and operations
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
Automate Your BI Administration to Save Millions with Command Manager and System Manager
Automate Your BI Administration to Save Millions with Command Manager and System Manager Presented by: Dennis Liao Sr. Sales Engineer Date: 27 th January, 2015 Session 2 This Session is Part of MicroStrategy
So#ware Defined Radio (SDR) Architecture and Systems Issues
So#ware Defined Radio (SDR) Architecture and Systems Issues Workshop on Spacecra# Flight So#ware (FSW 09) 2009 11 6 Kenneth J. Peters Jet Propulsion Laboratory, California Ins9tute of Technology Speaker
CA Data Protection. Content Provider Development Guide. Release 15.0
CA Data Protection Content Provider Development Guide Release 15.0 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
Enforcing Security Policies. Rahul Gera
Enforcing Security Policies Rahul Gera Brief overview Security policies and Execution Monitoring. Policies that can be enforced using EM. An automata based formalism for specifying those security policies.
CSCI 3136 Principles of Programming Languages
CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University Winter 2013 CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University
Formal Verification Toolkit for Requirements and Early Design Stages
Formal Verification Toolkit for Requirements and Early Design Stages Julia M. Badger 1 and Sheena Judson Miller 2 1 NASA Johnson Space Center, Houston, TX 77058, USA 2 Barrios Technology, Houston, TX 77058,
Unified Static and Runtime Verification of Object-Oriented Software
Unified Static and Runtime Verification of Object-Oriented Software Wolfgang Ahrendt 1, Mauricio Chimento 1, Gerardo Schneider 2, Gordon J. Pace 3 1 Chalmers University of Technology, Gothenburg, Sweden
Systems Engineering Interfaces: A Model Based Approach
Systems Engineering Interfaces: A Model Based Approach Elyse Fosse, Christopher L. Delp Jet Propulsion Laboratory, California Institute of Technology 4800 Oak Grove Drive Pasadena, CA 91109 [email protected]
Configuring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
Fundamentals of LoadRunner 9.0 (2 Days)
Fundamentals of LoadRunner 9.0 (2 Days) Quality assurance engineers New users of LoadRunner who need to load test their applications and/or executives who will be involved in any part of load testing.
Model Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,
SMock A Test Platform for the Evaluation of Monitoring Tools
SMock A Test Platform for the Evaluation of Monitoring Tools User Manual Ruth Mizzi Faculty of ICT University of Malta June 20, 2013 Contents 1 Introduction 3 1.1 The Architecture and Design of SMock................
Software Certification Coding, Code, and Coders
Software Certification Coding, Code, and Coders Klaus Havelund and Gerard J. Holzmann Laboratory for Reliable Software (LaRS) Jet Propulsion Laboratory, California Institute of Technology 4800 Oak Grove
tutorial: hardware and software model checking
tutorial: hardware and software model checking gerard holzmann and anuj puri { gerard anuj } @research.bell-labs.com Bell Labs, USA outline introduction (15 mins) theory and algorithms system modeling
Patterns of Information Management
PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy
Business Application Services Testing
Business Application Services Testing Curriculum Structure Course name Duration(days) Express 2 Testing Concept and methodologies 3 Introduction to Performance Testing 3 Web Testing 2 QTP 5 SQL 5 Load
Features of The Grinder 3
Table of contents 1 Capabilities of The Grinder...2 2 Open Source... 2 3 Standards... 2 4 The Grinder Architecture... 3 5 Console...3 6 Statistics, Reports, Charts...4 7 Script... 4 8 The Grinder Plug-ins...
Formal verification of contracts for synchronous software components using NuSMV
Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description
Application Architectures
Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch
A Classification of Model Checking-based Verification Approaches for Software Models
A Classification of Model Checking-based Verification Approaches for Software Models Petra Brosch, Sebastian Gabmeyer, Martina Seidl Sebastian Gabmeyer Business Informatics Group Institute of Software
Automatic Conversion Software for the Safety Verification of Goal-based Control Programs
Automatic Conversion Software for the Safety Verification of Goal-based Control Programs Julia M. B. Braman and Richard M. Murray Abstract Fault tolerance and safety verification of control systems are
Today s Agenda. Automata and Logic. Quiz 4 Temporal Logic. Introduction Buchi Automata Linear Time Logic Summary
Today s Agenda Quiz 4 Temporal Logic Formal Methods in Software Engineering 1 Automata and Logic Introduction Buchi Automata Linear Time Logic Summary Formal Methods in Software Engineering 2 1 Buchi Automata
An Overview of the Runtime Verification Tool Java PathExplorer
An Overview of the Runtime Verification Tool Java PathExplorer Klaus Havelund Kestrel Technology NASA Ames Research Center California, USA http://ase.arc.nasa.gov/havelund Grigore Roşu Department of Computer
Complexities of Simulating a Hybrid Agent-Landscape Model Using Multi-Formalism
Complexities of Simulating a Hybrid Agent-Landscape Model Using Multi-Formalism Composability Gary R. Mayer [email protected] Hessam S. Sarjoughian [email protected] Arizona Center for Integrative Modeling
Capabilities of a Java Test Execution Framework by Erick Griffin
Capabilities of a Java Test Execution Framework by Erick Griffin Here we discuss key properties and capabilities of a Java Test Execution Framework for writing and executing discrete Java tests for testing
http://aejm.ca Journal of Mathematics http://rema.ca Volume 1, Number 1, Summer 2006 pp. 69 86
Atlantic Electronic http://aejm.ca Journal of Mathematics http://rema.ca Volume 1, Number 1, Summer 2006 pp. 69 86 AUTOMATED RECOGNITION OF STUTTER INVARIANCE OF LTL FORMULAS Jeffrey Dallien 1 and Wendy
Software Verification for Space Applications Part 2. Autonomous Systems. G. Brat USRA/RIACS
Software Verification for Space Applications Part 2. Autonomous Systems G. Brat USRA/RIACS Main Objectives Implement a sustained and affordable human and robotic program to explore the solar system and
DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com [email protected]. File Integrity Monitor
DiskBoss File & Disk Manager File Integrity Monitor Version 2.0 Dec 2011 www.flexense.com [email protected] 1 Product Overview DiskBoss is an automated, rule-based file and disk manager allowing one to
Reduce Medical Device Compliance Costs with Best Practices. [email protected]
Reduce Medical Device Compliance Costs with Best Practices [email protected] 1 Agenda Medical Software Certification How new is Critical Software Certification? What do we need to do? What Best Practises
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012. Load Test Results for Submit and Approval Phases of Request Life Cycle
SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012 Load Test Results for Submit and Approval Phases of Request Life Cycle Table of Contents Executive Summary 3 Test Environment 4 Server
Chapter 17 Software Testing Strategies Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For
HTTP and HTTPS Statistics Services
CHAPTER 9 This chapter describes the HTTP and HTTPS Statistics service, which returns HTTP and HTTPS connection information and statistics for individual WAEs, device groups, and for the WAAS network,
IBM WebSphere Operational Decision Management Improve business outcomes with real-time, intelligent decision automation
Solution Brief IBM WebSphere Operational Decision Management Improve business outcomes with real-time, intelligent decision automation Highlights Simplify decision governance and visibility with a unified
How To Monitor Performance On A Microsoft Powerbook (Powerbook) On A Network (Powerbus) On An Uniden (Powergen) With A Microsatellite) On The Microsonde (Powerstation) On Your Computer (Power
A Topology-Aware Performance Monitoring Tool for Shared Resource Management in Multicore Systems TADaaM Team - Nicolas Denoyelle - Brice Goglin - Emmanuel Jeannot August 24, 2015 1. Context/Motivations
High-Volume Performance Test Framework using Big Data
High-Volume Performance Test Framework using Big Data Mike Yesudas, Girish Menon, Satheesh Nair IBM Corporation *IBM Standard disclaimer applies 2013 International Business Machines Corporation Disclaimer
International Journal of Software Engineering and Knowledge Engineering Vol. 11, No. 3 (2001) 231-258 World Scientific Publishing Company
International Journal of Software Engineering and Knowledge Engineering Vol. 11, No. 3 (2001) 231-258 World Scientific Publishing Company MULTIAGENT SYSTEMS ENGINEERING SCOTT A. DELOACH, MARK F. WOOD AND
Chapter 13: Program Development and Programming Languages
Understanding Computers Today and Tomorrow 12 th Edition Chapter 13: Program Development and Programming Languages Learning Objectives Understand the differences between structured programming, object-oriented
Process Modeling. Chapter 6. (with additions by Yale Braunstein) Slide 1
Process Modeling Chapter 6 (with additions by Yale Braunstein) Slide 1 PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 John Wiley & Sons, Inc. All rights reserved.
The Course. http://www.cse.unsw.edu.au/~cs3153/
The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,
Silect Software s MP Author
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems
System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.
Software Model Checking: Theory and Practice
Software Model Checking: Theory and Practice Lecture: Specification Checking - LTL Model Checking Copyright 2004, Matt Dwyer, John Hatcliff, and Robby. The syllabus and all lectures for this course are
Life Cycle of a Memory Request. Ring Example: 2 requests for lock 17
Life Cycle of a Memory Request (1) Use AQR or AQW to place address in AQ (2) If A[31]==0, check for hit in DCache Ring (3) Read Hit: place cache word in RQ; Write Hit: replace cache word with WQ RDDest/RDreturn
Model-Based Testing of Spacecraft Flight Software
Model-Based Testing of Spacecraft Flight Software Maria Hernek Virtual 12/09/2013 Objective/Outline Objective: To present the result and achievements of ESA study Model Based Testing of flight SW and discuss
Cassandra. References:
Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation
Customizing the Security Architecture
Chapter7.fm Page 113 Wednesday, April 30, 2003 4:29 PM CHAPTER7 Customizing the Security Architecture The office of government is not to confer happiness, but to give men opportunity to work out happiness
Methods and Tools For Embedded Distributed System Scheduling and Schedulability Analysis
Methods and Tools For Embedded Distributed System Scheduling and Schedulability Analysis Steve Vestal Honeywell Labs [email protected] 18 October 2005 Outline Background Binding and Routing Scheduling
SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
IndustrialIT System 800xA Engineering
IndustrialIT System 800xA Engineering Overview Features and Benefits Integrated Engineering Environment: Supports the engineering of the entire extended automation system from field devices to plant management
theguard! ApplicationManager System Windows Data Collector
theguard! ApplicationManager System Windows Data Collector Status: 10/9/2008 Introduction... 3 The Performance Features of the ApplicationManager Data Collector for Microsoft Windows Server... 3 Overview
Oracle BI EE Implementation on Netezza. Prepared by SureShot Strategies, Inc.
Oracle BI EE Implementation on Netezza Prepared by SureShot Strategies, Inc. The goal of this paper is to give an insight to Netezza architecture and implementation experience to strategize Oracle BI EE
MD Link Integration. 2013 2015 MDI Solutions Limited
MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY
0 0-10 5-30 8-39. Rover. ats gotorock getrock gotos. same time compatibility. Rock. withrover 8-39 TIME
Verication of plan models using UPPAAL Lina Khatib 1, Nicola Muscettola, and Klaus Havelund 2 NASA Ames Research Center, MS 269-2 Moett Field, CA 94035 1 QSS Group, Inc. 2 RECOM Technologies flina,mus,[email protected]
Best Practices for SAP MaxDB Backup and Recovery using IBM Tivoli Storage Manager
Best Practices for SAP MaxDB Backup and Recovery using IBM Tivoli Storage Manager White Paper Tivoli for SAP Development Thomas Ritter [email protected] IBM Boeblingen Laboratory Schoenaicherstrasse
SOFTWARE TESTING TRAINING COURSES CONTENTS
SOFTWARE TESTING TRAINING COURSES CONTENTS 1 Unit I Description Objectves Duration Contents Software Testing Fundamentals and Best Practices This training course will give basic understanding on software
Learning More About Load Testing
Welcome to this introduction to application performance testing and the LoadRunner load testing solution. This document provides a short overview of LoadRunner s features, and includes the following sections:
Feature Specification and Automated Conflict Detection
Feature Specification and Automated Conflict Detection AMY P. FELTY University of Ottawa and KEDAR S. NAMJOSHI Bell Laboratories Large software systems, especially in the telecommunications field, are
Server Manual. For Administrators of Cameleon Version 4
Server Manual For Administrators of Cameleon Version 4 Cameleon Version 4 Server Manual For Administrators of Cameleon Version 4 R4-07OCT04 Copyright 2004 360 Surveillance Inc. Camera Cameleon is a trademark
PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
Oracle Data Integrator: Administration and Development
Oracle Data Integrator: Administration and Development What you will learn: In this course you will get an overview of the Active Integration Platform Architecture, and a complete-walk through of the steps
Study on Real-Time Test Script in Automated Test Equipment
Study on Real-Time Test Script in Automated Test Equipment Chongwu Jiang, Bin Liu, Yongfeng Yin, Chang Liu Department of System Engineering of Engineering Technology Beihang University Beijing, China [email protected]
Implementing Rexx Handlers in NetRexx/Java/Rexx
Institut für Betriebswirtschaftslehre und Wirtschaftsinformatik Implementing Rexx Handlers in NetRexx/Java/Rexx The 2012 International Rexx Symposium Rony G. Flatscher Wirtschaftsuniversität Wien Augasse
Introduction to Promela and SPIN. LACL, Université Paris 12
Introduction to Promela and SPIN LACL, Université Paris 12 Promela = Process Meta Language A specification language! No programming language! Used for system description : Specify an abstraction of the
Technical paper review. Program visualization and explanation for novice C programmers by Matthew Heinsen Egan and Chris McDonald.
Technical paper review Program visualization and explanation for novice C programmers by Matthew Heinsen Egan and Chris McDonald Garvit Pahal Indian Institute of Technology, Kanpur October 28, 2014 Garvit
Model Checking based Software Verification
Model Checking based Software Verification 18.5-2006 Keijo Heljanko [email protected] Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may
