Fabio Patrizi DIS Sapienza - University of Rome
|
|
|
- Tiffany Eleanore Osborne
- 10 years ago
- Views:
Transcription
1 Fabio Patrizi DIS Sapienza - University of Rome
2 Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research Direction 2
3 Services Given, modular, decoupled blocks Possibly distributed Interacting Possibility to compose! Service 1 Service 2 Service 3 Service 4 3
4 Services (2) Examples: A (typical) set of web services over a network A set of interacting autonomous agents 4
5 The composition Problem Instance: A set of available services A (non available) goal service Solution: An automaton which mimics the goal service, by delegating goal interactions to available services 5
6 Service composition Community Service 1 Service 2 Service 3 Service 4 (Goal Service) 6
7 Modeling Services Focus on behavior (vs in/out description) High-level descriptions (e.g.,wsdl, BPEL, process algebra) abstracted as Finite Transition Systems (cf.[vanbreugel&koshkina,06]) Classification: Det, Ndet, Data, No-data 7
8 Services as TSs NDet recharge With Data/Messages!price(p) go_ahead?carid(x) searchprice(x,p) Guarded Combination passengers drive passengers stop?studid(id) chkstat(id,s) load_unload 8
9 A Composition framework for Non data-aware services 9
10 The Roman Model[Berardi & al., 03, 05] Focus on service behavior Atomic actions (abstract conversations) Asynchronous composition Extendible to NDet services (not here) Deterministic Goal service R.Hull, SIGMOD 04 10
11 The Roman Model (2) A Community of services over a shared alphabet A A (Virtual) Goal service over A Community Goal Service 11
12 The Roman Model (3) Composite Goal Service REQUIREMENTS: Service 1. If a run is executed by the Goal service, it is executed by the composed service 2. If the Goal service is in a final state, all available services do 12
13 input_french The Roman Model (4) IN GENERAL: Not just a TS labeling, but a Composite function Service of community histories! output_italian input_french output_italian input_french output_italian 13
14 Orchestrators Orchestrators are functions of community histories: for each history and current action, select HOW the right TO COMPUTE available service ORCHESTRATORS? Can be thought of as TSs, possibly infinite state 14
15 Propositional Dynamic Logic PDL[Fischer&Ladner, 79; Kozen&Tiuryn, 90; ]: Á! P Á Á 1 ÆÁ 2 hriá [r]á THEOREM[Berardi & al. 03]: A PDL formula can be built which is SAT iff an orchestrator exists Formulae interpreted over Kripke structures PDL-SAT: find a structure satisfying EXPTIME in the size of 15
16 Encoding as PDL-SAT i-th available service additional domainindependent conditions is polynomial in the size of services 16
17 Finding orchestrators (2) Finding an orchestrator in the Roman Model is EXPTIME-complete Membership: Reduction to PDL-SAT[Berardi & al. 03] Hardness: By reducing existence of an infinite computation in LB ATM (EXPTIME-hard) [Muscholl & Walukiewicz 07] 17
18 Finding orchestrators THEOREM: If an orchestrator exists then there exists one which is finite state[berardi et al. 03] Size at most exponential in the size of services S 0,,S n,s g 18
19 PDL Drawbacks 1. Only finite state orchestrators 2. Actual tools (e.g., of Maryland) not effective: Extracting models, thus orchestrators, not a trivial task: for efficiency reasons, only portions of the model are stored during tableaux construction 19
20 Service Composition Via Simulation 20
21 Simulation Relation Given TS 1 and TS 2 s 1 4 s 2 iff: 1. s 1 final implies s 2 final 2. For each transition s 1! a s 1 in TS 1, there exists a transition s 2! a s 2 in TS 2 s.t. s 1 4 s 2 TS 1 is simulated by TS 2 iff s s
22 Simulation Relation, informally TS 2 TS 1 c a b c c a a b b TS 2 behaviors include TS 1 s 22
23 Composition via Simulation PDL Encoding contains the idea of simulation. The composition problem can be reduced to search for a simulation of the target service by the available services asynchronous product [Berardi et al., 07] S t 4 S 1 S n? 23
24 Composition via Simulation (2) Community Asynchronous product X Largest Simulation Relation Target Service Compute Simulation (if any) 24
25 Composition via Simulation (3) 25
26 Orchestrators from Simulation Computing simulation is P in # of states # of states is S n Complexity refinement (wrt PDL-Sat): max # of states We get ALL orchestrators! O(S n+1 ) Exponential in number of services # of available services EXPTIME, thus still optimal wrt worst-case 26
27 Orchestrators from Simulation (2) ALL orchestrators Just-in-time composition Can deal Largest with Simulation failures Relation Orchestrator Generator Community 27
28 Extension: ND-Simulation Non-det services (but det target) Generalization: ND-simulation Simulation preserved regardless of ND action outcomes TS 1 b a TS 2 b a a c,b c 28
29 ND-Orchestrator Target service a b Observe actual state a service 1 a b service 2 b 29
30 Tools for computing (ND-) orchestrators Effective techniques & synthesis tools developed by the verification community: TLV [Pnueli & Shahar 96] Based on symbolic OBDD representation Conceptually based on simulation technique 30
31 Application Scenarios Web service composition[berardi et al., 07] An implementation from BPEL DIS Distributed agents in a common environment, with failures(work in preparation) 31
32 Unfortunately many services deal with data 32
33 Dealing with data Examples: Agents need to exchange messages (e.g., position, battery level, ) Web services take input messages (e.g., users subscribing a service) and return output messages (e.g., pricelist) 33
34 Dealing with data (2) REMARK: Infinitely many messages may give raise to infinitely many states PROBLEM: Finite-state property no longer holds We expect to get undecidability 34
35 COLOMBO[Berardi & al., VLDB 05] A general framework for web services with messages Basic results in data-aware composition Asynchronous, Deterministic, finite-state services with messaging Messages from infinite domains (Key-based) Access to a database through atomic processes (i.e., parametric actions) 35
36 COLOMBO (2) getincome Guarded automata Deterministic Messaging Invoke atomic processes Designed to interact with a client DB: PEOPLE(ssn, name,surname, income) STUDENTS(id,ssn,exams,age,grant) ssn inc id studentdata assigngrant studinc AS 2 ssn id id ssn studssn AS 1 AS 3 studssn studid Atomic (transationally) Stateless Can read, insert, studid delete or modify single tuples studelig checkeligibility Data from infinite domains: Dom =, Dom, Bool; id elig AS 4 studid 36
37 Atomic processes getincome I:ssn; O:inc Effects: inc := PEOPLE 3 (ssn) Interface specification checkeligibility I:id; O:eligibility Effects: if (STUDENT 4 (id) == true) then eligibility := true else eligibility := false assigngrant I:id Effects: either modify STUDENT 4 (id, false) or no-op Conditional effects - over local variables / accessed values Nondeterministic effects (Finite branching) - due to incomplete abstract model 37
38 Available services From client / service From / to same atomic process AS 1? studssn(ssn) getincome(ssn,inc) State: automaton state + variable configuration inc < 1000! msg( accepted ) inc >= 1000! msg( rejected ) To client / service 38
39 Synchronization 1. Wait for incoming messages (length-1 queues) 2. Execute a fragment of computation 3. After sending a message, either: Terminate (in a final state) or Go to 1. Client starts by sending a message Available services wait 39
40 System Execution No external modifications C C S S 1 S 3 S 2 S 4 AP 1 AP 2 DB AP 3 Linkage: set of inter-service communication channels (one-to-one only) 40
41 Execution Tree A system: S=h C, { S 1,,S n }, L i Infinite tree evolution: Nodes are snapshots of service + DB states Edges are labeled by: Ground messages Process invocations DB states (pre / post transition) 41
42 Execution Tree (2) 42
43 Execution Trees Essence Project the Execution Tree onto: Messages to/from client C S S 1 Atomic process invocations S 3 S 2 S 4 Effects on DB AP 1 AP 2 AP 3 DB REMARK: internal messages collapse! 43
44 System Equivalence C DB C DB Two systems are equivalent iff they have isomorphic essences! (Equivalent in terms of what is observable) 44
45 The Composition Problem in COLOMBO C C G GOAL: Messages Atomic processes MEDIATOR: Messages only COMPOSITION PROBLEM: Build a linkage and a (p,q)-bounded S 1 mediator such that the obtained system is equivalent S 2 M to the goal S 4 SERVICES (including CLIENT): Only messages from/to mediator S 3 45
46 Solving the Composition Problem in COLOMBO IDEA Reduce to the finite case OBSTACLES: Infinite messages and initial DB yield infinite properties (e.g., send-ground-message) RESTRICTIONS needed 46
47 Restrictions Bounded # of new values introduced by the client (wrt to initial DB state) Bounded # of DB lookups, depending on # of new values the client introduces REMARK: number of new values are finite, actual values still infinite 47
48 Symbolic representation Values are referred to by symbols Relevant features of symbols Relationships with All other symbols (wrt, =) Constants occurring in guards 48
49 Symbolic Value Characterization 7 Relevant constants: {4,15} 5 9 r 11 r 12 r 13 r 21 r 22 r INTUITION: svc = {r 11 >r 12, r 11 <r 13, r 11 <r 21, Under restrictions, a bounded r 11 <r 22, number r 11 =r 23, r 11 >4, of r 11 <15, } symbols is sufficient to represent all executions 12 Relevant constants: {4,15}
50 Symbolic execution tree Finite set of symbolic DB classes Finite set of states! Finite set of symbols yields finite branchings 50
51 From Infinite to Finite Each actual enactement has a symbolic counterpart! 51
52 Solution Technique & Issues (p,q)-bounded mediator: At most p states and q variables Reduction to PDL-Sat, with underconstrained variables To be guessed Represent existence of links and mediator behavior Upper bound double-exptime in p,q, size of target and community services: Expect to get rid of p,q Derivable from target and available services structure? Complexity can be refined with a more efficient encoding? 52
53 Conclusion & Future Directions Good understanding of behavioral composition: Optimal technique for deterministic scenarios Ongoing extension to nondeterministic contexts w/ failures Starting point for data-aware services: General framework and first results, but severe restrictions Relax key-based access assumption? Remove, or derive, mediator bounds? Investigate over decidability bounds Flexible solutions PDL technique returns only one solution, what about simulation? Reasoning about infinite state systems Abstraction (cf., e.g., [Pnueli & al, VMCAI 05], [Kesten&Pnueli, 00]) 53
54 Thanks For Your Attention! Questions? 54
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
Lecture 2: Universality
CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal
logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?
5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling
Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.
Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas [email protected] Background One basic goal in complexity theory is to separate interesting complexity
Formal Verification of Software
Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification
Model Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU
Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Birgit Vogtenhuber Institute for Software Technology email: [email protected] office hour: Tuesday 10:30 11:30 slides: http://www.ist.tugraz.at/pact.html
T-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
Formal Verification and Linear-time Model Checking
Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging
6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
Tableau Algorithms for Description Logics
Tableau Algorithms for Description Logics Franz Baader Theoretical Computer Science Germany Short introduction to Description Logics (terminological KR languages, concept languages, KL-ONE-like KR languages,...).
Ensuring Consistency in Long Running Transactions
Ensuring Consistency in Long Running Transactions UCLA Computer Science Dept. Technical Report TR-070011 Jeffrey Fischer Rupak Majumdar Department of Computer Science, University of California, Los Angeles
3515ICT Theory of Computation Turing Machines
Griffith University 3515ICT Theory of Computation Turing Machines (Based loosely on slides by Harald Søndergaard of The University of Melbourne) 9-0 Overview Turing machines: a general model of computation
INF5140: Specification and Verification of Parallel Systems
INF5140: Specification and Verification of Parallel Systems Lecture 7 LTL into Automata and Introduction to Promela Gerardo Schneider Department of Informatics University of Oslo INF5140, Spring 2007 Gerardo
Fixed-Point Logics and Computation
1 Fixed-Point Logics and Computation Symposium on the Unusual Effectiveness of Logic in Computer Science University of Cambridge 2 Mathematical Logic Mathematical logic seeks to formalise the process of
Bounded Treewidth in Knowledge Representation and Reasoning 1
Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany [email protected]
The Halting Problem is Undecidable
185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine
CSE 135: Introduction to Theory of Computation Decidability and Recognizability
CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing
Counterexample-guided Design of Property-based Dynamic Software Updates
Counterexample-guided Design of Property-based Dynamic Software Updates Min Zhang 20141015 Min Zhang (JAIST) Counterexample-guided Design of Property-based Dynamic Software Updates 20141015 [1/45] Contents
Software safety - DEF-STAN 00-55
Software safety - DEF-STAN 00-55 Where safety is dependent on the safety related software (SRS) fully meeting its requirements, demonstrating safety is equivalent to demonstrating correctness with respect
The Classes P and NP
The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
Enforcing Security Policies. Rahul Gera
Enforcing Security Policies Rahul Gera Brief overview Security policies and Execution Monitoring. Policies that can be enforced using EM. An automata based formalism for specifying those security policies.
Introduction to Software Verification
Introduction to Software Verification Orna Grumberg Lectures Material winter 2013-14 Lecture 4 5.11.13 Model Checking Automated formal verification: A different approach to formal verification Model Checking
Theoretical Computer Science (Bridging Course) Complexity
Theoretical Computer Science (Bridging Course) Complexity Gian Diego Tipaldi A scenario You are a programmer working for a logistics company Your boss asks you to implement a program that optimizes the
Today s Agenda. Automata and Logic. Quiz 4 Temporal Logic. Introduction Buchi Automata Linear Time Logic Summary
Today s Agenda Quiz 4 Temporal Logic Formal Methods in Software Engineering 1 Automata and Logic Introduction Buchi Automata Linear Time Logic Summary Formal Methods in Software Engineering 2 1 Buchi Automata
Semantic Description of Distributed Business Processes
Semantic Description of Distributed Business Processes Authors: S. Agarwal, S. Rudolph, A. Abecker Presenter: Veli Bicer FZI Forschungszentrum Informatik, Karlsruhe Outline Motivation Formalism for Modeling
Turing Machines, Part I
Turing Machines, Part I Languages The $64,000 Question What is a language? What is a class of languages? Computer Science Theory 2 1 Now our picture looks like Context Free Languages Deterministic Context
Trust but Verify: Authorization for Web Services. The University of Vermont
Trust but Verify: Authorization for Web Services Christian Skalka X. Sean Wang The University of Vermont Trust but Verify (TbV) Reliable, practical authorization for web service invocation. Securing complex
Web Data Extraction: 1 o Semestre 2007/2008
Web Data : Given Slides baseados nos slides oficiais do livro Web Data Mining c Bing Liu, Springer, December, 2006. Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008
Formal verification of contracts for synchronous software components using NuSMV
Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description
Runtime Verification for Real-Time Automotive Embedded Software
Runtime Verification for Real-Time Automotive Embedded Software S. Cotard, S. Faucou, J.-L. Béchennec, A. Queudet, Y. Trinquet 10th school of Modelling and Verifying Parallel processes (MOVEP) Runtime
Introduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
Fundamentals of Software Engineering
Fundamentals of Software Engineering Model Checking with Temporal Logic Ina Schaefer Institute for Software Systems Engineering TU Braunschweig, Germany Slides by Wolfgang Ahrendt, Richard Bubel, Reiner
Reminder: Complexity (1) Parallel Complexity Theory. Reminder: Complexity (2) Complexity-new
Reminder: Complexity (1) Parallel Complexity Theory Lecture 6 Number of steps or memory units required to compute some result In terms of input size Using a single processor O(1) says that regardless of
XML Data Integration
XML Data Integration Lucja Kot Cornell University 11 November 2010 Lucja Kot (Cornell University) XML Data Integration 11 November 2010 1 / 42 Introduction Data Integration and Query Answering A data integration
Business Process Verification: The Application of Model Checking and Timed Automata
Business Process Verification: The Application of Model Checking and Timed Automata Luis E. Mendoza Morales Processes and Systems Department, Simón Bolívar University, P.O. box 89000, Baruta, Venezuela,
Feature Specification and Automated Conflict Detection
Feature Specification and Automated Conflict Detection AMY P. FELTY University of Ottawa and KEDAR S. NAMJOSHI Bell Laboratories Large software systems, especially in the telecommunications field, are
Temporal Logics. Computation Tree Logic
Temporal Logics CTL: definition, relationship between operators, adequate sets, specifying properties, safety/liveness/fairness Modeling: sequential, concurrent systems; maximum parallelism/interleaving
Guiding Principles for Modeling and Designing Reusable Services
Guiding Principles for Modeling and Designing Reusable Services Max Dolgicer Managing Director International Systems Group, Inc. [email protected] http://www.isg-inc.com Agenda The changing notion
The Optimum One-Pass Strategy for Juliet
Master s Thesis One-Pass Strategies for Context-Free Games Christian Cöster August 2015 Examiners: Prof. Dr. Thomas Schwentick Prof. Dr. Christoph Buchheim Technische Universität Dortmund Fakultät für
Program Synthesis is a Game
Program Synthesis is a Game Barbara Jobstmann CNRS/Verimag, Grenoble, France Outline Synthesis using automata- based game theory. MoBvaBon, comparison with MC and LTL. Basics Terminology Reachability/Safety
Analysis of Boolean Programs
Analysis of Boolean Programs Patrice Godefroid 1 Mihalis Yannakakis 2 1 Microsoft Research, [email protected] 2 Columbia University, [email protected] Abstract. Boolean programs are a popular abstract
Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources
Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources Athanasios Naskos, Emmanouela Stachtiari, Panagiotis Katsaros, and Anastasios Gounaris Aristotle University of Thessaloniki,
Combining Software and Hardware Verification Techniques
Formal Methods in System Design, 21, 251 280, 2002 c 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Combining Software and Hardware Verification Techniques ROBERT P. KURSHAN VLADIMIR
Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi
Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
A Propositional Dynamic Logic for CCS Programs
A Propositional Dynamic Logic for CCS Programs Mario R. F. Benevides and L. Menasché Schechter {mario,luis}@cos.ufrj.br Abstract This work presents a Propositional Dynamic Logic in which the programs are
A Framework for the Semantics of Behavioral Contracts
A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK [email protected] Abstract. Contracts have proved a powerful concept
MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis
LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,
Automata on Infinite Words and Trees
Automata on Infinite Words and Trees Course notes for the course Automata on Infinite Words and Trees given by Dr. Meghyn Bienvenu at Universität Bremen in the 2009-2010 winter semester Last modified:
System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems
System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
Development of dynamically evolving and self-adaptive software. 1. Background
Development of dynamically evolving and self-adaptive software 1. Background LASER 2013 Isola d Elba, September 2013 Carlo Ghezzi Politecnico di Milano Deep-SE Group @ DEIB 1 Requirements Functional requirements
Lecture 1: Oracle Turing Machines
Computational Complexity Theory, Fall 2008 September 10 Lecture 1: Oracle Turing Machines Lecturer: Kristoffer Arnsfelt Hansen Scribe: Casper Kejlberg-Rasmussen Oracle TM Definition 1 Let A Σ. Then a Oracle
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University [email protected] Wei Chen Microsoft Research Asia [email protected] Abstract
Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics
Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google,
Complexity Theory. Jörg Kreiker. Summer term 2010. Chair for Theoretical Computer Science Prof. Esparza TU München
Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 Lecture 8 PSPACE 3 Intro Agenda Wrap-up Ladner proof and time vs. space succinctness QBF
Hint 1. Answer (b) first. Make the set as simple as possible and try to generalize the phenomena it exhibits. [Caution: the next hint is an answer to
Problem. Consider the collection of all subsets A of the topological space X. The operations of osure A Ā and ementation A X A are functions from this collection to itself. (a) Show that starting with
Model checking test models. Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl
Model checking test models Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl February 14, 2014 Abstract This thesis is about model checking testing models. These testing
Software Verification and Testing. Lecture Notes: Temporal Logics
Software Verification and Testing Lecture Notes: Temporal Logics Motivation traditional programs (whether terminating or non-terminating) can be modelled as relations are analysed wrt their input/output
Patterns for Business Object Model Integration in Process-Driven and Service-Oriented Architectures
Patterns for Business Object Model Integration in Process-Driven and Service-Oriented Architectures Carsten Hentrich IBM Business Consulting Services, SerCon GmbH c/o IBM Deutschland GmbH Hechtsheimer
Turing Machines: An Introduction
CIT 596 Theory of Computation 1 We have seen several abstract models of computing devices: Deterministic Finite Automata, Nondeterministic Finite Automata, Nondeterministic Finite Automata with ɛ-transitions,
Algebraic Computation Models. Algebraic Computation Models
Algebraic Computation Models Ζυγομήτρος Ευάγγελος ΜΠΛΑ 201118 Φεβρουάριος, 2013 Reasons for using algebraic models of computation The Turing machine model captures computations on bits. Many algorithms
NP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
Reducing Clocks in Timed Automata while Preserving Bisimulation
Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.
3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem
Software Engineering using Formal Methods
Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model
Handling Fault Detection Latencies in Automata-based Scheduling for Embedded Control Software
Handling Fault Detection atencies in Automata-based cheduling for Embedded Control oftware anthosh Prabhu M, Aritra Hazra, Pallab Dasgupta and P. P. Chakrabarti Department of Computer cience and Engineering,
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems 29 August 2011 What are workflows to us? Plans or schedules that map users or resources to tasks Such mappings may
A first step towards modeling semistructured data in hybrid multimodal logic
A first step towards modeling semistructured data in hybrid multimodal logic Nicole Bidoit * Serenella Cerrito ** Virginie Thion * * LRI UMR CNRS 8623, Université Paris 11, Centre d Orsay. ** LaMI UMR
CS154. Turing Machines. Turing Machine. Turing Machines versus DFAs FINITE STATE CONTROL AI N P U T INFINITE TAPE. read write move.
CS54 Turing Machines Turing Machine q 0 AI N P U T IN TAPE read write move read write move Language = {0} q This Turing machine recognizes the language {0} Turing Machines versus DFAs TM can both write
Monitoring Metric First-order Temporal Properties
Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at
Environment Modeling for Automated Testing of Cloud Applications
Environment Modeling for Automated Testing of Cloud Applications Linghao Zhang, Tao Xie, Nikolai Tillmann, Peli de Halleux, Xiaoxing Ma, Jian Lv {lzhang25, txie}@ncsu.edu, {nikolait, jhalleux}@microsoft.com,
