Verification of Behavior-Based Control Systems in their Physical Environment

Size: px
Start display at page:

Download "Verification of Behavior-Based Control Systems in their Physical Environment"

Transcription

1 Verification of Behavior-Based Control Systems in their Physical Environment Thorsten Ropertz, Prof. Dr. Karsten Berns Robotics Research Lab Department of Computer Science University of Kaiserslautern, Germany Xian Li, Prof. Dr. Klaus Schneider Embedded System Group Department of Computer Science University of Kaiserslautern, Germany

2 Outline Behavior-Based Control Systems 2-Step Verification Approach Network Reduction Verification using Hybrid Quartz Application Example Conclusion and Future Work

3 Behavior-Based Control System Global system behavior emerges from rather simple interacting local behaviors (behavior network) Robust due to partially overlapping functionality Modular structure fosters reuse Distributed design, implementation, and testing Network size and complexity can lead to difficulties to locate errors Safety critical application scenarios require correct control

4 Integrated Behavior-Based Control (ib2c) Fundamental unit in ib2c More information: [Proetzsch10]

5 2-Step Verification Direct verification not feasible due to network size and complexity Network structure (fusion+stimulation+inhibition) allows high level reduction Formal verification of reduced control network using synchronous programming language Quartz with hybrid system extension

6 Reduction Behaviors which have no connection to the realizing behaviors can be discarded Competing behaviors can be reduced if they are suppressed by behaviors on signal path Requirements: Mapping of properties to behaviors from design phase available Activity functions designed such that behavior is active if it requires full control to keep the intended property valid

7 Reduction 1. Identification of property-realizing behaviors 2. Separation of network into connected subnets 3. Removing networks that do not contain emphasized behaviors 4. For each emphasized behavior check competing behaviors on signal path If behaviors cannot be active at the same time then remove corresponding branch

8 Reduction Based on requirements the control networks always maintain properties realized by behavior A direct suppression: indirect suppression:

9 Reduction Problem: check whether two behaviors can be active at the same time Modelling the network structure using finite state automata 5 synchronizing FSMs per behavior Limiting behavior signals to {0,1} Using Uppaal verifier to check for concurrent activity

10 Verification Reduced behavior network modeled using the Quartz language VCG procedure for Quartz programs based on induction proofs on the strongly connected components (SCCs) of the underlying state transition diagram Validity of VCs is proven by standard SMT solvers like CVC4, isat, or Z3

11 Averest Toolkit Model-based design of software and hardware Based on the synchronous programming language Quartz Allows simple analysis and verification

12 Application Example Collision avoidance system Safety behavior limits velocity High level behaviors process velocity given by Joystick Trajectory following Target point tracking Others Question: Does the robot always keep a minimum distance to obstacles in front of it?

13 Reduction Uppaal model contains 408 locations and 927 edges Signal path from SlowDown to sink examined Tested against HighLevel Forward Cannot be active at the same time -> reduction of HighLevel Forward branch two behaviors remaining

14 Hybrid System Verification Hybrid Quartz Program macro delta=?, max_velocity_v =?, protect_distance =?; module SlowDown(real? obstacle_x,? vehicle_xi) { real max_velocity_a, slow_down_a, distance_front, vehicle_v ; hybrid real vehicle_x; vehicle_x = vehicle_xi ; // the movement of the vehicle towards the obstacle loop { // detect the distance betwee the vehicle and the obstacle distance_front = obstacle_x - vehicle_x ; // decide the velocity for the movement if( distance_front < protect_distance ) slow_down_a = 1; else slow_down_a = 0; max_velocity_a = 1.0- slow_down_a; vehicle_v = max_velocity_v*max_velocity_a; // the vehicle moves forward for delta unit time w0,w1: flow{ drv(vehicle_x) <- vehicle_v ; }until(cont(time)-time>=delta); } } Properties satisfies{ assume ((protect_distance >= 0) and (delta > 0)) ; // for bounded initial distance assume (abs(vehicle_xi-obstacle_x) > protect_distance ) ; // for fixed initial distance assume ((vehicle_xi = 0.0 ) and (obstacle_x = 15.0) ) ; // the vehicle keeps a certain distance to the obstacle assume (abs(max_velocity_v * delta) < protect_distance ) ; assert A G (abs(obstacle_x-vehicle_x) > protect_distance - vehicle_v* delta ) ;}

15 EFSM Generation

16 Verification Condition Generation Experiment with fixed and bounded initial distance VCG procedure generates 7 VCs All ODEs solved by Mathematica Application of SMT solver Z3 and isat

17 Experimental Results Application of 2 different solvers due to different handling of non-linear equations In bounded initial distance case isat returned CANDIDATE SOLUTION due to Zeno behaviors

18 Conclusion and Future Work Direct hybrid verification of behavior-based control systems not feasible due to complexity/size Exploiting arbitration mechanism allows efficient high level control system reduction Modelling the resulting system using the Quartz language and applying the VCG procedure to decompose the verification goal allows for further verification effort reduction and makes the hybrid system verification feasible Reduction procedure shall be extended and the correctness formally shown VCG procedure shall be extended to allow induction over program loops

Verification of Behavior-Based Control Systems in their Physical Environment

Verification of Behavior-Based Control Systems in their Physical Environment Verification of Behavior-Based Control Systems in their Physical Environment Thorsten Ropertz 1, Karsten Berns 1, Xian Li 2, and Klaus Schneider 2 1 The Robotics Research Lab 2 Embedded System Group 1,2

More information

Verification Condition Generation for Hybrid Systems described by Synchronous Languages

Verification Condition Generation for Hybrid Systems described by Synchronous Languages UNIVERSITY OF KAISERSLAUTERN Verification Condition Generation for Hybrid Systems described by Synchronous Languages by Marcel Heer A thesis submitted in partial fulfillment for the degree of Master of

More information

Towards an Integrated System Model for Testing and Verification

Towards an Integrated System Model for Testing and Verification Towards an Integrated System Model for Testing and Verification Benjamin Hummel and Peter Braun MiSE 2008 Domain Development of controller software for production machines Special case of mechatronic system

More information

Parametric Real Time System Feasibility Analysis Using Parametric Timed Automata

Parametric Real Time System Feasibility Analysis Using Parametric Timed Automata Parametric Real Time System Feasibility Analysis Using Parametric Timed Automata PhD Dissertation Yusi Ramadian Advisor : Luigi Palopoli Co advisor : Alessandro Cimatti 1 Real Time System Applications

More information

This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No

This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No 643921. TOOLS INTEGRATION UnCoVerCPS toolchain Goran Frehse, UGA Xavier

More information

Xuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata

Xuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata BACH: Path-oriented Reachability Checker of Linear Hybrid Automata Xuandong Li Department of Computer Science and Technology, Nanjing University, P.R.China Outline Preliminary Knowledge Path-oriented Reachability

More information

Safety for an Autonomous Bucket Excavator During Typical Landscaping Tasks

Safety for an Autonomous Bucket Excavator During Typical Landscaping Tasks Safety for an Autonomous Bucket Excavator During Typical Landscaping Tasks Gregor Zolynski, Daniel Schmidt and Karsten Berns Abstract The Robotics Research Lab in Kaiserserlautern, Germany, pursues the

More information

CIS 1.5 Course Objectives. a. Understand the concept of a program (i.e., a computer following a series of instructions)

CIS 1.5 Course Objectives. a. Understand the concept of a program (i.e., a computer following a series of instructions) By the end of this course, students should CIS 1.5 Course Objectives a. Understand the concept of a program (i.e., a computer following a series of instructions) b. Understand the concept of a variable

More information

Lecture 9: Reachability

Lecture 9: Reachability Lecture 9: Reachability Outline of Lecture Reachability General Transition Systems Algorithms for Reachability Safety through Reachability Backward Reachability Algorithm Given hybrid automaton H : set

More information

1 Mission Level Design. of Autonomous Underwater Vehicles

1 Mission Level Design. of Autonomous Underwater Vehicles Mission Level Design of Autonomous Underwater Vehicles Thomas Liebezeit, Volker Zerbe Department of Automatic Control and System Engineering, TU Ilmenau, Germany e-mail: thomas.liebezeit@tu-ilmenau.de

More information

Formal Modeling and Verification of Interlocking Systems Featuring Sequential Release

Formal Modeling and Verification of Interlocking Systems Featuring Sequential Release Formal Modeling and Verification of Interlocking Systems Featuring Sequential Release Linh H. Vu (lvho@dtu.dk) Anne E. Haxthausen (aeha@dtu.dk) Jan Peleska (jp@informatik.uni-bremen.de) Technical Univesity

More information

M. De Wulf, L. Doyen,J.-F. Raskin Université Libre de Bruxelles Centre Fédéré en Vérification

M. De Wulf, L. Doyen,J.-F. Raskin Université Libre de Bruxelles Centre Fédéré en Vérification Systematic Implementation of Real-Time Models M. De Wulf, L. Doyen,J.-F. Raskin Université Libre de Bruxelles Centre Fédéré en Vérification Model-based Development for Controllers Make a model of the environment

More information

Applications of Program analysis in Model-Based Design

Applications of Program analysis in Model-Based Design Applications of Program analysis in Model-Based Design Prahlad Sampath (Prahlad.Sampath@mathworks.com) 2018 by The MathWorks, Inc., MATLAB, Simulink, Stateflow, are registered trademarks of The MathWorks,

More information

LabVIEW Based Embedded Design [First Report]

LabVIEW Based Embedded Design [First Report] LabVIEW Based Embedded Design [First Report] Sadia Malik Ram Rajagopal Department of Electrical and Computer Engineering University of Texas at Austin Austin, TX 78712 malik@ece.utexas.edu ram.rajagopal@ni.com

More information

Robotic Behaviors. Potential Field Methods

Robotic Behaviors. Potential Field Methods Robotic Behaviors Potential field techniques - trajectory generation - closed feedback-loop control Design of variety of behaviors - motivated by potential field based approach steering behaviors Closed

More information

Lecture 2. Decidability and Verification

Lecture 2. Decidability and Verification Lecture 2. Decidability and Verification model temporal property Model Checker yes error-trace Advantages Automated formal verification, Effective debugging tool Moderate industrial success In-house groups:

More information

Lecture 05 ( ) High-Level Design with SysML. Systeme hoher Qualität und Sicherheit Universität Bremen WS 2015/2016

Lecture 05 ( ) High-Level Design with SysML. Systeme hoher Qualität und Sicherheit Universität Bremen WS 2015/2016 Systeme hoher Qualität und Sicherheit Universität Bremen WS 2015/2016 Lecture 05 (09-11-2015) High-Level Design with SysML Christoph Lüth Jan Peleska Dieter Hutter Where are we? 01: Concepts of Quality

More information

Self-Collision Detection and Prevention for Humanoid Robots. Talk Overview

Self-Collision Detection and Prevention for Humanoid Robots. Talk Overview Self-Collision Detection and Prevention for Humanoid Robots James Kuffner, Jr. Carnegie Mellon University Koichi Nishiwaki The University of Tokyo Satoshi Kagami Digital Human Lab (AIST) Masayuki Inaba

More information

Timed Automata Based Scheduling for a Miniature Pipeless Plant with Mobile Robots *

Timed Automata Based Scheduling for a Miniature Pipeless Plant with Mobile Robots * Timed Automata Based Scheduling for a Miniature Pipeless Plant with Mobile Robots * Christian Schoppmeyer, Martin Hüfner, Subanatarajan Subbiah, and Sebastian Engell Abstract In this contribution we present

More information

Module 10. Network Simplex Method:

Module 10. Network Simplex Method: Module 10 1 Network Simplex Method: In this lecture we shall study a specialized simplex method specifically designed to solve network structured linear programming problems. This specialized algorithm

More information

Integer Programming ISE 418. Lecture 7. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 7. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 7 Dr. Ted Ralphs ISE 418 Lecture 7 1 Reading for This Lecture Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Wolsey Chapter 7 CCZ Chapter 1 Constraint

More information

Feed Forward Parameter Identification for Precise Periodic Quadrocopter Motions

Feed Forward Parameter Identification for Precise Periodic Quadrocopter Motions Feed Forward Parameter Identification for Precise Periodic Quadrocopter Motions Angela P. Schoellig, Clemens Wiltsche, Raffaello D Andrea Institute for Dynamic Systems and Control ETH Zürich, Switzerland

More information

Fundamental Graph Algorithms Part Four

Fundamental Graph Algorithms Part Four Fundamental Graph Algorithms Part Four Announcements Problem Set One due right now. Due Friday at 2:15PM using one late period. Problem Set Two out, due next Friday, July 12 at 2:15PM. Play around with

More information

Building Reliable 2D Maps from 3D Features

Building Reliable 2D Maps from 3D Features Building Reliable 2D Maps from 3D Features Dipl. Technoinform. Jens Wettach, Prof. Dr. rer. nat. Karsten Berns TU Kaiserslautern; Robotics Research Lab 1, Geb. 48; Gottlieb-Daimler- Str.1; 67663 Kaiserslautern;

More information

VHDL Essentials Simulation & Synthesis

VHDL Essentials Simulation & Synthesis VHDL Essentials Simulation & Synthesis Course Description This course provides all necessary theoretical and practical know-how to design programmable logic devices using VHDL standard language. The course

More information

Hybrid Agent-Landscape Model Composition

Hybrid Agent-Landscape Model Composition Hybrid Agent-Landscape Model Composition Gary Mayer, Hessam Sarjoughian, Eowyn Allen Presented at the 1 st CSE Student Research Expo Hybrid Agent-Landscape Models Hybrid : both the human and environmental

More information

A CSP Search Algorithm with Reduced Branching Factor

A CSP Search Algorithm with Reduced Branching Factor A CSP Search Algorithm with Reduced Branching Factor Igor Razgon and Amnon Meisels Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84-105, Israel {irazgon,am}@cs.bgu.ac.il

More information

Behavior-based Arm Control for an Autonomous Bucket Excavator

Behavior-based Arm Control for an Autonomous Bucket Excavator Behavior-based Arm Control for an Autonomous Bucket Excavator Sergey Pluzhnikov, Daniel Schmidt, Jochen Hirth, and Karsten Berns Robotics Research Lab, Dept. of Computer Science, University of Kaiserslautern,

More information

ECE 4750 Computer Architecture, Fall 2017 Lab 1: Iterative Integer Multiplier

ECE 4750 Computer Architecture, Fall 2017 Lab 1: Iterative Integer Multiplier School of Electrical and Computer Engineering Cornell University revision: 2017-08-31-12-21 The first lab assignment is a warmup lab where you will design two implementations of an integer iterative multiplier:

More information

Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers

Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers Isil Dillig, Thomas Dillig, and Alex Aiken Computer Science Department Stanford University Linear Arithmetic

More information

Abstract Interpretation

Abstract Interpretation Abstract Interpretation Ranjit Jhala, UC San Diego April 22, 2013 Fundamental Challenge of Program Analysis How to infer (loop) invariants? Fundamental Challenge of Program Analysis Key issue for any analysis

More information

Distributed Systems Programming (F21DS1) Formal Verification

Distributed Systems Programming (F21DS1) Formal Verification Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on

More information

SOFTWARE DESIGN AND DEVELOPMENT OF MUTIMODAL INTERACTION

SOFTWARE DESIGN AND DEVELOPMENT OF MUTIMODAL INTERACTION SOFTWARE DESIGN AND DEVELOPMENT OF MUTIMODAL INTERACTION Marie-Luce Bourguet Queen Mary University of London Abstract: Key words: The multimodal dimension of a user interface raises numerous problems that

More information

Component-Based Software Engineering TIP

Component-Based Software Engineering TIP Component-Based Software Engineering TIP X LIU, School of Computing, Napier University This chapter will present a complete picture of how to develop software systems with components and system integration.

More information

DSVerifier: A Bounded Model Checking Tool for Digital Systems

DSVerifier: A Bounded Model Checking Tool for Digital Systems DSVerifier: A Bounded Model Checking Tool for Digital Systems Hussama I. Ismail, Iury V. Bessa, Lucas C. Cordeiro, Eddie B. de Lima Filho and João E. Chaves Filho Electronic and Information Research Center

More information

Cyber Physical System Verification with SAL

Cyber Physical System Verification with SAL Cyber Physical System Verification with July 22, 2013 Cyber Physical System Verification with Outline 1 2 3 4 5 Cyber Physical System Verification with Table of Contents 1 2 3 4 5 Cyber Physical System

More information

Model Checking and Its Applications

Model Checking and Its Applications Model Checking and Its Applications Orna Grumberg Technion, Israel Verification and Deduction Mentoring Workshop July 13, 2018 1 Personal data Ph.d. in (non-automated) verification Postdoc in Model Checking

More information

A Pattern-supported Parallelization Approach

A Pattern-supported Parallelization Approach A Pattern-supported Parallelization Approach Ralf Jahr, Mike Gerdes, Theo Ungerer University of Augsburg, Germany The 2013 International Workshop on Programming Models and Applications for Multicores and

More information

Limitations of Algorithmic Solvability In this Chapter we investigate the power of algorithms to solve problems Some can be solved algorithmically and

Limitations of Algorithmic Solvability In this Chapter we investigate the power of algorithms to solve problems Some can be solved algorithmically and Computer Language Theory Chapter 4: Decidability 1 Limitations of Algorithmic Solvability In this Chapter we investigate the power of algorithms to solve problems Some can be solved algorithmically and

More information

Strategies for simulating pedestrian navigation with multiple reinforcement learning agents

Strategies for simulating pedestrian navigation with multiple reinforcement learning agents Strategies for simulating pedestrian navigation with multiple reinforcement learning agents Francisco Martinez-Gil, Miguel Lozano, Fernando Ferna ndez Presented by: Daniel Geschwender 9/29/2016 1 Overview

More information

Cyber Physical System Verification Seminar: Event-B

Cyber Physical System Verification Seminar: Event-B Cyber Physical System Verification Seminar: Event-B Sebastian Schumb University of Kaiserslautern Embedded Systems Group s schumb10@cs.uni-kl.de 1 Introduction A Cyber-physical systems is a system of computer

More information

Automated Software Synthesis for Complex Robotic Systems

Automated Software Synthesis for Complex Robotic Systems Automated Software Synthesis for Complex Robotic Systems Indranil Saha Department of Computer Science and Engineering Indian Institute of Technology Kanpur Indranil Saha Automated Software Synthesis for

More information

Static Analysis! Prof. Leon J. Osterweil! CS 520/620! Fall 2012! Characteristics of! System to be! built must! match required! characteristics!

Static Analysis! Prof. Leon J. Osterweil! CS 520/620! Fall 2012! Characteristics of! System to be! built must! match required! characteristics! Static Analysis! Prof. Leon J. Osterweil! CS 520/620! Fall 2012! Requirements Spec.! Design! Test Results must! match required behavior! Characteristics of! System to be! built must! match required! characteristics!

More information

Extended Finite-State Machine Induction using SAT-Solver

Extended Finite-State Machine Induction using SAT-Solver Extended Finite-State Machine Induction using SAT-Solver Vladimir Ulyantsev, Fedor Tsarev ulyantsev@rain.ifmo.ru, tsarev@rain.ifmo.ru St. Petersburg National Research University of IT, Mechanics and Optics

More information

Semantic Subtyping. Alain Frisch (ENS Paris) Giuseppe Castagna (ENS Paris) Véronique Benzaken (LRI U Paris Sud)

Semantic Subtyping.  Alain Frisch (ENS Paris) Giuseppe Castagna (ENS Paris) Véronique Benzaken (LRI U Paris Sud) Semantic Subtyping Alain Frisch (ENS Paris) Giuseppe Castagna (ENS Paris) Véronique Benzaken (LRI U Paris Sud) http://www.cduce.org/ Semantic Subtyping - Groupe de travail BD LRI p.1/28 CDuce A functional

More information

Supervisory Control Synthesis the Focus in Model-Based Systems Engineering

Supervisory Control Synthesis the Focus in Model-Based Systems Engineering Supervisory Control Synthesis the Focus in Model-Based Systems Engineering Jos Baeten and Asia van de Mortel-Fronczak Systems Engineering Group Department of Mechanical Engineering November 23, 2011 What

More information

Flight Systems are Cyber-Physical Systems

Flight Systems are Cyber-Physical Systems Flight Systems are Cyber-Physical Systems Dr. Christopher Landauer Software Systems Analysis Department The Aerospace Corporation Computer Science Division / Software Engineering Subdivision 08 November

More information

A Framework for the Formal Verification of Time-Triggered Systems

A Framework for the Formal Verification of Time-Triggered Systems A Framework for the Formal Verification of Time-Triggered Systems Lee Pike leepike@galois.com Indiana University, Bloomington Department of Computer Science Advisor: Prof. Steven D. Johnson December 12,

More information

Simulation and Verification of Timed and Hybrid Systems

Simulation and Verification of Timed and Hybrid Systems Simulation and Verification of Timed and Hybrid Systems Bert van Beek and Koos Rooda Systems Engineering Group Eindhoven University of Technology ISC 2007 Delft 11 June 2007 Bert van Beek and Koos Rooda

More information

Formal Verification of Business Continuity Solutions

Formal Verification of Business Continuity Solutions Formal Verification of Business Continuity Solutions Emmanuel Zarpas, Sivan Tal IBM Research Lab in Haifa, May 2006 IBM Labs in Haifa Agenda Rationale What is Formal Verification / Model Checking How can

More information

VS 3 : SMT Solvers for Program Verification

VS 3 : SMT Solvers for Program Verification VS 3 : SMT Solvers for Program Verification Saurabh Srivastava 1,, Sumit Gulwani 2, and Jeffrey S. Foster 1 1 University of Maryland, College Park, {saurabhs,jfoster}@cs.umd.edu 2 Microsoft Research, Redmond,

More information

Planning & Decision-making in Robotics Case Study: Planning for Autonomous Driving

Planning & Decision-making in Robotics Case Study: Planning for Autonomous Driving 16-782 Planning & Decision-making in Robotics Case Study: Planning for Autonomous Driving Maxim Likhachev Robotics Institute Carnegie Mellon University Typical Planning Architecture for Autonomous Vehicle

More information

LIMoSim: A Lightweight and Integrated Approach for Simulating Vehicular Mobility with OMNeT++

LIMoSim: A Lightweight and Integrated Approach for Simulating Vehicular Mobility with OMNeT++ OMNeT++ Community Summit 2017 LIMoSim: A Lightweight and Integrated Approach for Simulating Vehicular Mobility with OMNeT++ Benjamin Sliwa, Johannes Pillmann, Fabian Eckermann and Christian Wietfeld Bremen,

More information

Sciduction: Combining Induction, Deduction and Structure for Verification and Synthesis

Sciduction: Combining Induction, Deduction and Structure for Verification and Synthesis Sciduction: Combining Induction, Deduction and Structure for Verification and Synthesis (abridged version of DAC slides) Sanjit A. Seshia Associate Professor EECS Department UC Berkeley Design Automation

More information

Software Engineering of Robots

Software Engineering of Robots Software Engineering of Robots Ana Cavalcanti Jon Timmis, Jim Woodcock Wei Li, Alvaro Miyazawa, Pedro Ribeiro University of York December 2015 Overview One of UK eight great technologies: robotics and

More information

Marrying Formal Methods With Simulation-Based Verification Function Verification Research at UCSB. Tim Cheng & Li-C. Wang UC-Santa Barbara

Marrying Formal Methods With Simulation-Based Verification Function Verification Research at UCSB. Tim Cheng & Li-C. Wang UC-Santa Barbara Marrying Formal Methods With Simulation-Based Verification Function Verification Research at UCSB Tim Cheng & Li-C. Wang UC-Santa Barbara 1 Outline Current Issues in Functional Verification Functional

More information

Jane Li. Assistant Professor Mechanical Engineering Department, Robotic Engineering Program Worcester Polytechnic Institute

Jane Li. Assistant Professor Mechanical Engineering Department, Robotic Engineering Program Worcester Polytechnic Institute Jane Li Assistant Professor Mechanical Engineering Department, Robotic Engineering Program Worcester Polytechnic Institute (3 pts) Compare the testing methods for testing path segment and finding first

More information

Range Sensing Based Autonomous Canal Following Using a Simulated Multi-copter. Ali Ahmad

Range Sensing Based Autonomous Canal Following Using a Simulated Multi-copter. Ali Ahmad Range Sensing Based Autonomous Canal Following Using a Simulated Multi-copter Ali Ahmad MS Student of Electrical Engineering Laboratory for Cyber Physical Networks and Systems LUMS School of Science &

More information

Graphical Tool For SC Automata.

Graphical Tool For SC Automata. Graphical Tool For SC Automata. Honours Project: 2000 Dr. Padmanabhan Krishnan 1 Luke Haslett 1 Supervisor Abstract SC automata are a variation of timed automata which are closed under complementation.

More information

Software Testing IV. Prof. Dr. Holger Schlingloff. Humboldt-Universität zu Berlin

Software Testing IV. Prof. Dr. Holger Schlingloff. Humboldt-Universität zu Berlin Software Testing IV Prof. Dr. Holger Schlingloff Humboldt-Universität zu Berlin and Fraunhofer Institute of Computer Architecture and Software Technology FIRST Outline of this Lecture Series 2006/11/24:

More information

Detection and Tracking of Moving Objects Using 2.5D Motion Grids

Detection and Tracking of Moving Objects Using 2.5D Motion Grids Detection and Tracking of Moving Objects Using 2.5D Motion Grids Alireza Asvadi, Paulo Peixoto and Urbano Nunes Institute of Systems and Robotics, University of Coimbra September 2015 1 Outline: Introduction

More information

By: Chaitanya Settaluri Devendra Kalia

By: Chaitanya Settaluri Devendra Kalia By: Chaitanya Settaluri Devendra Kalia What is an embedded system? An embedded system Uses a controller to perform some function Is not perceived as a computer Software is used for features and flexibility

More information

Slicing for Model Reduction in Adaptive Embedded Systems Development

Slicing for Model Reduction in Adaptive Embedded Systems Development Slicing for Model Reduction in Adaptive Embedded Systems Development Ina Schaefer and Arnd Poetzsch-Heffter Software Technology Group, TU Kaiserslautern, Germany Software Engineering for Adaptive and Self-Managing

More information

Emerging Connected Vehicle based

Emerging Connected Vehicle based Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu Presented by Sezana Fahmida Outline Introduction

More information

A Real-Time Animator for Hybrid Systems

A Real-Time Animator for Hybrid Systems A Real-Time Animator for Hybrid Systems Tobias Amnell, Alexandre David Wang Yi Department of Computer Systems, Uppsala University {adavid, tobiasa, yi} @docsuuse Abstract In this paper, we present a real

More information

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : M.Sc-CST Semester / Year : Even / II Subject Name

More information

ACCELERATION TECHNIQUES FOR BUSY BEAVER CANDIDATES

ACCELERATION TECHNIQUES FOR BUSY BEAVER CANDIDATES ACCELERATION TECHNIQUES FOR BUSY BEAVER CANDIDATES Alex Holkner 1 1 School of Computer Science and Information Technology, RMIT University ABSTRACT: A busy beaver is a Turing machine of N states which,

More information

CS5371 Theory of Computation. Lecture 8: Automata Theory VI (PDA, PDA = CFG)

CS5371 Theory of Computation. Lecture 8: Automata Theory VI (PDA, PDA = CFG) CS5371 Theory of Computation Lecture 8: Automata Theory VI (PDA, PDA = CFG) Objectives Introduce Pushdown Automaton (PDA) Show that PDA = CFG In terms of descriptive power Pushdown Automaton (PDA) Roughly

More information

DO-254 Implementation of CAN for Mil-Aero/ Safety Critical Applications

DO-254 Implementation of CAN for Mil-Aero/ Safety Critical Applications DO-254 Implementation of CAN for Mil-Aero/ Safety Critical Applications Reshma N 1, Dr. Srividya P 2, Kumaraswamy K V 3 P.G. Student (VLSI Design and Embedded Systems), Dept. of E.C.E, SJBIT, Bengaluru,

More information

Overview of SRI s. Lee Pike. June 3, 2005 Overview of SRI s. Symbolic Analysis Laboratory (SAL) Lee Pike

Overview of SRI s. Lee Pike. June 3, 2005 Overview of SRI s. Symbolic Analysis Laboratory (SAL) Lee Pike June 3, 2005 lee.s.pike@nasa.gov Model-Checking 101 Model-checking is a way automatically to verify hardware or software. For a property P, A Model-checking program checks to ensure that every state on

More information

A Framework for Asynchronous Circuit Modeling and Verification in ACL2

A Framework for Asynchronous Circuit Modeling and Verification in ACL2 A Framework for Asynchronous Circuit Modeling and Verification in ACL2 Cuong Chau 1, Warren A. Hunt, Jr. 1, Marly Roncken 2, and Ivan Sutherland 2 {ckcuong,hunt}@cs.utexas.edu, marly.roncken@gmail.com,

More information

Part II. Hoare Logic and Program Verification. Why specify programs? Specification and Verification. Code Verification. Why verify programs?

Part II. Hoare Logic and Program Verification. Why specify programs? Specification and Verification. Code Verification. Why verify programs? Part II. Hoare Logic and Program Verification Part II. Hoare Logic and Program Verification Dilian Gurov Props: Models: Specs: Method: Tool: safety of data manipulation source code logic assertions Hoare

More information

Automatic Software Verification

Automatic Software Verification Automatic Software Verification Instructor: Mooly Sagiv TA: Oded Padon Slides from Eran Yahav and the Noun Project, Wikipedia Course Requirements Summarize one lecture 10% one lecture notes 45% homework

More information

Word-Level Equivalence Checking in Bit-Level Accuracy by Synthesizing Designs onto Identical Datapath

Word-Level Equivalence Checking in Bit-Level Accuracy by Synthesizing Designs onto Identical Datapath 972 PAPER Special Section on Formal Approach Word-Level Equivalence Checking in Bit-Level Accuracy by Synthesizing Designs onto Identical Datapath Tasuku NISHIHARA a), Member, Takeshi MATSUMOTO, and Masahiro

More information

Everything You Always Wanted To Know About Programming Behaviors But Were Afraid To Ask

Everything You Always Wanted To Know About Programming Behaviors But Were Afraid To Ask Everything You Always Wanted To Know About Programming Behaviors But Were Afraid To Ask By Kevin Harrelson Machine Intelligence Lab University of Florida Spring, 1995 Overview Programming multiple behaviors

More information

Enhancement of Feedback Congestion Control Mechanisms by Deploying Active Congestion Control

Enhancement of Feedback Congestion Control Mechanisms by Deploying Active Congestion Control Enhancement of Feedback Congestion Control Mechanisms by Deploying Active Congestion Control Yoganandhini Janarthanan Aug 30,2001 Committee : Dr.Gary Minden Dr. Joseph Evans Dr.Perry Alexander Introduction

More information

Volvo Car Group Jonn Lantz Agile by Models

Volvo Car Group Jonn Lantz Agile by Models Volvo Car Group Jonn Lantz Agile by Models Challenge Scaling agile model driven development of AUTOSAR embedded software. Lift the abstraction level of in-house development. Create reliable, automated

More information

PLDI 2016 Tutorial Automata-Based String Analysis

PLDI 2016 Tutorial Automata-Based String Analysis PLDI 2016 Tutorial Automata-Based String Analysis Tevfik Bultan, Abdulbaki Aydin, Lucas Bang Verification Laboratory http://vlab.cs.ucsb.edu Department of Computer Science Common Usages of Strings } Input

More information

16-811: Math Fundamentals for Robotics, Fall 2014 Finding minimum energy trajectories of a two linked pendulum

16-811: Math Fundamentals for Robotics, Fall 2014 Finding minimum energy trajectories of a two linked pendulum 16-811: Math Fundamentals for Robotics, Fall 014 Finding minimum energy trajectories of a two linked pendulum Lerrel Pinto < lerrelp > December 1th 014 Problem Statement: Find a zero energy end effector

More information

Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations

Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations Inverse KKT Motion Optimization: A Newton Method to Efficiently Extract Task Spaces and Cost Parameters from Demonstrations Peter Englert Machine Learning and Robotics Lab Universität Stuttgart Germany

More information

Future Directions. Edward A. Lee. Berkeley, CA May 12, A New Computational Platform: Ubiquitous Networked Embedded Systems. actuate.

Future Directions. Edward A. Lee. Berkeley, CA May 12, A New Computational Platform: Ubiquitous Networked Embedded Systems. actuate. Future Directions Edward A. Lee 6th Biennial Ptolemy Miniconference Berkeley, CA May 12, 2005 A New Computational Platform: Ubiquitous Networked Embedded Systems sense actuate control Ptolemy II support

More information

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline

More information

Recitation Session 6

Recitation Session 6 Recitation Session 6 CSE341 Computer Organization University at Buffalo radhakri@buffalo.edu March 11, 2016 CSE341 Computer Organization Recitation Session 6 1/26 Recitation Session Outline 1 Overview

More information

Autonomous and Mobile Robotics. Whole-body motion planning for humanoid robots (Slides prepared by Marco Cognetti) Prof.

Autonomous and Mobile Robotics. Whole-body motion planning for humanoid robots (Slides prepared by Marco Cognetti) Prof. Autonomous and Mobile Robotics Whole-body motion planning for humanoid robots (Slides prepared by Marco Cognetti) Prof. Giuseppe Oriolo Motivations task-constrained motion planning: find collision-free

More information

Petri Nets ee249 Fall 2000

Petri Nets ee249 Fall 2000 Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow

More information

Chapter 8 Fault Tolerance

Chapter 8 Fault Tolerance DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 8 Fault Tolerance Fault Tolerance Basic Concepts Being fault tolerant is strongly related to what

More information

Advanced Driver Assistance: Modular Image Sensor Concept

Advanced Driver Assistance: Modular Image Sensor Concept Vision Advanced Driver Assistance: Modular Image Sensor Concept Supplying value. Integrated Passive and Active Safety Systems Active Safety Passive Safety Scope Reduction of accident probability Get ready

More information

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept

More information

Indistinguishability: Friend and Foe of Concurrent Data Structures. Hagit Attiya CS, Technion

Indistinguishability: Friend and Foe of Concurrent Data Structures. Hagit Attiya CS, Technion Indistinguishability: Friend and Foe of Concurrent Data Structures Hagit Attiya CS, Technion Uncertainty is a main obstacle for designing correct applications in concurrent systems Formally captured by

More information

A Modular Sensor Fusion Approach for Agricultural Machines

A Modular Sensor Fusion Approach for Agricultural Machines A Modular Sensor Fusion Approach for Agricultural Machines Sebastian Blank (1), Georg Kormann (2), Karsten Berns (1) (1) Robotics Research Lab University of Kaiserslautern, Germany (2) John Deere European

More information

College of Sciences. College of Sciences. Master s of Science in Computer Sciences Master s of Science in Biotechnology

College of Sciences. College of Sciences. Master s of Science in Computer Sciences Master s of Science in Biotechnology Master s of Science in Computer Sciences Master s of Science in Biotechnology Department of Computer Sciences 1. Introduction\Program Mission The Program mission is to prepare students to be fully abreast

More information

Complex behavior emergent from simpler ones

Complex behavior emergent from simpler ones Reactive Paradigm: Basics Based on ethology Vertical decomposition, as opposed to horizontal decomposition of hierarchical model Primitive behaviors at bottom Higher behaviors at top Each layer has independent

More information

Quantitative Timing Analysis of UML Activity Digrams using Statistical Model Checking

Quantitative Timing Analysis of UML Activity Digrams using Statistical Model Checking Quantitative Timing Analysis of UML Activity Digrams using Statistical Model Checking Fan Gu 1, Xinqian Zhang 1, Mingsong Chen 1, Daniel Grosse 2 and Rolf Drechsler 2 1 Institute of CS & SE, East China

More information

System Correctness. EEC 421/521: Software Engineering. System Correctness. The Problem at Hand. A system is correct when it meets its requirements

System Correctness. EEC 421/521: Software Engineering. System Correctness. The Problem at Hand. A system is correct when it meets its requirements System Correctness EEC 421/521: Software Engineering A Whirlwind Intro to Software Model Checking A system is correct when it meets its requirements a design without requirements cannot be right or wrong,

More information

724. Simulation of the radiation therapy system for respiratory movement compensation

724. Simulation of the radiation therapy system for respiratory movement compensation 724. Simulation of the radiation therapy system for respiratory movement compensation Tomas Krilavičius 1, Daiva Vitkutė-Adžgauskienė 2, Kęstutis Šidlauskas 3 Vytautas Magnus University, Kaunas, Lithuania

More information

Symbolic Evaluation/Execution

Symbolic Evaluation/Execution Symbolic Evaluation/Execution Reading Assignment *R.W. Floyd, "Assigning Meaning to Programs, Symposium on Applied Mathematics, 1967, pp. 19-32 (Appeared as volume 19 of Mathematical Aspects of Computer

More information

Automata-based Model Counting for String Constraints. Abdulbaki Aydin, Lucas Bang, Tevfik Bultan

Automata-based Model Counting for String Constraints. Abdulbaki Aydin, Lucas Bang, Tevfik Bultan Automata-based Model Counting for String Constraints Abdulbaki Aydin, Lucas Bang, Tevfik Bultan https://vlab.cs.ucsb.edu Model Counting for String Constraints Automata-Based model Counter (ABC) 2 Can you

More information

Combining Induction, Deduction and Structure for Synthesis

Combining Induction, Deduction and Structure for Synthesis Combining Induction, Deduction and Structure for Synthesis Sanjit A. Seshia Associate Professor EECS Department UC Berkeley Students: S. Jha, B. Brady, J. Kotker, W.Li Collaborators: R. Bryant, S. Gulwani,

More information

Safe Prediction-Based Local Path Planning using Obstacle Probability Sections

Safe Prediction-Based Local Path Planning using Obstacle Probability Sections Slide 1 Safe Prediction-Based Local Path Planning using Obstacle Probability Sections Tanja Hebecker and Frank Ortmeier Chair of Software Engineering, Otto-von-Guericke University of Magdeburg, Germany

More information

Verifying Recursive Programs using Intra-procedural Analyzers

Verifying Recursive Programs using Intra-procedural Analyzers Verifying Recursive Programs using Intra-procedural Analyzers Yu-Fang Chen, Academia Sinica, Taiwan joint work with Chiao Hsieh, Ming-Hsien Tsai, Bow-Yaw Wang and Farn Wang First of all Thanks for the

More information