Creating Smart Agents:

Size: px
Start display at page:

Download "Creating Smart Agents:"

Transcription

1 Creating Smart Agents: A Distributed Control Theory for DES Kai Cai Osaka City University RW30 Workshop at CDC

2 I am interested in multi-agent systems: I am working on both agents with continuous dynamics and agents with discrete-event dynamics 2

3 RW30: control architectural summary Centralized supervisor Agents 3

4 RW30: control architectural summary Decentralized supervisor Decentralized supervisor Agents 4

5 RW30: control architectural summary Hierarchical supervisor High-level plant Agents 5

6 RW30: control architectural summary Heterarchical supervisor High-level decentralized supervisor High-level decentralized supervisor Decentralized supervisor Decentralized supervisor Agents 6

7 RW30: control architectural summary Centralized (monolithic): Decentralized : Hierarchical : Heterarchical:

8 But, are these architectures suitable for controlling multi-agent systems, if individual agents are expected to be autonomous and smart 8

9 Distributed (for smart agents) Interaction graph Local controllers Agents 9

10 10

11 How to design distributed control? Suppose we have: Centralized supervisor Can we decompose the supervisor to get: Interaction graph 11

12 How to decompose? 12

13 13

14 Local controllers are quotient dynamic systems modulo locally unavailable control information. 14

15 Supervisor localization for distributed control synthesis: Given N agents (plant) Given a collective behavior (specification) First, compute the centralized supervisor Then, decompose into a set of local controllers such that 15

16 plant specification localization algorithm local controllers 16

17 Distributed architecture emerges: Interaction graph is part of solution Local controllers Agents 17

18 Example: warehouse automation Kiva Systems No collisions No deadlocks 18

19 19

20 For large-scale systems Hierarchical supervisor Interaction graph Decentralized supervisors Alternative supervisor localization 20

21 RW30: control architectural summary Centralized (monolithic): Decentralized : Hierarchical : Distributed : Heterarchical:

22 Localization for timed DES Standard RW framework: logical specifications RW framework + time: temporal specifications tick event: time delay, hard deadline 22

23 Localization for timed DES Enforcing: temporal specifications logical specifications Centralized supervisor Interaction graph local tick-preemptors local controllers Separation Principle 23

24 Localization for infinite-behavior DES RW framework + time: finite-behavior temporal specifications RW framework + temporal logic: infinite-behavior temporal (liveness) specifications 24

25 Localization for infinite-behavior DES Enforcing: infinite specifications finite specifications Centralized supervisor Interaction graph local live controllers local safe controllers Separation Principle 25

26 Conclusions Supervisor localization as a distributed control theory for discrete-event systems Anything you can do globally, you can do locally Localization theory Controllability Observability Opacity / diagnosability / detectability State-minimization, Bisimulation-minimization 26

27 Localization: limitations and promises Top-down: Global control design Bottom-up: Global verification Local implementation Local control design Convergence: top-down inspired bottom-up 27

28 W R Workshop CDC 14, Los Angels 28

Supervisory Control Synthesis the Focus in Model-Based Systems Engineering

Supervisory Control Synthesis the Focus in Model-Based Systems Engineering Supervisory Control Synthesis the Focus in Model-Based Systems Engineering Jos Baeten and Asia van de Mortel-Fronczak Systems Engineering Group Department of Mechanical Engineering November 23, 2011 What

More information

IEEE Smart Grid Research IEEE Smart Grid Vision for Computing: 2030 and Beyond. Executive Summary... xv. Chapter 1 Introduction...

IEEE Smart Grid Research IEEE Smart Grid Vision for Computing: 2030 and Beyond. Executive Summary... xv. Chapter 1 Introduction... IEEE Smart Grid Research IEEE Smart Grid Vision for Computing: 2030 and Beyond Table of Contents Executive Summary... xv Chapter 1 Introduction... 1 1.1 Purpose and scope... 1 1.2 CS-SGVP approach... 1

More information

Lecture 9 Extensions and Open Problems

Lecture 9 Extensions and Open Problems Lecture 9 Extensions and Open Problems Richard M. Murray Nok Wongpiromsarn Ufuk Topcu California Institute of Technology EECI, 18 May 2012 Outline: Review key concepts from the course Discussion open issues,

More information

Resource-bound process algebras for Schedulability and Performance Analysis of Real-Time and Embedded Systems

Resource-bound process algebras for Schedulability and Performance Analysis of Real-Time and Embedded Systems Resource-bound process algebras for Schedulability and Performance Analysis of Real-Time and Embedded Systems Insup Lee 1, Oleg Sokolsky 1, Anna Philippou 2 1 RTG (Real-Time Systems Group) Department of

More information

Counterexample Guided Synthesis of Monitors for Realizability Enforcement. Matthias Güdemann Gwen Salaün Meriem Ouederni

Counterexample Guided Synthesis of Monitors for Realizability Enforcement. Matthias Güdemann Gwen Salaün Meriem Ouederni Counterexample Guided Synthesis of Monitors for Realizability Enforcement Matthias Güdemann Gwen Salaün Meriem Ouederni Choreographies Global contract specifications Participants, communication, message

More information

Utilizing Static Analysis for Programmable Logic Controllers

Utilizing Static Analysis for Programmable Logic Controllers Sébastien Bornot Ralf Huuck Ben Lukoschus Lehrstuhl für Softwaretechnologie Universität Kiel Preußerstraße 1 9, D-24105 Kiel, Germany seb rhu bls @informatik.uni-kiel.de Yassine Lakhnech Verimag Centre

More information

NETWORK MANAGEMENT NEEDS NEW IDEAS

NETWORK MANAGEMENT NEEDS NEW IDEAS NETWORK MANAGEMENT NEEDS NEW IDEAS Traditional network management systems haven t adapted to the scale demanded by virtualization and cloud architectures. Distributed system designs may show the way. As

More information

Ch 3.4 The Integers and Division

Ch 3.4 The Integers and Division Integers and Division 1 Ch 3.4 The Integers and Division This area of discrete mathematics belongs to the area of Number Theory. Some applications of the concepts in this section include generating pseudorandom

More information

ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE?

ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? Motivation, Approach, and Research Agenda Rolf Stadler and Gunnar Karlsson KTH, Royal Institute of Technology 164 40 Stockholm-Kista, Sweden {stadler,gk}@imit.kth.se

More information

Model Checking Revision: Model Checking for Infinite Systems Revision: Traffic Light Controller (TLC) Revision: 1.12

Model Checking Revision: Model Checking for Infinite Systems Revision: Traffic Light Controller (TLC) Revision: 1.12 Model Checking mc Revision:.2 Model Checking for Infinite Systems mc 2 Revision:.2 check algorithmically temporal / sequential properties fixpoint algorithms with symbolic representations: systems are

More information

Petri Nets. Petri Nets. Petri Net Example. Systems are specified as a directed bipartite graph. The two kinds of nodes in the graph:

Petri Nets. Petri Nets. Petri Net Example. Systems are specified as a directed bipartite graph. The two kinds of nodes in the graph: System Design&Methodologies Fö - 1 System Design&Methodologies Fö - 2 Petri Nets 1. Basic Petri Net Model 2. Properties and Analysis of Petri Nets 3. Extended Petri Net Models Petri Nets Systems are specified

More information

Coordination Principles

Coordination Principles Coordination Principles 8/12/07 These principles concern how autonomous entities work together toward a common result. A coordination system is a set of agents interacting within a finite or infinite game

More information

Lecture 9: Reachability

Lecture 9: Reachability Lecture 9: Reachability Outline of Lecture Reachability General Transition Systems Algorithms for Reachability Safety through Reachability Backward Reachability Algorithm Given hybrid automaton H : set

More information

Learning Driving Styles for Autonomous Vehicles for Demonstration

Learning Driving Styles for Autonomous Vehicles for Demonstration Learning Driving Styles for Autonomous Vehicles for Demonstration Markus Kuderer, Shilpa Gulati, Wolfram Burgard Presented by: Marko Ilievski Agenda 1. Problem definition 2. Background a. Important vocabulary

More information

Further Topics in Modelling & Verification

Further Topics in Modelling & Verification Further Topics in Modelling & Verification Thursday Oct 09, 2014 Philipp Rümmer Uppsala University Philipp.Ruemmer@it.uu.se 1/34 Recap: Timed automata (TA) 2/34 Recap: Properties 3/34 Questions about TA

More information

Course Introduction to Matlab and Simulink - Stateflow

Course Introduction to Matlab and Simulink - Stateflow Course Introduction to Matlab and Simulink - Stateflow Emanuele Ruffaldi June 08, 2017 http://www.eruffaldi.com/wp/introduction-to-matlab-and-simulink/ Scuola Superiore Sant Anna, Pisa Event-driven Systems

More information

Consensus and Synchronization of Multi-Agent Systems

Consensus and Synchronization of Multi-Agent Systems Consensus and Synchronization of Multi-Agent Systems (Combinatorial) optimization on matrix semigroups Raphaël Jungers UCLouvain L aquila, April 2016 Smart cities Consensus of multiagent systems Gossip

More information

Task Management Techniques for Enforcing ED Scheduling on Periodic Task Set

Task Management Techniques for Enforcing ED Scheduling on Periodic Task Set This paper appeared in the Proceedings of the Fifth IEEE Workshop on Real-Time Software and Operating Systems, May 12-13, 1988, Washington, D.C., pp. 42-46 Task Management Techniques for Enforcing ED Scheduling

More information

DISCRETE-event dynamic systems (DEDS) are dynamic

DISCRETE-event dynamic systems (DEDS) are dynamic IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 7, NO. 2, MARCH 1999 175 The Supervised Control of Discrete-Event Dynamic Systems François Charbonnier, Hassane Alla, and René David Abstract The supervisory

More information

StateClock: a Tool for Timed Reactive Modules

StateClock: a Tool for Timed Reactive Modules StateClock: a Tool for Timed Reactive Modules Jonathan S. Ostroff Department Of Computer Science, York University, Toronto, Canada, M3J 1P3. Email: jonathan@yorku.ca Abstract: We provide an overview of

More information

A Modal Specification Approach for Assuring the Safety of On-Demand Medical Cyber-Physical Systems

A Modal Specification Approach for Assuring the Safety of On-Demand Medical Cyber-Physical Systems A Modal Specification Approach for Assuring the Safety of On-Demand Medical Cyber-Physical Systems Lu Feng PRECISE Center Department of Computer and Information Science University of Pennsylvania lufeng@cis.upenn.edu

More information

Decidability Issues for Decentralized Controllability of Open Nets

Decidability Issues for Decentralized Controllability of Open Nets Decidability Issues for Decentralized Controllability of Open Nets Karsten Wolf Universität Rostock, Institut für Informatik Abstract. We sketch an undecidability result concerning the decentralized controllability

More information

SECURIFY: A COMPOSITIONAL APPROACH OF BUILDING SECURITY VERIFIED SYSTEM

SECURIFY: A COMPOSITIONAL APPROACH OF BUILDING SECURITY VERIFIED SYSTEM 1 SRIFY: A COMPOSITIONAL APPROACH OF BUILDING SRITY VERIFIED SYSTEM Liu Yang, Associate Professor, NTU SG-CRC 2018 28 March 2018 2 Securify Approach Compositional Security Reasoning with Untrusted Components

More information

1 Elementary number theory

1 Elementary number theory Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},

More information

By: Chaitanya Settaluri Devendra Kalia

By: Chaitanya Settaluri Devendra Kalia By: Chaitanya Settaluri Devendra Kalia What is an embedded system? An embedded system Uses a controller to perform some function Is not perceived as a computer Software is used for features and flexibility

More information

Exam /Course 20767B: Implementing a SQL Data Warehouse

Exam /Course 20767B: Implementing a SQL Data Warehouse Exam 70-767/Course 20767B: Implementing a SQL Data Warehouse Course Outline Module 1: Introduction to Data Warehousing This module describes data warehouse concepts and architecture consideration. Overview

More information

A Formal Model Approach for the Analysis and Validation of the Cooperative Path Planning of a UAV Team

A Formal Model Approach for the Analysis and Validation of the Cooperative Path Planning of a UAV Team A Formal Model Approach for the Analysis and Validation of the Cooperative Path Planning of a UAV Team Antonios Tsourdos Brian White, Rafał Żbikowski, Peter Silson Suresh Jeyaraman and Madhavan Shanmugavel

More information

Verification of Infinite-State Dynamic Systems Using Approximate Quotient Transition Systems

Verification of Infinite-State Dynamic Systems Using Approximate Quotient Transition Systems IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 46, NO 9, SEPTEMBER 2001 1401 Verification of Infinite-State Dynamic Systems Using Approximate Quotient Transition Systems Alongkrit Chutinan and Bruce H Krogh,

More information

Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen

Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Harsh Beohar LF 265, harsh.beohar@uni-due.de Harsh Beohar Course Modelling of Concurrent Systems 1 Course handler

More information

THE APPROACH TO PROGRAMMING AGENT-BASED SYSTEMS. Dmitry Cheremisinov Liudmila Cheremisinova

THE APPROACH TO PROGRAMMING AGENT-BASED SYSTEMS. Dmitry Cheremisinov Liudmila Cheremisinova THE APPROACH TO PROGRAMMING AGENT-BASED SYSTEMS Dmitry Cheremisinov Liudmila Cheremisinova The United Institute of Informatics Problems of National Academy of Sciences of Belarus 8-th International Workshop

More information

Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications

Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications Distributed Consensus in Multivehicle Cooperative Control: Theory and Applications Wei Ren and Randal W. Beard Springer ISBN: 978-1-84800-014-8 Tutorial Slides Prepared by Wei Ren Department of Electrical

More information

Formal Verification for UML/SysML models

Formal Verification for UML/SysML models Formal Verification for UML/SysML models IBM Research Lab - Haifa Content Formal verification v.s. testing Correctness properties Formal verification for Rhapsody models 2 Formal Verification Desired Properties

More information

Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen

Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Course Modelling of Concurrent Systems Summer Semester 2016 University of Duisburg-Essen Harsh Beohar LF 265, harsh.beohar@uni-due.de Harsh Beohar Course Modelling of Concurrent Systems 1 Course handler

More information

Concurrent Programming Method for Embedded Systems

Concurrent Programming Method for Embedded Systems Concurrent Programming Method for Embedded Systems Norbert Schramm UVA, 24000 Subotica, Serbia norbert.schramm@gmail.com Anita Sabo Polytechnical Engineering College Subotica M. Oreškovića 16, 24000 Subotica,

More information

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.

More information

Temporal logic-based decision making and control. Jana Tumova Robotics, Perception, and Learning Department (RPL)

Temporal logic-based decision making and control. Jana Tumova Robotics, Perception, and Learning Department (RPL) Temporal logic-based decision making and control Jana Tumova Robotics, Perception, and Learning Department (RPL) DARPA Urban Challenge 2007 2 Formal verification Does a system meet requirements? System

More information

Self-Managed Systems: an Architectural Challenge

Self-Managed Systems: an Architectural Challenge Self-Managed Systems: an Architectural Challenge Kramer, Jeff and Magee, Jeff FOSE 07: 2007 Future of Software Engineering Summarized by Jason Porter Introduction A self-managed system is a system which

More information

Hierarchical FSMs with Multiple CMs

Hierarchical FSMs with Multiple CMs Hierarchical FSMs with Multiple CMs Manaloor Govindarajan Balasubramanian Manikantan Bharathwaj Muthuswamy (aka Bharath) Reference: Hierarchical FSMs with Multiple Concurrency Models. Alain Girault, Bilung

More information

Automated Formal Methods for Embedded Systems

Automated Formal Methods for Embedded Systems Automated Formal Methods for Embedded Systems Bernd Finkbeiner Universität des Saarlandes Reactive Systems Group 2011/02/03 Bernd Finkbeiner (UdS) Embedded Systems 2011/02/03 1 / 48 Automated Formal Methods

More information

Representing the Real World

Representing the Real World Representing the Real World The theory of representing the real world in a GIS using digital data The nature of digital data and binary notation The discrete object view of the world Entities, data objects,

More information

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications.

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications. Petri Nets 2. Applications Y Narahari Y Narahari is currently an Associate Professor of Computer Science and Automation at the Indian Institute of Science, Bangalore. His research interests are broadly

More information

Software verification for ubiquitous computing

Software verification for ubiquitous computing Software verification for ubiquitous computing Marta Kwiatkowska Computing Laboratory, University of Oxford QA 09, Grenoble, June 2009 Software everywhere Electronic devices, ever smaller Laptops, phones,

More information

Advanced Tutorial - Simulation-based Scheduling and Control

Advanced Tutorial - Simulation-based Scheduling and Control Advanced Tutorial - Simulation-based Scheduling and Control Brett A. Peters, Jeffrey S. Smith, James Curry, and Cynthia LaJimodiere Texas A&M University Glenn R. Drake Systems Modeling Corp. Abstract This

More information

Autonomic Computing. Pablo Chacin

Autonomic Computing. Pablo Chacin Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research

More information

Critical Analysis of Computer Science Methodology: Theory

Critical Analysis of Computer Science Methodology: Theory Critical Analysis of Computer Science Methodology: Theory Björn Lisper Dept. of Computer Science and Engineering Mälardalen University bjorn.lisper@mdh.se http://www.idt.mdh.se/ blr/ March 3, 2004 Critical

More information

Compositionality in system design: interfaces everywhere! UC Berkeley

Compositionality in system design: interfaces everywhere! UC Berkeley Compositionality in system design: interfaces everywhere! Stavros Tripakis UC Berkeley DREAMS Seminar, Mar 2013 Computers as parts of cyber physical systems cyber-physical ~98% of the world s processors

More information

skm skm skm 85 dagonet.cs.purdue.edu bradley User Name: Job Name: Host Name: Printer Name: 05/04/ :44:24 AM

skm skm skm 85 dagonet.cs.purdue.edu bradley User Name: Job Name: Host Name: Printer Name: 05/04/ :44:24 AM S skm User Name: Job Name: Host Name: Printer Name: Date: skm 85 dagonet.cs.purdue.edu bradley 05/04/2000 11:44:24 AM S skm User Profile Driven Web Security Sanjay Madria, Mukesh Mohania Bharat Bhargava

More information

Module 19: Protection

Module 19: Protection Module 19: Protection Goals of Protection Domain of Protection Access Matrix Implementation of Access Matrix Revocation of Access Rights Capability-Based Systems Language-Based Protection 19.1 Protection

More information

What is Set? Set Theory. Notation. Venn Diagram

What is Set? Set Theory. Notation. Venn Diagram What is Set? Set Theory Peter Lo Set is any well-defined list, collection, or class of objects. The objects in set can be anything These objects are called the Elements or Members of the set. CS218 Peter

More information

Xuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata

Xuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata BACH: Path-oriented Reachability Checker of Linear Hybrid Automata Xuandong Li Department of Computer Science and Technology, Nanjing University, P.R.China Outline Preliminary Knowledge Path-oriented Reachability

More information

Fault Detection of Reachability Testing with Game Theoretic Approach

Fault Detection of Reachability Testing with Game Theoretic Approach Fault Detection of Reachability Testing with Game Theoretic Approach S. Preetha Dr.M. Punithavalli Research Scholar, Karpagam University, Coimbatore. Director, Sri Ramakrishna Engineering College, Coimbatore.

More information

Vision Document for Multi-Agent Research Tool (MART)

Vision Document for Multi-Agent Research Tool (MART) Vision Document for Multi-Agent Research Tool (MART) Version 2.0 Submitted in partial fulfillment of the requirements for the degree MSE Madhukar Kumar CIS 895 MSE Project Kansas State University 1 1.

More information

Implementing a SQL Data Warehouse

Implementing a SQL Data Warehouse Implementing a SQL Data Warehouse Course 20767B 5 Days Instructor-led, Hands on Course Information This five-day instructor-led course provides students with the knowledge and skills to provision a Microsoft

More information

TTool Training. III. Using TTool

TTool Training. III. Using TTool TTool Training III. Using TTool Ludovic Apvrille ludovic.apvrille@telecom-paris.fr Eurecom, Office 223 Ludovic Apvrille - UML - 2005. Slide #1 I. Introduction TTool: main features Installing TTool Diagramming

More information

Bridging the Gap: Discrete-Event Systems for Software Engineering (Short Position Paper)

Bridging the Gap: Discrete-Event Systems for Software Engineering (Short Position Paper) Bridging the Gap: Discrete-Event Systems for Software Engineering (Short Position Paper) Juergen Dingel School of Computing Queen s University Kingston, ON dingel@cs.queensu.ca Karen Rudie Dept. of Elec.

More information

Optimization Methods in Management Science

Optimization Methods in Management Science Optimization Methods in Management Science MIT 15.053 Recitation 9 TAs: Giacomo Nannicini, Ebrahim Nasrabadi Problem 1 We apply Dijkstra s algorithm to the network given below to find the shortest path

More information

SYNTHESYS OUTBOUND. Viewing & Managing Outbound Lists. Synthesys CRM & Outbound Management 1

SYNTHESYS OUTBOUND. Viewing & Managing Outbound Lists. Synthesys CRM & Outbound Management 1 SYNTHESYS OUTBOUND Viewing & Managing Outbound Lists Synthesys CRM & Outbound Management 1 VIEWING QUEUED CALLS Explanation of Icons and Queue States... 3 Lead Tracking... 4 Queue State... 5 Customer History...

More information

Lecture 2. Decidability and Verification

Lecture 2. Decidability and Verification Lecture 2. Decidability and Verification model temporal property Model Checker yes error-trace Advantages Automated formal verification, Effective debugging tool Moderate industrial success In-house groups:

More information

Q Body of techniques supported by. R precise mathematics. R powerful analysis tools. Q Rigorous, effective mechanisms for system.

Q Body of techniques supported by. R precise mathematics. R powerful analysis tools. Q Rigorous, effective mechanisms for system. Introduction to Formal Methods 1 Introduction to Formal Methods 2 Formal Specification Requirements specification R notational statement of system services Software specification R formal abstract depiction

More information

TELSTRA IP TELEPHONY PREMIUM CALL CENTRE AGENT QUICK REFERENCE GUIDE

TELSTRA IP TELEPHONY PREMIUM CALL CENTRE AGENT QUICK REFERENCE GUIDE 1. To sign into the Agent Call Centre Web Based client, open your web browser 2. Enter the following URL https://callcentre.tipt.telstra.com/callcentre 3. When the sign in page appears enter your User

More information

Sl.No Project Title Year

Sl.No Project Title Year Sl.No Project Title Year WSN(Wireless Sensor ) 1 Distributed Topology Control With Lifetime Extension Based on Non-Cooperative Game for Wireless Sensor 2 Intercept Behavior Analysis of Industrial Wireless

More information

Design of a Live and Maximally Permissive Petri Net Controller Using the Theory of Regions

Design of a Live and Maximally Permissive Petri Net Controller Using the Theory of Regions IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 19, NO. 1, FEBRUARY 2003 137 [5] H. Cho and S. I. Marcus, Supremal and maximal sublanguages arising in supervisor synthesis problems with partial observations,

More information

System Correctness. EEC 421/521: Software Engineering. System Correctness. The Problem at Hand. A system is correct when it meets its requirements

System Correctness. EEC 421/521: Software Engineering. System Correctness. The Problem at Hand. A system is correct when it meets its requirements System Correctness EEC 421/521: Software Engineering A Whirlwind Intro to Software Model Checking A system is correct when it meets its requirements a design without requirements cannot be right or wrong,

More information

Model-Based Design of Connected and Autonomous Vehicles

Model-Based Design of Connected and Autonomous Vehicles Model-Based Design of Connected and Autonomous Vehicles Akshay Rajhans, PhD Senior Research Scientist Advanced Research and Technology Office MathWorks https://arajhans.github.io 2 nd IEEE Summer School

More information

1 Elementary number theory

1 Elementary number theory 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...}, along with their most basic arithmetical and ordering properties.

More information

Behavioural Equivalences and Abstraction Techniques. Natalia Sidorova

Behavioural Equivalences and Abstraction Techniques. Natalia Sidorova Behavioural Equivalences and Abstraction Techniques Natalia Sidorova Part 1: Behavioural Equivalences p. p. The elevator example once more How to compare this elevator model with some other? The cabin

More information

The Evolution of Secure Operating Systems

The Evolution of Secure Operating Systems The Evolution of Secure Operating Systems Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Computer Science and Engineering Department Pennsylvania State University 1 Operating Systems

More information

Combining Runtime Verification and Property Adaptation through Neural-Symbolic Integration

Combining Runtime Verification and Property Adaptation through Neural-Symbolic Integration Combining Runtime Verification and Property Adaptation through Neural-Symbolic Integration Alan Perotti Guido Boella Università di Torino Artur d Avila Garcez City University London perotti@di.unito.it

More information

A Case for Collaborative Construction as Testbed for Cooperative Multi-Agent Planning

A Case for Collaborative Construction as Testbed for Cooperative Multi-Agent Planning A Case for Collaborative Construction as Testbed for Cooperative Multi-Agent Planning Sven Koenig Department of Computer Science University of Southern California skoenig@usc.edu T. K. Satish Kumar Department

More information

20767B: IMPLEMENTING A SQL DATA WAREHOUSE

20767B: IMPLEMENTING A SQL DATA WAREHOUSE ABOUT THIS COURSE This 5-day instructor led course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft SQL Server

More information

Library-Based Scalable Refinement Checking for Contract-Based Design

Library-Based Scalable Refinement Checking for Contract-Based Design Library-Based Scalable Refinement Checking for Contract-Based Design Antonio Iannopollo Pierluigi Nuzzo Stavros Tripakis Alberto Sangiovanni-Vincentelli EXCAPE ANNUAL MEETING 10-11 MARCH 2014 UC BERKELEY

More information

Simulation of AADL models with software-in-the-loop execution

Simulation of AADL models with software-in-the-loop execution Simulation of AADL models with software-in-the-loop execution Denis Buzdalov Institute for System Programming of Russian Academy of Sciences Moscow, Russia buzdalov@ispras.ru ABSTRACT In this paper we

More information

- 5G SLICING - Challenges and opportunities from Verticals

- 5G SLICING - Challenges and opportunities from Verticals - 5G SLICING - Challenges and opportunities from Verticals Cipriano Lomba Efacec (partner in 5G-PPP SLICENET Project) June 15, 2017 Efacec is a technology driven company providing integrated turnkey solutions

More information

Modeling and Verification of RBC Handover Protocol

Modeling and Verification of RBC Handover Protocol Available online at www.sciencedirect.com Electronic Notes in Theoretical Computer Science 309 (2014) 51 62 www.elsevier.com/locate/entcs Modeling and Verification of RBC Handover Protocol Kai Yang 1,2

More information

Road and Street Maintenance Supervisors Conference

Road and Street Maintenance Supervisors Conference Road and Street Maintenance Supervisors Conference Distracted Driving Definition: Distracted Driving The practice of driving a motor vehicle while engaged in another activity, typically one that involves

More information

Research on Cloud Resource Scheduling Algorithm based on Ant-cycle Model

Research on Cloud Resource Scheduling Algorithm based on Ant-cycle Model , pp.427-432 http://dx.doi.org/10.14257/astl.2016.139.85 Research on Cloud Resource Scheduling Algorithm based on Ant-cycle Model Yang Zhaofeng, Fan Aiwan Computer School, Pingdingshan University, Pingdingshan,

More information

Lecture 10 Summary and Open Questions

Lecture 10 Summary and Open Questions Lecture 10 Summary and Open Questions Richard M. Murray Nok Wongpiromsarn Ufuk Topcu California Institute of Technology EECI, 22 Mar 2013 Outline: Review key concepts from the course Discussion open issues,

More information

EECE Hybrid and Embedded Systems: Computation

EECE Hybrid and Embedded Systems: Computation EECE 396-1 Hybrid and Embedded Systems: Computation T. John Koo, Ph.D. Institute for Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University 300 Featheringill

More information

Collaborators. Multiple Agents & Crowd Simulation: training sytems 5/15/2010. Interactive Multi-Robot Planning and Multi-Agent Simulation

Collaborators. Multiple Agents & Crowd Simulation: training sytems 5/15/2010. Interactive Multi-Robot Planning and Multi-Agent Simulation Interactive Multi-Robot Planning and Multi-Agent Simulation Dinesh Manocha UNC Chapel Hill dm@cs.unc.edu http://gamma.cs.unc.edu Collaborators Ming C. Lin Jur van der Berg Sean Curtis Russell Gayle Stephen

More information

Wireless Environments

Wireless Environments A Cyber Physical Systems Architecture for Timely and Reliable Information Dissemination in Mobile, Aniruddha Gokhale Vanderbilt University EECS Nashville, TN Wireless Environments Steven Drager, William

More information

A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES

A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES A TESTING FRAMEWORK FOR FAULT TOLERANT COMPOSITION OF TRANSACTIONAL WEB SERVICES Deepali Diwase Pune Institute of Computer Technology, Pune University Pune, Maharashtra, India deepali.diwase@gmail.com

More information

Model Checking for Autonomy Software

Model Checking for Autonomy Software Model Checking for Autonomy Software Charles Pecheur RIACS / ASE Group, NASA Ames Charles Pecheur, RIACS / NASA Ames 1 Contents Model Checking for Autonomy Software Why? Autonomy software, how to verify

More information

Synthesis of Supervisory Control of Discrete Event System for Static VAR Compansator

Synthesis of Supervisory Control of Discrete Event System for Static VAR Compansator Synthesis of Supervisory Control of Discrete Event System for Static VAR Compansator Tarun Jain Department of Electrical Engineering Indian Institute of Technology, BHU Varanasi, India tarun.jain.eee10@itbhu.ac.in

More information

Implementing a SQL Data Warehouse

Implementing a SQL Data Warehouse Course 20767B: Implementing a SQL Data Warehouse Page 1 of 7 Implementing a SQL Data Warehouse Course 20767B: 4 days; Instructor-Led Introduction This 4-day instructor led course describes how to implement

More information

Using Cantor s Diagonal Method to Show ζ(2) is Irrational

Using Cantor s Diagonal Method to Show ζ(2) is Irrational Using Cantor s Diagonal Method to Show ζ(2) is Irrational Timothy W. Jones November 1, 2018 Abstract We look at some of the details of Cantor s Diagonal Method and argue that the swap function given does

More information

9.5 Equivalence Relations

9.5 Equivalence Relations 9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same

More information

BIWEEKLY SALARY SCHEDULE U UNREPRESENTED/MISCELLANEOUS EMPLOYEES

BIWEEKLY SALARY SCHEDULE U UNREPRESENTED/MISCELLANEOUS EMPLOYEES BIWEEKLY SALARY SCHEDULE U UNREPRESENTED/MISCELLANEOUS EMPLOYEES (3% cost of living increase per Resolution 18-12) U 001 1234.82 1296.56 1361.39 1429.46 1500.93 U 002 1269.45 1332.92 1399.57 1469.55 1543.02

More information

Embedded Systems Requirements Verification Using HiLeS Designer

Embedded Systems Requirements Verification Using HiLeS Designer Embedded Systems Requirements Verification Using HiLeS Designer C-E. Gómez 1,3, J-C. Pascal 1,2, P. Esteban 1,2, Y. Déléris 4, J-R. Devatine 5 1: CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse,

More information

VANS: Visual Ad hoc Network Simulator

VANS: Visual Ad hoc Network Simulator VANS: Visual Ad hoc Network Simulator Masako Shinohara, Hideki Hayashi, Takahiro Hara, Akimitsu Kanzaki and Shojiro Nishio Graduate School of Information Science and Tech., Osaka University {sinohara.masako,

More information

EXERCISE Which of the following is irrational? (C) 7 (D) 81 (A) (B)

EXERCISE Which of the following is irrational? (C) 7 (D) 81 (A) (B) EXERCISE Write the correct answer in each of the following:. Every rational number is a natural number an integer (C) a real number (D) a whole number. Between two rational numbers there is no rational

More information

Specification and Analysis of Contracts Tutorial

Specification and Analysis of Contracts Tutorial Specification and Analysis of Contracts Tutorial Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo Gerardo Schneider (UiO) Specification and

More information

Announcements. CS 188: Artificial Intelligence Fall Robot motion planning! Today. Robotics Tasks. Mobile Robots

Announcements. CS 188: Artificial Intelligence Fall Robot motion planning! Today. Robotics Tasks. Mobile Robots CS 188: Artificial Intelligence Fall 2007 Lecture 6: Robot Motion Planning 9/13/2007 Announcements Project 1 due (yesterday)! Project 2 (Pacman with ghosts) up in a few days Reminder: you are allowed to

More information

CS 188: Artificial Intelligence Fall Announcements

CS 188: Artificial Intelligence Fall Announcements CS 188: Artificial Intelligence Fall 2007 Lecture 6: Robot Motion Planning 9/13/2007 Dan Klein UC Berkeley Many slides over the course adapted from either Stuart Russell or Andrew Moore Announcements Project

More information

Hierarchical Reinforcement Learning for Robot Navigation

Hierarchical Reinforcement Learning for Robot Navigation Hierarchical Reinforcement Learning for Robot Navigation B. Bischoff 1, D. Nguyen-Tuong 1,I-H.Lee 1, F. Streichert 1 and A. Knoll 2 1- Robert Bosch GmbH - Corporate Research Robert-Bosch-Str. 2, 71701

More information

Module 19: Protection

Module 19: Protection Module 19: Protection Goals of Protection Domain of Protection Access Matrix Implementation of Access Matrix Revocation of Access Rights Capability-Based Systems Language-Based Protection Operating System

More information

Formal Analysis of Timing Effects on Closed-loop Properties of Cyber Physical Systems

Formal Analysis of Timing Effects on Closed-loop Properties of Cyber Physical Systems Formal Analysis of Timing Effects on Closed-loop Properties of Cyber Physical Systems Arne Hamann, Corporate Research, Robert Bosch GmbH Joint work with: Matthias Wöhrle (Bosch), Goran Frehse (Université

More information

AN ITERATIVE APPROACH TO THE IRREGULARITY STRENGTH OF TREES

AN ITERATIVE APPROACH TO THE IRREGULARITY STRENGTH OF TREES AN ITERATIVE APPROACH TO THE IRREGULARITY STRENGTH OF TREES MICHAEL FERRARA, RONALD J. GOULD, MICHA L KAROŃSKI, AND FLORIAN PFENDER Abstract. An assignment of positive integer weights to the edges of a

More information

Minimal Communication in a Distributed Discrete-Event System

Minimal Communication in a Distributed Discrete-Event System IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 6, JUNE 2003 957 Minimal Communication in a Distributed Discrete-Event System Karen Rudie, Senior Member, IEEE, Stéphane Lafortune, Fellow, IEEE, and

More information

Checking the Realizability of BPMN 2.0 Choreographies

Checking the Realizability of BPMN 2.0 Choreographies Checking the Realizability of PMN 2.0 Choreographies Gwen Salaün Grenoble INP, INRI, France joint work with Pascal Poizat LRI, University of Evry, France 1 Realizability of Choreographies Interactions

More information

Traditional Approaches to Modeling

Traditional Approaches to Modeling Traditional Approaches to Modeling Timeliness, Performance and How They Relate to Modeling, Architecture and Design Mark S. Gerhardt Chief Architect Pittsburgh, PA 15213 Levels of Real Time Performance

More information