Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach
|
|
- Drusilla Hopkins
- 5 years ago
- Views:
Transcription
1 Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach Feng Tan *, Yufei Wang *, Qixin Wang *, Lei Bu, Rong Zheng, Neeraj Suri ** * Embedded Systems & Networking Lab, Dept. of Computing, The Hong Kong Polytechnic Univ. State Key Lab for Novel Software Tech., Dept. of Computer Sci. & Tech., Nanjing Univ., China Dept. of Computing and Software, McMaster Univ., Canada ** Dept. of Computer Science, TU Darmstadt, Germany June 26, 2013
2 Overview Related Work Demand Problem Evaluation Solution Background
3 Cyber-Physical Systems (CPS) are typically distributed and life/mission critical. Life/Mission critical CPS demand wireless Conflict Wireless is unreliable
4 Cyber-Physical Systems (CPS) are typically distributed and life/mission critical. Life/Mission critical CPS demand wireless Conflict PTE Safety Guarantee Wireless is unreliable
5 Cyber-Physical Systems (CPS) are typically distributed and life/mission critical. Life/Mission critical CPS demand wireless Conflict Design Pattern Hybrid Modeling PTE Safety Guarantee Wireless is unreliable
6 Cyber Physical Systems (CPS): systems involving tight/complex coupling of computer and physical subsystems Avionics Manufacturing Medical
7 CPS Features Typically distributed and life/mission-critical Real-time (in addition to logical time) matters Modeling must integrate both discrete and continuous aspects
8 Distributed life/mission critical CPS demand wireless communications.
9 Distributed life/mission critical CPS demand wireless communications.
10 Distributed life/mission critical CPS demand wireless communications.
11 Distributed life/mission critical CPS demand wireless communications. Wireless is unreliable
12 How to guarantee the safety of life/mission critical wireless CPS? Life/Mission critical CPS demand wireless Conflict Wireless is unreliable
13 How to guarantee the Proper-Temporal-Embedding (PTE) safety rule of life/mission critical wireless CPS? Life/Mission critical CPS demand wireless Conflict PTE Safety Guarantee Wireless is unreliable
14 What is Proper-Temporal-Embedding (PTE) safety rule?
15 CPS Feature 2: real-time (in addition to logical time) matters!
16 CPS Feature 2: real-time (in addition to logical time) matters! risky state dwelling time upper bound
17 CPS Feature 2: real-time (in addition to logical time) matters! enter-risky safeguard interval
18 CPS Feature 2: real-time (in addition to logical time) matters! exit-risky safeguard interval
19 How to guarantee PTE safety despite of arbitrary wireless link failures?
20 How to guarantee PTE safety despite of arbitrary wireless link failures? Leasing Design Pattern: risky state dwelling time must be leased.
21 General concepts of Leasing design pattern: each CPS entity takes one of the 3 roles. 3. approve 2. lease 2. lease Supervisor 1. request Initiator Participant Participant
22 CPS Features: 1. real-time matters; 2. real-time PTE even when aborting/canceling. (+ 3. arbitrary comm. failures) active Initiator fallback active Participant fallback active Participant fallback
23 How to formally describe, analyze, and use Leasing design pattern in the context of CPS?
24 How to formally describe, analyze, and use Leasing design pattern in the context of CPS? CPS Feature 3 implies the use of hybrid automata modeling
25 Hybrid Automaton is a state-of-the-art modeling tool for CPS. Bouncing Ball Example
26 Leasing Design Pattern for PTE Safety Rules: detailed Supervisor's hybrid automaton
27 Leasing Design Pattern for PTE Safety Rules: detailed Initiator's hybrid automaton
28 Leasing Design Pattern for PTE Safety Rules: detailed Participant's hybrid automaton
29 Leasing Design Pattern for PTE Safety Rules: detailed Participant's hybrid automaton
30 Leasing Design Pattern for PTE Safety Rules: detailed Participant's hybrid automaton
31 Validity of the design pattern Theorem 1: If the temporal parameters of the design pattern hybrid automata satisfy a certain set of linear inequalities, then PTE safety is guaranteed despite of arbitrary communications link failures.
32 Validity of the design pattern
33 Using the design pattern: how to turn design pattern into detailed CPS designs?
34 We proposed a formal procedure to elaborate a design pattern hybrid automaton into a detailed design hybrid automaton. Elaborate
35 Validity of elaboration Theorem 2: If detailed design hybrid automata are respectively derived by elaborating corresponding design pattern hybrid automata, then PTE safety is guaranteed despite of arbitrary communications link failures.
36 Laser Tracheotomy Medical CPS: interconnect/interlock smart medical devices to increase safety Laser Tracheotomy without Device Interlock
37 Laser Tracheotomy Medical CPS: interconnect/interlock smart medical devices to increase safety Laser Tracheotomy CPS
38 Demand to use wireless links for safety and efficiency concerns. Laser Tracheotomy CPS wireless links
39 Demand to use wireless links for safety and efficiency concerns.
40 Demand to use wireless links for safety and efficiency concerns. Laser Tracheotomy CPS wireless links
41 Laser Tracheotomy CPS PTE safety rule. 3sec 60sec 1.5sec
42 System architecture and roles of the design pattern: Initiator, Supervisor, Participant
43 System architecture and roles of the design pattern: Initiator, Supervisor, Participant
44 System architecture and roles of the design pattern: Initiator, Supervisor, Participant
45 System architecture and roles of the design pattern: Initiator, Supervisor, Participant
46 Following the Leasing design pattern and Elaboration procedure, we derive detailed designs
47 Emulation Scheme
48 Emulation Results
49 Related Work Leasing Protocol [7,8,9,10,11,12][24] check-point & roll-back logical time vs. real-time PTE uncontrollable physical world parameters
50 Related Work Use of formal modeling in design pattern [30~33]. Hybrid modeling mostly used for verification [3],[13~16]. Tichakorn [34] proposes use a subclass of hybrid automata for designing periodical hybrid control systems.
51 Conclusion 1. Proposed a Lease based design pattern to guarantee PTE safety rules in wireless CPS, under arbitrary communication link failures. 2. Derived the corresponding closed-form linear constraints for temporal configuration parameters. 3. Formal description of design pattern with hybrid modeling. 4. Proposed a formal methodology to elaborate design pattern hybrid automata to detailed design hybrid automata, while maintaining PTE safety properties.
52 Thank you! Life/Mission critical CPS demand wireless Conflict Design Pattern Hybrid Modeling PTE Safety Guarantee Wireless is unreliable
53 Cyber Physical Systems (CPS): systems involving tight/complex coupling of computer and physical subsystems Surgical Medicine Anesthesiology Nursing Computer Communications Mechanics Control
54 Cyber Physical Systems (CPS): systems involving tight/complex coupling of computer and physical subsystems Chemical Engineering Control Mechanics Computer Thermal Engineering Communications
55 Cyber Physical Systems (CPS): systems involving tight/complex coupling of computer and physical subsystems Computer Mechanics Aerodynamics Communications Control Material
56 Demand to use wireless links for safety and efficiency concerns. The Operation Room Spider Web
57 Demand to use wireless links for safety and efficiency concerns. The Operation Room Spider Web, after medical CPS safety interlocks
58 Demand to use wireless links for safety and efficiency concerns. Spider Web OR vs. Wireless OR
59 How to guarantee PTE safety despite of arbitrary wireless link failures? Leasing Design Pattern Hybrid Automata Modeling: formally describe, analyze, and use the design pattern
60 General concept of Leasing Design Pattern for CPS PTE guarantee Supervisor Initiator Participant Participant
61 General concept of Leasing Design Pattern for CPS PTE guarantee Fallback Supervisor Fallback Fallback Participant Fallback Participant Initiator
62 General concept of Leasing Design Pattern for CPS PTE guarantee Fallback Supervisor Request Fallback Participant Fallback Participant Initiator
63 General concept of Leasing Design Pattern for CPS PTE guarantee Supervisor Lease Request Fallback Participant Fallback Participant Initiator
64 General concept of Leasing Design Pattern for CPS PTE guarantee Supervisor Lease Request Fallback Initiator Participant Participant
65 General concept of Leasing Design Pattern for CPS PTE guarantee Lease Lease Supervisor Request Fallback Initiator Participant Participant
66 General concept of Leasing Design Pattern for CPS PTE guarantee Lease Lease Supervisor Request Initiator Participant Participant
67 General concept of Leasing Design Pattern for CPS PTE guarantee Lease Lease Supervisor Approve Request Initiator Participant Participant
68 General concept of Leasing Design Pattern for CPS PTE guarantee active Initiator fallback active Participant fallback active Participant fallback
69 The same scenario can also apply to purely cyber systems. What's the difference that CPS makes? active Initiator fallback active Participant fallback active Participant fallback
70 CPS Features: 1. real-time matters; 2. real-time PTE even when aborting/canceling. (+ 3. arbitrary comm. failures) active Initiator fallback active Participant fallback active Participant fallback
71 Leasing Design Pattern for PTE Safety Rules: sketch of Supervisor's hybrid automaton
72 Leasing Design Pattern for PTE Safety Rules: sketch of Initiator's hybrid automaton
73 Leasing Design Pattern for PTE Safety Rules: sketch of Participant's hybrid automaton
74 Emulation Scheme ) 1.5( ), 3( PTE safeguard intervals: ) 6( ), 35( ), 3( Ventilator : ) 1.5( ), 20( ), 10( ), 5( : Initiator ) 3( ), 13( : Supervisor min 1 :2 min 2 :1,1 max,1 max,1,2 max,2 max,2 max,2 max min,0 s T s T s T s T s T s T s T s T s T s T s T safe risky exit run enter exit run enter req wait fb
75 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient
76 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient
77 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient
78 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
79 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
80 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Shooting Patient
81 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
82 Example Scenario Supervisor lost Surgeon SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
83 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
84 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient
85 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient
86 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient
87 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
88 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
89 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Shooting Patient
90 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
91 Example Scenario Supervisor lost Surgeon SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
92 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
93 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient
94 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient
Building Dependable Distributed Medical Device Plug-and-Play Environments
Building Dependable Distributed Medical Device Plug-and-Play Environments Qixin Wang Dept. of Computing The Hong Kong Polytechnic University July 18, 2012 Contents Demand Modeling and Verification Dependable
More informationA Modal Specification Approach for Assuring the Safety of On-Demand Medical Cyber-Physical Systems
A Modal Specification Approach for Assuring the Safety of On-Demand Medical Cyber-Physical Systems Lu Feng PRECISE Center Department of Computer and Information Science University of Pennsylvania lufeng@cis.upenn.edu
More informationThis project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No
This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No 643921. TOOLS INTEGRATION UnCoVerCPS toolchain Goran Frehse, UGA Xavier
More informationAutomatic synthesis of switching controllers for linear hybrid systems: Reachability control
Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Massimo Benerecetti and Marco Faella Università di Napoli Federico II, Italy Abstract. We consider the problem
More informationSupervisory Control Synthesis the Focus in Model-Based Systems Engineering
Supervisory Control Synthesis the Focus in Model-Based Systems Engineering Jos Baeten and Asia van de Mortel-Fronczak Systems Engineering Group Department of Mechanical Engineering November 23, 2011 What
More informationNational Strategies. Key Domain Primary Direction
An Overview of PQC Research Activities and Standardization Concerns in China 4 th ETSI Quantum-Safe Cryptography Workshop Toronto, Canada. Sept. 19-21 2016 Hong Xiang, Tao Xiang Chongqing University Zhen-feng
More informationHybrid Systems Analysis of Periodic Control Systems using Continuization
Hybrid Systems Analysis of Periodic Control Systems using Continuization Stanley Bak Air Force Research Lab Information Directorate June 2015 DISTRIBUTION A. Approved for public release; Distribution unlimited.
More informationCurbing Aggregate Member Flow Burstiness to Bound End-to-End Delay in Networks of TDMA Crossbar Real-Time Switches
Curbing Aggregate Member Flow Burstiness to Bound End-to-End Delay in Networks of TDMA Crossbar Real-Time Switches Qixin Wang *, Yufei Wang *, Rong Zheng,*, Xue Liu * Dept. of Computing, the Hong Kong
More informationSystem Design and Methodology/ Embedded Systems Design (Modeling and Design of Embedded Systems)
Design&Methodologies Fö 1&2-1 Design&Methodologies Fö 1&2-2 Course Information Design and Methodology/ Embedded s Design (Modeling and Design of Embedded s) TDTS07/TDDI08 Web page: http://www.ida.liu.se/~tdts07
More informationA Brief Introduction to CFINS
A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students
More informationVerified Switched Control System Design using Real- Time Hybrid Systems Reachability
Verified Switched Control System Design using Real- Time Hybrid Systems Reachability Stanley Bak, Taylor Johnson, Marco Caccamo, Lui Sha Air Force Research Lab Information Directorate Rome, NY 1 Cyber-Physical
More informationCourse Introduction to Matlab and Simulink - Stateflow
Course Introduction to Matlab and Simulink - Stateflow Emanuele Ruffaldi June 08, 2017 http://www.eruffaldi.com/wp/introduction-to-matlab-and-simulink/ Scuola Superiore Sant Anna, Pisa Event-driven Systems
More informationAreas related to SW verif. Trends in Software Validation. Your Expertise. Research Trends High level. Research Trends - Ex 2. Research Trends Ex 1
Areas related to SW verif. Trends in Software Validation Abhik Roychoudhury CS 6214 Formal Methods Model based techniques Proof construction techniques Program Analysis Static Analysis Abstract Interpretation
More informationA Multi-Modal Composability Framework for Cyber-Physical Systems
S5 Symposium June 12, 2012 A Multi-Modal Composability Framework for Cyber-Physical Systems Linh Thi Xuan Phan Insup Lee PRECISE Center University of Pennsylvania Avionics, Automotive Medical Devices Cyber-physical
More informationVHDL framework for modeling fuzzy automata
Doru Todinca Daniel Butoianu Department of Computers Politehnica University of Timisoara SYNASC 2012 Outline Motivation 1 Motivation Why fuzzy automata? Why a framework for modeling FA? Why VHDL? 2 Fuzzy
More informationApplying CORBA to embedded time-triggered real-time systems. S. Aslam-Mir (Sam) Principal CORBA Architect Vertel USA
Applying CORBA to embedded time-triggered real-time systems S. Aslam-Mir (Sam) Principal CORBA Architect Vertel USA sam@vertel.com Synopsis! Motivation Time Triggered vs Event Triggered! Real-time CORBA
More informationXuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata
BACH: Path-oriented Reachability Checker of Linear Hybrid Automata Xuandong Li Department of Computer Science and Technology, Nanjing University, P.R.China Outline Preliminary Knowledge Path-oriented Reachability
More informationStatistical Model Checking in UPPAAL
Statistical Model Checking in UPPAAL Alexandre David, Kim G. Larsen, Marius Mikucionis Axel Legay, Wang Zheng, Peter Bulychev, Jonas van Vliet, Danny Poulsen, Dehui Du, Guangyuan Li CAV 11, PDMC 11,FORMATS
More informationMin-Cost Multicast Networks in Euclidean Space
Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue 1 Zongpeng Li 23 1 Fudan University Shanghai, China 2 University of Calgary Alberta, Canada 3 Institute of Network Coding, Chinese University of Hong Kong,
More informationMiddleware. Table of content 10/13/2015. Introduction. HL7 vs. Cerner Connectivity Engine. ibus (Cerner Middleware) SI Manager User Interface
Middleware Grete Gartz BM6068 Oct-2015 Table of content Introduction HL7 vs. Cerner Connectivity Engine SI Manager User Interface 1 Table of content Introduction HL7 vs. Cerner Connectivity Engine BUS
More informationCurriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.)
Curriculum (Structure) for M. Tech. Computer Science and Information Technology With Effect From Academic Year 2018-2019 (F. Y. M. Tech.) 2019-2020 (S. Y. M. Tech.) Teaching and Evaluation Scheme First
More informationReducing the Costs of Large-Scale BFT Replication
Reducing the Costs of Large-Scale BFT Replication Marco Serafini & Neeraj Suri TU Darmstadt, Germany Neeraj Suri EU-NSF ICT March 2006 Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de
More informationOn Line Service Composition in the Integrated Clinical Environment for ehealth and Medical Systems
sensors Article On Line Service Composition in the Integrated Clinical Environment for ehealth and Medical Systems Marisol García-Valls * and Imad Eddine Touahria Department of Telematics Engineering,
More informationEvaluating the IEEE GHz WBAN Proposal on Medical Multi-Parameter Monitoring under WiFi/Bluetooth Interference
Evaluating the IEEE 802.15.6 2.4GHz WBAN Proposal on Medical Multi-Parameter Monitoring under WiFi/Bluetooth Interference Yufei Wang, Qixin Wang {csyufewang, csqwang}@comp.polyu.edu.hk Department of Computing
More informationAn Introduction to Cyber-Physical Systems. Qixin Wang Department of Computing The Hong Kong Polytechnic University 2011
An Introduction to Cyber-Physical Systems Qixin Wang Department of Computing The Hong Kong Polytechnic University 2011 Content What is CPS? Applications Design Pattern / Methodology Modeling and Verification
More informationEnd-to-end Real-time Guarantees in Wireless Cyber-physical Systems
End-to-end Real-time Guarantees in Wireless Cyber-physical Systems Romain Jacob Marco Zimmerling Pengcheng Huang Jan Beutel Lothar Thiele RTSS 16 - IoT and Networking Session December 1, 2016 Predictability
More informationLecture 9: Reachability
Lecture 9: Reachability Outline of Lecture Reachability General Transition Systems Algorithms for Reachability Safety through Reachability Backward Reachability Algorithm Given hybrid automaton H : set
More informationWhat are Embedded Systems? Lecture 1 Introduction to Embedded Systems & Software
What are Embedded Systems? 1 Lecture 1 Introduction to Embedded Systems & Software Roopa Rangaswami October 9, 2002 Embedded systems are computer systems that monitor, respond to, or control an external
More informationStatistical Model Checking in UPPAAL
Statistical Model Checking in UPPAAL Alexandre David, Kim G. Larsen, Axel Legay, Marius Mikucionis Wang Zheng, Peter Bulychev, Jonas van Vliet, Danny Poulsen, Dehui Du, Guangyuan Li CAV 11, PDMC 11,FORMATS
More informationSymbolic and Statistical Model Checking in UPPAAL
Symbolic and Statistical Model Checking in UPPAAL Alexandre David Kim G. Larsen Marius Mikucionis, Peter Bulychev, Axel Legay, Dehui Du, Guangyuan Li, Danny B. Poulsen, Amélie Stainer, Zheng Wang CAV11,
More informationTowards Lab Based MOOCs: Embedded Systems, Robotics, and Beyond
Towards Lab Based MOOCs: Embedded Systems, Robotics, and Beyond Sanjit A. Seshia UC Berkeley Joint work with: Edward A. Lee, Jeff. C. Jensen, Alexandre Donzé, Garvit Juniwal, Andy Chang UC Berkeley & NI
More informationCritical Analysis of Computer Science Methodology: Theory
Critical Analysis of Computer Science Methodology: Theory Björn Lisper Dept. of Computer Science and Engineering Mälardalen University bjorn.lisper@mdh.se http://www.idt.mdh.se/ blr/ March 3, 2004 Critical
More informationState Identification In The Hybrid Automata Description Of Dynamical Systems
State Identification In The Hybrid Automata Description Of Dynamical Systems ISABELLA KOTINI, GEORGE HASSAPIS Dept. of Electrical and Computer Engineering Aristotle University of Thessaloniki 54006, Thessaloniki
More informationTowards an Integrated System Model for Testing and Verification
Towards an Integrated System Model for Testing and Verification Benjamin Hummel and Peter Braun MiSE 2008 Domain Development of controller software for production machines Special case of mechatronic system
More informationEmbedded Software Engineering
Embedded Software Engineering 3 Unit Course, Spring 2002 EECS Department, UC Berkeley Christoph Kirsch www.eecs.berkeley.edu/~fresco/giotto/course-2002 It s significant $4 billion development effort >
More informationSecurity Analysis of Emerging Remote Obstetrics Monitoring Systems
Security Analysis of Emerging Remote Obstetrics Monitoring Systems C. C. Tan*, L. Bai^, D. S. Mastrogiannis, J. Wu* *Dept. of Computer and Information Sciences, Temple University ^ Dept. of Electrical
More informationCopyright 2012 Pulse Systems, Inc. Page 1 of 14
Setting the viewer allows users to set their personal preferences and helps prevent appointment booking oversights, such as double-booking a resource or scheduling a patient appointment at an incorrect
More informationA Modeling Framework for Schedulability Analysis of Distributed Avionics Systems. Pujie Han MARS/VPT Thessaloniki, 20 April 2018
A Modeling Framework for Schedulability Analysis of Distributed Avionics Systems Pujie Han MARS/VPT Thessaloniki, 20 April 2018 Index Background Approach Modeling Case study Index Background Approach Modeling
More informationClearguard ACM 100 axle counting system. Smart track vacancy detection for cost-effective rail services. siemens.com / mobility
Clearguard ACM 100 axle counting system Smart track vacancy detection for cost-effective rail services siemens.com / mobility The launch of smart track vacancy detection The Clearguard ACM 100 axle counting
More informationFOX DIODE LASER. Power Calibration at Fiber Distal Tip Green Aiming Beam Video Touch Screen Intuitive Handling Rapid Amortization
The world s first diode laser with laser output calibration 810 nm 940 nm 980 nm 1064 nm DIODE LASER Power Calibration at Fiber Distal Tip Green Aiming Beam Video Touch Screen Intuitive Handling Rapid
More informationProcess Safety Management Training
IHS OPERATIONAL EXCELLENCE & RISK MANAGEMENT Process Safety Management Training Leverage state-of-the-art resources and practical knowhow to learn about proven management system concepts and techniques.
More informationSensor-aided Milling with a Surgical Robot System
1 Sensor-aided Milling with a Surgical Robot System Dirk Engel, Joerg Raczkowsky, Heinz Woern Institute for Process Control and Robotics (IPR), Universität Karlsruhe (TH) Engler-Bunte-Ring 8, 76131 Karlsruhe
More informationAN1432 APPLICATION NOTE
AN1432 APPLICATION NOTE Write Protection and Code Storage on the M25Pxx Serial Flash Memory Family Protection is one of the key features of a code storage memory. After all, the corruption of a single
More informationPromela and SPIN. Mads Dam Dept. Microelectronics and Information Technology Royal Institute of Technology, KTH. Promela and SPIN
Promela and SPIN Mads Dam Dept. Microelectronics and Information Technology Royal Institute of Technology, KTH Promela and SPIN Promela (Protocol Meta Language): Language for modelling discrete, event-driven
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationModel Checking. Automatic Verification Model Checking. Process A Process B. when not possible (not AI).
Sérgio Campos scampos@dcc.ufmg.br Why? Imagine the implementation of a complex hardware or software system: A 100K gate ASIC perhaps 100 concurrent modules; A flight control system dozens of concurrent
More informationInterfaces Module Exploration Systems Engineering, version 1.0
nterfaces Module Exploration Systems Engineering, version 1.0 Exploration Systems Engineering: nterfaces Module Module Purpose: nterfaces Define interfaces, how they are described and why it is important
More informationFast and Accurate Source-Level Simulation Considering Target-Specific Compiler Optimizations
FZI Forschungszentrum Informatik at the University of Karlsruhe Fast and Accurate Source-Level Simulation Considering Target-Specific Compiler Optimizations Oliver Bringmann 1 RESEARCH ON YOUR BEHALF Outline
More informationOptimized Positioning of Autonomous Surgical Lamps
Optimized Positioning of Autonomous Surgical Lamps Jörn Teuber 1, Rene Weller 1, Ron Kikinis 1, Karl-Jürgen Oldhafer 2, Michael J. Lipp 2, and Gabriel Zachmann 1 1 University of Bremen, Bremen, Germany
More informationSAFETY INSTRUMENTED SYSTEM (SIS) FOR PROCESS OPERATION BASED ON REAL- TIME MONITORING. by Cen Kelvin Nan
SAFETY INSTRUMENTED SYSTEM (SIS) FOR PROCESS OPERATION BASED ON REAL- TIME MONITORING by Cen Kelvin Nan Background Research Contributions Proposed Methodology Case Study Conclusions Future Works Acknowledgements
More informationLecture 2. Decidability and Verification
Lecture 2. Decidability and Verification model temporal property Model Checker yes error-trace Advantages Automated formal verification, Effective debugging tool Moderate industrial success In-house groups:
More informationOptimizing Translation Information Management in NAND Flash Memory Storage Systems
Optimizing Translation Information Management in NAND Flash Memory Storage Systems Qi Zhang 1, Xuandong Li 1, Linzhang Wang 1, Tian Zhang 1 Yi Wang 2 and Zili Shao 2 1 State Key Laboratory for Novel Software
More informationModeling and Analysis of Fischer s Algorithm
Processes and Data, Department of Computer Science, Swansea University Vino - July 2011 Today s Talk 1. Mutual Exclusion Algorithms (recap) 2. Fischer s Algorithm 3. Modeling Fischer s Algorithm 4. Analysis
More informationApplications of Program analysis in Model-Based Design
Applications of Program analysis in Model-Based Design Prahlad Sampath (Prahlad.Sampath@mathworks.com) 2018 by The MathWorks, Inc., MATLAB, Simulink, Stateflow, are registered trademarks of The MathWorks,
More informationSoftware Architecture. Lecture 4
Software Architecture Lecture 4 Last time We discussed tactics to achieve architecture qualities We briefly surveyed architectural styles 23-Jan-08 http://www.users.abo.fi/lpetre/sa08/ 2 Today We check
More informationMarch Santa Clara, CA Trends, Business & Career Opportunities in Wireless Sensors
Trends, Business & Career Opportunities in Wireless Sensors Harry Zervos / h.zervos@idtechex.com IDTechEx / www.idtechex.com Overview of IDTechEx services IDTechEx is an independent market research firm
More informationAssessing the Security of Internet Connected Critical Infrastructures
Assessing the Security of Internet Connected Critical Infrastructures The Comifin Project Approach H. Ghani, A. Khelil, N. Suri, G. Csertán, L. Gönczy, G. Urbanics, J. Clarke Dept of Computer Science,
More informationSimulation of Petri Nets in Rule-Based Expert System Shell McESE
Abstract Simulation of Petri Nets in Rule-Based Expert System Shell McESE F. Franek and I. Bruha Dept of Computer Science and Systems, McMaster University Hamilton, Ont., Canada, L8S4K1 Email: {franya
More informationTHE BEST WAY TO OPERATE
THE BEST WAY TO OPERATE TABLE OF CONTENTS 01 ABOUT US MULTIMEDIAMEDICAL is a multimedia centre 02 03 VIDEOSURGERY MULTIMEDIAMEDICAL offers highly specialized recording of surgery TRAINING Multimedia platform
More informationECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling
ECE 587 Hardware/Software Co-Design Spring 2018 1/20 ECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling Professor Jia Wang Department of Electrical and Computer Engineering
More informationImproved BDD-based Discrete Analysis of Timed Systems
Improved BDD-based Discrete Analysis of Timed Systems Truong Khanh Nguyen 1, Jun Sun 2, Yang Liu 1, Jin Song Dong 1 and Yan Liu 1 1 School of Computing National University of Singapore 2 Information System
More informationDistribution Middleware Technologies for Cyber Physical Systems Remote Engineering & Virtual Instrumentation
Distribution Middleware Technologies for Cyber Physical Systems Remote Engineering & Virtual Instrumentation 4-6 July 2012 REV 2012 Bilbao (Spain) Isidro Calvo Isidro.calvo@ehu.es Dept. of Automatic Control
More informationModeling and Verification of RBC Handover Protocol
Available online at www.sciencedirect.com Electronic Notes in Theoretical Computer Science 309 (2014) 51 62 www.elsevier.com/locate/entcs Modeling and Verification of RBC Handover Protocol Kai Yang 1,2
More informationFoundation of Contract for Things
Foundation of Contract for Things C.Sofronis, O.Ferrante, A.Ferrari, L.Mangeruca ALES S.r.l. Rome The Internet of System Engineering INCOSE-IL Seminar, Herzliya, Israel 15 September, 2011 Software Platform
More informationModelling and verification of cyber-physical system
Modelling and verification of cyber-physical system Michal Pluska, David Sinclair LERO @ DCU Dublin City University School of Computing Dublin 9, Ireland michal.pluska@computing.dcu.ie Abstract * Embedded
More informationQuantitative Verification and Synthesis of Systems
Quantitative Verification and Synthesis of Systems Sanjit A. Seshia Assistant Professor EECS, UC Berkeley Software-at-Scale Workshop August 2010 Quantitative Analysis / Verification Does the brake-by-wire
More informationCAN In A Day 2L01I. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved.
CAN In A Day 2L01I Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive & Industrial,
More informationMicropolis Interdependency Modeling using Open Hybrid Automata
Micropolis Interdependency Modeling using Open Hybrid Automata Constantinos Heracleous KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University
More informationBACH 2 : Bounded ReachAbility CHecker for Compositional Linear Hybrid Systems
: Bounded ReachAbility CHecker for Compositional Linear Hybrid Systems Lei Bu, You Li, Linzhang Wang, Xin Chen, and Xuandong Li State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing,
More informationA FILTERING TECHNIQUE FOR FRAGMENT ASSEMBLY- BASED PROTEINS LOOP MODELING WITH CONSTRAINTS
A FILTERING TECHNIQUE FOR FRAGMENT ASSEMBLY- BASED PROTEINS LOOP MODELING WITH CONSTRAINTS F. Campeotto 1,2 A. Dal Palù 3 A. Dovier 2 F. Fioretto 1 E. Pontelli 1 1. Dept. Computer Science, NMSU 2. Dept.
More informationBounded Model Checking with Parametric Data Structures
Bounded Model Checking with Marc Herbstritt (joint work with Erika Ábrahám, Bernd Becker, Martin Steffen) www.avacs.org August 15 2006 4th International Workshop on Bounded Model Checking Context Automated
More informationMC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety
RTSS 2018 MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang Dept. of Electrical and Computer Engineering
More informationSurgiNet Booking an Elective Surgery
SurgiNet Booking an Elective Surgery It is recommended you have set up your default Scheduling settings to your individual account for full functionality before booking a surgery. You will only need to
More informationKinematic Model Analysis of an 8-DOF Photographic Robot
Kinematic Model Analysis of an 8-DOF Photographic Robot Xiaowei Xie, Xingang Miao, Su Wang and Feng Zhang Abstract The photographic robot studied in this chapter is an 8-DOF PRRPR-S type. In order to obtain
More informationApproved Training Providers Programs
2014-2015 Approved Training Providers Programs PROGRAM DEGREE TRAINING PROVIDER LOCATION COST A+ Certification Diploma New Horizons Computer Learning Center Orlando $ 3,945.00 A+, Network+, CCNA Diploma
More informationQiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle.
2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 Research on Tunnel Support Deformation Based on Camera and Digital Speckle Improvement
More informationHardware Software Co-Design and Testing Using Simulink Real-Time Paul Berry and Brian Steenson
Hardware Software Co-Design and Testing Using Simulink Real-Time Paul Berry and Brian Steenson www.thalesgroup.com Overview Process Development Introduction to THALES Overview of design process Development
More informationMain components USB charging controller with integrated power switch
DN0019 Design note Smart dual-port USB charger with STCC2540 Designs from our labs describe tested circuit designs from ST labs which provide optimized solutions for specific applications. For more information
More informationException Handling in S88 using Grafchart *
Presented at the World Batch Forum North American Conference Woodcliff Lake, NJ April 7-10, 2002 107 S. Southgate Drive Chandler, Arizona 85226-3222 480-893-8803 Fax 480-893-7775 E-mail: info@wbf.org www.wbf.org
More informationThe interns will be assigned to assist our R&D / IT professionals in the following exciting enabling technology projects.
The interns will be assigned to assist our R&D / IT professionals in the following exciting enabling technology projects. A. Software Engineering Developing software utilities for automation equipment;
More informationKinetic Bounding Volume Hierarchies for Deformable Objects
Kinetic Bounding Volume Hierarchies for Deformable Objects René Weller Clausthal University of Technology, Germany weller@in.tu-clausthal.de VRCIA 06, June 2006, Hong Kong Motivation Bounding volume hierarchies
More informationPTIDES: A Discrete-Event-Based Programming Model for Distributed Embedded Systems
PTIDES: A Discrete-Event-Based Programming Model for Distributed Embedded Systems John C. Eidson Edward A. Lee Slobodan Matic Sanjit A. Seshia Jia Zou UC Berkeley Tutorial on Modeling and Analyzing Real-Time
More informationEnergy efficient real-time computing for extremely large telescopes with GPU
Energy efficient real-time computing for extremely large telescopes with GPU Florian Ferreira & Damien Gratadour Observatoire de Paris & Université Paris Diderot 1 Project #671662 funded by European Commission
More informationMaster of Technology (Integrated)/ Bachelor of Technology
SCHEME OF EXAMINATION for Master of Technology (Integrated)/ Bachelor of Technology ( Science and Engineering) 5 YEAR/4 YEAR COURSE (For Batch 217-221/222) Sri Guru Granth Sahib World University, Fatehgarh
More informationReal-Time Component Software. slide credits: H. Kopetz, P. Puschner
Real-Time Component Software slide credits: H. Kopetz, P. Puschner Overview OS services Task Structure Task Interaction Input/Output Error Detection 2 Operating System and Middleware Application Software
More informationModel-Based Design of Connected and Autonomous Vehicles
Model-Based Design of Connected and Autonomous Vehicles Akshay Rajhans, PhD Senior Research Scientist Advanced Research and Technology Office MathWorks https://arajhans.github.io 2 nd IEEE Summer School
More informationProperty-based design with HORUS / SYNTHORUS
Property-based design with HORUS / SYNTHORUS Dominique Borrione, Negin Javaheri, Katell Morin-Allory, Yann Oddos, Alexandre Porcher Radboud University, Nijmegen 1 March 27, 2013 Functional specifications
More informationProc. XVIII Conf. Latinoamericana de Informatica, PANEL'92, pages , August Timed automata have been proposed in [1, 8] to model nite-s
Proc. XVIII Conf. Latinoamericana de Informatica, PANEL'92, pages 1243 1250, August 1992 1 Compiling Timed Algebras into Timed Automata Sergio Yovine VERIMAG Centre Equation, 2 Ave de Vignate, 38610 Gieres,
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 61131-5 First edition 2000-11 Programmable controllers Part 5: Communications Automates programmables Partie 5: Communications IEC 2000 Copyright - all rights reserved No part
More informationDistributed Systems Programming (F21DS1) Formal Verification
Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on
More informationCurriculum Vitae. WANG Qixin July 12, Phone:
General Information Curriculum Vitae WANG Qixin July 12, 2018 Name: WANG Qixin Email: csqwang@comp.polyu.edu.hk Phone: +852-27667266 Position: Homepage: Associate Professor, Department of Computing, The
More informationContext-Aware WSNs for Energy-Efficient Buildings
Context-Aware WSNs for Energy-Efficient Buildings Mohamed Bakhouya International University of Rabat Morocco The US/Morocco Workshop on Sensors and Wireless Networks for Smart Cities January 5-7 2016,
More informationCS244-Introduction to Embedded Systems and Ubiquitous Computing. Instructor: Eli Bozorgzadeh Computer Science Department UC Irvine Winter 2010
CS244-Introduction to Embedded Systems and Ubiquitous Computing Instructor: Eli Bozorgzadeh Computer Science Department UC Irvine Winter 2010 CS244 Lecture 2 Embedded Applications Winter 2010- CS 244 2
More informationD R A F T ICD 1.8/4.4. Target Acquisition System to Telescope Control System. Bret Goodrich, Eric Hansen. Version: Draft A2. Issued By: Software Group
ICD 1.8/4.4 Target Acquisition System to Telescope Control System Version: Draft A2 Issued By: Software Group Date: 25 June 2013 Bret Goodrich, Eric Hansen Revision Control 1. Revision Version Draft1 Date:
More informationOptimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game
2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei
More informationThe PCA Interlock App in AADL!
The PCA Interlock App in AADL! http://cis.ksu.edu/~samprocter Sam Procter, John Hatcliff, Stephen Barret, and Robby SAnToS Lab Kansas State University Support: This work is supported in part by the US
More informationCyber Physical Systems
Distribution Middleware Technologies for Cyber Physical Systems Encuentro UPV/EHU U CIC CCEnergigune eggu e 12 May 2014 Vitoria-Gasteiz Isidro Calvo Ismael Etxeberria Adrián Noguero Isidro.calvo@ehu.es
More informationDr. Ing. Cornelia Zahlten. Prof. Dr. Jan Peleska. Concepts and Implementation. Hard Real-Time Test Tools
Hard Real-Time Test Tools Concepts and Implementation Prof. Dr. Jan Peleska Centre for Computing Technologies, University of Bremen, Germany Dr. Ing. Cornelia Zahlten Verified Systems International GmbH,
More informationA Goal-Oriented Interface to Consumer Electronics Using Planning and Commonsense Reasoning. Henry Lieberman and Jose Espinosa, MIT Media Lab, IUI 2005
A Goal-Oriented Interface to Consumer Electronics Using Planning and Commonsense Reasoning Henry Lieberman and Jose Espinosa, MIT Media Lab, IUI 2005 Presented by: Charles Rich January 30, 2008 CS 525U
More informationFormal Modeling and Analysis of Stream Processing Systems
Formal Modeling and Analysis of Stream Processing Systems Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 High performance Highly optimized requirements systems
More information