Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach

Size: px
Start display at page:

Download "Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach"

Transcription

1 Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach Feng Tan *, Yufei Wang *, Qixin Wang *, Lei Bu, Rong Zheng, Neeraj Suri ** * Embedded Systems & Networking Lab, Dept. of Computing, The Hong Kong Polytechnic Univ. State Key Lab for Novel Software Tech., Dept. of Computer Sci. & Tech., Nanjing Univ., China Dept. of Computing and Software, McMaster Univ., Canada ** Dept. of Computer Science, TU Darmstadt, Germany June 26, 2013

2 Overview Related Work Demand Problem Evaluation Solution Background

3 Cyber-Physical Systems (CPS) are typically distributed and life/mission critical. Life/Mission critical CPS demand wireless Conflict Wireless is unreliable

4 Cyber-Physical Systems (CPS) are typically distributed and life/mission critical. Life/Mission critical CPS demand wireless Conflict PTE Safety Guarantee Wireless is unreliable

5 Cyber-Physical Systems (CPS) are typically distributed and life/mission critical. Life/Mission critical CPS demand wireless Conflict Design Pattern Hybrid Modeling PTE Safety Guarantee Wireless is unreliable

6 Cyber Physical Systems (CPS): systems involving tight/complex coupling of computer and physical subsystems Avionics Manufacturing Medical

7 CPS Features Typically distributed and life/mission-critical Real-time (in addition to logical time) matters Modeling must integrate both discrete and continuous aspects

8 Distributed life/mission critical CPS demand wireless communications.

9 Distributed life/mission critical CPS demand wireless communications.

10 Distributed life/mission critical CPS demand wireless communications.

11 Distributed life/mission critical CPS demand wireless communications. Wireless is unreliable

12 How to guarantee the safety of life/mission critical wireless CPS? Life/Mission critical CPS demand wireless Conflict Wireless is unreliable

13 How to guarantee the Proper-Temporal-Embedding (PTE) safety rule of life/mission critical wireless CPS? Life/Mission critical CPS demand wireless Conflict PTE Safety Guarantee Wireless is unreliable

14 What is Proper-Temporal-Embedding (PTE) safety rule?

15 CPS Feature 2: real-time (in addition to logical time) matters!

16 CPS Feature 2: real-time (in addition to logical time) matters! risky state dwelling time upper bound

17 CPS Feature 2: real-time (in addition to logical time) matters! enter-risky safeguard interval

18 CPS Feature 2: real-time (in addition to logical time) matters! exit-risky safeguard interval

19 How to guarantee PTE safety despite of arbitrary wireless link failures?

20 How to guarantee PTE safety despite of arbitrary wireless link failures? Leasing Design Pattern: risky state dwelling time must be leased.

21 General concepts of Leasing design pattern: each CPS entity takes one of the 3 roles. 3. approve 2. lease 2. lease Supervisor 1. request Initiator Participant Participant

22 CPS Features: 1. real-time matters; 2. real-time PTE even when aborting/canceling. (+ 3. arbitrary comm. failures) active Initiator fallback active Participant fallback active Participant fallback

23 How to formally describe, analyze, and use Leasing design pattern in the context of CPS?

24 How to formally describe, analyze, and use Leasing design pattern in the context of CPS? CPS Feature 3 implies the use of hybrid automata modeling

25 Hybrid Automaton is a state-of-the-art modeling tool for CPS. Bouncing Ball Example

26 Leasing Design Pattern for PTE Safety Rules: detailed Supervisor's hybrid automaton

27 Leasing Design Pattern for PTE Safety Rules: detailed Initiator's hybrid automaton

28 Leasing Design Pattern for PTE Safety Rules: detailed Participant's hybrid automaton

29 Leasing Design Pattern for PTE Safety Rules: detailed Participant's hybrid automaton

30 Leasing Design Pattern for PTE Safety Rules: detailed Participant's hybrid automaton

31 Validity of the design pattern Theorem 1: If the temporal parameters of the design pattern hybrid automata satisfy a certain set of linear inequalities, then PTE safety is guaranteed despite of arbitrary communications link failures.

32 Validity of the design pattern

33 Using the design pattern: how to turn design pattern into detailed CPS designs?

34 We proposed a formal procedure to elaborate a design pattern hybrid automaton into a detailed design hybrid automaton. Elaborate

35 Validity of elaboration Theorem 2: If detailed design hybrid automata are respectively derived by elaborating corresponding design pattern hybrid automata, then PTE safety is guaranteed despite of arbitrary communications link failures.

36 Laser Tracheotomy Medical CPS: interconnect/interlock smart medical devices to increase safety Laser Tracheotomy without Device Interlock

37 Laser Tracheotomy Medical CPS: interconnect/interlock smart medical devices to increase safety Laser Tracheotomy CPS

38 Demand to use wireless links for safety and efficiency concerns. Laser Tracheotomy CPS wireless links

39 Demand to use wireless links for safety and efficiency concerns.

40 Demand to use wireless links for safety and efficiency concerns. Laser Tracheotomy CPS wireless links

41 Laser Tracheotomy CPS PTE safety rule. 3sec 60sec 1.5sec

42 System architecture and roles of the design pattern: Initiator, Supervisor, Participant

43 System architecture and roles of the design pattern: Initiator, Supervisor, Participant

44 System architecture and roles of the design pattern: Initiator, Supervisor, Participant

45 System architecture and roles of the design pattern: Initiator, Supervisor, Participant

46 Following the Leasing design pattern and Elaboration procedure, we derive detailed designs

47 Emulation Scheme

48 Emulation Results

49 Related Work Leasing Protocol [7,8,9,10,11,12][24] check-point & roll-back logical time vs. real-time PTE uncontrollable physical world parameters

50 Related Work Use of formal modeling in design pattern [30~33]. Hybrid modeling mostly used for verification [3],[13~16]. Tichakorn [34] proposes use a subclass of hybrid automata for designing periodical hybrid control systems.

51 Conclusion 1. Proposed a Lease based design pattern to guarantee PTE safety rules in wireless CPS, under arbitrary communication link failures. 2. Derived the corresponding closed-form linear constraints for temporal configuration parameters. 3. Formal description of design pattern with hybrid modeling. 4. Proposed a formal methodology to elaborate design pattern hybrid automata to detailed design hybrid automata, while maintaining PTE safety properties.

52 Thank you! Life/Mission critical CPS demand wireless Conflict Design Pattern Hybrid Modeling PTE Safety Guarantee Wireless is unreliable

53 Cyber Physical Systems (CPS): systems involving tight/complex coupling of computer and physical subsystems Surgical Medicine Anesthesiology Nursing Computer Communications Mechanics Control

54 Cyber Physical Systems (CPS): systems involving tight/complex coupling of computer and physical subsystems Chemical Engineering Control Mechanics Computer Thermal Engineering Communications

55 Cyber Physical Systems (CPS): systems involving tight/complex coupling of computer and physical subsystems Computer Mechanics Aerodynamics Communications Control Material

56 Demand to use wireless links for safety and efficiency concerns. The Operation Room Spider Web

57 Demand to use wireless links for safety and efficiency concerns. The Operation Room Spider Web, after medical CPS safety interlocks

58 Demand to use wireless links for safety and efficiency concerns. Spider Web OR vs. Wireless OR

59 How to guarantee PTE safety despite of arbitrary wireless link failures? Leasing Design Pattern Hybrid Automata Modeling: formally describe, analyze, and use the design pattern

60 General concept of Leasing Design Pattern for CPS PTE guarantee Supervisor Initiator Participant Participant

61 General concept of Leasing Design Pattern for CPS PTE guarantee Fallback Supervisor Fallback Fallback Participant Fallback Participant Initiator

62 General concept of Leasing Design Pattern for CPS PTE guarantee Fallback Supervisor Request Fallback Participant Fallback Participant Initiator

63 General concept of Leasing Design Pattern for CPS PTE guarantee Supervisor Lease Request Fallback Participant Fallback Participant Initiator

64 General concept of Leasing Design Pattern for CPS PTE guarantee Supervisor Lease Request Fallback Initiator Participant Participant

65 General concept of Leasing Design Pattern for CPS PTE guarantee Lease Lease Supervisor Request Fallback Initiator Participant Participant

66 General concept of Leasing Design Pattern for CPS PTE guarantee Lease Lease Supervisor Request Initiator Participant Participant

67 General concept of Leasing Design Pattern for CPS PTE guarantee Lease Lease Supervisor Approve Request Initiator Participant Participant

68 General concept of Leasing Design Pattern for CPS PTE guarantee active Initiator fallback active Participant fallback active Participant fallback

69 The same scenario can also apply to purely cyber systems. What's the difference that CPS makes? active Initiator fallback active Participant fallback active Participant fallback

70 CPS Features: 1. real-time matters; 2. real-time PTE even when aborting/canceling. (+ 3. arbitrary comm. failures) active Initiator fallback active Participant fallback active Participant fallback

71 Leasing Design Pattern for PTE Safety Rules: sketch of Supervisor's hybrid automaton

72 Leasing Design Pattern for PTE Safety Rules: sketch of Initiator's hybrid automaton

73 Leasing Design Pattern for PTE Safety Rules: sketch of Participant's hybrid automaton

74 Emulation Scheme ) 1.5( ), 3( PTE safeguard intervals: ) 6( ), 35( ), 3( Ventilator : ) 1.5( ), 20( ), 10( ), 5( : Initiator ) 3( ), 13( : Supervisor min 1 :2 min 2 :1,1 max,1 max,1,2 max,2 max,2 max,2 max min,0 s T s T s T s T s T s T s T s T s T s T s T safe risky exit run enter exit run enter req wait fb

75 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient

76 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient

77 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient

78 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

79 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

80 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Shooting Patient

81 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

82 Example Scenario Supervisor lost Surgeon SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

83 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

84 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient

85 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient

86 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient

87 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

88 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

89 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Shooting Patient

90 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

91 Example Scenario Supervisor lost Surgeon SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

92 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

93 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Pausing Laser Scalpel Patient

94 Example Scenario Surgeon Supervisor SpO 2 Sensor Ventilator Laser Scalpel Patient

Building Dependable Distributed Medical Device Plug-and-Play Environments

Building Dependable Distributed Medical Device Plug-and-Play Environments Building Dependable Distributed Medical Device Plug-and-Play Environments Qixin Wang Dept. of Computing The Hong Kong Polytechnic University July 18, 2012 Contents Demand Modeling and Verification Dependable

More information

A Modal Specification Approach for Assuring the Safety of On-Demand Medical Cyber-Physical Systems

A Modal Specification Approach for Assuring the Safety of On-Demand Medical Cyber-Physical Systems A Modal Specification Approach for Assuring the Safety of On-Demand Medical Cyber-Physical Systems Lu Feng PRECISE Center Department of Computer and Information Science University of Pennsylvania lufeng@cis.upenn.edu

More information

This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No

This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No This project has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement No 643921. TOOLS INTEGRATION UnCoVerCPS toolchain Goran Frehse, UGA Xavier

More information

Automatic synthesis of switching controllers for linear hybrid systems: Reachability control

Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Massimo Benerecetti and Marco Faella Università di Napoli Federico II, Italy Abstract. We consider the problem

More information

Supervisory Control Synthesis the Focus in Model-Based Systems Engineering

Supervisory Control Synthesis the Focus in Model-Based Systems Engineering Supervisory Control Synthesis the Focus in Model-Based Systems Engineering Jos Baeten and Asia van de Mortel-Fronczak Systems Engineering Group Department of Mechanical Engineering November 23, 2011 What

More information

National Strategies. Key Domain Primary Direction

National Strategies.   Key Domain Primary Direction An Overview of PQC Research Activities and Standardization Concerns in China 4 th ETSI Quantum-Safe Cryptography Workshop Toronto, Canada. Sept. 19-21 2016 Hong Xiang, Tao Xiang Chongqing University Zhen-feng

More information

Hybrid Systems Analysis of Periodic Control Systems using Continuization

Hybrid Systems Analysis of Periodic Control Systems using Continuization Hybrid Systems Analysis of Periodic Control Systems using Continuization Stanley Bak Air Force Research Lab Information Directorate June 2015 DISTRIBUTION A. Approved for public release; Distribution unlimited.

More information

Curbing Aggregate Member Flow Burstiness to Bound End-to-End Delay in Networks of TDMA Crossbar Real-Time Switches

Curbing Aggregate Member Flow Burstiness to Bound End-to-End Delay in Networks of TDMA Crossbar Real-Time Switches Curbing Aggregate Member Flow Burstiness to Bound End-to-End Delay in Networks of TDMA Crossbar Real-Time Switches Qixin Wang *, Yufei Wang *, Rong Zheng,*, Xue Liu * Dept. of Computing, the Hong Kong

More information

System Design and Methodology/ Embedded Systems Design (Modeling and Design of Embedded Systems)

System Design and Methodology/ Embedded Systems Design (Modeling and Design of Embedded Systems) Design&Methodologies Fö 1&2-1 Design&Methodologies Fö 1&2-2 Course Information Design and Methodology/ Embedded s Design (Modeling and Design of Embedded s) TDTS07/TDDI08 Web page: http://www.ida.liu.se/~tdts07

More information

A Brief Introduction to CFINS

A Brief Introduction to CFINS A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students

More information

Verified Switched Control System Design using Real- Time Hybrid Systems Reachability

Verified Switched Control System Design using Real- Time Hybrid Systems Reachability Verified Switched Control System Design using Real- Time Hybrid Systems Reachability Stanley Bak, Taylor Johnson, Marco Caccamo, Lui Sha Air Force Research Lab Information Directorate Rome, NY 1 Cyber-Physical

More information

Course Introduction to Matlab and Simulink - Stateflow

Course Introduction to Matlab and Simulink - Stateflow Course Introduction to Matlab and Simulink - Stateflow Emanuele Ruffaldi June 08, 2017 http://www.eruffaldi.com/wp/introduction-to-matlab-and-simulink/ Scuola Superiore Sant Anna, Pisa Event-driven Systems

More information

Areas related to SW verif. Trends in Software Validation. Your Expertise. Research Trends High level. Research Trends - Ex 2. Research Trends Ex 1

Areas related to SW verif. Trends in Software Validation. Your Expertise. Research Trends High level. Research Trends - Ex 2. Research Trends Ex 1 Areas related to SW verif. Trends in Software Validation Abhik Roychoudhury CS 6214 Formal Methods Model based techniques Proof construction techniques Program Analysis Static Analysis Abstract Interpretation

More information

A Multi-Modal Composability Framework for Cyber-Physical Systems

A Multi-Modal Composability Framework for Cyber-Physical Systems S5 Symposium June 12, 2012 A Multi-Modal Composability Framework for Cyber-Physical Systems Linh Thi Xuan Phan Insup Lee PRECISE Center University of Pennsylvania Avionics, Automotive Medical Devices Cyber-physical

More information

VHDL framework for modeling fuzzy automata

VHDL framework for modeling fuzzy automata Doru Todinca Daniel Butoianu Department of Computers Politehnica University of Timisoara SYNASC 2012 Outline Motivation 1 Motivation Why fuzzy automata? Why a framework for modeling FA? Why VHDL? 2 Fuzzy

More information

Applying CORBA to embedded time-triggered real-time systems. S. Aslam-Mir (Sam) Principal CORBA Architect Vertel USA

Applying CORBA to embedded time-triggered real-time systems. S. Aslam-Mir (Sam) Principal CORBA Architect Vertel USA Applying CORBA to embedded time-triggered real-time systems S. Aslam-Mir (Sam) Principal CORBA Architect Vertel USA sam@vertel.com Synopsis! Motivation Time Triggered vs Event Triggered! Real-time CORBA

More information

Xuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata

Xuandong Li. BACH: Path-oriented Reachability Checker of Linear Hybrid Automata BACH: Path-oriented Reachability Checker of Linear Hybrid Automata Xuandong Li Department of Computer Science and Technology, Nanjing University, P.R.China Outline Preliminary Knowledge Path-oriented Reachability

More information

Statistical Model Checking in UPPAAL

Statistical Model Checking in UPPAAL Statistical Model Checking in UPPAAL Alexandre David, Kim G. Larsen, Marius Mikucionis Axel Legay, Wang Zheng, Peter Bulychev, Jonas van Vliet, Danny Poulsen, Dehui Du, Guangyuan Li CAV 11, PDMC 11,FORMATS

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue 1 Zongpeng Li 23 1 Fudan University Shanghai, China 2 University of Calgary Alberta, Canada 3 Institute of Network Coding, Chinese University of Hong Kong,

More information

Middleware. Table of content 10/13/2015. Introduction. HL7 vs. Cerner Connectivity Engine. ibus (Cerner Middleware) SI Manager User Interface

Middleware. Table of content 10/13/2015. Introduction. HL7 vs. Cerner Connectivity Engine. ibus (Cerner Middleware) SI Manager User Interface Middleware Grete Gartz BM6068 Oct-2015 Table of content Introduction HL7 vs. Cerner Connectivity Engine SI Manager User Interface 1 Table of content Introduction HL7 vs. Cerner Connectivity Engine BUS

More information

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.)

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.) Curriculum (Structure) for M. Tech. Computer Science and Information Technology With Effect From Academic Year 2018-2019 (F. Y. M. Tech.) 2019-2020 (S. Y. M. Tech.) Teaching and Evaluation Scheme First

More information

Reducing the Costs of Large-Scale BFT Replication

Reducing the Costs of Large-Scale BFT Replication Reducing the Costs of Large-Scale BFT Replication Marco Serafini & Neeraj Suri TU Darmstadt, Germany Neeraj Suri EU-NSF ICT March 2006 Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de

More information

On Line Service Composition in the Integrated Clinical Environment for ehealth and Medical Systems

On Line Service Composition in the Integrated Clinical Environment for ehealth and Medical Systems sensors Article On Line Service Composition in the Integrated Clinical Environment for ehealth and Medical Systems Marisol García-Valls * and Imad Eddine Touahria Department of Telematics Engineering,

More information

Evaluating the IEEE GHz WBAN Proposal on Medical Multi-Parameter Monitoring under WiFi/Bluetooth Interference

Evaluating the IEEE GHz WBAN Proposal on Medical Multi-Parameter Monitoring under WiFi/Bluetooth Interference Evaluating the IEEE 802.15.6 2.4GHz WBAN Proposal on Medical Multi-Parameter Monitoring under WiFi/Bluetooth Interference Yufei Wang, Qixin Wang {csyufewang, csqwang}@comp.polyu.edu.hk Department of Computing

More information

An Introduction to Cyber-Physical Systems. Qixin Wang Department of Computing The Hong Kong Polytechnic University 2011

An Introduction to Cyber-Physical Systems. Qixin Wang Department of Computing The Hong Kong Polytechnic University 2011 An Introduction to Cyber-Physical Systems Qixin Wang Department of Computing The Hong Kong Polytechnic University 2011 Content What is CPS? Applications Design Pattern / Methodology Modeling and Verification

More information

End-to-end Real-time Guarantees in Wireless Cyber-physical Systems

End-to-end Real-time Guarantees in Wireless Cyber-physical Systems End-to-end Real-time Guarantees in Wireless Cyber-physical Systems Romain Jacob Marco Zimmerling Pengcheng Huang Jan Beutel Lothar Thiele RTSS 16 - IoT and Networking Session December 1, 2016 Predictability

More information

Lecture 9: Reachability

Lecture 9: Reachability Lecture 9: Reachability Outline of Lecture Reachability General Transition Systems Algorithms for Reachability Safety through Reachability Backward Reachability Algorithm Given hybrid automaton H : set

More information

What are Embedded Systems? Lecture 1 Introduction to Embedded Systems & Software

What are Embedded Systems? Lecture 1 Introduction to Embedded Systems & Software What are Embedded Systems? 1 Lecture 1 Introduction to Embedded Systems & Software Roopa Rangaswami October 9, 2002 Embedded systems are computer systems that monitor, respond to, or control an external

More information

Statistical Model Checking in UPPAAL

Statistical Model Checking in UPPAAL Statistical Model Checking in UPPAAL Alexandre David, Kim G. Larsen, Axel Legay, Marius Mikucionis Wang Zheng, Peter Bulychev, Jonas van Vliet, Danny Poulsen, Dehui Du, Guangyuan Li CAV 11, PDMC 11,FORMATS

More information

Symbolic and Statistical Model Checking in UPPAAL

Symbolic and Statistical Model Checking in UPPAAL Symbolic and Statistical Model Checking in UPPAAL Alexandre David Kim G. Larsen Marius Mikucionis, Peter Bulychev, Axel Legay, Dehui Du, Guangyuan Li, Danny B. Poulsen, Amélie Stainer, Zheng Wang CAV11,

More information

Towards Lab Based MOOCs: Embedded Systems, Robotics, and Beyond

Towards Lab Based MOOCs: Embedded Systems, Robotics, and Beyond Towards Lab Based MOOCs: Embedded Systems, Robotics, and Beyond Sanjit A. Seshia UC Berkeley Joint work with: Edward A. Lee, Jeff. C. Jensen, Alexandre Donzé, Garvit Juniwal, Andy Chang UC Berkeley & NI

More information

Critical Analysis of Computer Science Methodology: Theory

Critical Analysis of Computer Science Methodology: Theory Critical Analysis of Computer Science Methodology: Theory Björn Lisper Dept. of Computer Science and Engineering Mälardalen University bjorn.lisper@mdh.se http://www.idt.mdh.se/ blr/ March 3, 2004 Critical

More information

State Identification In The Hybrid Automata Description Of Dynamical Systems

State Identification In The Hybrid Automata Description Of Dynamical Systems State Identification In The Hybrid Automata Description Of Dynamical Systems ISABELLA KOTINI, GEORGE HASSAPIS Dept. of Electrical and Computer Engineering Aristotle University of Thessaloniki 54006, Thessaloniki

More information

Towards an Integrated System Model for Testing and Verification

Towards an Integrated System Model for Testing and Verification Towards an Integrated System Model for Testing and Verification Benjamin Hummel and Peter Braun MiSE 2008 Domain Development of controller software for production machines Special case of mechatronic system

More information

Embedded Software Engineering

Embedded Software Engineering Embedded Software Engineering 3 Unit Course, Spring 2002 EECS Department, UC Berkeley Christoph Kirsch www.eecs.berkeley.edu/~fresco/giotto/course-2002 It s significant $4 billion development effort >

More information

Security Analysis of Emerging Remote Obstetrics Monitoring Systems

Security Analysis of Emerging Remote Obstetrics Monitoring Systems Security Analysis of Emerging Remote Obstetrics Monitoring Systems C. C. Tan*, L. Bai^, D. S. Mastrogiannis, J. Wu* *Dept. of Computer and Information Sciences, Temple University ^ Dept. of Electrical

More information

Copyright 2012 Pulse Systems, Inc. Page 1 of 14

Copyright 2012 Pulse Systems, Inc. Page 1 of 14 Setting the viewer allows users to set their personal preferences and helps prevent appointment booking oversights, such as double-booking a resource or scheduling a patient appointment at an incorrect

More information

A Modeling Framework for Schedulability Analysis of Distributed Avionics Systems. Pujie Han MARS/VPT Thessaloniki, 20 April 2018

A Modeling Framework for Schedulability Analysis of Distributed Avionics Systems. Pujie Han MARS/VPT Thessaloniki, 20 April 2018 A Modeling Framework for Schedulability Analysis of Distributed Avionics Systems Pujie Han MARS/VPT Thessaloniki, 20 April 2018 Index Background Approach Modeling Case study Index Background Approach Modeling

More information

Clearguard ACM 100 axle counting system. Smart track vacancy detection for cost-effective rail services. siemens.com / mobility

Clearguard ACM 100 axle counting system. Smart track vacancy detection for cost-effective rail services. siemens.com / mobility Clearguard ACM 100 axle counting system Smart track vacancy detection for cost-effective rail services siemens.com / mobility The launch of smart track vacancy detection The Clearguard ACM 100 axle counting

More information

FOX DIODE LASER. Power Calibration at Fiber Distal Tip Green Aiming Beam Video Touch Screen Intuitive Handling Rapid Amortization

FOX DIODE LASER. Power Calibration at Fiber Distal Tip Green Aiming Beam Video Touch Screen Intuitive Handling Rapid Amortization The world s first diode laser with laser output calibration 810 nm 940 nm 980 nm 1064 nm DIODE LASER Power Calibration at Fiber Distal Tip Green Aiming Beam Video Touch Screen Intuitive Handling Rapid

More information

Process Safety Management Training

Process Safety Management Training IHS OPERATIONAL EXCELLENCE & RISK MANAGEMENT Process Safety Management Training Leverage state-of-the-art resources and practical knowhow to learn about proven management system concepts and techniques.

More information

Sensor-aided Milling with a Surgical Robot System

Sensor-aided Milling with a Surgical Robot System 1 Sensor-aided Milling with a Surgical Robot System Dirk Engel, Joerg Raczkowsky, Heinz Woern Institute for Process Control and Robotics (IPR), Universität Karlsruhe (TH) Engler-Bunte-Ring 8, 76131 Karlsruhe

More information

AN1432 APPLICATION NOTE

AN1432 APPLICATION NOTE AN1432 APPLICATION NOTE Write Protection and Code Storage on the M25Pxx Serial Flash Memory Family Protection is one of the key features of a code storage memory. After all, the corruption of a single

More information

Promela and SPIN. Mads Dam Dept. Microelectronics and Information Technology Royal Institute of Technology, KTH. Promela and SPIN

Promela and SPIN. Mads Dam Dept. Microelectronics and Information Technology Royal Institute of Technology, KTH. Promela and SPIN Promela and SPIN Mads Dam Dept. Microelectronics and Information Technology Royal Institute of Technology, KTH Promela and SPIN Promela (Protocol Meta Language): Language for modelling discrete, event-driven

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Model Checking. Automatic Verification Model Checking. Process A Process B. when not possible (not AI).

Model Checking. Automatic Verification Model Checking. Process A Process B. when not possible (not AI). Sérgio Campos scampos@dcc.ufmg.br Why? Imagine the implementation of a complex hardware or software system: A 100K gate ASIC perhaps 100 concurrent modules; A flight control system dozens of concurrent

More information

Interfaces Module Exploration Systems Engineering, version 1.0

Interfaces Module Exploration Systems Engineering, version 1.0 nterfaces Module Exploration Systems Engineering, version 1.0 Exploration Systems Engineering: nterfaces Module Module Purpose: nterfaces Define interfaces, how they are described and why it is important

More information

Fast and Accurate Source-Level Simulation Considering Target-Specific Compiler Optimizations

Fast and Accurate Source-Level Simulation Considering Target-Specific Compiler Optimizations FZI Forschungszentrum Informatik at the University of Karlsruhe Fast and Accurate Source-Level Simulation Considering Target-Specific Compiler Optimizations Oliver Bringmann 1 RESEARCH ON YOUR BEHALF Outline

More information

Optimized Positioning of Autonomous Surgical Lamps

Optimized Positioning of Autonomous Surgical Lamps Optimized Positioning of Autonomous Surgical Lamps Jörn Teuber 1, Rene Weller 1, Ron Kikinis 1, Karl-Jürgen Oldhafer 2, Michael J. Lipp 2, and Gabriel Zachmann 1 1 University of Bremen, Bremen, Germany

More information

SAFETY INSTRUMENTED SYSTEM (SIS) FOR PROCESS OPERATION BASED ON REAL- TIME MONITORING. by Cen Kelvin Nan

SAFETY INSTRUMENTED SYSTEM (SIS) FOR PROCESS OPERATION BASED ON REAL- TIME MONITORING. by Cen Kelvin Nan SAFETY INSTRUMENTED SYSTEM (SIS) FOR PROCESS OPERATION BASED ON REAL- TIME MONITORING by Cen Kelvin Nan Background Research Contributions Proposed Methodology Case Study Conclusions Future Works Acknowledgements

More information

Lecture 2. Decidability and Verification

Lecture 2. Decidability and Verification Lecture 2. Decidability and Verification model temporal property Model Checker yes error-trace Advantages Automated formal verification, Effective debugging tool Moderate industrial success In-house groups:

More information

Optimizing Translation Information Management in NAND Flash Memory Storage Systems

Optimizing Translation Information Management in NAND Flash Memory Storage Systems Optimizing Translation Information Management in NAND Flash Memory Storage Systems Qi Zhang 1, Xuandong Li 1, Linzhang Wang 1, Tian Zhang 1 Yi Wang 2 and Zili Shao 2 1 State Key Laboratory for Novel Software

More information

Modeling and Analysis of Fischer s Algorithm

Modeling and Analysis of Fischer s Algorithm Processes and Data, Department of Computer Science, Swansea University Vino - July 2011 Today s Talk 1. Mutual Exclusion Algorithms (recap) 2. Fischer s Algorithm 3. Modeling Fischer s Algorithm 4. Analysis

More information

Applications of Program analysis in Model-Based Design

Applications of Program analysis in Model-Based Design Applications of Program analysis in Model-Based Design Prahlad Sampath (Prahlad.Sampath@mathworks.com) 2018 by The MathWorks, Inc., MATLAB, Simulink, Stateflow, are registered trademarks of The MathWorks,

More information

Software Architecture. Lecture 4

Software Architecture. Lecture 4 Software Architecture Lecture 4 Last time We discussed tactics to achieve architecture qualities We briefly surveyed architectural styles 23-Jan-08 http://www.users.abo.fi/lpetre/sa08/ 2 Today We check

More information

March Santa Clara, CA Trends, Business & Career Opportunities in Wireless Sensors

March Santa Clara, CA Trends, Business & Career Opportunities in Wireless Sensors Trends, Business & Career Opportunities in Wireless Sensors Harry Zervos / h.zervos@idtechex.com IDTechEx / www.idtechex.com Overview of IDTechEx services IDTechEx is an independent market research firm

More information

Assessing the Security of Internet Connected Critical Infrastructures

Assessing the Security of Internet Connected Critical Infrastructures Assessing the Security of Internet Connected Critical Infrastructures The Comifin Project Approach H. Ghani, A. Khelil, N. Suri, G. Csertán, L. Gönczy, G. Urbanics, J. Clarke Dept of Computer Science,

More information

Simulation of Petri Nets in Rule-Based Expert System Shell McESE

Simulation of Petri Nets in Rule-Based Expert System Shell McESE Abstract Simulation of Petri Nets in Rule-Based Expert System Shell McESE F. Franek and I. Bruha Dept of Computer Science and Systems, McMaster University Hamilton, Ont., Canada, L8S4K1 Email: {franya

More information

THE BEST WAY TO OPERATE

THE BEST WAY TO OPERATE THE BEST WAY TO OPERATE TABLE OF CONTENTS 01 ABOUT US MULTIMEDIAMEDICAL is a multimedia centre 02 03 VIDEOSURGERY MULTIMEDIAMEDICAL offers highly specialized recording of surgery TRAINING Multimedia platform

More information

ECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling

ECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling ECE 587 Hardware/Software Co-Design Spring 2018 1/20 ECE 587 Hardware/Software Co-Design Lecture 12 Verification II, System Modeling Professor Jia Wang Department of Electrical and Computer Engineering

More information

Improved BDD-based Discrete Analysis of Timed Systems

Improved BDD-based Discrete Analysis of Timed Systems Improved BDD-based Discrete Analysis of Timed Systems Truong Khanh Nguyen 1, Jun Sun 2, Yang Liu 1, Jin Song Dong 1 and Yan Liu 1 1 School of Computing National University of Singapore 2 Information System

More information

Distribution Middleware Technologies for Cyber Physical Systems Remote Engineering & Virtual Instrumentation

Distribution Middleware Technologies for Cyber Physical Systems Remote Engineering & Virtual Instrumentation Distribution Middleware Technologies for Cyber Physical Systems Remote Engineering & Virtual Instrumentation 4-6 July 2012 REV 2012 Bilbao (Spain) Isidro Calvo Isidro.calvo@ehu.es Dept. of Automatic Control

More information

Modeling and Verification of RBC Handover Protocol

Modeling and Verification of RBC Handover Protocol Available online at www.sciencedirect.com Electronic Notes in Theoretical Computer Science 309 (2014) 51 62 www.elsevier.com/locate/entcs Modeling and Verification of RBC Handover Protocol Kai Yang 1,2

More information

Foundation of Contract for Things

Foundation of Contract for Things Foundation of Contract for Things C.Sofronis, O.Ferrante, A.Ferrari, L.Mangeruca ALES S.r.l. Rome The Internet of System Engineering INCOSE-IL Seminar, Herzliya, Israel 15 September, 2011 Software Platform

More information

Modelling and verification of cyber-physical system

Modelling and verification of cyber-physical system Modelling and verification of cyber-physical system Michal Pluska, David Sinclair LERO @ DCU Dublin City University School of Computing Dublin 9, Ireland michal.pluska@computing.dcu.ie Abstract * Embedded

More information

Quantitative Verification and Synthesis of Systems

Quantitative Verification and Synthesis of Systems Quantitative Verification and Synthesis of Systems Sanjit A. Seshia Assistant Professor EECS, UC Berkeley Software-at-Scale Workshop August 2010 Quantitative Analysis / Verification Does the brake-by-wire

More information

CAN In A Day 2L01I. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved.

CAN In A Day 2L01I. Renesas Electronics America Inc Renesas Electronics America Inc. All rights reserved. CAN In A Day 2L01I Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2012 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive & Industrial,

More information

Micropolis Interdependency Modeling using Open Hybrid Automata

Micropolis Interdependency Modeling using Open Hybrid Automata Micropolis Interdependency Modeling using Open Hybrid Automata Constantinos Heracleous KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University

More information

BACH 2 : Bounded ReachAbility CHecker for Compositional Linear Hybrid Systems

BACH 2 : Bounded ReachAbility CHecker for Compositional Linear Hybrid Systems : Bounded ReachAbility CHecker for Compositional Linear Hybrid Systems Lei Bu, You Li, Linzhang Wang, Xin Chen, and Xuandong Li State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing,

More information

A FILTERING TECHNIQUE FOR FRAGMENT ASSEMBLY- BASED PROTEINS LOOP MODELING WITH CONSTRAINTS

A FILTERING TECHNIQUE FOR FRAGMENT ASSEMBLY- BASED PROTEINS LOOP MODELING WITH CONSTRAINTS A FILTERING TECHNIQUE FOR FRAGMENT ASSEMBLY- BASED PROTEINS LOOP MODELING WITH CONSTRAINTS F. Campeotto 1,2 A. Dal Palù 3 A. Dovier 2 F. Fioretto 1 E. Pontelli 1 1. Dept. Computer Science, NMSU 2. Dept.

More information

Bounded Model Checking with Parametric Data Structures

Bounded Model Checking with Parametric Data Structures Bounded Model Checking with Marc Herbstritt (joint work with Erika Ábrahám, Bernd Becker, Martin Steffen) www.avacs.org August 15 2006 4th International Workshop on Bounded Model Checking Context Automated

More information

MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety

MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety RTSS 2018 MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang Dept. of Electrical and Computer Engineering

More information

SurgiNet Booking an Elective Surgery

SurgiNet Booking an Elective Surgery SurgiNet Booking an Elective Surgery It is recommended you have set up your default Scheduling settings to your individual account for full functionality before booking a surgery. You will only need to

More information

Kinematic Model Analysis of an 8-DOF Photographic Robot

Kinematic Model Analysis of an 8-DOF Photographic Robot Kinematic Model Analysis of an 8-DOF Photographic Robot Xiaowei Xie, Xingang Miao, Su Wang and Feng Zhang Abstract The photographic robot studied in this chapter is an 8-DOF PRRPR-S type. In order to obtain

More information

Approved Training Providers Programs

Approved Training Providers Programs 2014-2015 Approved Training Providers Programs PROGRAM DEGREE TRAINING PROVIDER LOCATION COST A+ Certification Diploma New Horizons Computer Learning Center Orlando $ 3,945.00 A+, Network+, CCNA Diploma

More information

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle.

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle. 2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 Research on Tunnel Support Deformation Based on Camera and Digital Speckle Improvement

More information

Hardware Software Co-Design and Testing Using Simulink Real-Time Paul Berry and Brian Steenson

Hardware Software Co-Design and Testing Using Simulink Real-Time Paul Berry and Brian Steenson Hardware Software Co-Design and Testing Using Simulink Real-Time Paul Berry and Brian Steenson www.thalesgroup.com Overview Process Development Introduction to THALES Overview of design process Development

More information

Main components USB charging controller with integrated power switch

Main components USB charging controller with integrated power switch DN0019 Design note Smart dual-port USB charger with STCC2540 Designs from our labs describe tested circuit designs from ST labs which provide optimized solutions for specific applications. For more information

More information

Exception Handling in S88 using Grafchart *

Exception Handling in S88 using Grafchart * Presented at the World Batch Forum North American Conference Woodcliff Lake, NJ April 7-10, 2002 107 S. Southgate Drive Chandler, Arizona 85226-3222 480-893-8803 Fax 480-893-7775 E-mail: info@wbf.org www.wbf.org

More information

The interns will be assigned to assist our R&D / IT professionals in the following exciting enabling technology projects.

The interns will be assigned to assist our R&D / IT professionals in the following exciting enabling technology projects. The interns will be assigned to assist our R&D / IT professionals in the following exciting enabling technology projects. A. Software Engineering Developing software utilities for automation equipment;

More information

Kinetic Bounding Volume Hierarchies for Deformable Objects

Kinetic Bounding Volume Hierarchies for Deformable Objects Kinetic Bounding Volume Hierarchies for Deformable Objects René Weller Clausthal University of Technology, Germany weller@in.tu-clausthal.de VRCIA 06, June 2006, Hong Kong Motivation Bounding volume hierarchies

More information

PTIDES: A Discrete-Event-Based Programming Model for Distributed Embedded Systems

PTIDES: A Discrete-Event-Based Programming Model for Distributed Embedded Systems PTIDES: A Discrete-Event-Based Programming Model for Distributed Embedded Systems John C. Eidson Edward A. Lee Slobodan Matic Sanjit A. Seshia Jia Zou UC Berkeley Tutorial on Modeling and Analyzing Real-Time

More information

Energy efficient real-time computing for extremely large telescopes with GPU

Energy efficient real-time computing for extremely large telescopes with GPU Energy efficient real-time computing for extremely large telescopes with GPU Florian Ferreira & Damien Gratadour Observatoire de Paris & Université Paris Diderot 1 Project #671662 funded by European Commission

More information

Master of Technology (Integrated)/ Bachelor of Technology

Master of Technology (Integrated)/ Bachelor of Technology SCHEME OF EXAMINATION for Master of Technology (Integrated)/ Bachelor of Technology ( Science and Engineering) 5 YEAR/4 YEAR COURSE (For Batch 217-221/222) Sri Guru Granth Sahib World University, Fatehgarh

More information

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner Real-Time Component Software slide credits: H. Kopetz, P. Puschner Overview OS services Task Structure Task Interaction Input/Output Error Detection 2 Operating System and Middleware Application Software

More information

Model-Based Design of Connected and Autonomous Vehicles

Model-Based Design of Connected and Autonomous Vehicles Model-Based Design of Connected and Autonomous Vehicles Akshay Rajhans, PhD Senior Research Scientist Advanced Research and Technology Office MathWorks https://arajhans.github.io 2 nd IEEE Summer School

More information

Property-based design with HORUS / SYNTHORUS

Property-based design with HORUS / SYNTHORUS Property-based design with HORUS / SYNTHORUS Dominique Borrione, Negin Javaheri, Katell Morin-Allory, Yann Oddos, Alexandre Porcher Radboud University, Nijmegen 1 March 27, 2013 Functional specifications

More information

Proc. XVIII Conf. Latinoamericana de Informatica, PANEL'92, pages , August Timed automata have been proposed in [1, 8] to model nite-s

Proc. XVIII Conf. Latinoamericana de Informatica, PANEL'92, pages , August Timed automata have been proposed in [1, 8] to model nite-s Proc. XVIII Conf. Latinoamericana de Informatica, PANEL'92, pages 1243 1250, August 1992 1 Compiling Timed Algebras into Timed Automata Sergio Yovine VERIMAG Centre Equation, 2 Ave de Vignate, 38610 Gieres,

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD IEC 61131-5 First edition 2000-11 Programmable controllers Part 5: Communications Automates programmables Partie 5: Communications IEC 2000 Copyright - all rights reserved No part

More information

Distributed Systems Programming (F21DS1) Formal Verification

Distributed Systems Programming (F21DS1) Formal Verification Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on

More information

Curriculum Vitae. WANG Qixin July 12, Phone:

Curriculum Vitae. WANG Qixin July 12, Phone: General Information Curriculum Vitae WANG Qixin July 12, 2018 Name: WANG Qixin Email: csqwang@comp.polyu.edu.hk Phone: +852-27667266 Position: Homepage: Associate Professor, Department of Computing, The

More information

Context-Aware WSNs for Energy-Efficient Buildings

Context-Aware WSNs for Energy-Efficient Buildings Context-Aware WSNs for Energy-Efficient Buildings Mohamed Bakhouya International University of Rabat Morocco The US/Morocco Workshop on Sensors and Wireless Networks for Smart Cities January 5-7 2016,

More information

CS244-Introduction to Embedded Systems and Ubiquitous Computing. Instructor: Eli Bozorgzadeh Computer Science Department UC Irvine Winter 2010

CS244-Introduction to Embedded Systems and Ubiquitous Computing. Instructor: Eli Bozorgzadeh Computer Science Department UC Irvine Winter 2010 CS244-Introduction to Embedded Systems and Ubiquitous Computing Instructor: Eli Bozorgzadeh Computer Science Department UC Irvine Winter 2010 CS244 Lecture 2 Embedded Applications Winter 2010- CS 244 2

More information

D R A F T ICD 1.8/4.4. Target Acquisition System to Telescope Control System. Bret Goodrich, Eric Hansen. Version: Draft A2. Issued By: Software Group

D R A F T ICD 1.8/4.4. Target Acquisition System to Telescope Control System. Bret Goodrich, Eric Hansen. Version: Draft A2. Issued By: Software Group ICD 1.8/4.4 Target Acquisition System to Telescope Control System Version: Draft A2 Issued By: Software Group Date: 25 June 2013 Bret Goodrich, Eric Hansen Revision Control 1. Revision Version Draft1 Date:

More information

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei

More information

The PCA Interlock App in AADL!

The PCA Interlock App in AADL! The PCA Interlock App in AADL! http://cis.ksu.edu/~samprocter Sam Procter, John Hatcliff, Stephen Barret, and Robby SAnToS Lab Kansas State University Support: This work is supported in part by the US

More information

Cyber Physical Systems

Cyber Physical Systems Distribution Middleware Technologies for Cyber Physical Systems Encuentro UPV/EHU U CIC CCEnergigune eggu e 12 May 2014 Vitoria-Gasteiz Isidro Calvo Ismael Etxeberria Adrián Noguero Isidro.calvo@ehu.es

More information

Dr. Ing. Cornelia Zahlten. Prof. Dr. Jan Peleska. Concepts and Implementation. Hard Real-Time Test Tools

Dr. Ing. Cornelia Zahlten. Prof. Dr. Jan Peleska. Concepts and Implementation. Hard Real-Time Test Tools Hard Real-Time Test Tools Concepts and Implementation Prof. Dr. Jan Peleska Centre for Computing Technologies, University of Bremen, Germany Dr. Ing. Cornelia Zahlten Verified Systems International GmbH,

More information

A Goal-Oriented Interface to Consumer Electronics Using Planning and Commonsense Reasoning. Henry Lieberman and Jose Espinosa, MIT Media Lab, IUI 2005

A Goal-Oriented Interface to Consumer Electronics Using Planning and Commonsense Reasoning. Henry Lieberman and Jose Espinosa, MIT Media Lab, IUI 2005 A Goal-Oriented Interface to Consumer Electronics Using Planning and Commonsense Reasoning Henry Lieberman and Jose Espinosa, MIT Media Lab, IUI 2005 Presented by: Charles Rich January 30, 2008 CS 525U

More information

Formal Modeling and Analysis of Stream Processing Systems

Formal Modeling and Analysis of Stream Processing Systems Formal Modeling and Analysis of Stream Processing Systems Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 High performance Highly optimized requirements systems

More information