Optimally Modifying Software for Safety and Functionality Sampath Kannan U.Penn (with Arvind Easwaran & Insup Lee)

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
1 Routing and Wavelength Assignment in Wavelength Routing Networks.
Management Science 461 Lecture 2b – Shortest Paths September 16, 2008.
Distributed Process Scheduling Summery Distributed Process Scheduling Summery BY:-Yonatan Negash.
Ad-Hoc Networks Beyond Unit Disk Graphs
CS Dept, City Univ.1 Low Latency Broadcast in Multi-Rate Wireless Mesh Networks LUO Hongbo.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 3 – Distributed Systems.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Jointly Optimal Transmission and Probing Strategies for Multichannel Systems Saswati Sarkar University of Pennsylvania Joint work with Sudipto Guha (Upenn)
Three heuristics for transmission scheduling in sensor networks with multiple mobile sinks Damla Turgut and Lotzi Bölöni University of Central Florida.
Ch4: Software Architecture and Design. 1 What is a design?
Review of “Embedded Software” by E.A. Lee Katherine Barrow Vladimir Jakobac.
1 Hybrid Agent-Based Modeling: Architectures,Analyses and Applications (Stage One) Li, Hailin.
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
Distributed Combinatorial Optimization
CprE 458/558: Real-Time Systems
Lecture 8. Why do we need residual networks? Residual networks allow one to reverse flows if necessary. If we have taken a bad path then residual networks.
Delay Efficient Sleep Scheduling in Wireless Sensor Networks Gang Lu, Narayanan Sadagopan, Bhaskar Krishnamachari, Anish Goel Presented by Boangoat(Bea)
1 Software Testing Techniques CIS 375 Bruce R. Maxim UM-Dearborn.
Graph Algorithms. Overview Graphs are very general data structures – data structures such as dense and sparse matrices, sets, multi-sets, etc. can be.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
MAKING COMPLEX DEClSlONS
Distributed Asynchronous Bellman-Ford Algorithm
Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan.
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
Sensor Network Capacity Enhancement Through Spatial Concurrency Bharat B. Madan and Shashi Phoha Applied Research Lab, Penn State University.
SMART ANTENNA under the guidance of Mr. G.V.Kiran Kumar EC
Scientific Computing By: Fatima Hallak To: Dr. Guy Tel-Zur.
Wireless Sensor Networks COE 499 Energy Aware Routing
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 March 01, 2005 Session 14.
Quasi-static Channel Assignment Algorithms for Wireless Communications Networks Frank Yeong-Sung Lin Department of Information Management National Taiwan.
Traveling Salesman Problems Motivated by Robot Navigation Maria Minkoff MIT With Avrim Blum, Shuchi Chawla, David Karger, Terran Lane, Adam Meyerson.
Computer Science CPSC 502 Lecture 14 Markov Decision Processes (Ch. 9, up to 9.5.3)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
CS584 - Software Multiagent Systems Lecture 12 Distributed constraint optimization II: Incomplete algorithms and recent theoretical results.
Major objective of this course is: Design and analysis of modern algorithms Different variants Accuracy Efficiency Comparing efficiencies Motivation thinking.
Models in I.E. Lectures Introduction to Optimization Models: Shortest Paths.
RF network in SoC1 SoC Test Architecture with RF/Wireless Connectivity 1. D. Zhao, S. Upadhyaya, M. Margala, “A new SoC test architecture with RF/wireless.
1 S ystems Analysis Laboratory Helsinki University of Technology Flight Time Allocation Using Reinforcement Learning Ville Mattila and Kai Virtanen Systems.
OPTIMUM INTEGRATED LINK SCHEDULING AND POWER CONTROL FOR MULTI-HOP WIRELESS NETWORKS Arash Behzad, and Izhak Rubin, IEEE Transactions on Vehicular Technology,
Submodule construction in logics 1 Gregor v. Bochmann, University of Ottawa Using First-Order Logic to Reason about Submodule Construction Gregor v. Bochmann.
Approximation Algorithms for Prize-Collecting Forest Problems with Submodular Penalty Functions Chaitanya Swamy University of Waterloo Joint work with.
DISTRIBUTED SYSTEMS II A POLYNOMIAL LOCAL SOLUTION TO MUTUAL EXCLUSION Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
SOFTWARE DESIGN. INTRODUCTION There are 3 distinct types of activities in design 1.External design 2.Architectural design 3.Detailed design Architectural.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks Mobile Networks and Applications 6, ,2001 Author : JEFFREY E. WIESELTHIER.
Linear Programming & its Applications to Wireless Networks Guofeng Deng IMPACT Lab, Arizona State University.
Joint Power and Channel Minimization in Topology Control: A Cognitive Network Approach J ORGE M ORI A LEXANDER Y AKOBOVICH M ICHAEL S AHAI L EV F AYNSHTEYN.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
UNIT 2 LESSON 8 CS PRINCIPLES. UNIT 2 LESSON 8 OBJECTIVES Students will be able to: Describe how routers develop routing tables to determine how to send.
Scheduling Messages with Deadlines in Multi-hop Real- time Sensor Networks Wei Song.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
An Optimization Model for Placement of Wavelength Converters to Minimize Blocking Probability in WDM Networks Authored by: SuixiangGao,XiaohuaJia Authored.
Introduction to Multiple-multicast Routing Chu-Fu Wang.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas A. Capone, I. Filippini, F. Martignon IEEE international.
Objective of This Course
Throughput-Optimal Broadcast in Dynamic Wireless Networks
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
Power Efficient Communication ----Joint Routing, Scheduling and Power Control Design Presenter: Rui Cao.
Presentation transcript:

Optimally Modifying Software for Safety and Functionality Sampath Kannan U.Penn (with Arvind Easwaran & Insup Lee)

Introduction User requirements on software systems –Desired functionality –Safety properties Verification/validation used to locate safety violations What about static correction of errors by system redesign?

Desirable Features of Model System redesign must preserve functionality: reward functionality, penalize violations System model must be stochastic because of interaction with unpredictable environment Each redesign/system control incurs a control cost.

System Model Software system represented by a finite state machine (FSM) Probability on transitions abstracts stochasticity Cost of control associated with blocking transitions Uncontrollable transitions explicitly labeled Numeric rewards and penalties at the states

System Model – cont’d q0 q1 q3 q a b c Goal: Control transitions to maximize difference between expected reward and control cost. Only consider the static version of the problem here.

DBMS Concurrency Controller Concurrency controller controls execution of transactions Transaction i can read/write data items Commit c i indicates i is complete Serializable schedule – schedule equivalent to sequential execution of transactions

DBMS Controller as FSM States = set of active transactions with state for each Transitions = read/write/commit Stochasticity = which transaction chosen Control cost = increased latency Reward = completed transaction Violation = non-serializability

Wireless Network Routing Message routing in wireless ad-hoc networks Each wireless node capable of communicating with a fixed set of nodes called its neighbors Nodes communicate by broadcasting messages Depending on the operating environment, only some of the neighbors would be able to receive the broadcast At each stage, routing algorithm chooses a node for transmission

Network Routing (2) State: Set of wireless nodes with the message Transition: Transmission by a particular node and reception by some of its neighbors Control action: Preventing the router from selecting some nodes Stochasticity: Uncertainty in reception of message transmitted by a neighbor Penalty: Cost of transmission Rewards: Reward for reception of message by a destination node

Mathematical Notation A: Control policy specifying blocked trans’ns. p(u,v) : Probability of transition (u,v) c A (u,v): Cost of controlling (u,v) under A. r(i): Reward/penalty at state i

Goal Want to pick control strategy A (i.e. which transitions to suppress) to minimize expected cost. Challenge: Transition probabilities are dynamic... suppressing one transition increases probabilities of others

Solution Technique - DAGs If FSM is directed acyclic graph (DAG) Dynamic programming algorithm computes optimal strategy efficiently –Starting from the sink nodes k, compute E k up the DAG. –When computing E i if suppressing some transition (i,j) improves E i do it.

Arbitrary Graphs Unique solution might not exist – switch to discounted rewards to ensure it does. Write constraints for each possible subset of transitions controlled – exponential number of constraints! Use implicit Linear Programming Solver such as Ellipsoid Algorithm to find optimum in polynomial time.

Conclusion Abstracted software systems as a stochastic FSM with cost of control, rewards and penalties Developed polynomial time DP algorithm for directed acyclic graphs Formulated optimization problem for strongly connected components as a LPP Described polynomial time separation oracle thereby generating polynomial time ellipsoid algorithm