CDC related research at the Dept. of Computer Science TUT Jüri Vain CDC Workshop - Tallinn, Jan. 21-22, 2008.

Slides:



Advertisements
Similar presentations
Tintu David Joy. Agenda Motivation Better Verification Through Symmetry-basic idea Structural Symmetry and Multiprocessor Systems Mur ϕ verification system.
Advertisements

© 2004 Wayne Wolf Topics Task-level partitioning. Hardware/software partitioning.  Bus-based systems.
Representing Boolean Functions for Symbolic Model Checking Supratik Chakraborty IIT Bombay.
CS 267: Automated Verification Lecture 8: Automata Theoretic Model Checking Instructor: Tevfik Bultan.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Automatic Verification Book: Chapter 6. What is verification? Traditionally, verification means proof of correctness automatic: model checking deductive:
Friday, April 17, 2015 Requirements Specifications Interaction Analysis Bill Mitchell Software and Systems Research Labs Motorola UK Research Labs Bill.
Hybrid System Verification Synchronous Workshop 2003 A New Verification Algorithm for Planar Differential Inclusions Gordon Pace University of Malta December.
Timed Automata.
Data Mining Methodology 1. Why have a Methodology  Don’t want to learn things that aren’t true May not represent any underlying reality ○ Spurious correlation.
Opmaker2: Efficient Action Schema Acquisition T.L.McCluskey, S.N.Cresswell, N. E. Richardson and M.M.West The University of Huddersfield,UK
CS 267: Automated Verification Lecture 10: Nested Depth First Search, Counter- Example Generation Revisited, Bit-State Hashing, On-The-Fly Model Checking.
1 Temporal Claims A temporal claim is defined in Promela by the syntax: never { … body … } never is a keyword, like proctype. The body is the same as for.
ECE 720T5 Fall 2012 Cyber-Physical Systems Rodolfo Pellizzoni.
Multi-agent Planning Amin Atrash. Papers Dynamic Planning for Multiple Mobile Robots –Barry L. Brummit, Anthony Stentz OBDD-based Universal Planning:
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
Synthesis of Embedded Software Using Free-Choice Petri Nets.
Doctoral course ’Advanced topics in Embedded Systems’. Lyngby'08 Synthesis of Test Purpose Directed Reactive Planning Tester for Nondeterministic Systems.
1 Carnegie Mellon UniversitySPINFlavio Lerda SPIN An explicit state model checker.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
MCS 2005 Round Table In the context of MCS, what do you believe to be true, even if you cannot yet prove it?
Doctoral course ’Advanced topics in Embedded Systems’. Lyngby'08 Model-Based Development and Validation of Multirobot Cooperative System Jüri Vain Dept.
CSE 830: Design and Theory of Algorithms
Integrating POMDP and RL for a Two Layer Simulated Robot Architecture Presented by Alp Sardağ.
Presenter: PCLee Design Automation Conference, ASP-DAC '07. Asia and South Pacific.
DAST, Spring © L. Joskowicz 1 Data Structures – LECTURE 1 Introduction Motivation: algorithms and abstract data types Easy problems, hard problems.
Information theory, fitness and sampling semantics colin johnson / university of kent john woodward / university of stirling.
Doctoral course ’Advanced topics in Embedded Systems’. Lyngby'08 Model-Based Development and Validation of Multirobot Cooperative System Jüri Vain Dept.
Jüri Vain Dept. of Computer Science Tallinn University of Technology J.Vain “...Reactive Planning Testing...”Abo, Feb 3,
ECE 720T5 Winter 2014 Cyber-Physical Systems Rodolfo Pellizzoni.
Sparse Coding for Specification Mining and Error Localization Runtime Verification September 26, 2012 Wenchao Li, Sanjit A. Seshia University of California.
1 Outline:  Outline of the algorithm  MILP formulation  Experimental Results  Conclusions and Remarks Advances in solving scheduling problems with.
Lecture #12 Distributed Algorithms (I) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Scientific Computing By: Fatima Hallak To: Dr. Guy Tel-Zur.
An Improved Algorithm to Accelerate Regular Expression Evaluation Author: Michela Becchi, Patrick Crowley Publisher: 3rd ACM/IEEE Symposium on Architecture.
1 Recurrences Algorithms Jay Urbain, PhD Credits: Discrete Mathematics and Its Applications, by Kenneth Rosen The Design and Analysis of.
Stochastic DAG Scheduling using Monte Carlo Approach Heterogeneous Computing Workshop (at IPDPS) 2012 Extended version: Elsevier JPDC (accepted July 2013,
1 Generating FSMs from Abstract State Machines Wolfgang Grieskamp Yuri Gurevich Wolfram Schulte Margus Veanes Foundations of Software Engineering Microsoft.
CIS 842: Specification and Verification of Reactive Systems Lecture Specifications: LTL Model Checking Copyright , Matt Dwyer, John Hatcliff,
CALTECH CS137 Spring DeHon CS137: Electronic Design Automation Day 9: May 6, 2002 FSM Equivalence Checking.
Computational Complexity Jang, HaYoung BioIntelligence Lab.
Conformance Test Suites, Extensionally Arend Rensink University of Twente Dutch Workshop on Formal Testing Techniques University of Twente 13 September.
A Mechanized Model for CAN Protocols Context and objectives Our mechanized model Results Conclusions and Future Works Francesco Bongiovanni and Ludovic.
1 Qualitative Reasoning of Distributed Object Design Nima Kaveh & Wolfgang Emmerich Software Systems Engineering Dept. Computer Science University College.
DARPA ITO/MARS Project Update Vanderbilt University A Software Architecture and Tools for Autonomous Robots that Learn on Mission K. Kawamura, M. Wilkes,
Conformance Test Experiments for Distributed Real-Time Systems Rachel Cardell-Oliver Complex Systems Group Department of Computer Science & Software Engineering.
Curiosity-Driven Exploration with Planning Trajectories Tyler Streeter PhD Student, Human Computer Interaction Iowa State University
1 Research Question  Can a vision-based mobile robot  with limited computation and memory,  and rapidly varying camera positions,  operate autonomously.
Regular Extrapolation of Behavioural Models Treating Systems Lacking Specification Regular Extrapolation of Behavioural Models Treating Systems Lacking.
Jüri Vain Tallinn University of Technology J.Vain Doctoral course ’Advanced topics in Embedded Systems’. Lyngby'09.
Introduction to Artificial Intelligence CS 438 Spring 2008 Today –AIMA, Ch. 25 –Robotics Thursday –Robotics continued Home Work due next Tuesday –Ch. 13:
May University of Glasgow Generalising Feature Interactions in Muffy Calder, Alice Miller Dept. of Computing Science University of Glasgow.
Real-time motion planning for Manipulator based on Configuration Space Chen Keming Cis Peking University.
Scientific Debugging. Errors in Software Errors are unexpected behaviors or outputs in programs As long as software is developed by humans, it will contain.
Towards Interoperability Test Generation of Time Dependent Protocols: a Case Study Zhiliang Wang, Jianping Wu, Xia Yin Department of Computer Science Tsinghua.
Performance of Distributed Constraint Optimization Algorithms A.Gershman, T. Grinshpon, A. Meisels and R. Zivan Dept. of Computer Science Ben-Gurion University.
Chapter 8 Asynchronous System Model by Mikhail Nesterenko “Distributed Algorithms” by Nancy A. Lynch.
ECE/CS 584: Verification of Embedded Computing Systems Model Checking Timed Automata Sayan Mitra Lecture 09.
Quality Assurance in the Presence of Variability Kim Lauenroth, Andreas Metzger, Klaus Pohl Institute for Computer Science and Business Information Systems.
Chapter 15 P, NP, and Cook’s Theorem. 2 Computability Theory n Establishes whether decision problems are (only) theoretically decidable, i.e., decides.
Generalized Point Based Value Iteration for Interactive POMDPs Prashant Doshi Dept. of Computer Science and AI Institute University of Georgia
1 Alan Mishchenko Research Update June-September 2008.
Non-parametric Methods for Clustering Continuous and Categorical Data Steven X. Wang Dept. of Math. and Stat. York University May 13, 2010.
Teooriapäevad, Vanaõue, Sept Synthesis of Test Purpose Directed Reactive Planning Tester for Nondeterministic Systems 1 Jüri Vain, Kullo Raiend,
New Characterizations in Turnstile Streams with Applications
Methodological Issues in Model-Based Testing (MBT)
Chapter 2 FINITE AUTOMATA.
On Using Linearly Priced Timed Automata for Flow Analysis
Joseph Xu Soar Workshop 31 June 2011
Discrete Controller Synthesis
Presentation transcript:

CDC related research at the Dept. of Computer Science TUT Jüri Vain CDC Workshop - Tallinn, Jan , 2008

Research lines (Timed) automata learning Proof techniques for swarm coordination algorithms State isomorphism based symmetry reduction Iterated search refinement with bit-state pruning Test trace generation using MC Synthesis of test goal directed reactive testers FMs for model-based planning in... model checking using... model-based test generation in... single agent systems multi-agent systems state space reduction by abstraction determinitic systems non-determi- nistic systems

Research lines (Timed) automata learning Proof techniques for swarm coordination algorithms State isomorphism based symmetry reduction Iterated search refinement with bit-state pruning Test trace generation using MC Synthesis of test goal directed reactive testers FMs for model-based planning in... model checking using... model-based test generation in... single agent systems multi-agent systems state space reduction by abstraction determinitic systems non-determi- nistic systems

State isomorphism based symmetry reduction Problem  Exploit symmetries to reduce the effects of state space explosion in explicit state reachability

State isomorphism based symmetry reduction Solution  Given a model in terms of unordered data structures, like sets and maps, and objects: Construct the state graphs of the states at run time and Use the computation of graph isomorphism to determine whether a state with similar structure has been seen. Results developed with Margus Veanes and Colin Campell and published at FORTE 2007 (June 2007) and in the PhD thesis of J. Ernits (Nov. 2007)

State isomorphism based symmetry reduction Applications:  Method is implemented in model-testing toolkit called NModel (by Margus Veanes et al, MS Research Redmond)  There is similar implementation developed independently by Arend Rensink in the GROOVE project

Research lines (Timed) automata learning Proof techniques for swarm coordination algorithms State isomorphism based symmetry reduction Iterated search refinement with bit-state pruning Test trace generation using MC Synthesis of test goal directed reactive testers FMs for model-based planning in... model checking using... model-based test generation in... single agent systems multi-agent systems state space reduction by abstraction determinitic systems non-determi- nistic systems

Iterated search refinement with bit- state pruning Problem  Calculate reachability in models that Run out of resources without producing results with known methods Produce too long traces to the error/desired state with known methods  Such reachability problems can be used for solving problems related to Scheduling Hardware synthesis Offline test generation

Iterated search refinement with bit- state pruning Solution  Combine two well known methods in a new way: Iterated Search Refinement, and Bitstate hashing  The key idea is to use collisions in bitstate hash table to randomly filter the search space. Each iteration requires very small amounts of memory A lot of prefixes of paths are covered multiple times, but Provides good results in several examples. Results published in the PhD thesis of J. Ernits (Nov. 2007)

Iterated search refinement with bit- state pruning Practical applications  2 well researched case studies: Synthesis of a memory arbiter for a radar memory case study (J. Ernits, 2005) Calculating offline test sequences for model-based testing (J. Ernits, A. Kull, K. Raiend, J. Vain, 2006) The method cannot be used for disproving the reachability, but provides a new alternative for finding a witness trace.

Pre-set test trace generation using MC Case study: modified INRES protocol

Pre-set test trace generation using MC Results  Time spent for finding sequences for the 2-switch coverage criterion  Experiments made with Uppaal Cora

Research lines (Timed) automata learning Proof techniques for swarm coordination algorithms State isomorphism based symmetry reduction Iterated search refinement with bit-state pruning Test trace generation using MC Synthesis of test goal directed reactive testers FMs for model-based planning in... model checking using... model-based test generation in... single agent systems multi-agent systems state space reduction by abstraction determinitic systems non-determi- nistic systems

Synthesis of test goal directed reactive testers Problem:  Given a Non-deterministic EFSM M SUT of System Under Test testing goal in terms of a set Trp of M SUT transitions  Find EFSM M TSR s.t.. M TSR is I/O compliant with M SUT any trace of M SUT || M TSR includes labels of all transitions in Trp M TSR chooses a transition from those labelled with current input from M SUT that maximizes some gain function G.

Synthesis of test goal directed reactive testers Solution:  Algorithm of constructing M TSR Complexity:  For all controllable transitions of the M TSR the upper bound of the complexity of the computations of the gain functions is O(|E SUT | 3 ).  At runtime each choice by the tester takes O(|E SUT | 2 ) arithmetic operations to evaluate the gain functions (ASE2007, Vain, Raiend, Kull, Ernits)

 Experimental results One Transition Test Purpose All Transition Test Purpose Synthesis of test goal directed reactive testers

Research lines (Timed) automata learning Proof techniques for swarm coordination algorithms State isomorphism based symmetry reduction Iterated search refinement with bit-state pruning Test trace generation using MC Synthesis of test goal directed reactive testers FMs for model based planning in... model checking using... model based test generation in... single agent systems multi-agent systems state space reduction by abstraction determinitic systems non-determi- nistic systems

Proof techniques for swarm coordination algorithms Problem:  proving properties of swarm (distributed) coordination algorithms  self-stabilization, covergence,... can be reduced to reachability analysis  reachability analysis collides with scalability barrier

Proof techniques for swarm coordination algorithms (ongoing work) Some solutions:  Pattern based problem encoding provides right level of abstraction (spec. patterns are problem oriented)  General principles of proving: Compositional approach combining different techniques of component proofs – MC, deduction,... Global properties by structural induction on the size of swarm/task  Base: prove sufficiency of assumptions on a swarm fragment of some tractable size, e.g., using MC with symmetry reduction, (typically the size of fragment can’t be trivial either) (see Int. WS on HAM, Vain, Kuusik, Tammet, 2006)  Step: Show that the induction step does not violate the assume part for the new fragment defined by the step

Proof techniques for swarm coordination algorithms Demo: dynamic cleaning problem different zones of the room deteriorate with different rate a swarm of cleaning robots should keep deterioration below treshold robots of the swarm communicate trough pherromone trace  Problem: given a treshold C Tresh and initial value of the deterioration vector S det (0), s.t. S i det (0) > C Tresh for all i, prove that 1) the swarm is always able to reach the state S det (t), s.t. S i det (t) < C Tresh for all i, and 1) for all t’ > t, condition S t det (t’ ) < C Tresh is invariantly true.

Proof techniques for swarm coordination algorithms Demo

Research lines (Timed) automata learning Proof techniques for swarm coordination algorithms State isomorphism based symmetry reduction Iterated search refinement with bit-state pruning Test trace generation using MC Synthesis of test goal directed reactive testers FMs for model based planning in... model checking using... model based test generation in... single agent systems multi-agent systems state space reduction by abstraction determinitic systems non-determi- nistic systems

(Timed) automata learning Problem: Planner synthesis for a human adaptive Scrub Nurse Robot (SNR)  human adaptive = on-line learning from H-H/H-R interactions  learning = constructing/modifying a human motion model

(Timed) automata learning Context: SNR control architecture SNR’s “world” model Nurse’s behaviour model Surgeon’s behaviour model Reactive action planning Targeting and motion control Motion recognition 3D position tracking Direct manipulator control Predicted further motions Hand position data samplings Fource & position feedback Control parameters SNR action to be taken Recognized motion NN model of Surgeon’s motions Scenario of the surgery Reactive ctrl. layer Collision avoidance Deliberative ctrl. layer

(Timed) automata learning Learning algorithm  Input: Time-stamped sequences of observations of phase switching (set of timed traces Tr T (Obs)) Parameters for  state rescaling operator -   distinquishing model observables/controllables -  TA  defining quotient state space  Output: Extended (Uppaal version) timed automaton TA s.t. Tr T (TA) =  (Tr T (Obs)|  TA ) /~% bisimilarity of timed traces (see also Vain, Miyawaki, MIC 2008, Insbruck)

(Timed) automata learning (example) TimeChest X Elbow X Chest Y Elbow Y Chest Z Elbow Z Action idle prepare_instr pick_instr hold_wait pass withraw idle stretch wait_return receive move_back put_on_tray idle pick_instr hold_wait pass wait_return receive move_back put_on_tray idle

Thank You!