Stephan Reiff University of Glasgow Hybrid Techniques for Detecting and Resolving Feature Interactions.

Slides:



Advertisements
Similar presentations
Recognising Languages We will tackle the problem of defining languages by considering how we could recognise them. Problem: Is there a method of recognising.
Advertisements

Based on text by S. Mourad "Priciples of Electronic Systems" Digital Testing: Design Representation and Fault Detection
Inference of progress properties for (multi party) sessions Mario Coppo (Universita’ di Torino) joint work with Mariangiola Dezani, Nobuko Yoshida Lisbon,
WIMS 2014, June 2-4Thessaloniki, Greece1 Optimized Backward Chaining Reasoning System for a Semantic Web Hui Shi, Kurt Maly, and Steven Zeil Contact:
Modelling Cell Signalling Pathways in PEPA
Fault Equivalence Number of fault sites in a Boolean gate circuit is = #PI + #gates + # (fanout branches) Fault equivalence: Two faults f1.
Leonardo da Vinci ALLEGRO © J. M. Martins Ferreira - University of Porto (FEUP / DEEC)1 Scan design techniques J. M. Martins Ferreira FEUP / DEEC - Rua.
Determinization of Büchi Automata
SECTION 21.5 Eilbroun Benjamin CS 257 – Dr. TY Lin INFORMATION INTEGRATION.
Addressing Diverse User Preferences in SQL-Query-Result Navigation SIGMOD ‘07 Zhiyuan Chen Tao Li University of Maryland, Baltimore County Florida International.
Efficient Query Evaluation on Probabilistic Databases
Introduction to Computability Theory
1 Introduction to Computability Theory Lecture7: PushDown Automata (Part 1) Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture5: Context Free Languages Prof. Amos Israeli.
Today’s Agenda  HW #1 Due  Quick Review  Finish Input Space Partitioning  Combinatorial Testing Software Testing and Maintenance 1.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
CP — Concurrent Programming 12. Petri Nets Prof. O. Nierstrasz Wintersemester 2005 / 2006.
Technische Universität München Institut für Informatik D München, Germany Realizability of System Interface Specifications Manfred Broy.
25/06/2015Marius Mikucionis, AAU SSE1/22 Principles and Methods of Testing Finite State Machines – A Survey David Lee, Senior Member, IEEE and Mihalis.
Chapter 28 Design of Experiments (DOE). Objectives Define basic design of experiments (DOE) terminology. Apply DOE principles. Plan, organize, and evaluate.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
Backtracking Reading Material: Chapter 13, Sections 1, 2, 4, and 5.
Environment Modeling in Quasi- Static Scheduling EE249 Project Donald Chai Mentors: Alex Kondratyev, Yoshi Watanabe.
Warm Up Explain how to simplify the expression 27 ÷ (9 + 6) + 7 = f
Detection and Resolution of Anomalies in Firewall Policy Rules
©2003/04 Alessandro Bogliolo Background Information theory Probability theory Algorithms.
Comparison of methods for supervisory control and submodule construction 1 Gregor v. Bochmann, University of Ottawa Comparison of methods for supervisory.
Com1040 Systems Design and Testing Part II – Testing (Based on A.J. Cowling’s lecture notes) LN-Test3: Equivalence classes and boundary conditions Marian.
The content of these slides by John Galeotti, © Carnegie Mellon University (CMU), was made possible in part by NIH NLM contract# HHSN P,
1 A Petri Net Siphon Based Solution to Protocol-level Service Composition Mismatches Pengcheng Xiong 1, Mengchu Zhou 2 and Calton Pu 1 1 College of Computing,
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
Li Yi, APSEC ‘12 Constructing Feature Models Us­­ing a Cross-Join Merging Operator.
On Bridging Simulation and Formal Verification Eugene Goldberg Cadence Research Labs (USA) VMCAI-2008, San Francisco, USA.
Zvi Kohavi and Niraj K. Jha 1 Memory, Definiteness, and Information Losslessness of Finite Automata.
Theory of Computation, Feodor F. Dragan, Kent State University 1 Regular expressions: definition An algebraic equivalent to finite automata. We can build.
Hybrid Solutions for Feature Interaction Detection and Resolution Mario Kolberg Evan Magill Stephan Reiff-Marganiec University of Stirling Muffy Calder.
A Theory of Interactive Computation Jan van Leeuwen, Jiri Widermann Presented by Choi, Chang-Beom KAIST.
MD – Object Model Domain eSales Checker Presentation Régis Elling 26 th October 2005.
Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations.
CHAPTER 1 Regular Languages
A Policy Architecture for Enhancing and Controlling Features Stephan Reiff-Marganiec Kenneth J Turner University of Stirling.
Process-oriented System Analysis Process Mining. BPM Lifecycle.
1 Features as Constraints Rafael AccorsiUniv. Freiburg Carlos ArecesUniv. Amsterdam Wiet BoumaKPN Research Maarten de RijkeUniv. Amsterdam.
MACHINE LEARNING 10 Decision Trees. Motivation  Parametric Estimation  Assume model for class probability or regression  Estimate parameters from all.
Mathematical Preliminaries
May University of Glasgow Generalising Feature Interactions in Muffy Calder, Alice Miller Dept. of Computing Science University of Glasgow.
2G1516 Formal Methods2005 Mads Dam IMIT, KTH 1 CCS: Processes and Equivalences Mads Dam Reading: Peled 8.5.
Lexical Analysis – Part II EECS 483 – Lecture 3 University of Michigan Wednesday, September 13, 2006.
An Enhanced Cellular Automata and Image Pyramid Decomposition Based Algorithm for Image Segmentation : A New Concept Anand Prakash Shukla Suneeta Agarwal.
Identification of Feature Denial of Services Rui Gustavo Crespo Technical University of Lisbon/ Portugal.
Chapter 8 Asynchronous System Model by Mikhail Nesterenko “Distributed Algorithms” by Nancy A. Lynch.
1 Turing Machines and Equivalent Models Section 13.1 Turing Machines.
1 Chapter Constructing Efficient Finite Automata.
An Algorithm for the Consecutive Ones Property Claudio Eccher.
Digital Image Processing, Spring ECES 682 Digital Image Processing Week 8 Oleh Tretiak ECE Department Drexel University.
Simulation of Rosetta Models Joseph Kuehn University of Adelaide, Australia.
1 Section 11.3 Constructing Efficient Finite Automata First we’ll see how to transform an NFA into a DFA. Then we’ll see how to transform a DFA into a.
Dr. Nermin Hamza. Agenda Signed Numbers Properties of Switching Algebra.
Section Recursion  Recursion – defining an object (or function, algorithm, etc.) in terms of itself.  Recursion can be used to define sequences.
1 Partial Orderings Epp, section Introduction An equivalence relation is a relation that is reflexive, symmetric, and transitive A partial ordering.
Unit-III Algebraic Structures
Profiling based unstructured process logs
Recovering and Exploiting Structural Knowledge from CNF Formulas
Simplifications of Context-Free Grammars
Sets and Logic…. Chapters 5 and 6
REGULAR LANGUAGES AND REGULAR GRAMMARS
Theory of Computation Turing Machines.
Resolution Proofs for Combinational Equivalence
Non-preemptive Semantics for Data-race-free Programs
Dave Marples Communications Division
Presentation transcript:

Stephan Reiff University of Glasgow Hybrid Techniques for Detecting and Resolving Feature Interactions in Telecommunication Services Resolution Choices for an Online Feature Manager FIW’00: Glasgow, May 2000

[2] Work, Project and Partners Joint work with Prof. Muffy Calder Project (EPSRC funded) : Hybrid Techniques for Detecting and Resolving Feature Interactions in Telecommunication Services Partners: –University of Strathclyde, Glasgow –Citel –Mitel

FIW’00 : Glasgow, May 2000[3] Overview Motivation and Background The Hybrid Approach Definitions Feature Interference The Feature Manager Solution Space Open Questions and Further Work

FIW’00 : Glasgow, May 2000[4] Motivation and Background Motivation Feature Interaction Problem Legacy and Proprietary Systems –Extension needed –Knowledge about internal behaviour unavailable/unreliable Background Work by Marples,Magill and Tsang; all have shortcomings We use Marples and Magill’s approach Hybrid? Use offline analysis to find general rules... … to control online feature manager

FIW’00 : Glasgow, May 2000[5] Example Features (1)

FIW’00 : Glasgow, May 2000[6] Definitions Messages –IO-aspect(event, source, destination, value) –relations between messages: –equal, inverse and name equivalent Alphabet –Set of messages (partitioned into Input and Output messages) Trace –non-empty, finite sequence of messages (starting with an input message) Feature –non empty set of traces over a minimal alphabet [Show examples]

FIW’00 : Glasgow, May 2000[7] Example Features (2) iaf = [[+(forwardcall,id,n,a)-(oinform,id,a,"Call Forwarded")]] cfu = [[+(ialert, a, b,-)-(forwardcall,id,n,a)]] tl = [[+(offhook, id, id,-)-(announce,id,id,"PIN?") +(onhook, id, id,-)], [+(offhook,id,id,-)-(tau)], [+(offhook,id,id,-)-(announce,id,id,"PIN?") +(dial,id,id,n)-(tau)], [+(offhook,id,id,-)-(announce,id,id,"PIN?") +(dial,id,id,n)-(announce,id,id, "wrong PIN") +(onhook,id,id,-)]]

FIW’00 : Glasgow, May 2000[8] Definition: Feature Interference n features F 1 …F n with alphabets  1 …  n interfere iff In words: Features interfere iff they have either a common input message or one feature’s output message is the other features input message. Feature Interference

FIW’00 : Glasgow, May 2000[9] Resolution Process

FIW’00 : Glasgow, May 2000[10] Solution Space (1) What is it? –A set of all traces that can be generated from the features individual traces –simple example: How do we obtain it? –Add all traces of just one feature –Add all combinations of traces of 2 features –Add all combinations of traces of 3 … –…

FIW’00 : Glasgow, May 2000[11] Solution Space (2) The combinations are sets of all possible overlapping interleavings Here we will consider overlapping interleavings of just 2 traces [example]

FIW’00 : Glasgow, May 2000[12] Examples for oi2 Example 1: t1 = {(+a-b+c)}t2 = {(+x-a-b)} oi2(t1, t2) = {(+x-a+a-b+c)} Example 2: t3 = {(+d-e)}t4 = {(+d-f)} oi2(t1, t2) = {(+d-e-f), (+d-f-e)} [Question: Why keep -a+a?] [Answer: Examples (CFB + BC with busy and BC + CND with free)]

FIW’00 : Glasgow, May 2000[13] Pruning: Simple Rules No useful behaviour is provided by: –consecutive announcement messages without an intermediate input –tones and announcements after onhook The message  can be removed from traces Duplicate traces can be removed [Example]

FIW’00 : Glasgow, May 2000[14] An Example >>> printshort(fm("xxx",fiwtl,fiwtcs)) These features interfere,finding resolution... 0 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,tau ) 1 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,wrong PIN )(-,tau )(+,onhook,-) 2 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,wrong PIN )(+,onhook,-)(-,tau ) 3 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,tau )(-,announce,wrong PIN )(+,onhook,-) 4 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,screened )(+,onhook,-)(-,tau ) 5 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,screened )(-,tau )(+,onhook,-) 6 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,tau )(-,announce,screened )(+,onhook,-) 7 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,wrong PIN )(-,announce,screened ) (+,onhook,-)(+,onhook,-) 8 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,wrong PIN )(+,onhook,-) (-,announce,screened )(+,onhook,-) 9 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,screened )(-,announce,wrong PIN ) (+,onhook,-)(+,onhook,-) 10 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,screened )(+,onhook,-) (-,announce,wrong PIN )(+,onhook,-) 11 : (+,offhook,-)(-,announce,PIN? )(+,onhook,-) 12 : (+,offhook,-)(-,tau ) 13 : (+,offhook,-)(-,announce,PIN? )(+,dial,n )(-,announce,wrong PIN )(+,onhook,-) 14 : (+,dial,n )(-,tau ) 15 : (+,dial,n )(-,announce,screened )(+,onhook,-)

FIW’00 : Glasgow, May 2000[15] Open Questions and Next Steps We need to refine pruning –What are bad resolutions? –What is a/the best resolution? –Is there always a best resolution? Can we combine construction and pruning? What is the complexity? –How well does the approach scale up? Is an observable approach sufficient? Use Process Algebra? –New Operator(s) for Construct and Prune

FIW’00 : Glasgow, May 2000[16] Conclusion

FIW’00 : Glasgow, May 2000[17] Any Questions? References:

FIW’00 : Glasgow, May 2000[18] Relations between Messages Name equivalent, event type and values are equal Equal, name equivalent and IO aspect are equal Inverses, name equivalent and IO aspect not equal

FIW’00 : Glasgow, May 2000[19] A functional View of the FM The feature manager has to construct the solution space and extract the best solution from it. Definition: Feature Manager [Explain individual subfunctions]

FIW’00 : Glasgow, May 2000[20] Construct

FIW’00 : Glasgow, May 2000[21] oi2 First(t j ) denotes the first message in a trace.

FIW’00 : Glasgow, May 2000[22] Overlapping Interleaving

FIW’00 : Glasgow, May 2000[23] f() and int()