CS 367: Model-Based Reasoning Lecture 5 (01/29/2002) Gautam Biswas.

Slides:



Advertisements
Similar presentations
4b Lexical analysis Finite Automata
Advertisements

CS 267: Automated Verification Lecture 8: Automata Theoretic Model Checking Instructor: Tevfik Bultan.
Lecture 24 MAS 714 Hartmut Klauck
1 Fault Diagnosis for Timed Automata Stavros Tripakis VERIMAG.
Operating Systems Lecture Notes Deadlocks Matthew Dailey Some material © Silberschatz, Galvin, and Gagne, 2002.
Concurrency: Deadlock and Starvation Chapter 6. Deadlock Permanent blocking of a set of processes that either compete for system resources or communicate.
Nondeterministic Finite Automata CS 130: Theory of Computation HMU textbook, Chapter 2 (Sec 2.3 & 2.5)
Game-theoretic approach to the simulation checking problem Peter Bulychev Vladimir Zakharov Lomonosov Moscow State University.
CS 367: Model-Based Reasoning Lecture 2 (01/15/2002)
Supervisory Control of Hybrid Systems Written by X. D. Koutsoukos et al. Presented by Wu, Jian 04/16/2002.
Nir Piterman Department of Computer Science TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAA Bypassing Complexity.
Probability Theory Part 1: Basic Concepts. Sample Space - Events  Sample Point The outcome of a random experiment  Sample Space S The set of all possible.
Diagnosis of Discrete Event Systems Meir Kalech Partly based on slides of Gautam Biswass.
1 Introduction to Computability Theory Lecture3: Regular Expressions Prof. Amos Israeli.
Winter 2007SEG2101 Chapter 81 Chapter 8 Lexical Analysis.
1 Software Testing and Quality Assurance Lecture 36 – Software Quality Assurance.
Languages. A Language is set of finite length strings on the symbol set i.e. a subset of (a b c a c d f g g g) At this point, we don’t care how the language.
An Introduction to Input/Output Automata Qihua Wang.
Lecture 3 Goals: Formal definition of NFA, acceptance of a string by an NFA, computation tree associated with a string. Algorithm to convert an NFA to.
Semantics of LOTOS Answering the question: Which processes are equivalent? Basic LOTOS: ignore ! and ?...pure synchronization Dining philosophers example:
CS 450 OPERATING SYSTEMS DEADLOCKS Manju Muralidharan Priya.
Concurrency CS 510: Programming Languages David Walker.
Lecture 3 Goals: Formal definition of NFA, acceptance of a string by an NFA, computation tree associated with a string. Algorithm to convert an NFA to.
Department of Electrical Engineering and Computer Sciences University of California at Berkeley System-Level Types for Component-Based Design Edward A.
Advanced Behavioral Modeling
System-Level Types for Component-Based Design Paper by: Edward A. Lee and Yuhong Xiong Presentation by: Dan Patterson.
Concurrency: Deadlock and Starvation Chapter 6. Goal and approach Deadlock and starvation Underlying principles Solutions? –Prevention –Detection –Avoidance.
1 Concurrency: Deadlock and Starvation Chapter 6.
Timed UML State Machines Ognyana Hristova Tutor: Priv.-Doz. Dr. Thomas Noll June, 2007.
Modeling with ordinary Petri Nets Events: Actions that take place in the system The occurrence of these events is controlled by the state of the system.
Nondeterministic Finite Automata CS 130: Theory of Computation HMU textbook, Chapter 2 (Sec 2.3 & 2.5)
AUTOMATA THEORY Reference Introduction to Automata Theory Languages and Computation Hopcraft, Ullman and Motwani.
CIS 842: Specification and Verification of Reactive Systems Lecture Specifications: Sequencing Properties Copyright , Matt Dwyer, John Hatcliff,
CS 367: Model-Based Reasoning Lecture 11 (02/19/2002) Gautam Biswas.
CIS 842: Specification and Verification of Reactive Systems Lecture Specifications: LTL Model Checking Copyright , Matt Dwyer, John Hatcliff,
Major objective of this course is: Design and analysis of modern algorithms Different variants Accuracy Efficiency Comparing efficiencies Motivation thinking.
CS5270 Lecture 41 Timed Automata I CS 5270 Lecture 4.
Natallia Kokash (Accepted for PACO’2011) ACG, 31/05/ Input-output conformance testing for channel-based connectors 1.
Lexical Analysis: Finite Automata CS 471 September 5, 2007.
BPEL Business Process Engineering Language A technology used to build programs in SOA architecture.
CS4730 Real-Time Systems and Modeling Fall 2010 José M. Garrido Department of Computer Science & Information Systems Kennesaw State University.
CSCI1600: Embedded and Real Time Software Lecture 11: Modeling IV: Concurrency Steven Reiss, Fall 2015.
Course: COMS-E6125 Professor: Gail E. Kaiser Student: Shanghao Li (sl2967)
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
OPERATING SYSTEMS CS 3530 Summer 2014 Systems and Models Chapter 03.
Software Quality and Safety Pascal Mbayiha.  software engineering  large, complex systems  functionality, changing requirements  development difficult.
Program Correctness. The designer of a distributed system has the responsibility of certifying the correctness of the system before users start using.
Overview of Previous Lesson(s) Over View  A token is a pair consisting of a token name and an optional attribute value.  A pattern is a description.
Chapter 5 Finite Automata Finite State Automata n Capable of recognizing numerous symbol patterns, the class of regular languages n Suitable for.
CS 367: Model-Based Reasoning Lecture 7 (02/05/2002) Gautam Biswas.
CS5270 Lecture 41 Timed Automata I CS 5270 Lecture 4.
Theory of Computation. Introduction to The Course Lectures: Room ( Sun. & Tue.: 8 am – 9:30 am) Instructor: Dr. Ayman Srour (Ph.D. in Computer Science).
OPERATING SYSTEMS CS 3502 Fall 2017
Sequential Flexibility
Lexical analysis Finite Automata
Activity Diagram.
Copyright © Cengage Learning. All rights reserved.
FORMAL LANGUAGES AND AUTOMATA THEORY
Parallel and Distributed Simulation Techniques
Jaya Krishna, M.Tech, Assistant Professor
CSE322 The Chomsky Hierarchy
Objective of This Course
High-Level Abstraction of Concurrent Finite Automata
CSE322 Definition and description of finite Automata
CSE322 Minimization of finite Automaton & REGULAR LANGUAGES
VERIFICATION IN CHUNK-BASED SOFTWARE EVOLUTION
4b Lexical analysis Finite Automata
CSCI1600: Embedded and Real Time Software
4b Lexical analysis Finite Automata
Normal Forms for Context-free Grammars
Presentation transcript:

CS 367: Model-Based Reasoning Lecture 5 (01/29/2002) Gautam Biswas

Today’s Lecture Last Lecture: Concept of Blocking Non deterministic Automata Operations on Automata Accessible, Coaccessible parts, Composition Operators (Product, Parallel) Today’s Lecture: Parallel Composition Observer Automata State Space Refinement Automata with Input and Output Analysis of Discrete Event Systems

Composition of Automata Two kinds Product:   completely synchronous Parallel:   synchronous

Product Composition

Example: Product Composition b

Parallel Composition

Parallel Composition: Example b Two automata are synchronized on common events, E 1  E 2 One automaton can execute a private event without participation of other automata (E 1 \ E 2 )  (E 2 \ E 1 ) If E 1 = E 2 then parallel composition reduces to product If E 1  E 2 =  then G 1  G 2 is the concurrent behavior of G 1 and G 2 – called the shuffle of G 1 and G 2 G 1  G 2 = G 2  G 1 (G 1  G 2 )  G 3 = G 1  (G 2  G 3 )

Example of Parallel Composition Dining Philosophers (Multiple users sharing common resources) Philosophers: (i) think, (ii) eat Forks: (i) available, (ii) used Incomplete model Contains two deadlock states -- controller added to disallow deadlock

What is control? Control – selecting right input to system to achieve desired behavior: r(t) – reference signal – describes desired behavior

Complexity of Parallel Composition k component system, each component model has m states. If the event sets of each automata are distinct, then model of complete system has m k states (exponential growth) – curse of dimensionality How do we handle complexity? Incremental analysis Symbolic representations ( “Symbolic Model Checking: States and Beyond,” Burch, et al., Information and Computation, vol. 98, pp , 1998.

Observer Automata Conversion of non deterministic FSA to deterministic FSA : language preserving transformation Converted deterministic automaton is called the observer: Partition the set of events: Observer contains no unobservable events

Observer -- Example Note: G obs is deterministic

Observer : Algorithm

State Space Refinement Task: Comparison of two languages Refinement by Product: How to make this comparison computationally efficient?

Moore and Mealy Automata Moore automata: automata with state outputs Mealy: input/output automata FSA  Regular Languages

Analysis of Discrete Event Systems Safety and Blocking Properties Safety: avoiding undesirable states, or undesirable sequence of events for a composed automaton – “legal” or “admissible” language Determine if state y is reached from state x : perform accessible operation on automaton with x as initial state, look for y in result Determine if substring possible in automaton: “execute” substring for all accessible states Parallel composition complexity: Accessible, Coaccessible algorithms are linear in size of automaton Blocking Properties:

State Estimation Unobserved events:  events can be attributed to: (i) absence of sensors, (ii) event occurred remotely, not communicated, (iii) fault events Genuine unobservable events:

Daignostics Determine whether certain events with certainty: fault events Build new automata like observer, but attach “labels” to the states of G diag To build Attach N label to states that can be reached from x 0 by unobservable strings Attach Y label to states that can be reached from x 0 by unobservable strings that contain at least one occurrence of e d If state z can be reached both with and without executing e d then create two entries in the initial state set of G diag : zN and zY.

Diagnoser Automata