This document discusses software verification using state-event based reasoning and deadlock detection. It presents an approach for verifying concurrent software using labeled Kripke structures to model both states and communication events. Properties are specified as state/event linear temporal logic (LTL) formulas. The approach allows for efficient model checking of both safety and liveness properties. Case studies on verifying properties of a real-time operating system and an industrial robotics module are also presented.
1) Laplace's equation describes situations where the electric potential (V) or other scalar field satisfies ∇^2V = 0. It can be solved in one, two, or three dimensions using separation of variables.
2) In three dimensions, the general solution is a sum of multipole terms involving associated Legendre polynomials. The leading terms are the monopole and dipole contributions.
3) For a dipole potential, the electric field is proportional to p/r^3 where p is the dipole moment. The field points radially away from a head-to-tail dipole and has no φ dependence.
This section discusses acceleration-velocity models with resistance proportional to velocity, velocity-squared, and inverse-square gravitational acceleration. It provides the equations, solutions, and answers to example problems for each model. Example problems are solved through integration and setting initial conditions to find velocity and position over time. Terminal velocities and times to stop/impact are calculated for some examples.
1) The document provides information on various physics concepts including kinematics equations, forces, energy, and more.
2) It includes 13 key equations related to topics like velocity, acceleration, Newton's laws of motion, Hooke's law, energy, and others.
3) The document also provides details on astrophysics concepts like astronomical units and the Hubble constant, as well as common physics prefixes and units.
Gauge Systems With Noncommutative Phase Spaceguest9fa195
This document describes gauge systems with noncommutative phase spaces. It introduces several models of gauge systems where the phase space has a noncanonical symplectic structure involving parameters that encode noncommutativity among coordinates and momenta.
As an example, it considers a noncommutative version of the usual SL(2,R) model where the symplectic structure is modified by a parameter θ that introduces noncommutativity between one set of coordinates. The constraints of the original model are also modified to maintain the same gauge algebra. The dynamics of this noncommutative SL(2,R) model involve additional terms depending on θ.
More generally, the paper shows it is possible to construct gauge systems where non
Adiabatic Theorem for Discrete Time Evolutiontanaka-atushi
The document summarizes the proof of an adiabatic theorem for discrete time evolution described by quantum maps. It extends Kato's proof of the adiabatic theorem to the discrete setting by using an interaction picture and showing that the main estimation involves terms that decay as O(N^-1) through destructive interference, proving the theorem. The proof technique involves introducing a geometric evolution operator and using a discrete version of integration by parts.
Catalogue of Models for Electricity Prices Part 2NicolasRR
This document provides an overview and examples of several stochastic models for electricity spot prices, including:
1) A one-factor affine jump diffusion model that adds a jump component to allow for strong price variations. The jumps follow a Gaussian distribution.
2) A jump diffusion model where jump amplitudes follow an Erlang distribution. Examples show how the parameters n and λ impact spike magnitude.
3) A Markov-chain model where the spot price depends on the percentage of online generators. Deterministic functions are used to influence spike amplitude and timing.
1) Laplace's equation describes situations where the electric potential (V) or other scalar field satisfies ∇^2V = 0. It can be solved in one, two, or three dimensions using separation of variables.
2) In three dimensions, the general solution is a sum of multipole terms involving associated Legendre polynomials. The leading terms are the monopole and dipole contributions.
3) For a dipole potential, the electric field is proportional to p/r^3 where p is the dipole moment. The field points radially away from a head-to-tail dipole and has no φ dependence.
This section discusses acceleration-velocity models with resistance proportional to velocity, velocity-squared, and inverse-square gravitational acceleration. It provides the equations, solutions, and answers to example problems for each model. Example problems are solved through integration and setting initial conditions to find velocity and position over time. Terminal velocities and times to stop/impact are calculated for some examples.
1) The document provides information on various physics concepts including kinematics equations, forces, energy, and more.
2) It includes 13 key equations related to topics like velocity, acceleration, Newton's laws of motion, Hooke's law, energy, and others.
3) The document also provides details on astrophysics concepts like astronomical units and the Hubble constant, as well as common physics prefixes and units.
Gauge Systems With Noncommutative Phase Spaceguest9fa195
This document describes gauge systems with noncommutative phase spaces. It introduces several models of gauge systems where the phase space has a noncanonical symplectic structure involving parameters that encode noncommutativity among coordinates and momenta.
As an example, it considers a noncommutative version of the usual SL(2,R) model where the symplectic structure is modified by a parameter θ that introduces noncommutativity between one set of coordinates. The constraints of the original model are also modified to maintain the same gauge algebra. The dynamics of this noncommutative SL(2,R) model involve additional terms depending on θ.
More generally, the paper shows it is possible to construct gauge systems where non
Adiabatic Theorem for Discrete Time Evolutiontanaka-atushi
The document summarizes the proof of an adiabatic theorem for discrete time evolution described by quantum maps. It extends Kato's proof of the adiabatic theorem to the discrete setting by using an interaction picture and showing that the main estimation involves terms that decay as O(N^-1) through destructive interference, proving the theorem. The proof technique involves introducing a geometric evolution operator and using a discrete version of integration by parts.
Catalogue of Models for Electricity Prices Part 2NicolasRR
This document provides an overview and examples of several stochastic models for electricity spot prices, including:
1) A one-factor affine jump diffusion model that adds a jump component to allow for strong price variations. The jumps follow a Gaussian distribution.
2) A jump diffusion model where jump amplitudes follow an Erlang distribution. Examples show how the parameters n and λ impact spike magnitude.
3) A Markov-chain model where the spot price depends on the percentage of online generators. Deterministic functions are used to influence spike amplitude and timing.
This document summarizes Markowitz's mean-variance portfolio theory and the two-fund theorem.
[1] Markowitz formulated the mean-variance model, which minimizes portfolio variance subject to a target expected return. The optimal weights are a function of the covariance matrix and target mean.
[2] The two-fund theorem states that any efficient portfolio can be replicated as a combination of two "fundamental" portfolios. Investors only need to invest in these two funds.
[3] The minimum variance set forms the left boundary of the feasible region in mean-variance space. Portfolios on this boundary are efficient funds.
This document summarizes research investigating the use of local meta-models within the CMA-ES optimization algorithm for large population sizes. It introduces CMA-ES, describes how local meta-models can be used to build surrogate models of the objective function to reduce evaluations, and presents a new variant called nlmm-CMA that uses a more flexible acceptance criterion for the meta-model. Experimental results show nlmm-CMA achieves speedups over lmm-CMA, the prior local meta-model approach for CMA-ES, on benchmark optimization problems.
1) A third charge Q located at a distance x from the left end of a rod experiences forces from the other charges. The net force is zero when x = 0.634d, providing a stable equilibrium position.
2) For two charges, the electric field and force they exert on a third charge a distance d away depends on d. The equilibrium position occurs when the fields cancel out.
3) An object of mass m and charge -Q suspended between two positive charges will undergo simple harmonic motion with an angular frequency proportional to Q/m.
This document provides an overview of signal-noise separation in singular spectrum analysis (SSA). It discusses how SSA works, including the decomposition and reconstruction stages. In the decomposition stage, a time series is embedded into a trajectory matrix and SVD is applied. In the reconstruction stage, eigentriples are grouped into signal and noise components, the trajectory matrix is reconstructed, and diagonal averaging is used to transform it back into a time series. Key steps include selecting the embedding dimension m and number of signal components k. The document also discusses parameter selection and how the embedding dimension relates to the dimensionality of the underlying manifold.
1) The document contains physics tutorial questions and solutions related to electrostatics and electric fields.
2) Sample questions calculate electrostatic force between ions, charge on point charges based on tension in a string connecting them, and direction of motion and speed of a charged particle in an electric field.
3) Detailed solutions show the relevant equations, setup of the problem, and step-by-step working to arrive at the final numerical answers.
The document provides an overview of key physics equations and concepts related to forces and motion, including equations for relative deviation, prefixes, units of area and volume, average speed, velocity, acceleration, momentum, Newton's laws of motion, and impulse. Key variables and their units are defined for each equation. Examples of displacement-time and velocity-time graphs are also included to illustrate the relationships between displacement, velocity, time, and acceleration.
F. Quevedo, On Local String Models and Moduli StabilisationSEENET-MTP
This document provides an overview of local string models in compact Calabi-Yau manifolds and moduli stabilisation. It discusses how the standard model can be localized on D-branes at singularities within a global compact Calabi-Yau. Consistency constraints from tadpole cancellation and orientifolds require specific embeddings of local models into the global geometry. Moduli are stabilised at hierarchies of scales allowing TeV soft terms and a Minkowski vacuum.
This document contains slides from a lecture on Hidden Markov Models given by Andrew W. Moore. The slides introduce Markov systems as having a set of states and discrete time steps, with the system occupying exactly one state at each time step chosen randomly based on the previous state. The slides provide examples of state transition probabilities in a Markov system and note that the Markov property means the next state depends only on the current state.
The document provides an overview of key physics equations and concepts for Form 4 students, including equations for relative deviation, prefixes, units for area and volume, equations for average speed, velocity, acceleration, momentum, Newton's laws of motion, and impulse. Key terms are defined for important concepts like displacement, time, mass, force, and velocity. Formulas are presented for calculations involving these fundamental physics quantities and relationships.
Analisi numerica di problemi di ingegneria strutturaleMMSLAB
Nel seminario verranno presentati due problemi applicativi che nascono nell'ambito dell'ingegneria strutturale e che richiedono la risoluzione di problemi a larga scala: il primo è un problema di ottimizzazione non lineare vincolato legato alla progettazione di strutture aeronautiche, mentre il secondo è un problema agli autovalori vincolato risultante dall'analisi modale di edifici storici in muratura. Verrà analizzata la struttura dei problemi e verranno proposte strategie numeriche ad hoc per la loro risoluzione in grado di gestire sia le grandi dimensioni che i vincoli sulle variabili. Nel primo caso proporremo l'utilizzo di strategie "multilevel" e nel secondo caso sfrutteremo tecniche di algebra lineare per matrici sparse.
Peer instructions questions for basic quantum mechanicsmolmodbasics
The document discusses the development of quantum mechanics from Planck/Einstein's quantization of energy to Schrodinger's wave equation. It presents the time-dependent and time-independent Schrodinger equations and their application to particles in a box, harmonic oscillators, and the hydrogen atom. The hydrogen atom energy levels and wavefunctions of the 1s and 2s orbitals are shown.
1) The document discusses soliton scattering amplitudes in affine Toda field theory and how they can be calculated using quantum affine algebras and Yangians.
2) It presents an algebraic method to find solutions to the reflection equation which describes particle reflection at boundaries in the quantum theory.
3) The goal is to motivate studying certain coideal subalgebras of quantum affine algebras and Yangians in order to calculate reflection matrices and learn about boundary solitons.
This document contains homework problems related to physics concepts like crystal structure, band structure, diffraction, and ionic bonding energies. It includes 4 problems:
1) Identifying the element of a metallic sample based on x-ray diffraction data by matching Bragg angles to allowed crystal structures. The element is determined to be nickel.
2) Calculating the zero-point kinetic energy of particles confined in a linear potential well based on the de Broglie wavelength formula.
3) Analyzing the interatomic potential and compressibility of a 1D linear ionic crystal chain, expressing the work required to compress the chain in terms of material properties.
4) Computing the Madelung energies of barium oxide
ANISOTROPIC SURFACES DETECTION USING INTENSITY MAPS ACQUIRED BY AN AIRBORNE L...grssieee
The document discusses methods for estimating the spatial anisotropy of surfaces using near-infrared LiDAR intensity maps over coastal environments. It presents two estimators - one based on 1D correlations of columns and lines in sliding windows, and another based on 2D correlations of windows and their transposes. The estimators are evaluated on synthetic data with varying anisotropy, relative anisotropy, and signal-to-noise ratio. The estimators are then applied to LiDAR intensity maps from coastal areas to characterize anisotropic surfaces independently of intensity variations. Future work involves combining these methods with multi-resolution wavelet approaches and comparing LiDAR intensity to DEM and dual-polarization SAR data.
This document discusses the torque-slip characteristics of three-phase induction motors. It derives expressions for the gross torque developed as a function of slip and defines key terms like synchronous speed, slip, and maximum torque. The characteristics are shown to vary with input voltage and rotor resistance. Maximum torque is independent of rotor resistance but the slip at which it occurs increases with resistance. Starters are introduced to reduce starting current and torque.
This document provides an introduction to the concept of wave turbulence. It discusses how waves interact nonlinearly at finite amplitudes to produce a statistical, non-equilibrium dynamics. Key points:
- Wave turbulence involves dispersive waves that are excited and damped by external processes, leading to interactions between many degrees of freedom.
- The nonlinear interactions can be modeled using a Hamiltonian approach by including higher-order terms that couple different Fourier modes.
- A central goal is developing a statistical description of the system using correlation functions and obtaining a closed kinetic equation for the wave spectrum.
- In the weak turbulence regime, this kinetic equation can be solved perturbatively to obtain scaling laws for the wave spectrum in both physical and
Simulation of Magnetically Confined Plasma for Etch Applicationsvvk0
The document describes computational optimization of plasma uniformity in a magnetically enhanced capacitively coupled plasma (CCP) reactor for disk etch applications. Initial simulations using a two-dimensional hybrid plasma equipment model (HPEM) showed non-uniform electron density and radical distributions in a CFP plasma with the magnet placed 125 mm from the substrate. The distance between the magnet and substrate was increased to 113 mm, which improved the uniformity of the electron density, CFx radical densities, and plasma potential above the substrate. Further simulations varying the magnet distance found that plasma density and F radical density decreased with smaller magnet-substrate gaps. The study demonstrates optimization of plasma uniformity through computational modeling of magnetic field and plasma transport parameters.
This document summarizes key concepts from a lecture on digital modulation and coding detection theory. It defines the Q-function and shows how it can be used to calculate error probabilities for digital modulation. It then derives upper and lower bounds on error probability (Pe) in terms of the minimum distance (dmin) between constellation points. Finally, it discusses how repeaters can be used to boost signal strength, and shows how the error probability is affected depending on whether the repeaters are regenerative or analog.
The document discusses calculating and interpreting the Green's function or propagator for systems with polarons. It begins by defining the polaron and stating the quantity of interest is the one-particle retarded propagator. It then provides examples of calculating the propagator exactly for simple non-interacting and impurity models to build intuition. Finally, it outlines discussing the Holstein polaron model in bulk materials and how the polaron may be affected near a surface.
What happens when the Kolmogorov-Zakharov spectrum is nonlocal?Colm Connaughton
This document summarizes research on the behavior of the Kolmogorov-Zakharov (KZ) spectrum when it is nonlocal. It examines a model of cluster-cluster aggregation described by the Smoluchowski equation, which can be viewed as a model of 3-wave turbulence without backscatter. The research finds that when the exponents in the interaction term satisfy certain conditions, the KZ spectrum is nonlocal. In this case, the stationary state has a novel functional form and can become unstable, leading to oscillatory behavior in the cascade dynamics at long times. Open questions remain about whether physical systems exhibit this behavior and how the results are affected by including backscatter terms.
The document discusses developing a wireless sensor network system for structural health monitoring using non-destructive evaluation techniques like acoustic emission testing and ultrasound testing. It outlines objectives like sensor node development, network control, and damage detection algorithms. The project status updates sensor node development and a finite element model for lamb wave propagation. Future plans include more signal processing algorithms and investigating additional non-destructive methods.
This document summarizes Markowitz's mean-variance portfolio theory and the two-fund theorem.
[1] Markowitz formulated the mean-variance model, which minimizes portfolio variance subject to a target expected return. The optimal weights are a function of the covariance matrix and target mean.
[2] The two-fund theorem states that any efficient portfolio can be replicated as a combination of two "fundamental" portfolios. Investors only need to invest in these two funds.
[3] The minimum variance set forms the left boundary of the feasible region in mean-variance space. Portfolios on this boundary are efficient funds.
This document summarizes research investigating the use of local meta-models within the CMA-ES optimization algorithm for large population sizes. It introduces CMA-ES, describes how local meta-models can be used to build surrogate models of the objective function to reduce evaluations, and presents a new variant called nlmm-CMA that uses a more flexible acceptance criterion for the meta-model. Experimental results show nlmm-CMA achieves speedups over lmm-CMA, the prior local meta-model approach for CMA-ES, on benchmark optimization problems.
1) A third charge Q located at a distance x from the left end of a rod experiences forces from the other charges. The net force is zero when x = 0.634d, providing a stable equilibrium position.
2) For two charges, the electric field and force they exert on a third charge a distance d away depends on d. The equilibrium position occurs when the fields cancel out.
3) An object of mass m and charge -Q suspended between two positive charges will undergo simple harmonic motion with an angular frequency proportional to Q/m.
This document provides an overview of signal-noise separation in singular spectrum analysis (SSA). It discusses how SSA works, including the decomposition and reconstruction stages. In the decomposition stage, a time series is embedded into a trajectory matrix and SVD is applied. In the reconstruction stage, eigentriples are grouped into signal and noise components, the trajectory matrix is reconstructed, and diagonal averaging is used to transform it back into a time series. Key steps include selecting the embedding dimension m and number of signal components k. The document also discusses parameter selection and how the embedding dimension relates to the dimensionality of the underlying manifold.
1) The document contains physics tutorial questions and solutions related to electrostatics and electric fields.
2) Sample questions calculate electrostatic force between ions, charge on point charges based on tension in a string connecting them, and direction of motion and speed of a charged particle in an electric field.
3) Detailed solutions show the relevant equations, setup of the problem, and step-by-step working to arrive at the final numerical answers.
The document provides an overview of key physics equations and concepts related to forces and motion, including equations for relative deviation, prefixes, units of area and volume, average speed, velocity, acceleration, momentum, Newton's laws of motion, and impulse. Key variables and their units are defined for each equation. Examples of displacement-time and velocity-time graphs are also included to illustrate the relationships between displacement, velocity, time, and acceleration.
F. Quevedo, On Local String Models and Moduli StabilisationSEENET-MTP
This document provides an overview of local string models in compact Calabi-Yau manifolds and moduli stabilisation. It discusses how the standard model can be localized on D-branes at singularities within a global compact Calabi-Yau. Consistency constraints from tadpole cancellation and orientifolds require specific embeddings of local models into the global geometry. Moduli are stabilised at hierarchies of scales allowing TeV soft terms and a Minkowski vacuum.
This document contains slides from a lecture on Hidden Markov Models given by Andrew W. Moore. The slides introduce Markov systems as having a set of states and discrete time steps, with the system occupying exactly one state at each time step chosen randomly based on the previous state. The slides provide examples of state transition probabilities in a Markov system and note that the Markov property means the next state depends only on the current state.
The document provides an overview of key physics equations and concepts for Form 4 students, including equations for relative deviation, prefixes, units for area and volume, equations for average speed, velocity, acceleration, momentum, Newton's laws of motion, and impulse. Key terms are defined for important concepts like displacement, time, mass, force, and velocity. Formulas are presented for calculations involving these fundamental physics quantities and relationships.
Analisi numerica di problemi di ingegneria strutturaleMMSLAB
Nel seminario verranno presentati due problemi applicativi che nascono nell'ambito dell'ingegneria strutturale e che richiedono la risoluzione di problemi a larga scala: il primo è un problema di ottimizzazione non lineare vincolato legato alla progettazione di strutture aeronautiche, mentre il secondo è un problema agli autovalori vincolato risultante dall'analisi modale di edifici storici in muratura. Verrà analizzata la struttura dei problemi e verranno proposte strategie numeriche ad hoc per la loro risoluzione in grado di gestire sia le grandi dimensioni che i vincoli sulle variabili. Nel primo caso proporremo l'utilizzo di strategie "multilevel" e nel secondo caso sfrutteremo tecniche di algebra lineare per matrici sparse.
Peer instructions questions for basic quantum mechanicsmolmodbasics
The document discusses the development of quantum mechanics from Planck/Einstein's quantization of energy to Schrodinger's wave equation. It presents the time-dependent and time-independent Schrodinger equations and their application to particles in a box, harmonic oscillators, and the hydrogen atom. The hydrogen atom energy levels and wavefunctions of the 1s and 2s orbitals are shown.
1) The document discusses soliton scattering amplitudes in affine Toda field theory and how they can be calculated using quantum affine algebras and Yangians.
2) It presents an algebraic method to find solutions to the reflection equation which describes particle reflection at boundaries in the quantum theory.
3) The goal is to motivate studying certain coideal subalgebras of quantum affine algebras and Yangians in order to calculate reflection matrices and learn about boundary solitons.
This document contains homework problems related to physics concepts like crystal structure, band structure, diffraction, and ionic bonding energies. It includes 4 problems:
1) Identifying the element of a metallic sample based on x-ray diffraction data by matching Bragg angles to allowed crystal structures. The element is determined to be nickel.
2) Calculating the zero-point kinetic energy of particles confined in a linear potential well based on the de Broglie wavelength formula.
3) Analyzing the interatomic potential and compressibility of a 1D linear ionic crystal chain, expressing the work required to compress the chain in terms of material properties.
4) Computing the Madelung energies of barium oxide
ANISOTROPIC SURFACES DETECTION USING INTENSITY MAPS ACQUIRED BY AN AIRBORNE L...grssieee
The document discusses methods for estimating the spatial anisotropy of surfaces using near-infrared LiDAR intensity maps over coastal environments. It presents two estimators - one based on 1D correlations of columns and lines in sliding windows, and another based on 2D correlations of windows and their transposes. The estimators are evaluated on synthetic data with varying anisotropy, relative anisotropy, and signal-to-noise ratio. The estimators are then applied to LiDAR intensity maps from coastal areas to characterize anisotropic surfaces independently of intensity variations. Future work involves combining these methods with multi-resolution wavelet approaches and comparing LiDAR intensity to DEM and dual-polarization SAR data.
This document discusses the torque-slip characteristics of three-phase induction motors. It derives expressions for the gross torque developed as a function of slip and defines key terms like synchronous speed, slip, and maximum torque. The characteristics are shown to vary with input voltage and rotor resistance. Maximum torque is independent of rotor resistance but the slip at which it occurs increases with resistance. Starters are introduced to reduce starting current and torque.
This document provides an introduction to the concept of wave turbulence. It discusses how waves interact nonlinearly at finite amplitudes to produce a statistical, non-equilibrium dynamics. Key points:
- Wave turbulence involves dispersive waves that are excited and damped by external processes, leading to interactions between many degrees of freedom.
- The nonlinear interactions can be modeled using a Hamiltonian approach by including higher-order terms that couple different Fourier modes.
- A central goal is developing a statistical description of the system using correlation functions and obtaining a closed kinetic equation for the wave spectrum.
- In the weak turbulence regime, this kinetic equation can be solved perturbatively to obtain scaling laws for the wave spectrum in both physical and
Simulation of Magnetically Confined Plasma for Etch Applicationsvvk0
The document describes computational optimization of plasma uniformity in a magnetically enhanced capacitively coupled plasma (CCP) reactor for disk etch applications. Initial simulations using a two-dimensional hybrid plasma equipment model (HPEM) showed non-uniform electron density and radical distributions in a CFP plasma with the magnet placed 125 mm from the substrate. The distance between the magnet and substrate was increased to 113 mm, which improved the uniformity of the electron density, CFx radical densities, and plasma potential above the substrate. Further simulations varying the magnet distance found that plasma density and F radical density decreased with smaller magnet-substrate gaps. The study demonstrates optimization of plasma uniformity through computational modeling of magnetic field and plasma transport parameters.
This document summarizes key concepts from a lecture on digital modulation and coding detection theory. It defines the Q-function and shows how it can be used to calculate error probabilities for digital modulation. It then derives upper and lower bounds on error probability (Pe) in terms of the minimum distance (dmin) between constellation points. Finally, it discusses how repeaters can be used to boost signal strength, and shows how the error probability is affected depending on whether the repeaters are regenerative or analog.
The document discusses calculating and interpreting the Green's function or propagator for systems with polarons. It begins by defining the polaron and stating the quantity of interest is the one-particle retarded propagator. It then provides examples of calculating the propagator exactly for simple non-interacting and impurity models to build intuition. Finally, it outlines discussing the Holstein polaron model in bulk materials and how the polaron may be affected near a surface.
What happens when the Kolmogorov-Zakharov spectrum is nonlocal?Colm Connaughton
This document summarizes research on the behavior of the Kolmogorov-Zakharov (KZ) spectrum when it is nonlocal. It examines a model of cluster-cluster aggregation described by the Smoluchowski equation, which can be viewed as a model of 3-wave turbulence without backscatter. The research finds that when the exponents in the interaction term satisfy certain conditions, the KZ spectrum is nonlocal. In this case, the stationary state has a novel functional form and can become unstable, leading to oscillatory behavior in the cascade dynamics at long times. Open questions remain about whether physical systems exhibit this behavior and how the results are affected by including backscatter terms.
The document discusses developing a wireless sensor network system for structural health monitoring using non-destructive evaluation techniques like acoustic emission testing and ultrasound testing. It outlines objectives like sensor node development, network control, and damage detection algorithms. The project status updates sensor node development and a finite element model for lamb wave propagation. Future plans include more signal processing algorithms and investigating additional non-destructive methods.
The document discusses abstract model checking techniques for verifying temporal logic properties on abstract models derived from concrete models using abstraction. It presents two dual methods - the classic method and over-approximation method - for defining satisfiability relations on abstract models and analyzes their properties and relationships. The document also proposes techniques for dealing with imprecision and incompleteness that can arise from working with abstract models.
A study of the worst case ratio of a simple algorithm for simple assembly lin...narmo
This document summarizes a study on a simple heuristic for solving the Simple Assembly Line Balancing Problem (SALBP). It presents two greedy heuristics - Next-Fit and First-Fit - for solving the SALBP. The Next-Fit heuristic achieves a worst-case ratio of 2, which is proven to be tight. An example is provided to show that the First-Fit heuristic also has a worst-case ratio of 2. Sorting tasks by Ranked Positional Weight before applying First-Fit can find the optimal solution for some instances but the worst-case ratio remains 2 when using Next-Fit.
This document provides an overview of nanomagnetism and the key developments in the field over time. It discusses early experiments and models from Einstein, de Haas, Heisenberg, and others. Key concepts covered include magnetic anisotropy, superparamagnetism, quantum tunneling of magnetization, and magnetic deflagration. Experimental work is highlighted from various researchers, including observations of quantum steps in microwave absorption and avalanches in Mn-12 acetate.
International Conference on Monte Carlo techniques
Closing conference of thematic cycle
Paris July 5-8th 2016
Campus les cordeliers
Jere Koskela's slides
Testing the Stability of GPS Oscillators within Serbian Permanent GPS Station...vogrizovic
This document summarizes research analyzing the stability of GPS oscillators within Serbia's permanent GPS station network. The researchers analyzed data from 30 stations to calculate Allan variance and power spectral density graphs. They found that most stations exhibited flicker frequency modulation noise processes, but some showed different characteristics likely due to environmental factors. Older receiver models generally had higher Allan variances. The results indicated only flicker frequency modulation and random walk frequency modulation noise processes. Calibration of GPS receivers was determined to be important for ensuring accuracy.
Cluster aggregation with complete collisional fragmentationColm Connaughton
The document summarizes research on cluster-cluster aggregation (CCA) models where particles stick together upon contact. It discusses mean-field kinetic equations to model CCA with sources and sinks of particles. For the case of complete fragmentation, it presents an exact solution to the kinetic equations. It finds that nonlocal cascades where larger clusters interact mostly with smaller ones can be unstable, leading to oscillatory behavior over time rather than a stationary state. The document outlines approaches to model the nonlocal case using approximations to the Smoluchowski kinetic equation.
Iit jam 2016 physics solutions BY TrajectoryeducationDev Singh
1. The electric field at a point (a, b, 0) due to an infinitely long wire with uniform line charge density λ is given by E=λ/(2πε0)(a/r2)ex+(b/r2)ey, where r2=a2+b2.
2. For a 1W point source emitting light uniformly in all directions, the Poynting vector at the point (1, 1, 0) is 1/(8π)ex+(y/e)ey W/cm2.
3. A charged particle starting from the origin with velocity 3/2ex+2ez m/s in a uniform magnetic field B=B
Cluster-cluster aggregation with (complete) collisional fragmentationColm Connaughton
This document summarizes a presentation on cluster-cluster aggregation models with collisional fragmentation. It discusses mean-field theories of aggregation with a source of monomers and collision-induced fragmentation. Stationary solutions to the Smoluchowski equation are presented for both local and nonlocal aggregation kernels. While stationary nonlocal solutions exist, they are dynamically unstable. Simplified models with complete fragmentation and a source/sink of monomers produce exact solutions analogous to previous work. Nonlocality and the instability of stationary states require further study.
Prévision de consommation électrique avec adaptive GAMCdiscount
The document discusses generalized additive models (GAM) for short-term electricity load forecasting. GAMs are smooth additive models that decompose a response variable into additive components like trends, cyclic patterns, and nonlinear effects. They summarize how GAMs can model various drivers of electricity consumption, including temperature effects, day-of-week patterns, and lagged load values. Big additive models (BAM) allow applying GAMs to large electricity load datasets. BAMs use QR decomposition and online updating to efficiently estimate high-dimensional additive models.
Parametric time domain system identification of a mass spring-damperMidoOoz
This document describes a laboratory experiment for an undergraduate system dynamics course to identify physical parameters of a mass-spring-damper system using parametric system identification. Students will collect step response data from the system under different mass configurations and use the data to determine damped natural frequency and damping ratio. Equations relating these parameters to the physical stiffness, mass, and damping values will then allow the students to estimate the physical parameters without disassembling the system. The goal is for students to understand that lumped parameter models are an approximation and will not perfectly match experimental data due to small nonlinearities in real systems.
All of material inside is un-licence, kindly use it for educational only but please do not to commercialize it.
Based on 'ilman nafi'an, hopefully this file beneficially for you.
Thank you.
This document contains 20 practice problems related to electrostatics involving calculations of electric field E, electric flux density D, and charge distributions. The problems involve point charges, line charges, and surface charges in various configurations and ask the student to calculate values of E, D, and total charge. Sample problems are solved involving calculations for E and D given charges at specific points in space.
This document compares JPEG and JPEG2000 image compression techniques using objective and perceptual quality measures. JPEG2000 provides higher PSNR values at all bitrates but JPEG has better picture quality scale (PQS) scores, a perceptual measure, at moderate and high bitrates. At very low bitrates below 0.5 bpp, JPEG2000 produces higher quality images according to PQS due to its wavelet-based compression method. The study uses four test images with different spatial and frequency characteristics to evaluate the compression methods.
This document provides an overview of Support Vector Data Description (SVDD), which finds the minimum enclosing ball that encapsulates a set of data points. It discusses how SVDD can be formulated as a quadratic programming problem and outlines its dual formulation. The document also notes that SVDD generalizes to non-linear settings using kernels, and discusses variations like adaptive SVDD and density-induced SVDD. Key points covered include the representer theorem, KKT conditions, and how the radius of the enclosing ball can be determined from the Lagrangian.
Quickselect Under Yaroslavskiy's Dual Pivoting AlgorithmSebastian Wild
I gave this talk at the 24th International Meeting on Probabilistic, Combinatorial and Asymptotic Methods for the Analysis of Algorithms (AofA 2013) on Menorca (Spain).
A paper covering the analyses of this talk (and some more!) has been submitted.
Also, in the talk, I refer to the previous speaker at the conference, my advisor Markus Nebel - corresponding results can be found in an earlier talk of mine:
slideshare.net/sebawild/average-case-analysis-of-java-7s-dual-pivot-quicksort
Check my website for preprints of papers and my other talks:
wwwagak.cs.uni-kl.de/sebastian-wild.html
Similar to 20080501 software verification_sharygina_lecture02 (20)
The document discusses concurrency and synchronization in distributed computing. It provides an overview of Petr Kuznetsov's research at Telecom ParisTech, which includes algorithms and models for distributed systems. Some key points discussed are:
- Concurrency is important due to multi-core processors and distributed systems being everywhere. However, synchronization between concurrent processes introduces challenges.
- Common synchronization problems include mutual exclusion, readers-writers problems, and producer-consumer problems. Tools for synchronization include semaphores, transactional memory, and non-blocking algorithms.
- Characterizing distributed computing models and determining what problems can be solved in a given model is an important area of research, with implications for distributed system design.
The document discusses weakly supervised learning from video and images using convolutional neural networks. It describes using scripts as weak supervision for learning actions from movies without explicit labeling. Methods are presented for jointly learning actors and actions from scripts, and for action learning with ordering constraints. The use of CNNs for object and action recognition in images is also summarized, including work on training CNNs using only image-level labels without bounding boxes.
This document discusses common C++ bugs and tools to find them. It describes various types of memory access bugs like buffer overflows on the stack, heap, and globals that can lead to crashes or security vulnerabilities. Threading bugs like data races, deadlocks, and race conditions on object destruction are also covered. Other undefined behaviors like initialization order issues, lack of sequence points, and integer overflows are explained. The document provides examples of each type of bug and emphasizes that undefined behavior does not guarantee a predictable result. It concludes with a quiz to find bugs in a code sample and links to additional reading materials.
AddressSanitizer, ThreadSanitizer, and MemorySanitizer are compiler-based tools that detect bugs like buffer overflows, data races, and uninitialized memory reads in C/C++ programs. AddressSanitizer instruments loads and stores to detect out-of-bounds memory accesses. ThreadSanitizer intercepts synchronization calls to detect data races between threads. MemorySanitizer tracks initialized and uninitialized memory using shadow memory to find uses of uninitialized values. The tools have found thousands of bugs with low overhead. Future work includes supporting more platforms and languages and detecting additional bug classes.
This document discusses common C++ bugs and tools to find them. It describes various types of memory access bugs like buffer overflows on the stack, heap, and globals that can lead to crashes or security vulnerabilities. Threading bugs like data races, deadlocks, and race conditions on object destruction are also covered. Other undefined behaviors like initialization order issues, lack of sequence points, and integer overflows are explained. The document provides examples of each type of bug and quizzes the reader to find bugs in a code sample. It recommends resources for further reading on debugging techniques and thread sanitizers that can detect races and data races.
This document provides examples and snippets of code for MapReduce, Pig, Hive, Spark, Shark, and Disco frameworks. It also includes two sections of references for related papers and Disco documentation. The examples demonstrate basic MapReduce jobs with drivers, mappers, and reducers in Java, Pig and Hive queries, Spark and Shark table operations, and a Disco MapReduce job.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
1. Software Verification:
State-Event-based Reasoning
and Deadlock Detection
Natasha Sharygina
Joint work with Sagar Chaki, Ed Clarke, Joel
Ouaknine
USI-CMU summer school 2007 Natasha Sharygina
2. Objectives
C program verification
Sequential and concurrent
Properties involve both data (states) and
communication (events)
Specified as (State/Event) LTL formulas
Safety and Liveness
Communication via shared actions
Synchronous communication
Asynchronous execution
USI-CMU summer school 2007 Natasha Sharygina 2
3. Bluetooth L2CAP Spec
“When an L2CAP_ConnectRsp event is received in a
W4_L2CAP_CONNECT_RSP state, an L2CAP process
may send out an L2CA_ConnectInd event, disable the RTX
timer, and move to state CONFIG.”
…
Spec involves both states and events
USI-CMU summer school 2007 Natasha Sharygina 3
4. Labelled Kripke Structures
Directed graph with labels on edges and states,
(S,Init,P,L,T,Σ,E)
Every state is labeled with a set of atomic
propositions, P, true in the state 0,1
Every LKS comes with
an alphabet of actions, Σ a a
b 1,1 1,0
b c
State labeling function : L: S 2P 0,0
Transition labeling function : E : T (2Σ {})
Assumption: LKSs are deadlock-free
[see deadlock detection algorithm, later in this lecture]
USI-CMU summer school 2007 Natasha Sharygina 4
5. Traces and Languages
Trace: infinite alternating sequence of
states and actions
(s1 a s2 b s4 b s1…)
s1
a a
b s2 s3
Language: set of all traces b c
L(M) = {s1 a (s2 b + s3 c) s4 b}ω
s4
M
USI-CMU summer school 2007 Natasha Sharygina 5
6. Surge Protector : State/Event
m2
m1 c0 c1
m1 m2 m2
m0 c0
c0 m=0 m=1 m=2 c1
m0 m1 c2
m0
State/Event model of the Surge Protector
(example is given for m: [0..2], c: [0..2])
USI-CMU summer school 2007 Natasha Sharygina 6
7. Surge Protector : State Only
m=0 m=1 m=2
c=0 c=0 c=0
m=0 m=1 m=2
c=1 c=1 c=1
m=0 m=1 m=2
c=2 c=2 c=2
Kripke structure of the Surge Protector
(example is given for m: [0..2], c: [0..2])
USI-CMU summer school 2007 Natasha Sharygina 7
8. State/Event LTL
Given LKS M = (S,Init,P,L,T,Σ,E), and p ∈ P, a ∈ Σ,
ϕ ::= p | a | ~ϕ | ϕ & ϕ | Xϕ | Gϕ | Fϕ | ϕ Uϕ
π = (s1 a1 s2 a2 …) is a path and πi is the suffix of π starting at state si
π╞ p iff s1 is the first state of π and p ∈ L(s1)
π╞ a iff a is the first action of π
π╞ ∼ϕ iff ∼(π╞ ϕ)
π╞ Xϕ iff π2╞ ϕ
π╞ ϕ1 U ϕ2 iff there is some i ≥ 1 such that πi╞ ϕ2
and for all 1 ≥ j ≥ i - 1, πj╞ ϕ1
M╞ ϕ iff, for every path π ∈ L(M), π╞ ϕ
USI-CMU summer school 2007 Natasha Sharygina 8
10. Surge Spec : State Only
m=0 m=1 m=2
c=0 c=0 c=0
m=0 m=1 m=2
c=1 c=1 c=1
m=0 m=1 m=2
c=2 c=2 c=2
G (((c=0 V c=2) & X (c=1)) → (m=1 V m=2)) &
G (((c=0 V c=1) & X (c=2)) → m=2)
USI-CMU summer school 2007 Natasha Sharygina 10
11. Surge Protector Verification
• Changes of current beyond threshold are disallowed
• State/Event Formula: G ((c2 → m=2) & (c1 → (m=1 V m=2)))
• State Formula: G (((c=0 V c=2) & X (c=1)) → (m=1 V m=2))
& G (((c=0 V c=1) & X (c=2)) → m=2)
• Event Formula: G (m0 → ((∼c1 W (m1 V m2) ) ) &
G (m0 → ((∼c2 W m2)) &
G (m1 → ((∼c2 W m2))
USI-CMU summer school 2007 Natasha Sharygina 11
12. Automata-based Verification
Given: M – LKS over Σ, P
ϕ – SE/LTL formula
How to check: M╞ ϕ
Possible Approach:
1. Convert M into a conventional state-only Kripke structure
2. Convert ϕ into a state-only LTL formula
3. Check whether M╞ ϕ
Inefficient!
What we do:
1. Interpret ϕ as an LTL formula over Σ U P
2. Compute B~ϕ (using Wring [Somenzi, Bloem’00])
3. Construct M ⊗ B~ϕ (result is a Buchi automaton)
4. Theorem: We have L (M ⊗ B~ϕ ) = {} iff M╞ ϕ
No extra cost in time or space!
USI-CMU summer school 2007 Natasha Sharygina 12
13. Verification Results
Current State Formula Event Formula State/Event Formula
range
Aut. Size Time Aut. Size Time Aut. Size Time
St Tr BC MC St Tr BC MC St Tr BC MC
4 5 0.25 0.383 6 10 0.245 0.32 3 4 0.184 0.252
2
14 23 0.49 1.141 20 41 1.597 1.77 5 8 0.243 0.391
4
32 57 2.43 4.818 42 92 12.08 12.66 7 12 0.614 0.962
6
58 107 17.5 24.60 72 163 372.8 374.17 9 16 2.622 3.133
8
92 173 196 214.0 X X X X 11 20 33.56 34.5
10
X X X X X X X X 13 24 534.9 536.4
12
X X X X X X X X X X X X
13
USI-CMU summer school 2007 Natasha Sharygina 13
14. Concurrent Software
Components synchronize on shared actions
proceed independently on local actions
Propositions of components are disjoint (no shared
variables)
USI-CMU summer school 2007 Natasha Sharygina 14
15. Operational Semantics
a a
M1 → M1’ M 2 → M2 ’ Synchronization on
a Shared action
(M1 || M2) → (M1’ || M2’)
a
M1→ M1’ a ∉ Σ (M2) Asynchronous
a Execution
(M1 || M2) → (M1’ || M2)
USI-CMU summer school 2007 Natasha Sharygina 15
16. Operational Semantics
State of M1 || M2 is of the form (s1,s2) where si is a state of Mi
a a
s1 s’1 a ∉ Σ( M2) s2 s’2 a ∉ Σ( M1)
a a
(s1,s2) (s’1,s2) (s1,s2) (s1,s’2)
a a
s1 s’1 s2 s’2
a
(s1,s2) (s’1,s’2)
State-space exponential in # of components
USI-CMU summer school 2007 Natasha Sharygina 16
17. Example
d d
a b c a b’ c
1 2 3 4 1’ 2’ 3’ 4’
M1 Σ = {a,b,c,d} M2 Σ = {a,b’,c,d}
d
b 3,2’ b’
a c
1,1’ 2,2’ 3,3’ 4,4’
b’ 2,3’ b
M1 k M2
USI-CMU summer school 2007 Natasha Sharygina 17
18. Compositional Verification
☺
C Program Predicate Model SE-LTL Yes
Abstraction Abstraction Verification
System OK
Guidance Counter No
Example
Improved Guided Counterexample
Abstraction
Guidance
Abstraction
Refinement
☺ ☺
Abstraction No Counterexample Yes
Refinement Valid?
Spurious
Counterexample
USI-CMU summer school 2007 Natasha Sharygina 18
19. Case Studies
MicroC/OS-II
Real-time OS for embedded applications
Widely used (cell phones, medical devices,
routers, washing machines…)
6000+ LOC
Verified locking discipline
Locks and Unlocks alternate and locks are eventually
released
Found four bugs
Missing unlock and return (three known – one unknown)
USI-CMU summer school 2007 Natasha Sharygina 19
20. Results
Name St-B Tr-B St-Mdl T-BA T-Mdl T-Ver T-Tot Mem
SS 25 47 7951 0.690 48.8 6.84 56.9 39.3
SE 20 45 4331 0.497 18.8 2.92 22.8 24.2
SS 25 47 7574 0.699 43.6 1.65 46.4 38.1
SE 18 40 3691 0.407 15.3 1.089 17.3 21.2
SS 25 47 24.8 M 0.874 65.6 X X 851
SE 20 45 13.6M 0.655 33.1 2.17 2207 162
SS 25 47 32.6M 0.836 66.0 X X 347
SE 18 40 15.9M 0.713 34.6 4149 4185 321
BUG 8 14 873 0.205 3.41 0.261 3.88 X
USI-CMU summer school 2007 Natasha Sharygina 20
21. Case Studies
IPC Module
Deployed by a world leader in robotics engineering systems
1500+ LOC
4 components
Over 30 billion states after predicate abstraction
Discovered synchronization bug in a matter of hours
Process can incorrectly block while writing to a queue
Undetected despite seven years of testing/industrial use
USI-CMU summer school 2007 Natasha Sharygina 21
22. Summary of the Approach
State/Event-based modeling and specification
Efficient (direct) model checking algorithm
CEGAR loop for software systems
Safety and liveness properties
Compositional software verification
Component-wise abstractions
Component-wise counterexample validation
Component-wise refinements
USI-CMU summer school 2007 Natasha Sharygina 22
23. References
Sagar Chaki, Edmund M. Clarke, Joël Ouaknine,
Natasha Sharygina: Concurrent software verification
with states, events, and deadlocks. Formal Aspects
of Computing 17(4): 461-483 (2005)
Chiara Braghin, Natasha Sharygina, Katerina Barone-
Adesi: Automated Verification of Security Policies in
Mobile Code, In Proc. of Integrated Formal Methods
2007 conf., LNCS 4591:37 - 54 (2007)
USI-CMU summer school 2007 Natasha Sharygina 23