首页 > 最新文献

2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design最新文献

英文 中文
Synthesis of programs from temporal property specifications 从时间属性规范合成程序
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185372
A. Pnueli, U. Klein
The paper investigates a development process for reactive programs, in which the program is automatically generated (synthesized) from a high-level temporal specification. The method is based on previous results that proposed a similar synthesis method for the automatic construction of hardware designs from their temporal specifications. Thus, the work reported here can be viewed as a generalization of existing methods for the synthesis of synchronous reactive systems into the synthesis of asynchronous systems. In the synchronous case it was possible to identify a restricted subclass of formulas and present an algorithm that solves the synthesis problem for these restricted specifications in polynomial time. Here the results are less definitive in the sense that we can offer some heuristics that may provide polynomial-time solutions only in some of the cases.
本文研究了响应式程序的开发过程,其中程序从高级时间规范自动生成(合成)。该方法基于先前的研究结果,提出了一种类似的综合方法,用于从硬件设计的时间规范自动构建硬件设计。因此,这里报告的工作可以看作是将同步反应系统合成为异步系统的现有方法的推广。在同步情况下,有可能确定一个受限制的公式子类,并提出一个算法,在多项式时间内解决这些受限制规范的综合问题。这里的结果不太确定,因为我们可以提供一些启发式,这些启发式可能只在某些情况下提供多项式时间的解决方案。
{"title":"Synthesis of programs from temporal property specifications","authors":"A. Pnueli, U. Klein","doi":"10.1109/MEMCOD.2009.5185372","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185372","url":null,"abstract":"The paper investigates a development process for reactive programs, in which the program is automatically generated (synthesized) from a high-level temporal specification. The method is based on previous results that proposed a similar synthesis method for the automatic construction of hardware designs from their temporal specifications. Thus, the work reported here can be viewed as a generalization of existing methods for the synthesis of synchronous reactive systems into the synthesis of asynchronous systems. In the synchronous case it was possible to identify a restricted subclass of formulas and present an algorithm that solves the synthesis problem for these restricted specifications in polynomial time. Here the results are less definitive in the sense that we can offer some heuristics that may provide polynomial-time solutions only in some of the cases.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117196155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Refining schizophrenia via graph reachability in Esterel 在Esterel中通过图形可达性提炼精神分裂症
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185374
Jeong-Han Yun, Chul-Joo Kim, Sunae Seo, Taisook Han, K. Choe
Esterel is an imperative synchronous language for control-dominant reactive systems. The combination of imperative structures and the perfect synchrony hypothesis often result in schizophrenic statements. Previous studies explain the characteristics of schizophrenia as the instantaneous reentrance to block statements: local signal declarations and parallel statements. In practice, however, most instantly-reentered block statements do not cause any problems in Esterel compilation. In this paper, we refine schizophrenic problems in terms of signal emissions, and suggest an algorithm to detect harmful schizophrenia using reachability on control flow graphs (CFGs) in Esterel. Our algorithm performs well in analyzing practical programs. Moreover, it can be easily applied to existing compilers.
Esterel是一种用于控制主导型反应系统的命令式同步语言。祈使句结构和完全同步假说的结合经常导致精神分裂的陈述。先前的研究将精神分裂症的特征解释为瞬间重新进入阻塞语句:局部信号声明和并行语句。然而,在实践中,大多数立即重入的块语句不会在Esterel编译中引起任何问题。在本文中,我们从信号发射的角度对精神分裂症问题进行了细化,并提出了一种基于Esterel控制流图(CFGs)可达性的有害精神分裂症检测算法。该算法在实际程序分析中表现良好。此外,它可以很容易地应用于现有的编译器。
{"title":"Refining schizophrenia via graph reachability in Esterel","authors":"Jeong-Han Yun, Chul-Joo Kim, Sunae Seo, Taisook Han, K. Choe","doi":"10.1109/MEMCOD.2009.5185374","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185374","url":null,"abstract":"Esterel is an imperative synchronous language for control-dominant reactive systems. The combination of imperative structures and the perfect synchrony hypothesis often result in schizophrenic statements. Previous studies explain the characteristics of schizophrenia as the instantaneous reentrance to block statements: local signal declarations and parallel statements. In practice, however, most instantly-reentered block statements do not cause any problems in Esterel compilation. In this paper, we refine schizophrenic problems in terms of signal emissions, and suggest an algorithm to detect harmful schizophrenia using reachability on control flow graphs (CFGs) in Esterel. Our algorithm performs well in analyzing practical programs. Moreover, it can be easily applied to existing compilers.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bounded Dataflow Networks and Latency-Insensitive circuits 有界数据流网络和延迟不敏感电路
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185393
M. Vijayaraghavan, Arvind
We present a theory for modular refinement of Synchronous Sequential Circuits (SSMs) using Bounded Dataflow Networks (BDNs). We provide a procedure for implementing any SSM into an LI-BDN, a special class of BDNs with some good compositional properties. We show that the Latency-Insensitive property of LI-BDNs is preserved under parallel and iterative composition of LI-BDNs. Our theory permits one to make arbitrary cuts in an SSM and turn each of the parts into LI-BDNs without affecting the overall functionality. We can further refine each constituent LI-BDN into another LI-BDN which may take different number of cycles to compute. If the constituent LI-BDN is refined correctly we guarantee that the overall behavior would be cycle-accurate with respect to the original SSM. Thus one can replace, say a 3-ported register file in an SSM by a one-ported register file without affecting the correctness of the SSM. We give several examples to show how our theory supports a generalization of previous techniques for Latency-Insensitive refinements of SSMs.
我们提出了一种利用有界数据流网络(bdn)对同步顺序电路(SSMs)进行模块化改进的理论。我们提供了一个实现任何SSM到LI-BDN的过程,LI-BDN是一类特殊的bdn,具有一些良好的组成特性。我们证明了在li - bdn的并行和迭代组合下,li - bdn的延迟不敏感特性仍然保持不变。我们的理论允许在SSM中任意切割,并在不影响整体功能的情况下将每个部分变成li - bdn。我们可以进一步将每个组成LI-BDN细化为另一个LI-BDN,这可能需要不同数量的循环来计算。如果对组成LI-BDN进行了正确的改进,我们可以保证相对于原始SSM而言,整体行为将是周期精确的。因此,可以用单端口寄存器文件替换SSM中的3端口寄存器文件,而不会影响SSM的正确性。我们给出了几个例子来说明我们的理论是如何支持对ssm延迟不敏感改进的先前技术的推广的。
{"title":"Bounded Dataflow Networks and Latency-Insensitive circuits","authors":"M. Vijayaraghavan, Arvind","doi":"10.1109/MEMCOD.2009.5185393","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185393","url":null,"abstract":"We present a theory for modular refinement of Synchronous Sequential Circuits (SSMs) using Bounded Dataflow Networks (BDNs). We provide a procedure for implementing any SSM into an LI-BDN, a special class of BDNs with some good compositional properties. We show that the Latency-Insensitive property of LI-BDNs is preserved under parallel and iterative composition of LI-BDNs. Our theory permits one to make arbitrary cuts in an SSM and turn each of the parts into LI-BDNs without affecting the overall functionality. We can further refine each constituent LI-BDN into another LI-BDN which may take different number of cycles to compute. If the constituent LI-BDN is refined correctly we guarantee that the overall behavior would be cycle-accurate with respect to the original SSM. Thus one can replace, say a 3-ported register file in an SSM by a one-ported register file without affecting the correctness of the SSM. We give several examples to show how our theory supports a generalization of previous techniques for Latency-Insensitive refinements of SSMs.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Bang for the buck: Improvising and scheduling verification engines for effective resource utilization 物有所值:为有效的资源利用而临时安排和调度验证引擎
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185373
Malay K. Ganai, Weihong Li
In practice, verification engines have to solve many checkers in a very tight time budget, especially, when the system to be analyzed is large, with many coverage criteria. To cope with such a situation, we propose improved and light-weight verification techniques that are built over the state-of-the-art engines such as bounded model checking (BMC), induction, and guided-simulation (directed testing). Specifically, we propose using control state reachability (CSR) information—obtained from a given software system—to strengthen our induction-based proof engine. We also propose identifying and using lighthouses (or guide-posts)—intermediate control states—to simplify and reduce BMC instances, and to guide a simulation engine. We schedule these engines suitably to maximize the resource utilization. We implemented our techniques in a tool ACE, and integrated it in an industry strength software verification platform F-Soft to provide a robust and precise analysis framework. We show effectiveness of ACE on several industry and public benchmarks in a comparative study.
在实践中,验证引擎必须在非常紧张的时间预算中解决许多检查器,特别是当要分析的系统很大,具有许多覆盖标准时。为了应对这种情况,我们提出了改进的轻量级验证技术,这些技术建立在最先进的引擎之上,例如有界模型检查(BMC)、归纳和引导模拟(定向测试)。具体来说,我们建议使用从给定软件系统获得的控制状态可达性(CSR)信息来增强我们的基于归纳的证明引擎。我们还建议识别和使用灯塔(或路标)-中间控制状态-来简化和减少BMC实例,并指导仿真引擎。我们对这些引擎进行适当的调度,以最大限度地提高资源利用率。我们在ACE工具中实现了我们的技术,并将其集成到行业实力的软件验证平台F-Soft中,以提供强大而精确的分析框架。我们在一项比较研究中显示了ACE在几个行业和公共基准上的有效性。
{"title":"Bang for the buck: Improvising and scheduling verification engines for effective resource utilization","authors":"Malay K. Ganai, Weihong Li","doi":"10.1109/MEMCOD.2009.5185373","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185373","url":null,"abstract":"In practice, verification engines have to solve many checkers in a very tight time budget, especially, when the system to be analyzed is large, with many coverage criteria. To cope with such a situation, we propose improved and light-weight verification techniques that are built over the state-of-the-art engines such as bounded model checking (BMC), induction, and guided-simulation (directed testing). Specifically, we propose using control state reachability (CSR) information—obtained from a given software system—to strengthen our induction-based proof engine. We also propose identifying and using lighthouses (or guide-posts)—intermediate control states—to simplify and reduce BMC instances, and to guide a simulation engine. We schedule these engines suitably to maximize the resource utilization. We implemented our techniques in a tool ACE, and integrated it in an industry strength software verification platform F-Soft to provide a robust and precise analysis framework. We show effectiveness of ACE on several industry and public benchmarks in a comparative study.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127665098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The role of mutation analysis for property qualification 突变分析对财产鉴定的作用
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185375
L. D. Guglielmo, F. Fummi, G. Pravadelli
The paper proposes a comprehensive methodology for property qualification based on a combination of dynamic and static techniques. In particular, given a set of properties defined to check the correctness of a design implementation, the methodology first evaluates property coverage, property overspecification, and it identifies vacuous properties. This is commonly performed by exploiting mutation analysis and automatic testbenches generation, i.e., dynamic strategies. This phase allows us to quickly evaluate the quality of properties with respect to the use of formal approaches. Then, a second phase, based on model checking, is applied to the restricted number of situations, where the dynamic approach is not exhaustive. Experimental results show the effectiveness and efficiency of the proposed methodology.
本文提出了一种基于动态技术与静态技术相结合的综合产权认定方法。特别是,给定一组定义用于检查设计实现正确性的属性,该方法首先评估属性覆盖、属性过度规范,并识别空洞的属性。这通常是通过利用突变分析和自动测试平台生成来实现的,即动态策略。这一阶段允许我们快速评估与使用形式化方法相关的属性的质量。然后,基于模型检查的第二阶段应用于有限数量的情况,其中动态方法不是详尽的。实验结果表明了该方法的有效性和高效性。
{"title":"The role of mutation analysis for property qualification","authors":"L. D. Guglielmo, F. Fummi, G. Pravadelli","doi":"10.1109/MEMCOD.2009.5185375","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185375","url":null,"abstract":"The paper proposes a comprehensive methodology for property qualification based on a combination of dynamic and static techniques. In particular, given a set of properties defined to check the correctness of a design implementation, the methodology first evaluates property coverage, property overspecification, and it identifies vacuous properties. This is commonly performed by exploiting mutation analysis and automatic testbenches generation, i.e., dynamic strategies. This phase allows us to quickly evaluate the quality of properties with respect to the use of formal approaches. Then, a second phase, based on model checking, is applied to the restricted number of situations, where the dynamic approach is not exhaustive. Experimental results show the effectiveness and efficiency of the proposed methodology.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130925212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An introduction to implementation attacks and countermeasures 介绍实现攻击和对策
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185386
Thomas Popp
Implementation attacks pose a serious threat to the security of cryptographic algorithms and protocols. In such attacks, not the abstract descriptions of cryptographic methods are attacked but their practical realizations in cryptographic devices. This opens up a wide range of powerful attacks, which are introduced in this article. Also the main approaches to counteract implementation attacks are discussed.
实现攻击对加密算法和协议的安全性构成严重威胁。在这种攻击中,攻击的不是加密方法的抽象描述,而是它们在加密设备中的实际实现。这将引发一系列强大的攻击,本文将对此进行介绍。并讨论了对抗实现攻击的主要方法。
{"title":"An introduction to implementation attacks and countermeasures","authors":"Thomas Popp","doi":"10.1109/MEMCOD.2009.5185386","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185386","url":null,"abstract":"Implementation attacks pose a serious threat to the security of cryptographic algorithms and protocols. In such attacks, not the abstract descriptions of cryptographic methods are attacked but their practical realizations in cryptographic devices. This opens up a wide range of powerful attacks, which are introduced in this article. Also the main approaches to counteract implementation attacks are discussed.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
High-level optimization of integer multipliers over a finite bit-width with verification capabilities 具有验证功能的有限位宽整数乘法器的高级优化
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185378
O. Sarbishei, M. Tabandeh, B. Alizadeh, M. Fujita
Integer multipliers with finite output bit-widths are widely used in many Digital Signal Processing (DSP) applications. In such circuits high-level optimizations like Residue Number System (RNS) can be utilized to achieve more efficient architectures compared to the conventional binary representations. This paper presents an efficient high-level Don't-Care Optimization (DC-Opt) method for integer multipliers and in general Multiply Accumulator (MAC) units when the output result is limited to a finite bit-width. This high-level optimization approach can then be combined with logic optimizations at gate-level. Experimental results have shown major improvements in terms of area and latency compared to the conventional optimization approaches.
有限输出位宽的整数乘法器广泛应用于许多数字信号处理(DSP)应用中。在这种电路中,与传统的二进制表示相比,残数系统(RNS)等高级优化可以用来实现更高效的体系结构。本文针对整数乘法器和一般的乘法累加器(MAC)单元,在输出结果限于有限位宽的情况下,提出了一种高效的高级不关心优化(DC-Opt)方法。然后,可以将这种高级优化方法与门级的逻辑优化相结合。实验结果表明,与传统的优化方法相比,该方法在面积和延迟方面有了很大的改进。
{"title":"High-level optimization of integer multipliers over a finite bit-width with verification capabilities","authors":"O. Sarbishei, M. Tabandeh, B. Alizadeh, M. Fujita","doi":"10.1109/MEMCOD.2009.5185378","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185378","url":null,"abstract":"Integer multipliers with finite output bit-widths are widely used in many Digital Signal Processing (DSP) applications. In such circuits high-level optimizations like Residue Number System (RNS) can be utilized to achieve more efficient architectures compared to the conventional binary representations. This paper presents an efficient high-level Don't-Care Optimization (DC-Opt) method for integer multipliers and in general Multiply Accumulator (MAC) units when the output result is limited to a finite bit-width. This high-level optimization approach can then be combined with logic optimizations at gate-level. Experimental results have shown major improvements in terms of area and latency compared to the conventional optimization approaches.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survival strategies for synthesized hardware systems 合成硬件系统的生存策略
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185387
M. Rinard
Survival is a key concern of many complex systems. A standard approach to maximizing the likelihood of survival is to attempt to produce a system that is as free of errors as possible. We instead propose a methodology that changes the semantics of the underlying development and execution environments to cleanly and simply obtain survival guarantees that are difficult if not impossible to obtain with standard techniques. Examples of survival properties include continued execution in the face of addressing errors and guaranteed bounds on the amount of memory required during any execution of the system (even in the face of dynamic memory allocation).We summarize results for software implementations of these techniques and discuss issues and advantages that arise in the context of hardware implementations.
生存是许多复杂系统的关键问题。使生存可能性最大化的一个标准方法是尝试制造一个尽可能没有错误的系统。相反,我们提出了一种方法,该方法改变了底层开发和执行环境的语义,以干净、简单地获得生存保证,而使用标准技术很难(如果不是不可能的话)获得生存保证。生存属性的例子包括在寻址错误时继续执行,以及在任何系统执行期间保证所需内存量的界限(即使在面对动态内存分配时)。我们总结了这些技术的软件实现的结果,并讨论了在硬件实现环境中出现的问题和优势。
{"title":"Survival strategies for synthesized hardware systems","authors":"M. Rinard","doi":"10.1109/MEMCOD.2009.5185387","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185387","url":null,"abstract":"Survival is a key concern of many complex systems. A standard approach to maximizing the likelihood of survival is to attempt to produce a system that is as free of errors as possible. We instead propose a methodology that changes the semantics of the underlying development and execution environments to cleanly and simply obtain survival guarantees that are difficult if not impossible to obtain with standard techniques. Examples of survival properties include continued execution in the face of addressing errors and guaranteed bounds on the amount of memory required during any execution of the system (even in the face of dynamic memory allocation).We summarize results for software implementations of these techniques and discuss issues and advantages that arise in the context of hardware implementations.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125080202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Codesign of dependable systems: A component-based modeling language 可靠系统的协同设计:一种基于组件的建模语言
Pub Date : 2009-07-13 DOI: 10.1109/MEMCOD.2009.5185388
M. Bozzano, A. Cimatti, Marco Roveri, J. Katoen, V. Y. Nguyen, T. Noll
This paper presents a model-based approach to system-software co-engineering which is focused on aerospace systems but is relevant to a much wider class of dependable systems. We present the main ingredients of the SLIM modeling language and give a precise interpretation of SLIM models by providing a formal semantics using networks of event-data automata. The major distinguishing aspects of this component-based approach are the possibility to describe nominal hardware and software operations, hybrid (and timing) aspects, as well as probabilistic faults and their propagation and recovery. As our approach bears strong resemblance to the standardized AADL (Architecture Analysis and Design Language), a secondary contribution of this paper is a formal semantics of a large fragment of AADL including its Error Model Annex.
本文提出了一种基于模型的系统软件协同工程方法,该方法的重点是航空航天系统,但与更广泛的可靠系统相关。我们介绍了SLIM建模语言的主要成分,并通过使用事件数据自动机网络提供形式化语义,给出了SLIM模型的精确解释。这种基于组件的方法的主要区别在于描述名义硬件和软件操作、混合(和定时)方面以及概率故障及其传播和恢复的可能性。由于我们的方法与标准化的AADL(架构分析和设计语言)非常相似,本文的第二个贡献是AADL的一个大片段的形式语义,包括它的错误模型附件。
{"title":"Codesign of dependable systems: A component-based modeling language","authors":"M. Bozzano, A. Cimatti, Marco Roveri, J. Katoen, V. Y. Nguyen, T. Noll","doi":"10.1109/MEMCOD.2009.5185388","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185388","url":null,"abstract":"This paper presents a model-based approach to system-software co-engineering which is focused on aerospace systems but is relevant to a much wider class of dependable systems. We present the main ingredients of the SLIM modeling language and give a precise interpretation of SLIM models by providing a formal semantics using networks of event-data automata. The major distinguishing aspects of this component-based approach are the possibility to describe nominal hardware and software operations, hybrid (and timing) aspects, as well as probabilistic faults and their propagation and recovery. As our approach bears strong resemblance to the standardized AADL (Architecture Analysis and Design Language), a secondary contribution of this paper is a formal semantics of a large fragment of AADL including its Error Model Annex.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Performance estimation for task graphs combining sequential path profiling and control dependence regions 结合顺序路径分析和控制依赖区域的任务图性能估计
Pub Date : 2009-07-01 DOI: 10.1109/MEMCOD.2009.5185389
Fabrizio Ferrandi, M. Lattuada, C. Pilato, Antonino Tumeo
The speed-up estimation of parallelized code is crucial to efficiently compare different parallelization techniques or task graph transformations. Unfortunately, most of the time, during the parallelization of a specification, the information that can be extracted by profiling the corresponding sequential code (e.g. the most executed paths) are not properly taken into account. In particular, correlating sequential path profiling with the corresponding parallelized code can help in the identification of code hot spots, opening new possibilities for automatic parallelization. For this reason, starting from a well-known profiling technique, the Efficient Path Profiling, we propose a methodology that estimates the speed-up of a parallelized specification, just using the corresponding hierarchical task graph representation and the information coming from the dynamic profiling of the initial sequential specification. Experimental results show that the proposed solution outperforms existing approaches.
并行化代码的加速估计对于有效地比较不同的并行化技术或任务图转换至关重要。不幸的是,大多数时候,在规范的并行化过程中,可以通过分析相应的顺序代码(例如执行次数最多的路径)来提取的信息没有被适当地考虑在内。特别是,将顺序路径分析与相应的并行化代码相关联可以帮助识别代码热点,为自动并行化开辟新的可能性。因此,我们从一种著名的分析技术——高效路径分析(Efficient Path profiling)出发,提出了一种方法,该方法仅使用相应的分层任务图表示和来自初始顺序规范的动态分析的信息来估计并行化规范的加速。实验结果表明,该方法优于现有方法。
{"title":"Performance estimation for task graphs combining sequential path profiling and control dependence regions","authors":"Fabrizio Ferrandi, M. Lattuada, C. Pilato, Antonino Tumeo","doi":"10.1109/MEMCOD.2009.5185389","DOIUrl":"https://doi.org/10.1109/MEMCOD.2009.5185389","url":null,"abstract":"The speed-up estimation of parallelized code is crucial to efficiently compare different parallelization techniques or task graph transformations. Unfortunately, most of the time, during the parallelization of a specification, the information that can be extracted by profiling the corresponding sequential code (e.g. the most executed paths) are not properly taken into account. In particular, correlating sequential path profiling with the corresponding parallelized code can help in the identification of code hot spots, opening new possibilities for automatic parallelization. For this reason, starting from a well-known profiling technique, the Efficient Path Profiling, we propose a methodology that estimates the speed-up of a parallelized specification, just using the corresponding hierarchical task graph representation and the information coming from the dynamic profiling of the initial sequential specification. Experimental results show that the proposed solution outperforms existing approaches.","PeriodicalId":163970,"journal":{"name":"2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128103933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1