首页 > 最新文献

2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)最新文献

英文 中文
A Quantitative Safety Verification Approach for the Decision-making Process of Autonomous Driving 自动驾驶决策过程的定量安全验证方法
Bingqing Xu, Qin Li, Tong Guo, Yi Ao, Dehui Du
Autonomous driving is a safety critical system whose performance mainly depends on the recognition of the environment through a large amount of spatio-temporal data and driving policy based on the complex traffic conditions. Thus, it is important and necessary to build the abstract model of environment data and set the safety assessment method for autonomous driving policy. To address the problem, we propose a quantitative safety verification approach for the abstract decision-making model of autonomous driving. We extract the essential spatio-temporal features from both observation and estimation, and preserve them in the abstract model of decision-making. In the estimation, we adopt the explicit description of the uncertain driving decisions of vehicles by means of probability distributions. Based on these time-dependent spatial features, specification, reasoning, and verification of safety property are enabled. To evaluate the safety of the driving policy, we propose an operational verification approach based on Stochastic Hybrid Automata (SHA). Given the environmental information and the corresponding driving decisions according to the planned route on the basis of certain traffic laws, the single-lane roundabout scenario is introduced to illustrate how to verify quantitative safety property in our verification approach by using UPPAAL SMC which can validate the stochastic real-time model.
自动驾驶是一种安全关键系统,其性能主要依赖于基于复杂交通条件的大量时空数据和驾驶策略对环境的识别。因此,建立环境数据的抽象模型和制定自动驾驶策略的安全评估方法是非常重要和必要的。为了解决这个问题,我们提出了一种自动驾驶抽象决策模型的定量安全验证方法。我们从观测和估计中提取基本的时空特征,并将其保存在决策的抽象模型中。在估计中,采用概率分布对车辆的不确定驾驶决策进行显式描述。基于这些与时间相关的空间特征,启用安全属性的规范、推理和验证。为了评估驾驶策略的安全性,我们提出了一种基于随机混合自动机(SHA)的操作验证方法。在给定环境信息的情况下,根据一定的交通规则,按照规划的路线进行相应的驾驶决策,并以单车道环形交叉路口为例,说明了如何利用能够验证随机实时模型的UPPAAL SMC来验证我们的验证方法中的定量安全性。
{"title":"A Quantitative Safety Verification Approach for the Decision-making Process of Autonomous Driving","authors":"Bingqing Xu, Qin Li, Tong Guo, Yi Ao, Dehui Du","doi":"10.1109/TASE.2019.000-9","DOIUrl":"https://doi.org/10.1109/TASE.2019.000-9","url":null,"abstract":"Autonomous driving is a safety critical system whose performance mainly depends on the recognition of the environment through a large amount of spatio-temporal data and driving policy based on the complex traffic conditions. Thus, it is important and necessary to build the abstract model of environment data and set the safety assessment method for autonomous driving policy. To address the problem, we propose a quantitative safety verification approach for the abstract decision-making model of autonomous driving. We extract the essential spatio-temporal features from both observation and estimation, and preserve them in the abstract model of decision-making. In the estimation, we adopt the explicit description of the uncertain driving decisions of vehicles by means of probability distributions. Based on these time-dependent spatial features, specification, reasoning, and verification of safety property are enabled. To evaluate the safety of the driving policy, we propose an operational verification approach based on Stochastic Hybrid Automata (SHA). Given the environmental information and the corresponding driving decisions according to the planned route on the basis of certain traffic laws, the single-lane roundabout scenario is introduced to illustrate how to verify quantitative safety property in our verification approach by using UPPAAL SMC which can validate the stochastic real-time model.","PeriodicalId":183749,"journal":{"name":"2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SMT-based Multi-objective Optimization for Scheduling of MPSoC Applications 基于smt的MPSoC应用调度多目标优化
Rongjie Yan, Anyu Cai, Hongyu Gao, Feifei Ma, Jun Yan
Network-on-Chip (NoC) is a promising interconnecting paradigm in the state-of-the-art multi-core architectures. Its communication network can increase the capacity of parallel data transfer such that system performance is improved. In the design of MPSoC-based applications, multiple objectives exist, such as minimizing time and energy consumption, which may conflict and certain trade-off needs to be evaluated. Heuristic-based methods such as evolutionary algorithms are always adopted to find near-optimal solutions for such applications. However, it is hard to evaluate the accuracy of those solutions. As most of the constraints on the mapping and scheduling process of NoCs can be described as logic formulas, we apply SMT-based methods for the multi-objective optimization of NoC-based MPSoCs. Moreover, to improve the scalability of the optimization problem, we propose to reduce the search space with respect to the symmetry feature of NoC architecture, and to decompose the search process according to the feature of non-dominated solutions. Extensive experimental results from random and real-case benchmarks demonstrate the accuracy of SMT-based methods in finding all the Pareto-fronts, and the efficiency of the proposed strategies.
片上网络(NoC)是目前最先进的多核架构中一种很有前途的互连模式。它的通信网络可以增加并行数据传输的容量,从而提高系统的性能。在基于mpsoc的应用程序设计中,存在多个目标,例如最小化时间和能量消耗,这些目标可能会相互冲突,需要进行一定的权衡。基于启发式的方法,如进化算法,总是被用来为这些应用寻找接近最优的解决方案。然而,很难评估这些解决方案的准确性。由于noc的映射和调度过程的约束大多可以用逻辑公式来描述,我们采用基于smt的方法对基于noc的mpsoc进行多目标优化。此外,为了提高优化问题的可扩展性,我们提出根据NoC结构的对称性特征缩小搜索空间,并根据非支配解的特征分解搜索过程。来自随机和实际案例基准的大量实验结果证明了基于smt的方法在寻找所有pareto前沿方面的准确性,以及所提出策略的效率。
{"title":"SMT-based Multi-objective Optimization for Scheduling of MPSoC Applications","authors":"Rongjie Yan, Anyu Cai, Hongyu Gao, Feifei Ma, Jun Yan","doi":"10.1109/TASE.2019.000-5","DOIUrl":"https://doi.org/10.1109/TASE.2019.000-5","url":null,"abstract":"Network-on-Chip (NoC) is a promising interconnecting paradigm in the state-of-the-art multi-core architectures. Its communication network can increase the capacity of parallel data transfer such that system performance is improved. In the design of MPSoC-based applications, multiple objectives exist, such as minimizing time and energy consumption, which may conflict and certain trade-off needs to be evaluated. Heuristic-based methods such as evolutionary algorithms are always adopted to find near-optimal solutions for such applications. However, it is hard to evaluate the accuracy of those solutions. As most of the constraints on the mapping and scheduling process of NoCs can be described as logic formulas, we apply SMT-based methods for the multi-objective optimization of NoC-based MPSoCs. Moreover, to improve the scalability of the optimization problem, we propose to reduce the search space with respect to the symmetry feature of NoC architecture, and to decompose the search process according to the feature of non-dominated solutions. Extensive experimental results from random and real-case benchmarks demonstrate the accuracy of SMT-based methods in finding all the Pareto-fronts, and the efficiency of the proposed strategies.","PeriodicalId":183749,"journal":{"name":"2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132672156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low complexity and large interactions are possible in Strategy logic 在策略逻辑中,低复杂性和大交互性是可能的
Patrick Gardy
Strategy logic is an expressive multi-agent logic which extends ATL* (the multi-agent version of CTL*). It allows for powerful and interdependent branching (making it possible to express the existence of a dominant strategy, or a qualitative Nash equilibrium). However its model-checking is Non-Elementary. In their paper, Mogavero and al. conjectured that restricting the information strategies have of one another would bring the complexity back to 2-EXPTIME, the same as LTL or ATL* on games. This spurs a bunch of papers ranging over different semantics and fragments of Strategy Logic. As of this instant all papers supported the conjecture. However, so far a 2-EXPTIME model-checking is always obtained by restricting the interactions between the different goals (the interdependent branches in a formula); for example only using a single goal or a conjunction of goals. This severely limits the properties one can create, for example neither admissible strategies nor Nash equilibria can be expressed in these restrictions. In this paper, we prove that a 2-EXPTIME model-checking can be obtained for the fragment SL[BG] in the timeline semantic without restricting the interactions between the goals, greatly improving the expressiveness over other known fragments with 2-EXPTIME model-checking. This places SL[BG] in the timeline semantic as the largest extension of ATL* with similar complexity, yet capable of expressing global properties.
策略逻辑是对ATL* (CTL*的多代理版本)的扩展,是一种富有表现力的多代理逻辑。它允许强大且相互依赖的分支(使其能够表达主导策略或定性纳什均衡的存在)。然而,它的模型检查是非基本的。在他们的论文中,Mogavero等人推测,限制彼此的信息策略将使复杂性回到2-EXPTIME,与游戏中的LTL或ATL*相同。这激发了一堆关于不同语义和策略逻辑片段的论文。就在这时,所有的报纸都支持这个猜想。然而,到目前为止,2-EXPTIME模型检查总是通过限制不同目标之间的交互(公式中相互依赖的分支)来获得;例如,只使用一个目标或多个目标。这严重限制了人们可以创造的属性,例如,可接受的策略和纳什均衡都不能在这些限制中表达。在本文中,我们证明了在不限制目标之间交互的情况下,可以在时间轴语义上对片段SL[BG]进行2-EXPTIME模型检查,大大提高了具有2-EXPTIME模型检查的其他已知片段的表达性。这使得SL[BG]在时间轴语义中成为ATL*的最大扩展,具有相似的复杂性,但能够表达全局属性。
{"title":"Low complexity and large interactions are possible in Strategy logic","authors":"Patrick Gardy","doi":"10.1109/TASE.2019.000-1","DOIUrl":"https://doi.org/10.1109/TASE.2019.000-1","url":null,"abstract":"Strategy logic is an expressive multi-agent logic which extends ATL* (the multi-agent version of CTL*). It allows for powerful and interdependent branching (making it possible to express the existence of a dominant strategy, or a qualitative Nash equilibrium). However its model-checking is Non-Elementary. In their paper, Mogavero and al. conjectured that restricting the information strategies have of one another would bring the complexity back to 2-EXPTIME, the same as LTL or ATL* on games. This spurs a bunch of papers ranging over different semantics and fragments of Strategy Logic. As of this instant all papers supported the conjecture. However, so far a 2-EXPTIME model-checking is always obtained by restricting the interactions between the different goals (the interdependent branches in a formula); for example only using a single goal or a conjunction of goals. This severely limits the properties one can create, for example neither admissible strategies nor Nash equilibria can be expressed in these restrictions. In this paper, we prove that a 2-EXPTIME model-checking can be obtained for the fragment SL[BG] in the timeline semantic without restricting the interactions between the goals, greatly improving the expressiveness over other known fragments with 2-EXPTIME model-checking. This places SL[BG] in the timeline semantic as the largest extension of ATL* with similar complexity, yet capable of expressing global properties.","PeriodicalId":183749,"journal":{"name":"2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134180093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sub-Reviewers Sub-Reviewers
{"title":"Sub-Reviewers","authors":"","doi":"10.1109/tase.2019.00-28","DOIUrl":"https://doi.org/10.1109/tase.2019.00-28","url":null,"abstract":"","PeriodicalId":183749,"journal":{"name":"2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs IMSpec:探索api错误用法的可扩展方法
Zuxing Gu, Min Zhou, Jiecheng Wu, Yu Jiang, Jiaxiang Liu, M. Gu
Application Programming Interfaces (APIs) usually have usage constraints, such as call conditions or call orders. Incorrect usage of these constraints, called API misuse, will result in system crashes, bugs, and even security problems. It is crucial to detect such misuses early in the development process. Though many approaches have been proposed over the last years, recent studies show that API misuses are still prevalent, especially the ones specific to individual projects. In this paper, we strive to improve current API-misuse detection capability for large-scale C programs. First, We propose IMSpec, a lightweight domain-specific language enabling developers to specify API usage constraints in three different aspects (i.e., parameter validation, error handling, and causal calling), which are the majority of API-misuse bugs. Then, we have tailored a constraint guided static analysis engine to automatically parse IMSpec rules and detect API-misuse bugs with rich semantics. We evaluate our approach on widely used benchmarks and real-world projects. The results show that our easily extensible approach performs better than state-of-the-art tools. We also discover 19 previously unknown bugs in real-world open-source projects, all of which have been confirmed by the corresponding developers.
应用程序编程接口(api)通常具有使用约束,例如调用条件或调用顺序。不正确地使用这些约束(称为API滥用)将导致系统崩溃、错误甚至安全问题。在开发过程的早期发现这种滥用是至关重要的。尽管在过去几年中提出了许多方法,但最近的研究表明,API的滥用仍然很普遍,特别是针对个别项目的滥用。在本文中,我们努力提高当前大规模C程序的api误用检测能力。首先,我们提出了IMSpec,这是一种轻量级的特定于领域的语言,使开发人员能够在三个不同的方面(即参数验证、错误处理和因果调用)指定API使用约束,这是大多数API误用错误。然后,我们定制了一个约束引导的静态分析引擎,以自动解析IMSpec规则并检测具有丰富语义的api滥用错误。我们在广泛使用的基准和实际项目中评估我们的方法。结果表明,我们易于扩展的方法比最先进的工具表现得更好。我们还在真实的开源项目中发现了19个以前未知的bug,所有这些bug都得到了相应的开发人员的确认。
{"title":"IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs","authors":"Zuxing Gu, Min Zhou, Jiecheng Wu, Yu Jiang, Jiaxiang Liu, M. Gu","doi":"10.1109/TASE.2019.00006","DOIUrl":"https://doi.org/10.1109/TASE.2019.00006","url":null,"abstract":"Application Programming Interfaces (APIs) usually have usage constraints, such as call conditions or call orders. Incorrect usage of these constraints, called API misuse, will result in system crashes, bugs, and even security problems. It is crucial to detect such misuses early in the development process. Though many approaches have been proposed over the last years, recent studies show that API misuses are still prevalent, especially the ones specific to individual projects. In this paper, we strive to improve current API-misuse detection capability for large-scale C programs. First, We propose IMSpec, a lightweight domain-specific language enabling developers to specify API usage constraints in three different aspects (i.e., parameter validation, error handling, and causal calling), which are the majority of API-misuse bugs. Then, we have tailored a constraint guided static analysis engine to automatically parse IMSpec rules and detect API-misuse bugs with rich semantics. We evaluate our approach on widely used benchmarks and real-world projects. The results show that our easily extensible approach performs better than state-of-the-art tools. We also discover 19 previously unknown bugs in real-world open-source projects, all of which have been confirmed by the corresponding developers.","PeriodicalId":183749,"journal":{"name":"2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113977899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China BAT浏览器扩展在中国的大规模隐私泄露检测
Yufei Zhao, Longtao He, Zhoujun Li, Liqun Yang, Haolong Dong, Chao Li, Yu Wang
Although browser extensions bring users a better experience, it creates a hidden danger of privacy leakage. A common privacy leakage detection method is realized through detecting private data transmission. However, only the unintended transmission is considered to be a privacy leak. Therefore, the real challenge is to determine whether or not the transmission is user intended. In order to address this problem, we check the rationality of private data transmission by establishing a privacy model based on classification for extensions to confirm the scope of private data that can be uploaded and domains that can be sent to. Furthermore, we present BEDS (Browser Extension Detection System), a Chromium based extension dynamic detection system. BEDS first builds a privacy model for each extension and then records the extension's network logs and browser API logs when accessing specified pages. Finally, BEDS determines whether there exists a privacy leak according to the strict privacy leakage judgment rules. We test our implementation in large scale on extensions in browsers developed by China's three major Internet companies and complete 15 months of continuous tracking. After examining a total of 14,487 extensions, 1,897 privacy leaks are identified, all results have been inspected by manual and the accuracy of BEDS is over 97%. A number of domains that illegally collect private user data are discovered and tracked. Our results show that about 47,000 Chinese IPs upload private information to suspicious servers every day.
浏览器扩展虽然给用户带来了更好的体验,但也带来了隐私泄露的隐患。一种常用的隐私泄漏检测方法是通过检测隐私数据传输来实现的。然而,只有非预期的传输才被认为是隐私泄露。因此,真正的挑战是确定传输是否是用户想要的。为了解决这一问题,我们通过建立基于分类的隐私模型来验证隐私数据传输的合理性,以确定隐私数据可以上传的范围和可以发送的域。此外,我们提出了基于Chromium的扩展动态检测系统BEDS (Browser Extension Detection System)。BEDS首先为每个扩展建立一个隐私模型,然后在访问指定页面时记录扩展的网络日志和浏览器API日志。最后,BEDS根据严格的隐私泄露判断规则来判断是否存在隐私泄露。我们在中国三大互联网公司开发的浏览器扩展上进行了大规模的测试,并完成了15个月的连续跟踪。在检查了14487个扩展后,发现了1897个隐私泄露,所有结果都经过人工检查,bed的准确率超过97%。许多非法收集私人用户数据的域名被发现和跟踪。我们的研究结果显示,每天大约有47,000个中国ip向可疑服务器上传私人信息。
{"title":"Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China","authors":"Yufei Zhao, Longtao He, Zhoujun Li, Liqun Yang, Haolong Dong, Chao Li, Yu Wang","doi":"10.1109/TASE.2019.00-19","DOIUrl":"https://doi.org/10.1109/TASE.2019.00-19","url":null,"abstract":"Although browser extensions bring users a better experience, it creates a hidden danger of privacy leakage. A common privacy leakage detection method is realized through detecting private data transmission. However, only the unintended transmission is considered to be a privacy leak. Therefore, the real challenge is to determine whether or not the transmission is user intended. In order to address this problem, we check the rationality of private data transmission by establishing a privacy model based on classification for extensions to confirm the scope of private data that can be uploaded and domains that can be sent to. Furthermore, we present BEDS (Browser Extension Detection System), a Chromium based extension dynamic detection system. BEDS first builds a privacy model for each extension and then records the extension's network logs and browser API logs when accessing specified pages. Finally, BEDS determines whether there exists a privacy leak according to the strict privacy leakage judgment rules. We test our implementation in large scale on extensions in browsers developed by China's three major Internet companies and complete 15 months of continuous tracking. After examining a total of 14,487 extensions, 1,897 privacy leaks are identified, all results have been inspected by manual and the accuracy of BEDS is over 97%. A number of domains that illegally collect private user data are discovered and tracked. Our results show that about 47,000 Chinese IPs upload private information to suspicious servers every day.","PeriodicalId":183749,"journal":{"name":"2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129858524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Formalizing Time4sys using parametric timed automata 使用参数时间自动机形式化Time4sys
É. André
Critical real-time systems must be verified to avoid the risk of dramatic consequences in case of failure. Thales developed an open formalism "Time4Sys" to model real-time systems, with expressive features such as periodic or sporadic tasks, task dependencies, distributed systems, etc. However, Time4Sys does not natively allow for a formal reasoning. In this work, we present a translation from Time4Sys to (parametric) timed automata, so as to allow for a formal verification.
必须对关键的实时系统进行验证,以避免发生故障时产生严重后果的风险。泰雷兹开发了一种开放的形式主义“Time4Sys”来模拟实时系统,具有表达性特征,如周期性或零星任务、任务依赖性、分布式系统等。然而,Time4Sys本身不允许形式推理。在这项工作中,我们提出了从Time4Sys到(参数)定时自动机的转换,以便允许形式化验证。
{"title":"Formalizing Time4sys using parametric timed automata","authors":"É. André","doi":"10.1109/TASE.2019.000-3","DOIUrl":"https://doi.org/10.1109/TASE.2019.000-3","url":null,"abstract":"Critical real-time systems must be verified to avoid the risk of dramatic consequences in case of failure. Thales developed an open formalism \"Time4Sys\" to model real-time systems, with expressive features such as periodic or sporadic tasks, task dependencies, distributed systems, etc. However, Time4Sys does not natively allow for a formal reasoning. In this work, we present a translation from Time4Sys to (parametric) timed automata, so as to allow for a formal verification.","PeriodicalId":183749,"journal":{"name":"2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115180202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Quantum Programs Against Decoherence: Delaying Qubits into Quantum Superposition 针对退相干优化量子程序:延迟量子比特进入量子叠加态
Yu Zhang, Haowei Deng, Quanxi Li, Haoze Song, Lei Nie
Quantum computing technology has reached a second renaissance in the last decade. However, in the NISQ era pointed out by John Preskill in 2018, quantum noise and decoherence, which affect the accuracy and execution effect of quantum programs, cannot be ignored and corrected by the near future NISQ computers. In order to let users more easily write quantum programs, the compiler and runtime system should consider underlying quantum hardware features such as decoherence. To address the challenges posed by decoherence, in this paper, we propose and prototype QLifeReducer to minimize the qubit lifetime in the input OpenQASM program by delaying qubits into quantum superposition. QLifeReducer includes three core modules, i.e., the parser, parallelism analyzer and transformer. It introduces the layered bundle format to express the quantum program, where a set of parallelizable quantum operations is packaged into a bundle. We evaluate quantum programs before and after transformed by QLifeReducer on both real IBM Q 5 Tenerife and the self-developed simulator. The experimental results show that QLifeReducer reduces the error rate of a quantum program when executed on IBMQ 5 Tenerife by 11%; and can reduce the longest qubit lifetime as well as average qubit lifetime by more than 20% on most quantum workloads.
量子计算技术在过去十年中迎来了第二次复兴。然而,在John Preskill于2018年指出的NISQ时代,影响量子程序精度和执行效果的量子噪声和退相干,是近期NISQ计算机无法忽视和纠正的。为了让用户更容易地编写量子程序,编译器和运行时系统应该考虑底层量子硬件特性,如退相干。为了解决退相干带来的挑战,在本文中,我们提出并原型化QLifeReducer,通过延迟量子比特进入量子叠加来最小化输入OpenQASM程序中的量子比特寿命。QLifeReducer包括三个核心模块,即解析器、并行分析器和转换器。引入分层束格式来表达量子程序,将一组可并行的量子操作打包成一个束。我们在真实的IBM q5 Tenerife和自行开发的模拟器上对QLifeReducer转换前后的量子程序进行了评估。实验结果表明,QLifeReducer将量子程序在IBMQ 5 Tenerife上执行时的错误率降低了11%;并且可以在大多数量子工作负载上将最长量子位寿命和平均量子位寿命减少20%以上。
{"title":"Optimizing Quantum Programs Against Decoherence: Delaying Qubits into Quantum Superposition","authors":"Yu Zhang, Haowei Deng, Quanxi Li, Haoze Song, Lei Nie","doi":"10.1109/TASE.2019.000-2","DOIUrl":"https://doi.org/10.1109/TASE.2019.000-2","url":null,"abstract":"Quantum computing technology has reached a second renaissance in the last decade. However, in the NISQ era pointed out by John Preskill in 2018, quantum noise and decoherence, which affect the accuracy and execution effect of quantum programs, cannot be ignored and corrected by the near future NISQ computers. In order to let users more easily write quantum programs, the compiler and runtime system should consider underlying quantum hardware features such as decoherence. To address the challenges posed by decoherence, in this paper, we propose and prototype QLifeReducer to minimize the qubit lifetime in the input OpenQASM program by delaying qubits into quantum superposition. QLifeReducer includes three core modules, i.e., the parser, parallelism analyzer and transformer. It introduces the layered bundle format to express the quantum program, where a set of parallelizable quantum operations is packaged into a bundle. We evaluate quantum programs before and after transformed by QLifeReducer on both real IBM Q 5 Tenerife and the self-developed simulator. The experimental results show that QLifeReducer reduces the error rate of a quantum program when executed on IBMQ 5 Tenerife by 11%; and can reduce the longest qubit lifetime as well as average qubit lifetime by more than 20% on most quantum workloads.","PeriodicalId":183749,"journal":{"name":"2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126491457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1