Инсерционное моделирование А.Летичевский Семинар «Образный компьютер» 10 Мая 2011.

Презентация:



Advertisements
Похожие презентации
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
Advertisements

PAT312, Section 16, December 2006 S16-1 Copyright 2007 MSC.Software Corporation SECTION 16 MATERIALS.
Ionospheric model. Introduction Because of the complicated nature of the ionosphere, there have been numerous approaches for ionospheric modeling. In.
© 2009 Avaya Inc. All rights reserved.1 Chapter Two, Voic Pro Components Module Two – Actions, Variables & Conditions.
Charles Kime & Thomas Kaminski © 2008 Pearson Education, Inc. (Hyperlinks are active in View Show mode) Chapter 5 – Sequential Circuits Part 2 – Sequential.
Copyright 2003 CCNA 4 Chapter 11 Scaling IP Addresses By Your Name.
WS14-1 WORKSHOP 14 ANCHOR ANALYSIS PAT301, Workshop 14, October 2003.
© 2002 IBM Corporation Confidential | Date | Other Information, if necessary © Wind River Systems, released under EPL 1.0. All logos are TM of their respective.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to Multiple Service.
Loader Design Options Linkage Editors Dynamic Linking Bootstrap Loaders.
Internet Structure. 1. The Definition Internet, WAN, connect, networks, are built, by different principles Internet, WAN, connect, networks, are built,
PAT312, Section 21, December 2006 S21-1 Copyright 2007 MSC.Software Corporation SECTION 21 GROUPS.
Sequences Sequences are patterns. Each pattern or number in a sequence is called a term. The number at the start is called the first term. The term-to-term.
24-Jul-15Workgroup and Workflow Systems - When are two Workflows the Same?1 When are two Workflows the same? Polo Regionale di Como of the Politecnico.
Charles Kime & Thomas Kaminski © 2008 Pearson Education, Inc. (Hyperlinks are active in View Show mode) Chapter 6 – Selected Design Topics Part 4 – Programmable.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Configuring Policies.
Operators and Arithmetic Operations. Operators An operator is a symbol that instructs the code to perform some operations or actions on one or more operands.
Michael Marchenko. In mathematics, a sequence is an ordered list of objects (or events). Like a set, it contains members (also called elements, or terms),
Operator Overloading Customised behaviour of operators Chapter: 08 Lecture: 26 & 27 Date:
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Implementation Using MPLS VPN Mechanisms of Cisco IOS Platforms.
Транксрипт:

Инсерционное моделирование А.Летичевский Семинар «Образный компьютер» 10 Мая 2011

Содержание Инсерционное моделирование Математические основания Инсерционные машины Базовые протоколы Верификация в системе VRS Май Образный компьютер2

Май Инсерционное моделирование: Технология построения и исследования моделей многокомпонентных распределенных систем, представленных с помощью композиции агентов и сред Формально Агенты и среды: Атрибутные транзиционные системы Композиция: непрерывная функция погружения, характеризующая изменение поведения среды в результате погружения агента Образный компьютер

Май Образный компьютер4 Исторические замечания Идея «Взаимодействия агентов и сред» появилась в 1996 году в результате совместных исследований с Д.Гильбертом в Сити Университете в Лондоне. С 2000 она использовалась при разработке средств верификации требований краспределенным программным системам. Реализована в системе VRS, разработанной по заказу Моторолы. В настоящее время используется компанией Uniquesoft для создания новых средств разработки программных cистем. Одновременно в ИК разрабатывается система инсерционного моделирования IMS

Insertion modeling paradigm Май Образный компьютер agent environment agent environment Insertion function The world is a hierarchy of environments and agents inserted into them. Environments and agents are entities evolving in time. Insertion of agent into environment changes the behavior of environment and produces new environment which is ready for insertion of new agents (if there is a room). Environments as agents can be inserted into higher level environment. Agents can be inserted from external environment as well as from internal agents (environments). Agents and environments can model another agents and environments on the different levels of abstraction

Май Образный компьютер6 Mathematical foundations Transition systems Agents Behaviors and behavior algebras Environments and insertion function Insertion equivalence of agents Process algebras

a Transition systems Май Образный компьютер Agents and environments are labeled or attributed transition systems considered up to bisimilarity (bisimilar states have the same behavior that is cannot be distinguished by an observer). b a b b b a a a a b b aa a a a a b b b

8 s s's' Поведение транзиционной системы: множество последовательностей действий, которые она может совершить (?) Май Образный компьютер

9 Бисимуляционная эквивалентность bisimilarity (Milner 1980, D.Park 1981) Отношение бисимуляции (bisimulation): a R s a t R a R s a t R bisimulation => bisimilarity (бисимуляционная эквивалентность) Май Образный компьютер

Май Образный компьютер10 Agents x y:Δ a aa b a Δ x:(a.0)+a.(b.(y:(a.0+a. Δ + Δ)) + bot) Attribued transition systems with divergence and terminal states considered up to bisimularity. Behaviors Elements of continuous complete behaviour algebra F(A) over a set of actions A (a kind of process algebra). Extensions: functions defined by recursive definitions in F(A) Sates as behaviors.

Май Образный компьютер11 Environments and insertion functions Insertion function must be continuous n Insertion of several agents Multilevel insertion is a complete behavior algebra over action algebra (a kind of process algebra).

Май Образный компьютер12 Insertion equivalence Semigroup of environment transformations Equivalence

Май Образный компьютер13 Traditional algebras of communicating processes (CCS, CSP, ACP, π-calculus,...) can be obtained by selection of an environment and its insertion function.

Май Образный компьютер14 One-step insertion Classification of insertion functions Look-ahead insertion (прогнозирующее погружение) continuous Head insertion (префиксное погружение) continuous

Май Образный компьютер15 Insertion machines: implementation of insertion models Real time insertion machines Analytical insertion machines

Real time insertion machine Май Образный компьютер 16 Agent behavior unfolder Environment interactor Model driver Input model Unfolding recursive definitions Computing insertion function and making nondeterministic choice External environment External insertion function

Analytical insertion machine Май Образный компьютер 17 Agent behavior unfolder Environment interactor Model driver Input model Goal state Filters Search control Unfolding recursive definitions Computing insertion function Output traces

Май Образный компьютер18 IMS is an environment for the development of insertion machines (new project of Glushkov Institute of Cybernetics)

Some insertion machines developed previously Май Образный компьютер19 Semantics of MSC (2002, 2005) Glushkov evidence algorithm (2002, 2003) Semantics of Basic Protocols (2005) Trace Generators for VRS (2008) Checking security protocols (2009) Creatures and substance (2009) Proving program correctness and generating invariants

BPSL Basic Protocol Specification Language used in VRS Май Образный компьютер20

21 Basic protocol Precondition Properties of environment First order quantifier with typed variables Postcondition Finite process (behavior) of attributed environment with inserted agents Environment property Combination of Hoar triples with the model of interaction of agents and environments. A method to define insertion function (look-ahead) by representing its local properties. Май Образный компьютер

BPSL implemented in VRS environment description + set of BPs Май Образный компьютер22 Types: Data types simple: int, real, Bool, enumerated, symbolic (free terms), agent behaviors (process algebra) lists: list of τ (simple) functional: (simple, arrays are considered as functional types with restrictions on the domains of indexes) Agent types: defined by the set of typed agent attributes Agent behaviors: defined by recursive equations Environment attributes: used as functional symbols (simple= arity 0) Agent attributes: typed names

Preconditions and postconditions Май Образный компьютер23 Environment description defines a signature of multisorted algebra and domains for types (sorts). Precondition is a first order formula over signature defined by environment description. Postcondition is a formula + assignments + update operators for lists. Assignments and updates are considered as a temporal logic formula. Formulas for lists: u=(t1,t2,…) or Exist x(u=p*x*q). Existential quantifiers are allowed in formulas.

VRS tools Concrete Trace Generator (CTG) Symbolic Trace Generator (STG) Static Requirements Checker (SRC) Май Образный компьютер24

Concrete trace generator analytical insertion machine for concrete models Май Образный компьютер All attributes have concrete values in the state of environment and agents states. Each instantiated basic protocol defines single- valued transformation of environment state: Analog: model checker for BP-specifications Goal state, safety conditions Filters and search control, LTL, Symmetry, dynamic abstraction,…

Май Образный компьютер Symbolic trace generator analytical insertion machine for concrete models Possible values of environment and agent attributes are defined by means of logic formulas. Transition rules defined by means of corresponding deductive system Predicate transformer computes the strongest postcondition.

Май Образный компьютер Static requirement checker algorithms based on predicate transformer Proving properties of requirements without generating traces. Completeness Consistency Safety Reachability (reduced to safety)

Май Образный компьютер Future development of IMS Models, defined by local properties (generalization of basic protocols) Proving correctness of programs Solving constraint problems Developing new cognitive architecture on a base of IMS