SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
Toward Approximate Stochastic Model Checking of
   Computational Fields for Pervasive Computing Systems

                                Matteo Casadei, Mirko Viroli
                           {m.casadei,mirko.viroli}@unibo.it

                            Alma Mater Studiorum—Universit` di Bologna
                                                          a


                                       WOA, 19/09/2012




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields    WOA, 19/09/2012   1 / 17
Outline


 Preview
 Problem
  ⇒ tackling verification in field-based self-organising systems
 Goal
  ⇒ exploiting approximate stochastic model-checking and Prism
 Strategy
  ⇒ developing a high-level language translating to Prism
 Use
  ⇒ showing few example applications and results




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   2 / 17
Motivating Setting

 An abstract network model for pervasive computing
     A set of interconnected nodes situated in space
        Each node asynchronously interacts with a small neighbourhood
        Topology can be very dynamic due to mobility and faults

 Example problem
        Node n advertises an event in a large locality L(n)
        An “annotation” (tuple, data) in m ∈ L(n) then moves towards n

 General application scenarios – many rooted in SAPERE
        Steering people in pervasive computing scenarios [6]
        Message routing in wireless sensor networks [2]
        Mobile robot applications [1]
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   3 / 17
Motivating Setting

 An abstract network model for pervasive computing
     A set of interconnected nodes situated in space
        Each node asynchronously interacts with a small neighbourhood
        Topology can be very dynamic due to mobility and faults

 Example problem
        Node n advertises an event in a large locality L(n)
        An “annotation” (tuple, data) in m ∈ L(n) then moves towards n

 General application scenarios – many rooted in SAPERE
        Steering people in pervasive computing scenarios [6]
        Message routing in wireless sensor networks [2]
        Mobile robot applications [1]
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   3 / 17
Motivating Setting

 An abstract network model for pervasive computing
     A set of interconnected nodes situated in space
        Each node asynchronously interacts with a small neighbourhood
        Topology can be very dynamic due to mobility and faults

 Example problem
        Node n advertises an event in a large locality L(n)
        An “annotation” (tuple, data) in m ∈ L(n) then moves towards n

 General application scenarios – many rooted in SAPERE
        Steering people in pervasive computing scenarios [6]
        Message routing in wireless sensor networks [2]
        Mobile robot applications [1]
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   3 / 17
A solution by so-called “Computational Fields” [4]
 Mapping nodes to values (suggests a continuum space-time viewpoint)




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   4 / 17
A solution by so-called “Computational Fields” [4]
 Mapping nodes to values (suggests a continuum space-time viewpoint)




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   4 / 17
A solution by so-called “Computational Fields” [4]
 Mapping nodes to values (suggests a continuum space-time viewpoint)




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   4 / 17
A solution by so-called “Computational Fields” [4]
 Mapping nodes to values (suggests a continuum space-time viewpoint)




 Other structures (channel, shrinking crown, partition, shadow)




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   4 / 17
Computational Fields and emergence




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   5 / 17
The predictability/controllability issue


 Any guarantee about “appropriateness”?
        Will the computational field stabilise? (or can it diverge?)
        Will the computational field have the proper shape?
        Will people be steered until eventually reaching the POI?

 Approaches to assess properties
     Formal proof: difficult to find, typically ad-hoc
        Simulation: the standard-de-facto, often hard to be fully trusted
        Automatic Verification (model-checking): shortly impractical




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   6 / 17
The predictability/controllability issue


 Any guarantee about “appropriateness”?
        Will the computational field stabilise? (or can it diverge?)
        Will the computational field have the proper shape?
        Will people be steered until eventually reaching the POI?

 Approaches to assess properties
     Formal proof: difficult to find, typically ad-hoc
        Simulation: the standard-de-facto, often hard to be fully trusted
        Automatic Verification (model-checking): shortly impractical




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   6 / 17
A solution between Simulation and Automatic Verification
 Approximate Stochastic Model Checking [3] (A-SMC)
 Tackle the state-space explosion, probabilistically:
        Explore a subset of state-space through a (possibly high) number of
        stochastic simulations (requires less time and less space than MC)
        Result: probability for the property to hold, with known confidence

 Three key parameters
    1   Number of independent simulation runs N
    2   Approximation : the desired precision on the obtained probability
    3   Confidence factor δ: probability that approximation is not met

  ⇒ (Definition of                and δ: Prob[|Mexact − Mapprox | ≤ ] ≥ 1 − δ)
  ⇒ Parameters are linked: N ≥ 4log ( 2 )/
                                      δ
                                                              2

  ⇒ Our choice:               = 0.01, δ = 0.01, N            90 000.
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   7 / 17
A solution between Simulation and Automatic Verification
 Approximate Stochastic Model Checking [3] (A-SMC)
 Tackle the state-space explosion, probabilistically:
        Explore a subset of state-space through a (possibly high) number of
        stochastic simulations (requires less time and less space than MC)
        Result: probability for the property to hold, with known confidence

 Three key parameters
    1   Number of independent simulation runs N
    2   Approximation : the desired precision on the obtained probability
    3   Confidence factor δ: probability that approximation is not met

  ⇒ (Definition of                and δ: Prob[|Mexact − Mapprox | ≤ ] ≥ 1 − δ)
  ⇒ Parameters are linked: N ≥ 4log ( 2 )/
                                      δ
                                                              2

  ⇒ Our choice:               = 0.01, δ = 0.01, N            90 000.
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   7 / 17
A solution between Simulation and Automatic Verification
 Approximate Stochastic Model Checking [3] (A-SMC)
 Tackle the state-space explosion, probabilistically:
        Explore a subset of state-space through a (possibly high) number of
        stochastic simulations (requires less time and less space than MC)
        Result: probability for the property to hold, with known confidence

 Three key parameters
    1   Number of independent simulation runs N
    2   Approximation : the desired precision on the obtained probability
    3   Confidence factor δ: probability that approximation is not met

  ⇒ (Definition of                and δ: Prob[|Mexact − Mapprox | ≤ ] ≥ 1 − δ)
  ⇒ Parameters are linked: N ≥ 4log ( 2 )/
                                      δ
                                                              2

  ⇒ Our choice:               = 0.01, δ = 0.01, N            90 000.
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   7 / 17
PRISM (www.prismmodelchecker.org)

 The reference tool for A-SMC
     Widely used: biochemistry, games, protocols, coordination
        Support for Continuous Stochastic Logic (CSL) and CTMC

 The “module” linguistic construct in PRISM:
     State – A small set of bounded numerical variables
        Behaviour – A small set of condition-action transitions
        Network – Can write many modules, also by clone & rename
        Synchronisation – Can influence other modules via synch. transitions

 Limits of PRISM as front-end language to our ends
  ⇒ No first-class support for true (large, dynamic, ad-hoc) topologies
  ⇒ No first-class support for node-to-node communications

Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   8 / 17
PRISM (www.prismmodelchecker.org)

 The reference tool for A-SMC
     Widely used: biochemistry, games, protocols, coordination
        Support for Continuous Stochastic Logic (CSL) and CTMC

 The “module” linguistic construct in PRISM:
     State – A small set of bounded numerical variables
        Behaviour – A small set of condition-action transitions
        Network – Can write many modules, also by clone & rename
        Synchronisation – Can influence other modules via synch. transitions

 Limits of PRISM as front-end language to our ends
  ⇒ No first-class support for true (large, dynamic, ad-hoc) topologies
  ⇒ No first-class support for node-to-node communications

Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   8 / 17
A PRISM-based framework

 Three inputs
        Specification of a node (state + behaviour + interaction)
        Specification of a topology (grid, torus, ad-hoc, and the like)
        Specification of a formula to verify (CSL + node quantification)

 Two outputs
        (Big) PRISM specification (basically obtained by expansion)
        PRISM formula to verify

 Then..
     PRISM is used as usual to run modelchecking
        Specifying ,δ and N
        Charting probability of truth for different parameters
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   9 / 17
The hop-count gradient case

 Node specification
 pump : [0..1]; field : [0..MAX];
 []     pump=1 & field>0 -- 1.0 --> field’= 0;
 [diff] pump=0           -- 1.0 --> field’= min[@.field]+1;


 Referencing neighbours
     min[@.field]: minimum value of field in neighbours

 An example on a “random torus”




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   10 / 17
The hop-count gradient case
 Node specification
 pump : [0..1]; field : [0..MAX];
 []     pump=1 & field>0 -- 1.0 --> field’= 0;
 [diff] pump=0           -- 1.0 --> field’= min[@.field]+1;


 PRISM specification (grid topology, node 11, having neighbours 13,21,31)
 module node1_1
   pump1_1 : [0..1] init 1; field1_1 : [0..MAX] init MAX;
   [] pump1_1>0 & field1_1>0 -> 1.0 : field1_1’ = 0;
   [diff_1_1] pump1_1=0 -> 1.0 : field1_1’ = min(field1_3,field2_1,field3_1)+1;
 endmodule
 module node1_2=node1_1 [ diff_1_1=diff_1_2, pump1_1=pump1_2, ..] endmodule
 module node2_1=node1_1 [ diff_1_1=diff_2_1, ..] endmodule
 ...


 Property to verify and query (stabilisation within “k” time units)
 property "stab" = forall[(pump=0 & field=min(@.field)+1) | (pump=1 & field=0)];
 P=? [F<=k "stab"]   % F is bounded-eventually operator of temporal logics

Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   11 / 17
Simulation

 Charting probability of convergence within k time units




 ⇒ Result: stabilisation is reached linearly in the network diameter
 ⇒ This simulation takes about 2 hours on a 2.66 Ghz Dual-Core PC..
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   12 / 17
A random walk – showing node synchronisation

 Node specification
 v : [0..1];
 [move] v=1 & N:=&any[@.v=0] -- 1.0 --> v’=0 & N.v’=1;


 Referencing neighbours
     any[@.v=0]: any neighbour having v set to 0

 PRISM specification (node 1, having neighbours 2,3)
 module node_1
   v_1 : [0..1] init 1;
  [move_1_2] v_1 = 1 & v_2 = 0 -> 1.0 : (v_1’=0); % one per outgoing neighbour
  [move_1_3] v_1 = 1 & v_3 = 0 -> 1.0 : (v_1’=0);
  [move_2_1] true -> 1.0 : (v_1’=1);              % one per incoming neighbour
  [move_3_1] true -> 1.0 : (v_1’=1);
 endmodule
 module node_2 .. endmodule
 module node_3 .. endmodule

Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   13 / 17
Language Syntax

 Module specification
 S   ::=   D T                               % Specification
 D   ::=   X : [n_l..n_u];                   % Variable def
 T   ::=   [L] P --e--> A;                   % Transition
 A   ::=   V’=e                              % Assignment
 P   ::=   b | M:=&f[e] | M:=&f[b]           % Precondition
 f   ::=   any | min | max                   % Selection function
 e   ::=   r | V | (e) | e+e | e-e | e*e | -e | f[e]    % exp
 b   ::=   e<=e | e<e | e>=e | e>e | e=e | e!=e         % bool exp
 V   ::=   X | M.X | @.X                               % Variable
 r   ::=   <real-num>                        % (real) Number
 n   ::=   <int-num>                         % (integer) Number
 L   ::=   <literal>                         % Label
 X   ::=   <literal>                         % Variable name
 M   ::=   <literal>                         % Node variable
Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   14 / 17
A more involved example – channel structure


 Node specification
 source : [0..1];    fs : [0..MAX];
 target : [0..1];    ft : [0..MAX];
 distance : [0..MAX]; range : [0..MAX];
 channel : [0..1];

 []          source=1 & fs>0 -- 100.0 --> fs’= 0 ;
 [sdiff]     source=0        -- 1.0 --> fs’= min[@.fs]+1;
 []          target=1 & ft>0 -- 100.0 --> ft’= 0 ;
 [tdiff]     target=0        -- 1.0 --> ft’= min[@.ft]+1;
 [dist]      source=1 & ft<MAX -- 1.0 --> distance’=ft;
 [goss]      N:=&any[@.distance>distance] -- 1.0 --> N.distance’=N.distance;
 [chn]       channel=0 & fs+ft<distance+range -- 1.0 --> channel’=1




Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   15 / 17
Conclusions

 Open issues
     Very hard to deal with network mobility, can simulate by:
          ⇒ translating links into modules
          ⇒ such modules activate/disactivate stochastically
        PRISM itself does not scale very well with size of the specification
        A-SMC is becoming popular in academia, but it is not yet a standard
        Can analyse topologies of few hundreds nodes

 Future works
     Improve the specification language – still very constrained by PRISM
        Integrating A-SMC in ad-hoc simulators (e.g. Alchemist [5])
        Find proof methodologies for certain classes of fields
        Incorporate a development methodology based on A-SMC in SAPERE

Matteo Casadei, Mirko Viroli (UNIBO)   A-SMC for Computational Fields   WOA, 19/09/2012   16 / 17
References I

 [1] Jonathan Bachrach, Jacob Beal, and James McLurkin.
     Composable continuous-space programs for robotic swarms.
     Neural Computing and Applications, 19(6):825–847, 2010.

 [2] Matteo Casadei, Mirko Viroli, and Luca Gardelli.
     On the collective sort problem for distributed tuple spaces.
     Sci. of Computer Programming, 74(9):702–722, 2009.

 [3] Thomas H´rault, Richard Lassaigne, Fr´d´ric Magniette, and Sylvain Peyronnet.
               e                           e e
     Approximate probabilistic model checking.
     In Bernhard Steffen and Giorgio Levi, editors, Proc. 5th International Conference on Verification, Model Checking and
     Abstract Interpretation (VMCAI’04), volume 2937 of Lecture Notes in Computer Science, pages 73–84. Springer, 2004.

 [4] Marco Mamei and Franco Zambonelli.
     Programming pervasive and mobile computing applications: The tota approach.
     ACM Trans. Softw. Eng. Methodol., 18(4):1–56, 2009.

 [5] Danilo Pianini, Sara Montagna, and Mirko Viroli.
     A chemical inspired simulation framework for pervasive services ecosystems.
     In Maria Ganzha, Leszek Maciaszek, and Marcin Paprzycki, editors, Proceedings of the Federated Conference on Computer
     Science and Information Systems, pages 675–682, Szczecin, Poland, 18-21 September 2011. IEEE Computer Society Press.
 [6] Mirko Viroli, Danilo Pianini, Sara Montagna, and Graeme Stevenson.
     Pervasive ecosystems: a coordination model based on semantic chemistry.
     In Sascha Ossowski, Paola Lecca, Chih-Cheng Hung, and Jiman Hong, editors, 27th Annual ACM Symposium on Applied
     Computing (SAC 2012), Riva del Garda, TN, Italy, 26-30 March 2012. ACM.




Matteo Casadei, Mirko Viroli (UNIBO)             A-SMC for Computational Fields                WOA, 19/09/2012        17 / 17

Contenu connexe

Tendances

Convolutional Neural Networks (D1L3 2017 UPC Deep Learning for Computer Vision)
Convolutional Neural Networks (D1L3 2017 UPC Deep Learning for Computer Vision)Convolutional Neural Networks (D1L3 2017 UPC Deep Learning for Computer Vision)
Convolutional Neural Networks (D1L3 2017 UPC Deep Learning for Computer Vision)Universitat Politècnica de Catalunya
 
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...paperpublications3
 
Joint unsupervised learning of deep representations and image clusters
Joint unsupervised learning of deep representations and image clustersJoint unsupervised learning of deep representations and image clusters
Joint unsupervised learning of deep representations and image clustersUniversitat Politècnica de Catalunya
 
Introduction to Convolutional Neural Networks
Introduction to Convolutional Neural NetworksIntroduction to Convolutional Neural Networks
Introduction to Convolutional Neural NetworksParrotAI
 
Convolutional Neural Networks - Xavier Giro - UPC TelecomBCN Barcelona 2020
Convolutional Neural Networks - Xavier Giro - UPC TelecomBCN Barcelona 2020Convolutional Neural Networks - Xavier Giro - UPC TelecomBCN Barcelona 2020
Convolutional Neural Networks - Xavier Giro - UPC TelecomBCN Barcelona 2020Universitat Politècnica de Catalunya
 
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018Universitat Politècnica de Catalunya
 
The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)James McMurray
 
Person re-identification, PhD Day 2011
Person re-identification, PhD Day 2011Person re-identification, PhD Day 2011
Person re-identification, PhD Day 2011Riccardo Satta
 
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018Universitat Politècnica de Catalunya
 
Simulated Annealing Algorithm for VLSI Floorplanning for Soft Blocks
Simulated Annealing Algorithm for VLSI Floorplanning for Soft BlocksSimulated Annealing Algorithm for VLSI Floorplanning for Soft Blocks
Simulated Annealing Algorithm for VLSI Floorplanning for Soft BlocksIJCSIS Research Publications
 
Interpretability of Convolutional Neural Networks - Eva Mohedano - UPC Barcel...
Interpretability of Convolutional Neural Networks - Eva Mohedano - UPC Barcel...Interpretability of Convolutional Neural Networks - Eva Mohedano - UPC Barcel...
Interpretability of Convolutional Neural Networks - Eva Mohedano - UPC Barcel...Universitat Politècnica de Catalunya
 
#6 PyData Warsaw: Deep learning for image segmentation
#6 PyData Warsaw: Deep learning for image segmentation#6 PyData Warsaw: Deep learning for image segmentation
#6 PyData Warsaw: Deep learning for image segmentationMatthew Opala
 
Dissimilarity-based people re-identification and search for intelligent video...
Dissimilarity-based people re-identification and search for intelligent video...Dissimilarity-based people re-identification and search for intelligent video...
Dissimilarity-based people re-identification and search for intelligent video...Riccardo Satta
 
Transfer Learning and Domain Adaptation (DLAI D5L2 2017 UPC Deep Learning for...
Transfer Learning and Domain Adaptation (DLAI D5L2 2017 UPC Deep Learning for...Transfer Learning and Domain Adaptation (DLAI D5L2 2017 UPC Deep Learning for...
Transfer Learning and Domain Adaptation (DLAI D5L2 2017 UPC Deep Learning for...Universitat Politècnica de Catalunya
 
Steganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingSteganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingIJECEIAES
 
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)Universitat Politècnica de Catalunya
 

Tendances (20)

Convolutional Neural Networks (D1L3 2017 UPC Deep Learning for Computer Vision)
Convolutional Neural Networks (D1L3 2017 UPC Deep Learning for Computer Vision)Convolutional Neural Networks (D1L3 2017 UPC Deep Learning for Computer Vision)
Convolutional Neural Networks (D1L3 2017 UPC Deep Learning for Computer Vision)
 
crfasrnn_presentation
crfasrnn_presentationcrfasrnn_presentation
crfasrnn_presentation
 
Deep 3D Analysis - Javier Ruiz-Hidalgo - UPC Barcelona 2018
Deep 3D Analysis - Javier Ruiz-Hidalgo - UPC Barcelona 2018Deep 3D Analysis - Javier Ruiz-Hidalgo - UPC Barcelona 2018
Deep 3D Analysis - Javier Ruiz-Hidalgo - UPC Barcelona 2018
 
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
 
Joint unsupervised learning of deep representations and image clusters
Joint unsupervised learning of deep representations and image clustersJoint unsupervised learning of deep representations and image clusters
Joint unsupervised learning of deep representations and image clusters
 
Introduction to Convolutional Neural Networks
Introduction to Convolutional Neural NetworksIntroduction to Convolutional Neural Networks
Introduction to Convolutional Neural Networks
 
Convolutional Neural Networks - Xavier Giro - UPC TelecomBCN Barcelona 2020
Convolutional Neural Networks - Xavier Giro - UPC TelecomBCN Barcelona 2020Convolutional Neural Networks - Xavier Giro - UPC TelecomBCN Barcelona 2020
Convolutional Neural Networks - Xavier Giro - UPC TelecomBCN Barcelona 2020
 
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
 
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
 
The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)
 
Person re-identification, PhD Day 2011
Person re-identification, PhD Day 2011Person re-identification, PhD Day 2011
Person re-identification, PhD Day 2011
 
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
 
Simulated Annealing Algorithm for VLSI Floorplanning for Soft Blocks
Simulated Annealing Algorithm for VLSI Floorplanning for Soft BlocksSimulated Annealing Algorithm for VLSI Floorplanning for Soft Blocks
Simulated Annealing Algorithm for VLSI Floorplanning for Soft Blocks
 
Interpretability of Convolutional Neural Networks - Eva Mohedano - UPC Barcel...
Interpretability of Convolutional Neural Networks - Eva Mohedano - UPC Barcel...Interpretability of Convolutional Neural Networks - Eva Mohedano - UPC Barcel...
Interpretability of Convolutional Neural Networks - Eva Mohedano - UPC Barcel...
 
#6 PyData Warsaw: Deep learning for image segmentation
#6 PyData Warsaw: Deep learning for image segmentation#6 PyData Warsaw: Deep learning for image segmentation
#6 PyData Warsaw: Deep learning for image segmentation
 
Dissimilarity-based people re-identification and search for intelligent video...
Dissimilarity-based people re-identification and search for intelligent video...Dissimilarity-based people re-identification and search for intelligent video...
Dissimilarity-based people re-identification and search for intelligent video...
 
Deep Visual Saliency - Kevin McGuinness - UPC Barcelona 2017
Deep Visual Saliency - Kevin McGuinness - UPC Barcelona 2017Deep Visual Saliency - Kevin McGuinness - UPC Barcelona 2017
Deep Visual Saliency - Kevin McGuinness - UPC Barcelona 2017
 
Transfer Learning and Domain Adaptation (DLAI D5L2 2017 UPC Deep Learning for...
Transfer Learning and Domain Adaptation (DLAI D5L2 2017 UPC Deep Learning for...Transfer Learning and Domain Adaptation (DLAI D5L2 2017 UPC Deep Learning for...
Transfer Learning and Domain Adaptation (DLAI D5L2 2017 UPC Deep Learning for...
 
Steganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingSteganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matching
 
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
Unsupervised Deep Learning (D2L1 Insight@DCU Machine Learning Workshop 2017)
 

En vedette

Software development made serious
Software development made seriousSoftware development made serious
Software development made seriousDanilo Pianini
 
Gradient-based Self-organisation Patterns of Anticipative Adaptation
Gradient-based Self-organisation Patterns of Anticipative AdaptationGradient-based Self-organisation Patterns of Anticipative Adaptation
Gradient-based Self-organisation Patterns of Anticipative AdaptationDanilo Pianini
 
Simulating Large-scale Aggregate MASs with Alchemist and Scala
Simulating Large-scale Aggregate MASs with Alchemist and ScalaSimulating Large-scale Aggregate MASs with Alchemist and Scala
Simulating Large-scale Aggregate MASs with Alchemist and ScalaDanilo Pianini
 
Democratic process and electronic platforms: concerns of an engineer
Democratic process and electronic platforms: concerns of an engineerDemocratic process and electronic platforms: concerns of an engineer
Democratic process and electronic platforms: concerns of an engineerDanilo Pianini
 
Protelis: Practical Aggregate Programming - Symposium on Applied Computing (S...
Protelis: Practical Aggregate Programming - Symposium on Applied Computing (S...Protelis: Practical Aggregate Programming - Symposium on Applied Computing (S...
Protelis: Practical Aggregate Programming - Symposium on Applied Computing (S...Danilo Pianini
 
Engineering Complex Computational Ecosystems (PhD defense)
Engineering Complex Computational Ecosystems (PhD defense)Engineering Complex Computational Ecosystems (PhD defense)
Engineering Complex Computational Ecosystems (PhD defense)Danilo Pianini
 

En vedette (7)

SAPERE Analysis tools
SAPERE Analysis toolsSAPERE Analysis tools
SAPERE Analysis tools
 
Software development made serious
Software development made seriousSoftware development made serious
Software development made serious
 
Gradient-based Self-organisation Patterns of Anticipative Adaptation
Gradient-based Self-organisation Patterns of Anticipative AdaptationGradient-based Self-organisation Patterns of Anticipative Adaptation
Gradient-based Self-organisation Patterns of Anticipative Adaptation
 
Simulating Large-scale Aggregate MASs with Alchemist and Scala
Simulating Large-scale Aggregate MASs with Alchemist and ScalaSimulating Large-scale Aggregate MASs with Alchemist and Scala
Simulating Large-scale Aggregate MASs with Alchemist and Scala
 
Democratic process and electronic platforms: concerns of an engineer
Democratic process and electronic platforms: concerns of an engineerDemocratic process and electronic platforms: concerns of an engineer
Democratic process and electronic platforms: concerns of an engineer
 
Protelis: Practical Aggregate Programming - Symposium on Applied Computing (S...
Protelis: Practical Aggregate Programming - Symposium on Applied Computing (S...Protelis: Practical Aggregate Programming - Symposium on Applied Computing (S...
Protelis: Practical Aggregate Programming - Symposium on Applied Computing (S...
 
Engineering Complex Computational Ecosystems (PhD defense)
Engineering Complex Computational Ecosystems (PhD defense)Engineering Complex Computational Ecosystems (PhD defense)
Engineering Complex Computational Ecosystems (PhD defense)
 

Similaire à A Framework to Specify and Verify Computational Fields for Pervasive Computing Systems

Engineering Resilient Collaborative Edge-enabled IoT
Engineering Resilient Collaborative Edge-enabled IoTEngineering Resilient Collaborative Edge-enabled IoT
Engineering Resilient Collaborative Edge-enabled IoTRoberto Casadei
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanThe hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanIAEME Publication
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)iaemedu
 
Reifying the concurrency concern into xDSML specifications
Reifying the concurrency concern into xDSML specificationsReifying the concurrency concern into xDSML specifications
Reifying the concurrency concern into xDSML specificationsBenoit Combemale
 
Approximating Attack Surfaces with Stack Traces [ICSE 15]
Approximating Attack Surfaces with Stack Traces [ICSE 15]Approximating Attack Surfaces with Stack Traces [ICSE 15]
Approximating Attack Surfaces with Stack Traces [ICSE 15]Chris Theisen
 
Compositional Blocks for Optimal Self-Healing Gradients
Compositional Blocks for Optimal Self-Healing GradientsCompositional Blocks for Optimal Self-Healing Gradients
Compositional Blocks for Optimal Self-Healing GradientsRoberto Casadei
 
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...acijjournal
 
Towards Automated Engineering for Collective Adaptive Systems: Vision and Res...
Towards Automated Engineering for Collective Adaptive Systems: Vision and Res...Towards Automated Engineering for Collective Adaptive Systems: Vision and Res...
Towards Automated Engineering for Collective Adaptive Systems: Vision and Res...Roberto Casadei
 
On Execution Platforms for Large-Scale Aggregate Computing
On Execution Platforms for Large-Scale Aggregate ComputingOn Execution Platforms for Large-Scale Aggregate Computing
On Execution Platforms for Large-Scale Aggregate ComputingRoberto Casadei
 
Collective Abstractions and Platforms for Large-Scale Self-Adaptive IoT
Collective Abstractions and Platforms for Large-Scale Self-Adaptive IoTCollective Abstractions and Platforms for Large-Scale Self-Adaptive IoT
Collective Abstractions and Platforms for Large-Scale Self-Adaptive IoTRoberto Casadei
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxAbyThomas54
 
Promoting Space-Aware Coordination: ReSpecT as a Spatial Computing Virtual Ma...
Promoting Space-Aware Coordination: ReSpecT as a Spatial Computing Virtual Ma...Promoting Space-Aware Coordination: ReSpecT as a Spatial Computing Virtual Ma...
Promoting Space-Aware Coordination: ReSpecT as a Spatial Computing Virtual Ma...Stefano Mariani
 
Applying Neural Networks and Analogous Estimating to Determine the Project Bu...
Applying Neural Networks and Analogous Estimating to Determine the Project Bu...Applying Neural Networks and Analogous Estimating to Determine the Project Bu...
Applying Neural Networks and Analogous Estimating to Determine the Project Bu...Ricardo Viana Vargas
 
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...Innopolis University
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
 
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...Ravi Kiran B.
 

Similaire à A Framework to Specify and Verify Computational Fields for Pervasive Computing Systems (20)

Towards Edge Computing as a Service: Dynamic Formation of the Micro Data-Centers
Towards Edge Computing as a Service: Dynamic Formation of the Micro Data-CentersTowards Edge Computing as a Service: Dynamic Formation of the Micro Data-Centers
Towards Edge Computing as a Service: Dynamic Formation of the Micro Data-Centers
 
Engineering Resilient Collaborative Edge-enabled IoT
Engineering Resilient Collaborative Edge-enabled IoTEngineering Resilient Collaborative Edge-enabled IoT
Engineering Resilient Collaborative Edge-enabled IoT
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanThe hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid woban
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
 
Reifying the concurrency concern into xDSML specifications
Reifying the concurrency concern into xDSML specificationsReifying the concurrency concern into xDSML specifications
Reifying the concurrency concern into xDSML specifications
 
Approximating Attack Surfaces with Stack Traces [ICSE 15]
Approximating Attack Surfaces with Stack Traces [ICSE 15]Approximating Attack Surfaces with Stack Traces [ICSE 15]
Approximating Attack Surfaces with Stack Traces [ICSE 15]
 
Compositional Blocks for Optimal Self-Healing Gradients
Compositional Blocks for Optimal Self-Healing GradientsCompositional Blocks for Optimal Self-Healing Gradients
Compositional Blocks for Optimal Self-Healing Gradients
 
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...
 
Towards Automated Engineering for Collective Adaptive Systems: Vision and Res...
Towards Automated Engineering for Collective Adaptive Systems: Vision and Res...Towards Automated Engineering for Collective Adaptive Systems: Vision and Res...
Towards Automated Engineering for Collective Adaptive Systems: Vision and Res...
 
On Execution Platforms for Large-Scale Aggregate Computing
On Execution Platforms for Large-Scale Aggregate ComputingOn Execution Platforms for Large-Scale Aggregate Computing
On Execution Platforms for Large-Scale Aggregate Computing
 
Collective Abstractions and Platforms for Large-Scale Self-Adaptive IoT
Collective Abstractions and Platforms for Large-Scale Self-Adaptive IoTCollective Abstractions and Platforms for Large-Scale Self-Adaptive IoT
Collective Abstractions and Platforms for Large-Scale Self-Adaptive IoT
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
 
Promoting Space-Aware Coordination: ReSpecT as a Spatial Computing Virtual Ma...
Promoting Space-Aware Coordination: ReSpecT as a Spatial Computing Virtual Ma...Promoting Space-Aware Coordination: ReSpecT as a Spatial Computing Virtual Ma...
Promoting Space-Aware Coordination: ReSpecT as a Spatial Computing Virtual Ma...
 
1809.05680.pdf
1809.05680.pdf1809.05680.pdf
1809.05680.pdf
 
Distributed Streams
Distributed StreamsDistributed Streams
Distributed Streams
 
Applying Neural Networks and Analogous Estimating to Determine the Project Bu...
Applying Neural Networks and Analogous Estimating to Determine the Project Bu...Applying Neural Networks and Analogous Estimating to Determine the Project Bu...
Applying Neural Networks and Analogous Estimating to Determine the Project Bu...
 
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Atta...
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
 
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
 

Plus de Danilo Pianini

Time fluid field-based Coordination
Time fluid field-based CoordinationTime fluid field-based Coordination
Time fluid field-based CoordinationDanilo Pianini
 
Engineering the Aggregate - Talk at Software Engineering for Intelligent and ...
Engineering the Aggregate - Talk at Software Engineering for Intelligent and ...Engineering the Aggregate - Talk at Software Engineering for Intelligent and ...
Engineering the Aggregate - Talk at Software Engineering for Intelligent and ...Danilo Pianini
 
Versioning and License selection
Versioning and License selectionVersioning and License selection
Versioning and License selectionDanilo Pianini
 
Continuous Integration
Continuous IntegrationContinuous Integration
Continuous IntegrationDanilo Pianini
 
Enforce reproducibility: dependency management and build automation
Enforce reproducibility: dependency management and build automationEnforce reproducibility: dependency management and build automation
Enforce reproducibility: dependency management and build automationDanilo Pianini
 
Productive parallel teamwork: Decentralized Version Control Systems
Productive parallel teamwork: Decentralized Version Control SystemsProductive parallel teamwork: Decentralized Version Control Systems
Productive parallel teamwork: Decentralized Version Control SystemsDanilo Pianini
 
Computational Fields meet Augmented Reality: Perspectives and Challenges
Computational Fields meet Augmented Reality: Perspectives and ChallengesComputational Fields meet Augmented Reality: Perspectives and Challenges
Computational Fields meet Augmented Reality: Perspectives and ChallengesDanilo Pianini
 
Practical Aggregate Programming with Protelis @ SASO2017
Practical Aggregate Programming with Protelis @ SASO2017Practical Aggregate Programming with Protelis @ SASO2017
Practical Aggregate Programming with Protelis @ SASO2017Danilo Pianini
 
Towards a Foundational API for Resilient Distributed Systems Design
Towards a Foundational API for Resilient Distributed Systems DesignTowards a Foundational API for Resilient Distributed Systems Design
Towards a Foundational API for Resilient Distributed Systems DesignDanilo Pianini
 
Continuous integration and delivery
Continuous integration and deliveryContinuous integration and delivery
Continuous integration and deliveryDanilo Pianini
 
Extending the Gillespie's Stochastic Simulation Algorithm for Integrating Dis...
Extending the Gillespie's Stochastic Simulation Algorithm for Integrating Dis...Extending the Gillespie's Stochastic Simulation Algorithm for Integrating Dis...
Extending the Gillespie's Stochastic Simulation Algorithm for Integrating Dis...Danilo Pianini
 
Engineering computational ecosystems (2nd year PhD seminar)
Engineering computational ecosystems (2nd year PhD seminar)Engineering computational ecosystems (2nd year PhD seminar)
Engineering computational ecosystems (2nd year PhD seminar)Danilo Pianini
 
From Engineer to Alchemist, There and Back Again: An Alchemist Tale
From Engineer to Alchemist, There and Back Again: An Alchemist TaleFrom Engineer to Alchemist, There and Back Again: An Alchemist Tale
From Engineer to Alchemist, There and Back Again: An Alchemist TaleDanilo Pianini
 
SAPERE WP1 Alchemist status at 02/2013
SAPERE WP1 Alchemist status at 02/2013SAPERE WP1 Alchemist status at 02/2013
SAPERE WP1 Alchemist status at 02/2013Danilo Pianini
 
Engineering Computational Ecosystems
Engineering Computational EcosystemsEngineering Computational Ecosystems
Engineering Computational EcosystemsDanilo Pianini
 
Recipes for Sabayon: cook your own Linux distro within two hours
Recipes for Sabayon: cook your own Linux distro within two hoursRecipes for Sabayon: cook your own Linux distro within two hours
Recipes for Sabayon: cook your own Linux distro within two hoursDanilo Pianini
 
Towards a comprehensive approach to spontaneous self-composition in pervasive...
Towards a comprehensive approach to spontaneous self-composition in pervasive...Towards a comprehensive approach to spontaneous self-composition in pervasive...
Towards a comprehensive approach to spontaneous self-composition in pervasive...Danilo Pianini
 

Plus de Danilo Pianini (17)

Time fluid field-based Coordination
Time fluid field-based CoordinationTime fluid field-based Coordination
Time fluid field-based Coordination
 
Engineering the Aggregate - Talk at Software Engineering for Intelligent and ...
Engineering the Aggregate - Talk at Software Engineering for Intelligent and ...Engineering the Aggregate - Talk at Software Engineering for Intelligent and ...
Engineering the Aggregate - Talk at Software Engineering for Intelligent and ...
 
Versioning and License selection
Versioning and License selectionVersioning and License selection
Versioning and License selection
 
Continuous Integration
Continuous IntegrationContinuous Integration
Continuous Integration
 
Enforce reproducibility: dependency management and build automation
Enforce reproducibility: dependency management and build automationEnforce reproducibility: dependency management and build automation
Enforce reproducibility: dependency management and build automation
 
Productive parallel teamwork: Decentralized Version Control Systems
Productive parallel teamwork: Decentralized Version Control SystemsProductive parallel teamwork: Decentralized Version Control Systems
Productive parallel teamwork: Decentralized Version Control Systems
 
Computational Fields meet Augmented Reality: Perspectives and Challenges
Computational Fields meet Augmented Reality: Perspectives and ChallengesComputational Fields meet Augmented Reality: Perspectives and Challenges
Computational Fields meet Augmented Reality: Perspectives and Challenges
 
Practical Aggregate Programming with Protelis @ SASO2017
Practical Aggregate Programming with Protelis @ SASO2017Practical Aggregate Programming with Protelis @ SASO2017
Practical Aggregate Programming with Protelis @ SASO2017
 
Towards a Foundational API for Resilient Distributed Systems Design
Towards a Foundational API for Resilient Distributed Systems DesignTowards a Foundational API for Resilient Distributed Systems Design
Towards a Foundational API for Resilient Distributed Systems Design
 
Continuous integration and delivery
Continuous integration and deliveryContinuous integration and delivery
Continuous integration and delivery
 
Extending the Gillespie's Stochastic Simulation Algorithm for Integrating Dis...
Extending the Gillespie's Stochastic Simulation Algorithm for Integrating Dis...Extending the Gillespie's Stochastic Simulation Algorithm for Integrating Dis...
Extending the Gillespie's Stochastic Simulation Algorithm for Integrating Dis...
 
Engineering computational ecosystems (2nd year PhD seminar)
Engineering computational ecosystems (2nd year PhD seminar)Engineering computational ecosystems (2nd year PhD seminar)
Engineering computational ecosystems (2nd year PhD seminar)
 
From Engineer to Alchemist, There and Back Again: An Alchemist Tale
From Engineer to Alchemist, There and Back Again: An Alchemist TaleFrom Engineer to Alchemist, There and Back Again: An Alchemist Tale
From Engineer to Alchemist, There and Back Again: An Alchemist Tale
 
SAPERE WP1 Alchemist status at 02/2013
SAPERE WP1 Alchemist status at 02/2013SAPERE WP1 Alchemist status at 02/2013
SAPERE WP1 Alchemist status at 02/2013
 
Engineering Computational Ecosystems
Engineering Computational EcosystemsEngineering Computational Ecosystems
Engineering Computational Ecosystems
 
Recipes for Sabayon: cook your own Linux distro within two hours
Recipes for Sabayon: cook your own Linux distro within two hoursRecipes for Sabayon: cook your own Linux distro within two hours
Recipes for Sabayon: cook your own Linux distro within two hours
 
Towards a comprehensive approach to spontaneous self-composition in pervasive...
Towards a comprehensive approach to spontaneous self-composition in pervasive...Towards a comprehensive approach to spontaneous self-composition in pervasive...
Towards a comprehensive approach to spontaneous self-composition in pervasive...
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

A Framework to Specify and Verify Computational Fields for Pervasive Computing Systems

  • 1. Toward Approximate Stochastic Model Checking of Computational Fields for Pervasive Computing Systems Matteo Casadei, Mirko Viroli {m.casadei,mirko.viroli}@unibo.it Alma Mater Studiorum—Universit` di Bologna a WOA, 19/09/2012 Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 1 / 17
  • 2. Outline Preview Problem ⇒ tackling verification in field-based self-organising systems Goal ⇒ exploiting approximate stochastic model-checking and Prism Strategy ⇒ developing a high-level language translating to Prism Use ⇒ showing few example applications and results Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 2 / 17
  • 3. Motivating Setting An abstract network model for pervasive computing A set of interconnected nodes situated in space Each node asynchronously interacts with a small neighbourhood Topology can be very dynamic due to mobility and faults Example problem Node n advertises an event in a large locality L(n) An “annotation” (tuple, data) in m ∈ L(n) then moves towards n General application scenarios – many rooted in SAPERE Steering people in pervasive computing scenarios [6] Message routing in wireless sensor networks [2] Mobile robot applications [1] Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 3 / 17
  • 4. Motivating Setting An abstract network model for pervasive computing A set of interconnected nodes situated in space Each node asynchronously interacts with a small neighbourhood Topology can be very dynamic due to mobility and faults Example problem Node n advertises an event in a large locality L(n) An “annotation” (tuple, data) in m ∈ L(n) then moves towards n General application scenarios – many rooted in SAPERE Steering people in pervasive computing scenarios [6] Message routing in wireless sensor networks [2] Mobile robot applications [1] Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 3 / 17
  • 5. Motivating Setting An abstract network model for pervasive computing A set of interconnected nodes situated in space Each node asynchronously interacts with a small neighbourhood Topology can be very dynamic due to mobility and faults Example problem Node n advertises an event in a large locality L(n) An “annotation” (tuple, data) in m ∈ L(n) then moves towards n General application scenarios – many rooted in SAPERE Steering people in pervasive computing scenarios [6] Message routing in wireless sensor networks [2] Mobile robot applications [1] Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 3 / 17
  • 6. A solution by so-called “Computational Fields” [4] Mapping nodes to values (suggests a continuum space-time viewpoint) Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 4 / 17
  • 7. A solution by so-called “Computational Fields” [4] Mapping nodes to values (suggests a continuum space-time viewpoint) Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 4 / 17
  • 8. A solution by so-called “Computational Fields” [4] Mapping nodes to values (suggests a continuum space-time viewpoint) Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 4 / 17
  • 9. A solution by so-called “Computational Fields” [4] Mapping nodes to values (suggests a continuum space-time viewpoint) Other structures (channel, shrinking crown, partition, shadow) Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 4 / 17
  • 10. Computational Fields and emergence Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 5 / 17
  • 11. The predictability/controllability issue Any guarantee about “appropriateness”? Will the computational field stabilise? (or can it diverge?) Will the computational field have the proper shape? Will people be steered until eventually reaching the POI? Approaches to assess properties Formal proof: difficult to find, typically ad-hoc Simulation: the standard-de-facto, often hard to be fully trusted Automatic Verification (model-checking): shortly impractical Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 6 / 17
  • 12. The predictability/controllability issue Any guarantee about “appropriateness”? Will the computational field stabilise? (or can it diverge?) Will the computational field have the proper shape? Will people be steered until eventually reaching the POI? Approaches to assess properties Formal proof: difficult to find, typically ad-hoc Simulation: the standard-de-facto, often hard to be fully trusted Automatic Verification (model-checking): shortly impractical Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 6 / 17
  • 13. A solution between Simulation and Automatic Verification Approximate Stochastic Model Checking [3] (A-SMC) Tackle the state-space explosion, probabilistically: Explore a subset of state-space through a (possibly high) number of stochastic simulations (requires less time and less space than MC) Result: probability for the property to hold, with known confidence Three key parameters 1 Number of independent simulation runs N 2 Approximation : the desired precision on the obtained probability 3 Confidence factor δ: probability that approximation is not met ⇒ (Definition of and δ: Prob[|Mexact − Mapprox | ≤ ] ≥ 1 − δ) ⇒ Parameters are linked: N ≥ 4log ( 2 )/ δ 2 ⇒ Our choice: = 0.01, δ = 0.01, N 90 000. Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 7 / 17
  • 14. A solution between Simulation and Automatic Verification Approximate Stochastic Model Checking [3] (A-SMC) Tackle the state-space explosion, probabilistically: Explore a subset of state-space through a (possibly high) number of stochastic simulations (requires less time and less space than MC) Result: probability for the property to hold, with known confidence Three key parameters 1 Number of independent simulation runs N 2 Approximation : the desired precision on the obtained probability 3 Confidence factor δ: probability that approximation is not met ⇒ (Definition of and δ: Prob[|Mexact − Mapprox | ≤ ] ≥ 1 − δ) ⇒ Parameters are linked: N ≥ 4log ( 2 )/ δ 2 ⇒ Our choice: = 0.01, δ = 0.01, N 90 000. Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 7 / 17
  • 15. A solution between Simulation and Automatic Verification Approximate Stochastic Model Checking [3] (A-SMC) Tackle the state-space explosion, probabilistically: Explore a subset of state-space through a (possibly high) number of stochastic simulations (requires less time and less space than MC) Result: probability for the property to hold, with known confidence Three key parameters 1 Number of independent simulation runs N 2 Approximation : the desired precision on the obtained probability 3 Confidence factor δ: probability that approximation is not met ⇒ (Definition of and δ: Prob[|Mexact − Mapprox | ≤ ] ≥ 1 − δ) ⇒ Parameters are linked: N ≥ 4log ( 2 )/ δ 2 ⇒ Our choice: = 0.01, δ = 0.01, N 90 000. Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 7 / 17
  • 16. PRISM (www.prismmodelchecker.org) The reference tool for A-SMC Widely used: biochemistry, games, protocols, coordination Support for Continuous Stochastic Logic (CSL) and CTMC The “module” linguistic construct in PRISM: State – A small set of bounded numerical variables Behaviour – A small set of condition-action transitions Network – Can write many modules, also by clone & rename Synchronisation – Can influence other modules via synch. transitions Limits of PRISM as front-end language to our ends ⇒ No first-class support for true (large, dynamic, ad-hoc) topologies ⇒ No first-class support for node-to-node communications Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 8 / 17
  • 17. PRISM (www.prismmodelchecker.org) The reference tool for A-SMC Widely used: biochemistry, games, protocols, coordination Support for Continuous Stochastic Logic (CSL) and CTMC The “module” linguistic construct in PRISM: State – A small set of bounded numerical variables Behaviour – A small set of condition-action transitions Network – Can write many modules, also by clone & rename Synchronisation – Can influence other modules via synch. transitions Limits of PRISM as front-end language to our ends ⇒ No first-class support for true (large, dynamic, ad-hoc) topologies ⇒ No first-class support for node-to-node communications Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 8 / 17
  • 18. A PRISM-based framework Three inputs Specification of a node (state + behaviour + interaction) Specification of a topology (grid, torus, ad-hoc, and the like) Specification of a formula to verify (CSL + node quantification) Two outputs (Big) PRISM specification (basically obtained by expansion) PRISM formula to verify Then.. PRISM is used as usual to run modelchecking Specifying ,δ and N Charting probability of truth for different parameters Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 9 / 17
  • 19. The hop-count gradient case Node specification pump : [0..1]; field : [0..MAX]; [] pump=1 & field>0 -- 1.0 --> field’= 0; [diff] pump=0 -- 1.0 --> field’= min[@.field]+1; Referencing neighbours min[@.field]: minimum value of field in neighbours An example on a “random torus” Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 10 / 17
  • 20. The hop-count gradient case Node specification pump : [0..1]; field : [0..MAX]; [] pump=1 & field>0 -- 1.0 --> field’= 0; [diff] pump=0 -- 1.0 --> field’= min[@.field]+1; PRISM specification (grid topology, node 11, having neighbours 13,21,31) module node1_1 pump1_1 : [0..1] init 1; field1_1 : [0..MAX] init MAX; [] pump1_1>0 & field1_1>0 -> 1.0 : field1_1’ = 0; [diff_1_1] pump1_1=0 -> 1.0 : field1_1’ = min(field1_3,field2_1,field3_1)+1; endmodule module node1_2=node1_1 [ diff_1_1=diff_1_2, pump1_1=pump1_2, ..] endmodule module node2_1=node1_1 [ diff_1_1=diff_2_1, ..] endmodule ... Property to verify and query (stabilisation within “k” time units) property "stab" = forall[(pump=0 & field=min(@.field)+1) | (pump=1 & field=0)]; P=? [F<=k "stab"] % F is bounded-eventually operator of temporal logics Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 11 / 17
  • 21. Simulation Charting probability of convergence within k time units ⇒ Result: stabilisation is reached linearly in the network diameter ⇒ This simulation takes about 2 hours on a 2.66 Ghz Dual-Core PC.. Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 12 / 17
  • 22. A random walk – showing node synchronisation Node specification v : [0..1]; [move] v=1 & N:=&any[@.v=0] -- 1.0 --> v’=0 & N.v’=1; Referencing neighbours any[@.v=0]: any neighbour having v set to 0 PRISM specification (node 1, having neighbours 2,3) module node_1 v_1 : [0..1] init 1; [move_1_2] v_1 = 1 & v_2 = 0 -> 1.0 : (v_1’=0); % one per outgoing neighbour [move_1_3] v_1 = 1 & v_3 = 0 -> 1.0 : (v_1’=0); [move_2_1] true -> 1.0 : (v_1’=1); % one per incoming neighbour [move_3_1] true -> 1.0 : (v_1’=1); endmodule module node_2 .. endmodule module node_3 .. endmodule Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 13 / 17
  • 23. Language Syntax Module specification S ::= D T % Specification D ::= X : [n_l..n_u]; % Variable def T ::= [L] P --e--> A; % Transition A ::= V’=e % Assignment P ::= b | M:=&f[e] | M:=&f[b] % Precondition f ::= any | min | max % Selection function e ::= r | V | (e) | e+e | e-e | e*e | -e | f[e] % exp b ::= e<=e | e<e | e>=e | e>e | e=e | e!=e % bool exp V ::= X | M.X | @.X % Variable r ::= <real-num> % (real) Number n ::= <int-num> % (integer) Number L ::= <literal> % Label X ::= <literal> % Variable name M ::= <literal> % Node variable Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 14 / 17
  • 24. A more involved example – channel structure Node specification source : [0..1]; fs : [0..MAX]; target : [0..1]; ft : [0..MAX]; distance : [0..MAX]; range : [0..MAX]; channel : [0..1]; [] source=1 & fs>0 -- 100.0 --> fs’= 0 ; [sdiff] source=0 -- 1.0 --> fs’= min[@.fs]+1; [] target=1 & ft>0 -- 100.0 --> ft’= 0 ; [tdiff] target=0 -- 1.0 --> ft’= min[@.ft]+1; [dist] source=1 & ft<MAX -- 1.0 --> distance’=ft; [goss] N:=&any[@.distance>distance] -- 1.0 --> N.distance’=N.distance; [chn] channel=0 & fs+ft<distance+range -- 1.0 --> channel’=1 Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 15 / 17
  • 25. Conclusions Open issues Very hard to deal with network mobility, can simulate by: ⇒ translating links into modules ⇒ such modules activate/disactivate stochastically PRISM itself does not scale very well with size of the specification A-SMC is becoming popular in academia, but it is not yet a standard Can analyse topologies of few hundreds nodes Future works Improve the specification language – still very constrained by PRISM Integrating A-SMC in ad-hoc simulators (e.g. Alchemist [5]) Find proof methodologies for certain classes of fields Incorporate a development methodology based on A-SMC in SAPERE Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 16 / 17
  • 26. References I [1] Jonathan Bachrach, Jacob Beal, and James McLurkin. Composable continuous-space programs for robotic swarms. Neural Computing and Applications, 19(6):825–847, 2010. [2] Matteo Casadei, Mirko Viroli, and Luca Gardelli. On the collective sort problem for distributed tuple spaces. Sci. of Computer Programming, 74(9):702–722, 2009. [3] Thomas H´rault, Richard Lassaigne, Fr´d´ric Magniette, and Sylvain Peyronnet. e e e Approximate probabilistic model checking. In Bernhard Steffen and Giorgio Levi, editors, Proc. 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI’04), volume 2937 of Lecture Notes in Computer Science, pages 73–84. Springer, 2004. [4] Marco Mamei and Franco Zambonelli. Programming pervasive and mobile computing applications: The tota approach. ACM Trans. Softw. Eng. Methodol., 18(4):1–56, 2009. [5] Danilo Pianini, Sara Montagna, and Mirko Viroli. A chemical inspired simulation framework for pervasive services ecosystems. In Maria Ganzha, Leszek Maciaszek, and Marcin Paprzycki, editors, Proceedings of the Federated Conference on Computer Science and Information Systems, pages 675–682, Szczecin, Poland, 18-21 September 2011. IEEE Computer Society Press. [6] Mirko Viroli, Danilo Pianini, Sara Montagna, and Graeme Stevenson. Pervasive ecosystems: a coordination model based on semantic chemistry. In Sascha Ossowski, Paola Lecca, Chih-Cheng Hung, and Jiman Hong, editors, 27th Annual ACM Symposium on Applied Computing (SAC 2012), Riva del Garda, TN, Italy, 26-30 March 2012. ACM. Matteo Casadei, Mirko Viroli (UNIBO) A-SMC for Computational Fields WOA, 19/09/2012 17 / 17