A promising technique for the formal verification of embedded and cyber-physical systems is flow-pipe construction, which creates a sequence of regions covering all reachable states over time. Flow-pipe construction m...
详细信息
ISBN:
(数字)9783319657653
ISBN:
(纸本)9783319657653;9783319657646
A promising technique for the formal verification of embedded and cyber-physical systems is flow-pipe construction, which creates a sequence of regions covering all reachable states over time. Flow-pipe construction methods can check whether specifications are met for all states, rather than just testing using a finite and incomplete set of simulation traces. A fundamental challenge when using flow-pipe construction on high-dimensional systems is the cost of geometric operations, such as intersection and convex hull. We address this challenge by showing that it is often possible to remove the need to perform high-dimensional geometric operations by combining two model transformations, direct time-triggered conversion and dynamics scaling. Further, we prove the overapproximation error in the conversion can be made arbitrarily small. Finally, we show that our transformation-based approach enables the analysis of a drivetrain system with up to 51 dimensions.
The proceedings contain 46 papers. The topics discussed include: cycle-accurate performance modeling in an ultra-fast just-in-time dynamic binary translation instruction set simulator;a trace-based scenario database f...
ISBN:
(纸本)9781424479382
The proceedings contain 46 papers. The topics discussed include: cycle-accurate performance modeling in an ultra-fast just-in-time dynamic binary translation instruction set simulator;a trace-based scenario database for high-level simulation of multimedia MP-SoCs;a library of dual-clock FIFOs for cost-effective and flexible MPSoCs design;transparent sampling;design of a flexible high-speed FPGA-based flow monitor for next generation networks;a fully programmable FSM-based processing engine for gigabytes/s header parsing;empirical evaluation of data transformations for network infrastructure applications;design environment for the support of configurable network interfaces in NoC-based platforms;an efficient realization of forward integer transform in H.264/AVC intra-frame encoder;SIMD performance in software based mobile video coding;and real-time stereo vision system using semi-global matching disparity estimation: architecture and FPGA-implementation.
The proceedings contain 22 papers. The special focus in this conference is on computer Safety, Reliability, and Security. The topics include: Model-based safety analysis for vehicle guidance systems;rare event simulat...
ISBN:
(纸本)9783319662657
The proceedings contain 22 papers. The special focus in this conference is on computer Safety, Reliability, and Security. The topics include: Model-based safety analysis for vehicle guidance systems;rare event simulation for dynamic fault trees;arguing on software-level verification techniques appropriateness;confidence assessment framework for safety arguments;safety case impact assessment in automotive software systems;modeling operator behavior in the safety analysis of collaborative robotic applications;development and verification of a flight stack for a high-altitude glider in ada/SPARK 2014;a simplex architecture for hybrid systems using barrier certificates;a conceptual safety supervisor definition and evaluation framework for autonomous systems;a strategy for assessing safe use of sensors in autonomous road vehicles;modeling the safety architecture of UAS flight operations;generic management of availability in fail-operational automotive systems;benchmarking static code analyzers;automatic estimation of verified floating-point round-off errors via static analysis;classification tree method with parameter shielding;a tool for error propagation analysis of simulink models;early safety assessment of automotive systems using sabotage simulation-based fault injection framework;towards a sensor failure-dependent performance adaptation Using the validity concept;SMT-based synthesis of fault-tolerant architectures;a lightweight threat analysis approach intertwining safety and security for the automotive domain;a security architecture for railway signalling and systematic pattern approach for safety and security co-engineering in the automotive domain.
Generalized predictive controller of nonlinear systems are analyzed, to improve the efficiency, a secant method is employed to estimate the parameters of U-model that considered as an easy and effective modelling meth...
详细信息
ISBN:
(纸本)9789811063732;9789811063725
Generalized predictive controller of nonlinear systems are analyzed, to improve the efficiency, a secant method is employed to estimate the parameters of U-model that considered as an easy and effective modelling method for nonlinear dynamic plants. In this way, the final controller output of the nonlinear systems is transformed into solving a polynomial equation based on the available controller output, which greatly decreases the difficulties in the design of nonlinear control systems. The controller output can be derived from the secant method, which does not need to calculate the derivative, reduces the computational complexity and have faster convergence rate. In order to illustrate the design process and its effectiveness of the algorithm, a simulation is conducted to verify the method.
The proceedings contain 24 papers. The topics discussed include: towards the application of flask security architecture to SoC design;a power-efficient and high performance FPGA accelerator for convolutional neural ne...
ISBN:
(纸本)9781450351850
The proceedings contain 24 papers. The topics discussed include: towards the application of flask security architecture to SoC design;a power-efficient and high performance FPGA accelerator for convolutional neural networks;a unified framework for throughput analysis of synchronous data flow graphs under memory constraints;data analytics enables energy-efficiency and robustness: from mobile to manycores, datacenters, and networks;a fast online sequential learning accelerator for IoT network intrusion detection;small neural nets are beautiful: enabling embeddedsystems with small deep-neural-network architectures;driving behavior modeling and estimation for battery optimization in electric vehicles;heterogeneous redundancy to address performance and cost in multi-core SIMT;a machine learning-based approach for power and thermal management of next-generation video coding on MPSoCs;IR-level annotation strategy dealing with aggressive loop optimizations for performance estimation in native simulation;retention state-aware energy management for efficient nonvolatile processors;communication optimization for thermal reliable many-core systems;significance-driven adaptive approximate computing for energy-efficient image processing application;and 3D nanosystems enable embedded abundant-data computing.
In this paper, the stability analysis of event-triggered networked control systems is investigated. First, a more advanced event-triggered algorithm is introduced. Second, the nonperiodic sampled-data system is modele...
详细信息
ISBN:
(纸本)9789811063732;9789811063725
In this paper, the stability analysis of event-triggered networked control systems is investigated. First, a more advanced event-triggered algorithm is introduced. Second, the nonperiodic sampled-data system is modeled as a state delay system. Third, a stability result is derived based on LyapunovKrasovskii functional approach. Finally, some simulation results are given to verify the effectiveness of the proposed method.
This volume highlights new trends and challenges in research on agents and the new digital and knowledge economy, and includes 23 papers classified into the following categories: business process management, agent-bas...
ISBN:
(数字)9783319593944
ISBN:
(纸本)9783319593937
This volume highlights new trends and challenges in research on agents and the new digital and knowledge economy, and includes 23 papers classified into the following categories: business process management, agent-based modeling and simulation, and anthropic-oriented computing. All papers were originally presented at the 11th international KES conference on Agents and Multi-Agent systems Technologies and Applications (KES-AMSTA 2017) held June 2123, 2017 in Vilamoura, Algarve, Portugal. Todays economy is driven by technologies and knowledge. Digital technologies can free, shift and multiply choices, and often intrude on the territory of other industries by providing new ways of conducting business operations and creating value for customers and companies. The topics covered in this volume include software agents, multi-agent systems, agent modeling, mobile and cloud computing, big data analysis, business intelligence, artificial intelligence, social systems, computerembeddedsystems and nature inspired manufacturing, etc., all of which contribute to the modern Digital Economy. The results presented here will be of theoretical and practical value to researchers and industrial practitioners working in the fields of artificial intelligence, collective computational intelligence, innovative business models, the new digital and knowledge economy and, in particular, agent and multi-agent systems, technologies, tools and applications.
Community networks establish a wireless mesh network among citizens, providing a network that is independent, free, and (in some cases) available where regular Internet access is not. Following initial disappointments...
详细信息
ISBN:
(纸本)9781509043958
Community networks establish a wireless mesh network among citizens, providing a network that is independent, free, and (in some cases) available where regular Internet access is not. Following initial disappointments with their performance and availability, they are currently experiencing a second spring. Many of these networks are growing fast, but with little planning and limited oversight. Problems mostly manifest as limited scalability of the network-as has happened in the Freifunk mesh network operating in the city of Paderborn (approx. 800 nodes running the BATMAN IV protocol with control messages alone accounting for 25 GByte per month and node). In this work, we detail how we modeled this real-life network in a computersimulation as a way of allowing rapid (and worry free) experimentation with maximum insight. We describe how we parameterized and validated this model using gathered measurements. Based on the model, we were able to investigate alternative structures and parameterizations to improve the performance. The predicted performance gains map well to those measured after the proposed changes were deployed city-wide.
Surveillance applications require reliable monitoring system architectures and cost-efficient in-network data processing mechanisms able to provide effective information extraction for event tracking. Wireless Sensor ...
详细信息
ISBN:
(纸本)9781509064588
Surveillance applications require reliable monitoring system architectures and cost-efficient in-network data processing mechanisms able to provide effective information extraction for event tracking. Wireless Sensor Networks (WSNs) appear to be the most suitable technology due to some well known benefits and the rapid development of embedded devices. Current research is mostly focused on improving and developing new decentralized sensor fusion schemes able to overcome the limitations introduced by the battery operated sensor nodes, but most of the time evaluating the proposed algorithms is performed with a serious lack of precise channel modeling. To close this gap, we provide a stochastic consensus implementation for lossy wireless networks comprising fixed and mobile sensor nodes, as a heterogeneous surveillance system based on ground sensor nodes and UAVs (Unmanned Aerial Vehicles). We developed a simulation framework tailored for fixed and mobile sensor nodes and we are able to evaluate the performance of consensus algorithms from a comparative standpoint, considering deterministic and probabilistic packet propagation models described by common models such as Free Space and Nakagami models. In this paper, we consider a complex in-network adaptive estimation using the distributed least-mean square algorithm tailored for WSN. We perform a mean-square error (MSE) performance analysis for both deterministic and probabilistic propagation models.
User simulators are a principal offline method for training and evaluating human-computer dialog systems. In this paper. we examine simple sequence-to-sequence neural network architectures for training end-to-end, nat...
详细信息
ISBN:
(纸本)9781510848764
User simulators are a principal offline method for training and evaluating human-computer dialog systems. In this paper. we examine simple sequence-to-sequence neural network architectures for training end-to-end, natural language to natural language, user simulators, using only raw logs of previous interactions without any additional human labelling. We compare the neural network-based simulators with a language model (LM)-based approach for creating natural language user simulators. Using both an automatic evaluation using LM perplexity and a human evaluation, we demonstrate that the sequence-to-sequence approaches outperform the LM-based method. We show correlation between LM perplexity and the human evaluation on this task, and discuss the benefits of different neural network architecture variations.
暂无评论