Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, e.g., automotive, aerospace or industrial automation. However, many of these systems also ha...
详细信息
ISBN:
(纸本)9781728183244
Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, e.g., automotive, aerospace or industrial automation. However, many of these systems also have stringent security requirements, and security attacks may impair safety. Given a TSN-based distributed architecture, a set of applications with tasks and messages, as well as a set of security and redundancy requirements, we are interested to synthesize a system configuration such that the real-time, safety and security requirements are satisfied. We use the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) low-resource multicast authentication protocol to guarantee the security requirements, and redundant disjunct message routes to tolerate link failures. We consider that the tasks are scheduled using static cyclic scheduling and that the messages use the time-sensitive traffic class in TSN, which relies on schedule tables (called Gate Control Lists, GCLs) in the network switches. A configuration consists of the schedule tables for tasks as well as the disjoint routes and GCLs for messages. We propose a constraint programming-based formulation for this problem and we evaluate it on several test cases.
Effective and robust search heuristics are critical for solving constraint satisfaction or optimization problems. In this paper, we propose a new hybrid heuristic which uses the idea of reducing the dynamic arity of c...
详细信息
ISBN:
(纸本)9781728192284
Effective and robust search heuristics are critical for solving constraint satisfaction or optimization problems. In this paper, we propose a new hybrid heuristic which uses the idea of reducing the dynamic arity of constraints, called constraintArity-Reduction (CAR). The hybrid heuristic is formed with a base heuristic which switches to CAR using a switching heuristic. We experimented with hybrids of CAR combining existing stateof-the-art search heuristics. Experimental results on a variety of structured benchmarks show that hybrid CAR heuristics is an effective and competitive strategy, which can successfully reduce the search space and improve the performance of existing heuristics on a variety of problems.
In the context of Network-on-Chip (NoC) based Chip Multiprocessor (CMP) design, core mapping for application specific systems is a challenging problem. In such designs, various decisions have to be made that affect pe...
详细信息
ISBN:
(数字)9781728165820
ISBN:
(纸本)9781728165820
In the context of Network-on-Chip (NoC) based Chip Multiprocessor (CMP) design, core mapping for application specific systems is a challenging problem. In such designs, various decisions have to be made that affect performance and power consuinption. Moreover, in emerging 3D NoC systems, by intensification of cooling issues, temperature constraints on hot-spots are added, and problem becomes more complicated. In this paper, an earlier constraint programming (('P) methodology for heterogeneous 2D NoC design is extended to 3D model, while critical temperature constraints are accounted. In a single stage, our approach can choose core types from a set of low, medium and high power, and assign them to appropriate places on the mesh which minimizes the overall computation time and communication cost while satisfying the temperature constraints. To achieve our objective, in addition to cores placement problem, tasks should also be scheduled on corresponding cores with matching performance levels to minimize the overall completion time (makespan). Experimental results show that task completion times are more dependent on the mesh structure for our benchmark data. 3D mesh structures may yield shorter task completion times, without compromising thermal constraints. On the other hand, restricting the peak temperature naturally requires the usage of low-performance computing elements which inherently may delay the processing time.
Les systèmes dynamiques sont des modèles mathématiques pour décrire l'évolution temporelle de l'état d'un système. Il y a deux classes de systèmes dynamiques pertine...
详细信息
Les systèmes dynamiques sont des modèles mathématiques pour décrire l'évolution temporelle de l'état d'un système. Il y a deux classes de systèmes dynamiques pertinentes à cette thèse : les systèmes discrets et les systèmes continus. Dans les systèmes dynamiques discrets (ou les programmes informatiques classiques), l'état évolue avec un pas de temps discrets. Dans les systèmes dynamiques continus, l'état du système est fonction du temps continu, et son évolution caractérisée par des équations différentielles. Étant donné que ces systèmes peuvent prendre des décisions critiques, il est important de pouvoir vérifier des propriétés garantissant leur sûreté. Par exemple, sur un programme, l'absence de débordement arithmétique. Dans cette thèse, nous développons un cadre pour la vérification automatique des propriétés de sûreté des programmes. Un élément clé de cette vérification est la preuve de propriétés invariantes. Nous développons ici un algorithme pour synthétiser des invariants inductifs (des propriétés vraies pour l'état initial, qui sont stables dans l'évolution des états du programme, donc sont toujours vraies par récurrence) pour des programmes numériques. L’interprétation abstraite (IA) est une approche traditionnelle pour la recherche d’invariants inductifs des programmes numériques. L'IA interprète les instructions du programme dans un domaine abstrait (par exemple intervalles, octogones, polyèdres, zonotopes), domaine qui est choisi en fonction des propriétés à prouver. Un invariant inductif peut être calculé comme limite possiblement infinie des itérées d'une fonctionnelle croissante. L'analyse peut recourir aux opérateurs d'élargissement pour forcer la convergence, au détriment de la précision. Si l'invariant n'est pas prouvé, une solution standard est de remplacer le domaine par un nouveau domaine abstrait davantage susceptible de représenter précisément l'*** programmation par contraintes (PPC) est une approche alternative pour synthétiser d
This paper presents a production scheduling system that optimizes operations of a modular factory. The proposed system consists of a database, a scheduling optimizer and an interface connecting two other components. A...
详细信息
ISBN:
(纸本)9783030196486;9783030196479
This paper presents a production scheduling system that optimizes operations of a modular factory. The proposed system consists of a database, a scheduling optimizer and an interface connecting two other components. A scheduling model for optimal schedules plays a key role in the scheduling system. In this research, we aim to develop the scheduling model using constraint programming, and design a data mart storing the related operational data. In particular, we set the modular factory environment to the hybrid flow shop and apply the constraint programming for scheduling. We provide a case study to test the performance of the proposed scheduling model with the synthesized dataset based on a modular factory environment in SmartFactory(KL).
Time-Triggered Ethernet (TTEthernet) efficiently integrates distributed applications with different security levels and real-time requirements in the mixed-criticality system. The key of TTEthernet is the time-trigger...
详细信息
ISBN:
(纸本)9781728161365
Time-Triggered Ethernet (TTEthernet) efficiently integrates distributed applications with different security levels and real-time requirements in the mixed-criticality system. The key of TTEthernet is the time-triggered mechanism that is achieved by following statically time slot schedule. In the paper, the network model and constraint model are mathematically detailed and exemplified. constraint programming technology based on ILOG CPLEX is applied innovatively in solve the TTEthernet schedule synthesis problem. Finally, three topologies and two message density scenarios are set up to evaluate the performance of the algorithm in variables, constraint, memory occupancy, and synthesis time dimensions. Numerous experiment results show that the schedule synthesis method is well qualified for the schedules synthesis tasks of TTEthernet.
The paper proposes an original approach to solving the problem of ineffective processing of qualitative constraints of a subject domain using the constraint programming technique. The approach is based on the use of s...
详细信息
ISBN:
(纸本)9781614999331;9781614999324
The paper proposes an original approach to solving the problem of ineffective processing of qualitative constraints of a subject domain using the constraint programming technique. The approach is based on the use of specialized matrix-like structures providing a "compressed" representation of constraints over finite domains, as well as on the use of the authors' inference techniques on these structures. In comparison with the prototypes using the typical representation of multi-place relations in the form of a table, the techniques make it possible to more efficiently reduce the search space. The paper presents practical aspects of implementation of user-developed types of constraints and corresponding algorithmspropagators, with the help of constraint programming libraries. The algorithms performance has been assessed by means of the above matrix structures to clearly demonstrate the advantages of representation and processing of qualitative constraints of a subject domain.
Cyber-physical systems (CPSs), as cruise control systems, involve life-critical or mission critical functions that must be validated. Formal verification techniques can bring high assurance level but have to be extend...
详细信息
ISBN:
(纸本)9781450381871
Cyber-physical systems (CPSs), as cruise control systems, involve life-critical or mission critical functions that must be validated. Formal verification techniques can bring high assurance level but have to be extended to embrace all the components of CPSs. Physical part models of CPSs are usually defined from ordinary differential equations (ODEs) and reachability methods can be used to compute safe over-approximation of the solution set of ODEs. However, additional constraints, as obstacle avoidance have also to be considered to validate CPSs. To meet this need, we propose in this paper a framework, based on abstract domains, for solving constraint satisfaction problems where the objects manipulated are described by ODEs. We use a form of disjunctive completion for which we provide a split operator and an efficient constraint filtering mechanism that takes advantage of the continuity aspect of ODEs. We illustrate the benefits of our method on a real-world application of trajectory validation of a swarm of drones, for which the main property we aim to prove is the absence of collisions between drone trajectories. Our work has been concretized in the form of a cooperation between the DynIbex library, used for the abstraction of ODEs, and the AbSolute constraint solver, used for the constraint resolution. Experiments show promising results.
Network Function Virtualization (NFV) and Software Defined Networking (SDN) are technologies that recently acquired a great momentum thanks to their promise of being a flexible and cost-effective solution for replacin...
详细信息
ISBN:
(纸本)9780998133126
Network Function Virtualization (NFV) and Software Defined Networking (SDN) are technologies that recently acquired a great momentum thanks to their promise of being a flexible and cost-effective solution for replacing hardware-based, vendor-dependent network middleboxes with software appliances running on general purpose hardware in the cloud. Delivering end-to-end networking services across multiple NFV/SDN network domains by implementing the so-called Service Function Chain (SFC) i.e., a sequence of Virtual Network Functions (VNF) that composes the service, is a challenging task. In this paper we address two crucial sub-problems of this task: i) the language to formalize the request of a given SFC to the network and ii) the solution of the SFC design problem, once the request is received. As for i) in our solution the request is built upon the intent-based approach, with a syntax that focuses on asking the user "what" she needs and not "how" it should be implemented, in a simple and high level language. Concerning ii) we define a formal model describing network architectures and VNF properties that is then used to solve the SFC design problem by means of constraint programming (CP), a programming paradigm which is often used in Artificial Intelligence applications. We argue that CP can be effectively used to address this kind of problems because it provides very expressive and flexible modeling languages which come with powerful solvers, thus providing efficient and scalable performance. We substantiate this claim by validating our tool on some typical and non trivial SFC design problems.
It has been shown that evolutionary algorithms are able to construct suitable search strategies for classes of constraint Satisfaction Problems (CSPs) in constraint programming. This paper is an explanation of the use...
详细信息
It has been shown that evolutionary algorithms are able to construct suitable search strategies for classes of constraint Satisfaction Problems (CSPs) in constraint programming. This paper is an explanation of the use of multi-objective optimisation in contrast to simple additive weighting techniques with a view to develop search strategies to classes of CSPs. A hierarchical scheme is employed to select a candidate strategy from the Pareto frontier for final evaluation. The results demonstrate that multi-objective optimisation significantly outperforms the single objective scheme in the same number of objective evaluations. In situations where strategies developed for a class of problems fail to extend to unseen problem instances of the same class, it is found that the structure of the underlying CSPs do not resemble those employed in the training process.
暂无评论