Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com...
详细信息
ISBN:
(纸本)9798350351507
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into computerscience education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computerscience programs, (2) construct level-appropriate examples that could be included midway into one's undergraduate studies, (3) demonstrate how to address successive 'failuresy' through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding TLA+ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in TLA+ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudinal analysis within our own institution and
This paper presents a unified approach for repre-senting multiple domains alongside production in cyber-physical production systems (CPPSs) through domain-specific languages (DSLs). The approach is illustrated using m...
详细信息
Today, most database-backed web applications depend on the database to handle deadlocks. At runtime, the database monitors the progress of transaction execution to detect deadlocks and abort affected transactions. How...
详细信息
distributed transaction systems incur extensive cross-node communication to execute and commit serializable OLTP transactions. As a result, their performance greatly suffers. Caching data at nodes that execute transac...
Over the past decade, there has been a significant increase in interest in digital twin (DT) technology in a variety of domains. While research on DTs of single assets was initially prevalent, there has been a notable...
详细信息
As the Industry 4.0 shifts towards the adoption of autonomous mobile robots (AMRs) in warehouses, decentralized decision-making has become a key design principle. Multi-robot task allocation (MRTA) is a problem that i...
详细信息
Many time-critical and data-intensive distributed applications for the computing continuum depend on low-latency, scalable, and highly available distributed key value storages. In this paper, we introduce SDKV, a scal...
详细信息
ISBN:
(纸本)9798400702341
Many time-critical and data-intensive distributed applications for the computing continuum depend on low-latency, scalable, and highly available distributed key value storages. In this paper, we introduce SDKV, a scalable -Smart and distributed Key-Value- store for the Edge-Cloud continuum to automatically place data in close proximity to clients resulting in low response times. The clients of SDKV can influence data availability and access latency by specifying the number of replicas and the desired level of data consistency (strong or eventual) on a per key-value pair basis, which favors the support of a wide range of applications. Results reveal that for different workloads and client access behaviors, SDKV outperforms existing distributed data storages and their data placement algorithms by 12--69% for both consistency models. Moreover, the proposed placement algorithm of SDKV provides fast decision times and scales linearly with the number of keys.
Positioning estimations of wireless sensors can be enhanced via sensor collaboration. To enable this, various methods have been proposed; yet, most do not leverage the entire collective knowledge, which also involves ...
Positioning estimations of wireless sensors can be enhanced via sensor collaboration. To enable this, various methods have been proposed; yet, most do not leverage the entire collective knowledge, which also involves the estimation’s uncertainty. In this article, we introduce Anchor-free Ranging-Likelihood-based Cooperative Localization (ARLCL); a novel anchor-free and technology-agnostic localization algorithm that utilizes inter-exchanged ranging signals from sensors to enable their simultaneous positioning. Ranging technologies with easy-to-model propagation properties, such as UWB or LiDAR are among the first beneficiaries that ARLCL is targeting. To examine its applicability, however, even to signals that are noisier and often unsuitable for ranging, we assess ARLCL with real-world BLE RSS measurements. At the same time, we consider deployments that typically induce flip-ambiguity, being a major problem in cooperative localization. We provide an extensive comparison against the most widely-adopted optimization method (Mass-Spring) but also against the recent likelihood-based approach (Maximum Likelihood - Particle Swarm Optimization). The results showed that ARLCL outperformed the baselines in almost all scenarios. Our gain in positioning accuracy is also found to be positively correlated to both the swarm’s size and the signal’s quality, reaching an improvement of 40%.
As of today, research in vulnerable road users (VRUs) applications is mainly focused on safety in urban road scenarios. There is little to be found in the literature with respect to VRUs in mountain areas, where mount...
详细信息
ISBN:
(数字)9783903176713
ISBN:
(纸本)9798331522025
As of today, research in vulnerable road users (VRUs) applications is mainly focused on safety in urban road scenarios. There is little to be found in the literature with respect to VRUs in mountain areas, where mountain biking and hiking also present risks of collision. Here, it is not yet clear whether existing localization and communication technologies would provide sufficient performance in such harsh environments. In this work, we start answering this question by presenting the results of a measurement campaign which took place in a mountain area in Northern Italy during Summer 2024. With respect to localization, we show that global navigation satellite system (GNSS)-based localization alone often provides unreliable results due to vegetation and terrain. Trilateration with Bluetooth Low Energy (BLE) and beacons mounted at fixed positions performs well in some circumstances and can be used to enhance GNSS, however, we also observed many unclear effects that require further investigations. Concerning communication, the results indicate that both direct short range communications (DSRC) and cellular V2X (C-V2X) works fairly well in most cases, but terrain characteristics might induce packet losses or low signal quality, whereas instabilities in GNSS fixes might also cause C-V2X outages.
Knowledge Graphs (KGs) are the semantic backbone for a wide variety of applications in different domains. In recent years, different web portals providing relevant functionalities for managing KGs have been proposed. ...
详细信息
暂无评论