28/Dec/2005 Linking the -calculus and B-Method Damien Karkinsky PhD Symposium IFM 2005 ¼.

Slides:



Advertisements
Similar presentations
Chapter 13 Application Framework. Outline Definition & anatomy Fulfilling the framework contract Building frameworks Examples.
Advertisements

TU e technische universiteit eindhoven / department of mathematics and computer science Modeling User Input and Hypermedia Dynamics in Hera Databases and.
Structuring for Reuse: from B to Event-B Mike Poppleton, DSSE.
Formal Semantics of Programming Languages 虞慧群 Topic 6: Advanced Issues.
Formal Modelling of Reactive Agents as an aggregation of Simple Behaviours P.Kefalas Dept. of Computer Science 13 Tsimiski Str Thessaloniki Greece.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 12Slide 1 Software Design l Objectives To explain how a software design may be represented.
Concurrency: introduction1 ©Magee/Kramer 2 nd Edition Concurrency State Models and Java Programs Jeff Magee and Jeff Kramer.
Language aspects of algebra Jean-Philippe Drouhard, Desmond Fearnley-Sander Bernadette Barker, Nadine Bednarz, Dave Hewitt, Brenda Menzel, Jarmila Novotná,
A Brief Introduction. Acknowledgements  The material in this tutorial is based in part on: Concurrency: State Models & Java Programming, by Jeff Magee.
Process Algebra (2IF45) Dr. Suzana Andova. 1 Process Algebra (2IF45) Practical issues Lecturer - Suzana Andova - Group: Software Engineering and Technology.
Component Interaction in Distributed Systems Nat Pryce Imperial College
DEVS-Based Simulation Web Services for Net-Centric T&E Saurabh Mittal, Ph.D. Jose L. Risco-Martin*, Ph.D. Bernard P. Zeigler, Ph.D. Arizona Center for.
Adding Organizations and Roles as Primitives to the JADE Framework NORMAS’08 Normative Multi Agent Systems, Matteo Baldoni 1, Valerio Genovese 1, Roberto.
Winter 2007SEG2101 Chapter 41 Chapter 4 SDL – Structure and Behavior.
STRUCTURAL SIMILARITIES OF COMPLEX NETWORKS: A COMPUTATIONAL MODEL BY EXAMPLE OF WIKI GRAPHS For CS790 Complex Network A Paper Presented by Bingdong Li.
Systems Engineering for Automating V&V of Dependable Systems John S. Baras Institute for Systems Research University of Maryland College Park
1 Synchronization strategies for global computing models Ivan Lanese Computer Science Department University of Bologna.
1 Ivan Lanese Computer Science Department University of Bologna Roberto Bruni Computer Science Department University of Pisa A mobile calculus with parametric.
1 Trust Management and Theory Revision Ji Ma School of Computer and Information Science University of South Australia 24th September 2004, presented at.
07/06/98 知的インタフェース特論 1 Operational Semantics Again, the question? Operational Model = Labeled Transition System If P and Q yields a same LTS. How to define.
Formalizing an Adaptive Security Infrastructure in Mob adtl Laura Semini & Carlo Montangero dip. Informatica, Pisa Outline Mob adtl instance ASI Mob adtl.
Heterochronous Dataflow in Ptolemy II Brian K. Vogel EE249 Project Presentation, Dec. 4, 1999.
1 Ivan Lanese Computer Science Department University of Pisa Prof. Ugo Montanari Synchronization strategies for global computing Relator: Thesis Progress.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
Objectives Explain the purpose and objectives of object- oriented design Develop design class diagrams Develop interaction diagrams based on the principles.
Sharif University of Technology Session # 7.  Contents  Systems Analysis and Design  Planning the approach  Asking questions and collecting data 
Process Algebra (2IF45) Basic Process Algebra (Soundness proof) Dr. Suzana Andova.
Basic Concepts The Unified Modeling Language (UML) SYSC System Analysis and Design.
Knowledge Mediation in the WWW based on Labelled DAGs with Attached Constraints Jutta Eusterbrock WebTechnology GmbH.
Formal Methods 1. Software Engineering and Formal Methods  Every software engineering methodology is based on a recommended development process  proceeding.
Service-enabling Legacy Applications for the GENIE Project Sofia Panagiotidi, Jeremy Cohen, John Darlington, Marko Krznarić and Eleftheria Katsiri.
Computational Design of the CCSM Next Generation Coupler Tom Bettge Tony Craig Brian Kauffman National Center for Atmospheric Research Boulder, Colorado.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
Workflow Treatment with Coloured Petri Nets Alexandru Cicortaş Diana
Interfacing Registry Systems December 2000.
Research Heaven, West Virginia A Compositional Approach for Validation of Formal Models Bojan Cukic, Dejan Desovski West Virginia University NASA OSMA.
Advanced Topics in SE Spring Process Algebra Hossein Hojjat Formal Methods Lab University of Tehran.
Eric MadelaineOSMOSE -- WP2 -- Prague June 2004 Models for the Verification of Distributed Java Objects Eric Madelaine work with Tomás Barros, Rabéa Boulifa,
Reactive systems – general
Refining middleware functions for verification purpose Jérôme Hugues Laurent Pautet Fabrice Kordon
Lyra – A service-oriented and component-based method for the development of communicating systems (by Sari Leppänen, Nokia/NRC) Traditionally, the design,
1 Qualitative Reasoning of Distributed Object Design Nima Kaveh & Wolfgang Emmerich Software Systems Engineering Dept. Computer Science University College.
Understanding Code Mobility A Fuggetta, G P Picco and G Vigna Presenter Samip Bararia.
Service Creation Model and Framework Focus: control, redirection services Challenges: –Simplicity, user-friendliness –Flexibility –Robustness (e.g., feature.
1/26 On-demand Learning Series Software Engineering of Web Application - Object-Oriented Development & UML Hunan University, Software School.
Formal verification of skiplist algorithms Student: Trinh Cong Quy Supervisor: Bengt Jonsson Reviewer: Parosh Abdulla.
Formal Specification and Analysis of Software Architectures Using the Chemical Abstract Machine Model CS 5381 Juan C. González Authors: Paola Inverardi.
Formal Methods for Software Engineering Part II: Modelling & Analysis of System Behaviour.
Network Protocols Network Systems Security Mort Anvari.
Chapter 17. Assertions State Assertion – predicate intended to express that a descriptive or prescriptive property holds in an arbitrarily chose current.
Lecture 5 1 CSP tools for verification of Sec Prot Overview of the lecture The Casper interface Refinement checking and FDR Model checking Theorem proving.
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 3rd Edition Copyright © 2009 John Wiley & Sons, Inc. All rights.
Assignment Help From Requirements Elicitation to Elicitation.
2G1516 Formal Methods2005 Mads Dam IMIT, KTH 1 CCS: Processes and Equivalences Mads Dam Reading: Peled 8.5.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Trait ontology approach Marie-Angélique LAPORTE NCEAS June 7 th 2010.
Properties as Processes : FORTE slide Properties as Processes: their Specification and Verification Joel Kelso and George Milne School of Computer.
Duminda WijesekeraSWSE 623: Introduction1 Introduction to Formal and Semi- formal Methods Based on A Specifier's Introduction to Formal Methods (J. Wing)
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
Process Algebra (2IF45) Basic Process Algebra Dr. Suzana Andova.
International Workshop 28 Jan – 2 Feb 2011 Phoenix, AZ, USA Ontology in Model-Based Systems Engineering Henson Graves 29 January 2011.
CHESS Methodology and Tool Federico Ciccozzi MBEES Meeting Sälen, January 2011 January 2011.
Functionality of objects through observation and Interaction Ruzena Bajcsy based on Luca Bogoni’s Ph.D thesis April 2016.
Slide 1 Wolfram Höpken RMSIG Reference Model Special Interest Group Wolfram Höpken IFITT RMSIG.
Rewriting Nested Graphs, through Term Graphs Roberto Bruni, Andrea Corradini, Fabio Gadducci Alberto Lluch Lafuente and Ugo Montanari Dipartimento di Informatica,
Formal methods: Lecture
CSCE 548 Secure Software Development Use Cases Misuse Cases
SysML v2 Formalism: Requirements & Benefits
postgrad. Sergiy Korotunov prof. Galyna Tabunshchyk
A MODULAR LTS FOR OPEN REACTIVE SYSTEMS
Presentation transcript:

28/Dec/2005 Linking the -calculus and B-Method Damien Karkinsky PhD Symposium IFM 2005 ¼

 Distributed Systems display: 1.high degree of component autonomy, 2.instantiation & state encapsulation, 3.dynamic reconfiguration.  The –calculus interaction model seen as suitable abstraction for such application domains.  The B-Method offers separation of concerns when describing state components and a tool.  Common semantics between the two might offer a powerful formal framework. Motivation

 Differences between the two methods are: 1.actions are non-atomic, operations are atomic, 2.  has operational semantics, B denotational semantics.  The conventional approach in the research field is to give B operational semantics by: 1.encoding each TERM of B with a TERM of  2.proving that the encoding is sound and complete with respect to D B using bi-simulation. Background

 If a common semantics exists how would the MACHINE construct behave in a system of agents?  We use B denotational semantics to derive a labelled transition system LTS M.  LTS M is then extended and a wrapper is provided enabling interaction with -agents.  The design of the wrapper: 1.provides machine instantiation, 2.separates operations into non-atomic actions. Methodology

Methodology (cont.)  In the case of machines without I/O & no guards y LTS M val1val2 P1P2 zop h ¤ i op INTER ( ¿ ) + LTS M ¼ z LTS M ………

Methodology (cont.) val1 ¼ P1 zop h ¤ i op INTER LTS M ¿ ­ ? val1 ¼ P1 LTS M

Example on o ® o ® on LTS M

Example (cont.)

Using the wrapper  The process can be used in a system of -agents. [[( BEGIN )]]h z i

A problem ( # ¿ ) + ( # ¿ ) + # cp ( z ) b = 2 f n ( C 0 )

Future Work  We are interested in investigating controlled interactions between -agents and machine instances.  Verification of divergence freedom properties 1.The full -calculus is too open, 2.Machine communication internalised, 3.Bi-simulation does not distinguish divergence.