21,891 research outputs found
Beliefs and Conflicts in a Real World Multiagent System
In a real world multiagent system, where the
agents are faced with partial, incomplete and
intrinsically dynamic knowledge, conflicts are
inevitable. Frequently, different agents have
goals or beliefs that cannot hold simultaneously.
Conflict resolution methodologies have to be
adopted to overcome such undesirable occurrences.
In this paper we investigate the application of
distributed belief revision techniques as the support
for conflict resolution in the analysis of the
validity of the candidate beams to be produced
in the CERN particle accelerators.
This CERN multiagent system contains a higher
hierarchy agent, the Specialist agent, which
makes use of meta-knowledge (on how the conflicting
beliefs have been produced by the other
agents) in order to detect which beliefs should be
abandoned. Upon solving a conflict, the Specialist
instructs the involved agents to revise their
beliefs accordingly.
Conflicts in the problem domain are mapped into
conflicting beliefs of the distributed belief revision
system, where they can be handled by
proven formal methods. This technique builds
on well established concepts and combines them
in a new way to solve important problems. We
find this approach generally applicable in several
domains
Automatic Generation of Minimal Cut Sets
A cut set is a collection of component failure modes that could lead to a
system failure. Cut Set Analysis (CSA) is applied to critical systems to
identify and rank system vulnerabilities at design time. Model checking tools
have been used to automate the generation of minimal cut sets but are generally
based on checking reachability of system failure states. This paper describes a
new approach to CSA using a Linear Temporal Logic (LTL) model checker called BT
Analyser that supports the generation of multiple counterexamples. The approach
enables a broader class of system failures to be analysed, by generalising from
failure state formulae to failure behaviours expressed in LTL. The traditional
approach to CSA using model checking requires the model or system failure to be
modified, usually by hand, to eliminate already-discovered cut sets, and the
model checker to be rerun, at each step. By contrast, the new approach works
incrementally and fully automatically, thereby removing the tedious and
error-prone manual process and resulting in significantly reduced computation
time. This in turn enables larger models to be checked. Two different
strategies for using BT Analyser for CSA are presented. There is generally no
single best strategy for model checking: their relative efficiency depends on
the model and property being analysed. Comparative results are given for the
A320 hydraulics case study in the Behavior Tree modelling language.Comment: In Proceedings ESSS 2015, arXiv:1506.0325
Fault-tolerant sub-lithographic design with rollback recovery
Shrinking feature sizes and energy levels coupled with high clock rates and decreasing node capacitance lead us into a regime where transient errors in logic cannot be ignored. Consequently, several recent studies have focused on feed-forward spatial redundancy techniques to combat these high transient fault rates. To complement these studies, we analyze fine-grained rollback techniques and show that they can offer lower spatial redundancy factors with no significant impact on system performance for fault rates up to one fault per device per ten million cycles of operation (Pf = 10^-7) in systems with 10^12 susceptible devices. Further, we concretely demonstrate these claims on nanowire-based programmable logic arrays. Despite expensive rollback buffers and general-purpose, conservative analysis, we show the area overhead factor of our technique is roughly an order of magnitude lower than a gate level feed-forward redundancy scheme
New Inapproximability Bounds for TSP
In this paper, we study the approximability of the metric Traveling Salesman
Problem (TSP) and prove new explicit inapproximability bounds for that problem.
The best up to now known hardness of approximation bounds were 185/184 for the
symmetric case (due to Lampis) and 117/116 for the asymmetric case (due to
Papadimitriou and Vempala). We construct here two new bounded occurrence CSP
reductions which improve these bounds to 123/122 and 75/74, respectively. The
latter bound is the first improvement in more than a decade for the case of the
asymmetric TSP. One of our main tools, which may be of independent interest, is
a new construction of a bounded degree wheel amplifier used in the proof of our
results
Formal Verification of Probabilistic SystemC Models with Statistical Model Checking
Transaction-level modeling with SystemC has been very successful in
describing the behavior of embedded systems by providing high-level executable
models, in which many of them have inherent probabilistic behaviors, e.g.,
random data and unreliable components. It thus is crucial to have both
quantitative and qualitative analysis of the probabilities of system
properties. Such analysis can be conducted by constructing a formal model of
the system under verification and using Probabilistic Model Checking (PMC).
However, this method is infeasible for large systems, due to the state space
explosion. In this article, we demonstrate the successful use of Statistical
Model Checking (SMC) to carry out such analysis directly from large SystemC
models and allow designers to express a wide range of useful properties. The
first contribution of this work is a framework to verify properties expressed
in Bounded Linear Temporal Logic (BLTL) for SystemC models with both timed and
probabilistic characteristics. Second, the framework allows users to expose a
rich set of user-code primitives as atomic propositions in BLTL. Moreover,
users can define their own fine-grained time resolution rather than the
boundary of clock cycles in the SystemC simulation. The third contribution is
an implementation of a statistical model checker. It contains an automatic
monitor generation for producing execution traces of the
model-under-verification (MUV), the mechanism for automatically instrumenting
the MUV, and the interaction with statistical model checking algorithms.Comment: Journal of Software: Evolution and Process. Wiley, 2017. arXiv admin
note: substantial text overlap with arXiv:1507.0818
- …