434 research outputs found

    Runtime Enforcement for Component-Based Systems

    Get PDF
    Runtime enforcement is an increasingly popular and effective dynamic validation technique aiming to ensure the correct runtime behavior (w.r.t. a formal specification) of systems using a so-called enforcement monitor. In this paper we introduce runtime enforcement of specifications on component-based systems (CBS) modeled in the BIP (Behavior, Interaction and Priority) framework. BIP is a powerful and expressive component-based framework for formal construction of heterogeneous systems. However, because of BIP expressiveness, it remains difficult to enforce at design-time complex behavioral properties. First we propose a theoretical runtime enforcement framework for CBS where we delineate a hierarchy of sets of enforceable properties (i.e., properties that can be enforced) according to the number of observational steps a system is allowed to deviate from the property (i.e., the notion of k-step enforceability). To ensure the observational equivalence between the correct executions of the initial system and the monitored system, we show that i) only stutter-invariant properties should be enforced on CBS with our monitors, ii) safety properties are 1-step enforceable. Given an abstract enforcement monitor (as a finite-state machine) for some 1-step enforceable specification, we formally instrument (at relevant locations) a given BIP system to integrate the monitor. At runtime, the monitor observes and automatically avoids any error in the behavior of the system w.r.t. the specification. Our approach is fully implemented in an available tool that we used to i) avoid deadlock occurrences on a dining philosophers benchmark, and ii) ensure the correct placement of robots on a map.Comment: arXiv admin note: text overlap with arXiv:1109.5505 by other author

    Decentralized Enforcement of Artifact Lifecycles

    No full text
    International audienceArtifact-centric workflows describe possible executions of a business process through constraints expressed from the point of view of the documents exchanged between principals. A sequence of manipulations is deemed valid as long as every document in the workflow follows its prescribed lifecycle at all steps of the process. So far, establishing that a given workflow complies with artifact lifecycles has mostly been done through static verification, or by assuming a centralized access to all artifacts where these constraints can be monitored and enforced. We present in this paper an alternate method of enforcing document lifecycles that requires neither static verification nor single-point access. Rather, the document itself is designed to carry fragments of its history, protected from tampering using hashing and public-key encryption. Any principal involved in the process can verify at any time that a document's history complies with a given lifecycle. Moreover, the proposed system also enforces access permissions: not all actions are visible to all principals, and one can only modify and verify what one is allowed to observe

    Decentralized Enforcement of Artifact Lifecycles

    Get PDF
    International audienceArtifact-centric workflows describe possible executions of a business process through constraints expressed from the point of view of the documents exchanged between principals. A sequence of manipulations is deemed valid as long as every document in the workflow follows its prescribed lifecycle at all steps of the process. So far, establishing that a given workflow complies with artifact lifecycles has mostly been done through static verification, or by assuming a centralized access to all artifacts where these constraints can be monitored and enforced. We present in this paper an alternate method of enforcing document lifecycles that requires neither static verification nor single-point access. Rather, the document itself is designed to carry fragments of its history, protected from tampering using hashing and public-key encryption. Any principal involved in the process can verify at any time that a document's history complies with a given lifecycle. Moreover, the proposed system also enforces access permissions: not all actions are visible to all principals, and one can only modify and verify what one is allowed to observe

    Bringing Runtime Verification Home

    Get PDF
    International audienceWe use runtime verification (RV) to check various specifications in a smart apartment. The specifications can be broken down into three types: be-havioral correctness of the apartment sensors, detection of specific user activities (known as activities of daily living), and composition of specifications of the previous types. The context of the smart apartment provides us with a complex system with a large number of components with two different hierarchies to group specifications and sensors: geographically within the same room, floor or globally in the apartment, and logically following the different types of specifications. We leverage a recent approach to decentralized RV of decentralized specifications, where monitors have their own specifications and communicate together to verify more general specifications. This allows us to re-use specifications , and combine them to: (1) scale beyond existing centralized RV techniques, and (2) greatly reduce computation and communication costs. Sensors and actuators are used to create "smart" environments which track the data across sensors and human-machine interaction. One particular area of interest consists of homes (or apartments) equipped with a myriad of sensors and actuators, called smart homes [11]. Smart homes are capable of providing added services to users. These services rely on detecting the user behavior and the context of such activities [7], typically detecting activities of daily living (ADL) [29,9] from sensor information. Detecting ADL allows to optimize resource consumption (such as electricity [1]), improve the quality of life for the elderly [27] and users suffering from mild impairment [30]. Relying on information from multiple sources and observing behavior is not just constrained to activities. It is also used with techniques that verify the correct behavior of systems. Runtime Verification (RV) [20,5,3,4] is a lightweight formal method which consists in verifying that a run of a system is correct wrt a specification. The specification formalizes the behavior of the system typically in logics (such as variants of Linear Temporal Logic, LTL) or finite-state machines. Based on the provided specification , monitors are automatically synthesized to run alongside the system and verify whether or not the system execution complies with the specification. RV techniques have been used for instance in the context of automotive [10] and medical [26] systems. In both cases, RV is used to verify communication patterns between components and their adherence to the architecture and their formal specifications

    Should I stay or should I go? Modelling year-round habitat suitability for fin whales in the California Current

    Get PDF
    Aim Understanding the spatial ecology of endangered species is crucial to predicting habitat use at scales relevant to conservation and management. Here, we aim to model the influence of biophysical conditions on habitat suitability for endangered fin whales Balaenoptera physalus, with a view to informing management in a heavily impacted ocean region. Location We satellite-tracked the movements of 67 fin whales through the California Current System (CCS), a dynamic eastern boundary upwelling ecosystem in the Northeast Pacific. Methods We use a multi-scale modelling framework to elucidate biophysical influences on habitat suitability for fin whales in the CCS. Using Generalised Additive Mixed Models, we quantify the influence of a suite of remotely-sensed variables on broad-scale patterns of occupancy, and present the first year-round, high-resolution predictions of seasonal habitat suitability. Further, we model the influence of contemporaneous biophysical conditions on individual-level residence times in high-use habitat. Results We present evidence of year-round habitat suitability in the southern California Current System, robust to inter-annual variability, establishing that North Pacific fin whales do not follow the canonical baleen whale migration model. Within the high-use habitat in the Southern California Bight (SCB), individual-level residency to localised areas (n=16 for >30 days; n=4 for >6 months) was associated with warm, shallow, nearshore waters (>18°C, <500m); with cool waters (14-15°C) occurring over complex seafloor topographies and convergent (sub-)mesoscale structures at the surface. Main Conclusions Biophysical conditions in the southern CCS generate productive foraging habitats that can support the fin whale population year-round and allow for extended periods of residency in localised areas. High-use habitats for fin whales are co-located with areas of intense human use, including international shipping routes and a major naval training range. Seasonal habitat suitability maps presented here could inform the management of anthropogenic threats to an endangered baleen whales in this globally significant biodiversity hotspot

    Targeted biological therapies for Graves’ disease and thyroid-associated ophthalmopathy. Focus on B-cell depletion with Rituximab

    Full text link
    Based on experience from the treatment of other autoimmune diseases and because of the limitations imposed by existing therapeutic options for Graves’ disease (GD) and thyroid-associated ophthalmopathy (TAO), rituximab (RTX) was recently proposed as a novel therapy option. Here, we summarize the rationale for using RTX; give an overview of the possible mechanisms of action; and give an account of its effects and side-effects when used in GD and TAO. Scant evidence, originating from only a few methodologically inhomogeneous studies, suggests that RTX may prolong remission for hyperthyroidism over that seen with antithyroid drugs, at least in mild GD. Furthermore, in patients with TAO, who are unresponsive to conventional immunosuppressive therapy, RTX seems efficacious. As we wait for larger-scale randomized studies, RTX, should be considered experimental and reserved for patients who do not respond favourably to conventional therapy. It is the first in what is likely to be a series of new and emerging treatments specifically targeting relevant components of the immune system. Further studies will hopefully lead to improved and better tailored, individualized therapy for GD and especially TAO.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/79171/1/j.1365-2265.2010.03806.x.pd
    • …
    corecore