210 research outputs found

    Fully-automated Runtime Enforcement of Component-based Systems with Formal and Sound Recovery

    No full text
    International audienceWe introduce runtime enforcement of specifications on component-based systems (CBS) modeled in the BIP (Behavior, Interaction and Priority) framework. Runtime enforcement is an increasingly popular and effective dynamic validation technique aiming to ensure the correct runtime behavior (w.r.t. a formal specification) of a system using a so-called enforcement monitor. BIP is a powerful and expressive component-based framework for the formal construction of heterogeneous systems. Because of BIP expressiveness however , it is difficult to enforce complex behavioral properties at design-time. We first introduce a theoretical runtime enforcement framework for component-based systems where we delineate a hierarchy of enforceable properties (i.e., properties that can be enforced) according to the number of observational steps a system is allowed to deviate from the property (i.e., the notion of k-step enforceability). To ensure the observational equivalence between the correct executions of the initial system and the monitored system, we show that i) only stutter-invariant properties should be enforced on CBS with our monitors, and ii) safety properties are 1-step enforceable. Second, given an abstract enforcement monitor for some 1-step enforceable property, we define a series of formal transformations to instrument (at relevant locations) a CBS described in the BIP framework to integrate the monitor. At runtime, the monitor observes and automatically avoids any error in the behavior of the system w.r.t. the property. Third, our approach is fully implemented in RE-BIP, an available tool integrated in the BIP tool suite. Fourth, to validate our approach, we use RE-BIP to i) enforce deadlock-freedom on a dining philosophers benchmark, and ii) ensure the correct placement of robots on a map

    Enhancing Application Identification By Means Of Sequential Testing

    Get PDF
    Abstract. One of the most important challenges for network administrators is the identification of applications behind the Internet traffic. This identification serves for many purposes as in network security, traffic engineering and monitoring. The classical methods based on standard port numbers or deep packet inspection are unfortunately becoming less and less efficient because of encryption and the utilization of non standard ports. In this paper we come up with an online iterative probabilistic method that identifies applications quickly and accurately by only using the size of packets. Our method associates a configurable confidence level to the port number carried in the transport header and is able to consider a variable number of packets at the beginning of a flow. By verification on real traces we observe that even in the case of no confidence in the port number, a very high accuracy can be obtained for well known applications after few packets were examined

    Runtime Enforcement for Component-Based Systems

    Get PDF
    Runtime enforcement is an increasingly popular and effective dynamic validation technique aiming to ensure the correct runtime behavior (w.r.t. a formal specification) of systems using a so-called enforcement monitor. In this paper we introduce runtime enforcement of specifications on component-based systems (CBS) modeled in the BIP (Behavior, Interaction and Priority) framework. BIP is a powerful and expressive component-based framework for formal construction of heterogeneous systems. However, because of BIP expressiveness, it remains difficult to enforce at design-time complex behavioral properties. First we propose a theoretical runtime enforcement framework for CBS where we delineate a hierarchy of sets of enforceable properties (i.e., properties that can be enforced) according to the number of observational steps a system is allowed to deviate from the property (i.e., the notion of k-step enforceability). To ensure the observational equivalence between the correct executions of the initial system and the monitored system, we show that i) only stutter-invariant properties should be enforced on CBS with our monitors, ii) safety properties are 1-step enforceable. Given an abstract enforcement monitor (as a finite-state machine) for some 1-step enforceable specification, we formally instrument (at relevant locations) a given BIP system to integrate the monitor. At runtime, the monitor observes and automatically avoids any error in the behavior of the system w.r.t. the specification. Our approach is fully implemented in an available tool that we used to i) avoid deadlock occurrences on a dining philosophers benchmark, and ii) ensure the correct placement of robots on a map.Comment: arXiv admin note: text overlap with arXiv:1109.5505 by other author

    Quantitative Models for Centralised Supply Chain Coordination

    Get PDF

    A note on: an empirical comparison of forgetting models

    Get PDF
    In the above paper, Nembhard and Osothsilp (2001) empirically compared several forgetting models against empirical data on production breaks. Among the models compared was the learn–forget curve model (LFCM) developed by Jaber and Bonney(1996). In previous research, several studies have shown that the LFCM is advantageous to some of the models being investigated, however, Nembhard and Osothsilp (2001) found that the LFCM showed the largest deviation from empirical data. In this commentary, we demonstrate that the poor performance of the LFCM in the study of Nembhard and Osothsilp (2001) might be attributed to an error on their part when fitting the LFCM to their empirical data

    Causes a Gap between the Expectations of Auditors and Users of Audit Reports

    Get PDF
    The present paper aims to study the expectation gap between the auditors and the users of financial information with regard to the financial reports assurance, decision-making profitability based on the audited financial information, and responsibility for such information. Expectation gap between the auditors and the users of financial reports is a factor, which results in the ambiguity in the auditors’ role and users’ perception of it. In this context, meticulous and viable research must be conducted so that this expectation gap can be reduced and removed. This necessity has provided a foundation for the implementation of the present study. In this view, the following assumptions are taken into account. A significant difference exists between the expectation of the users and that of the auditors in terms of auditing responsibility, assurance, and decisionmaking profitability. For analysis of the data and test of the assumptions, preliminary data have been collected using some questionnaire and research variables have thus been calculated. In the present study, with regard to the proposed assumptions, the t test with two independent samples has been applied. Statistical test results indicate the justification of the three above relations in the proposed assumptions in the present study. It is recommended that our findings should be applied by the specialists and researchers for elimination of such expectation gap

    Architecture internalisation in BIP

    Get PDF
    International audienceWe consider two approaches for building component-based systems, which we call respectively architecture-based and architecture-agnostic. The former consists in describing coordination constraints in a purely declarative manner through parametrizable glue operators; it provides higher abstraction level and, consequently, stronger correctness by construction. The latter uses simple fixed coordination primitives, which are spread across component behaviour; it is more error-prone, but allows performance optimisation. We study architecture internalisation leading from an architecture-based system to an equivalent architecture-agnostic one, focusing, in particular, on component-based systems described in BIP. BIP uses connectors for hierarchical composition of components. We study connector internalisation in three steps. 1) We introduce and study the properties of interaction expressions, which represent the combined information about all the effects of an interaction. We show that they are a very powerful tool for specifying and analysing structured interaction. 2) We formalize the connector semantics of BIP by using interaction expressions. The formalization proves to be mathematically rigorous and concise. 3) We introduce the T/B component model and provide a semantics preserving translation of BIP into this model. The translation is compositional that is, it preserves the structure of the source models. The results are illustrated by simple examples. A Java implementation is evaluated on two case studies
    corecore