Visualizing Self-Adaptive Plan Simulations given Embedded Verification Concerns

被引:0
|
作者
Jahan, Sharmin [1 ]
Marshall, Allen [1 ]
Gamble, Rose [1 ]
机构
[1] Univ Tulsa, Tandy Sch Comp Sci, Tulsa, OK 74104 USA
来源
2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W) | 2017年
关键词
verification; self-adaptation; Linear Temporal Logic; verification process reuse; adaptive plans; ProM;
D O I
10.1109/FAS-W.2017.185
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A system that dynamically self-adapts at runtime, should comply with critical requirements. However, runtime verification is difficult even when the system was originally formulated to expect adaptation and allowable changes are preconfigured or prespecified. Our approach examines verification processes originally performed for compliance with system requirements to identify specific verification concerns, such as variables, safety and liveness property conditions, and architecture properties. The expectation is that if a verification concern is impacted by an adaptation then the reuse of the original verification process may be restricted. If verification process reuse is inhibited, then there is increased likelihood that the requirements relying on that verification concern may no longer be guaranteed. In this demonstration, we illustrate our approach to take identified verification concerns for each requirement and embed them as checkpoints within the code, given the flow of the verification process from which they were derived. Simulating an adaptation plan produces log files based on which checkpoints are reached. Failure to complete a path through the checkpoints without raising a flag indicates that the verification process may not be repeatable and the adaptation plan may be risky to perform. We visualize the paths using ProM which shows where and how an adaptation plan may be problematic.
引用
收藏
页码:389 / 390
页数:2
相关论文
共 50 条
  • [31] Multi-modal Representation Learning with Self-adaptive Threshold for Commodity Verification
    Han, Chenchen
    Jia, Heng
    CCKS 2022 - EVALUATION TRACK, 2022, 1711 : 172 - 179
  • [32] RINGA: Design and verification of finite state machine for self-adaptive software at runtime
    Lee, Euijong
    Kim, Young-Gab
    Seo, Young-Duk
    Seol, Kwangsoo
    Baik, Doo-Kwon
    INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 93 : 200 - 222
  • [33] Formal specification and verification of decentralized self-adaptive systems using symmetric nets
    Camilli, Matteo
    Capra, Lorenzo
    DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2021, 31 (04): : 609 - 657
  • [34] EasyModel: A Refinement-Based Modeling and Verification Approach for Self-Adaptive Software
    Han, De-Shuai
    Yang, Qi-Liang
    Xing, Jian-Chun
    Ma, Guang-Lian
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 35 (05) : 1016 - 1046
  • [35] Formal specification and verification of decentralized self-adaptive systems using symmetric nets
    Matteo Camilli
    Lorenzo Capra
    Discrete Event Dynamic Systems, 2021, 31 : 609 - 657
  • [36] Refinement-Based Modelling and Verification of Design Patterns for Self-adaptive Systems
    Goethel, Thomas
    Jaehnig, Nils
    Seif, Simon
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2017, 2017, 10610 : 157 - 173
  • [37] Toward self-adaptive embedded systems: Multi-objective hardware evolution
    Kaufmann, Paul
    Platzner, Marco
    ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2007, PROCEEDINGS, 2007, 4415 : 199 - +
  • [38] A Self-Adaptive SEU Mitigation Scheme for Embedded Systems in Extreme Radiation Environments
    Lu, Yufan
    Zhai, Xiaojun
    Saha, Sangeet
    Ehsan, Shoaib
    McDonald-Maier, Klaus D.
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1436 - 1447
  • [39] Model-based self-adaptive embedded programs with temporal logic specifications
    Tan, Li
    QSIC 2006: Sixth International Conference on Quality Software, Proceedings, 2006, : 151 - 158
  • [40] A Self-Adaptive Decoding Scheme for BICM-ID Embedded Turbo Codes
    Liu Shuyang
    Li Jianping
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 473 - 477