Concepts and experiments in computational reflection
OOPSLA '87 Conference proceedings on Object-oriented programming systems, languages and applications
A Randomized Parallel Backtracking Algorithm
IEEE Transactions on Computers
A logic for reasoning about probabilities
Information and Computation - Selections from 1988 IEEE symposium on logic in computer science
Remote Agent: to boldly go where no AI system has gone before
Artificial Intelligence - Special issue: artificial intelligence 40 years later
Distributed constraint satisfaction: foundations of cooperation in multi-agent systems
Distributed constraint satisfaction: foundations of cooperation in multi-agent systems
Software Fault Tolerance
Introduction to Reinforcement Learning
Introduction to Reinforcement Learning
Directed diffusion for wireless sensor networking
IEEE/ACM Transactions on Networking (TON)
Using Runtime Analysis to Guide Model Checking of Java Programs
Proceedings of the 7th International SPIN Workshop on SPIN Model Checking and Software Verification
Stochastic Logic Programs: Sampling, Inference and Applications
UAI '00 Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence
Construction of Abstract State Graphs with PVS
CAV '97 Proceedings of the 9th International Conference on Computer Aided Verification
Abstract and Model Check While You Prove
CAV '99 Proceedings of the 11th International Conference on Computer Aided Verification
Design and verification of secure systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Counterexample-guided abstraction refinement for symbolic model checking
Journal of the ACM (JACM)
Distributed Spatial Control, Global Monitoring and Steering of Mobile Agents
ICIIS '99 Proceedings of the 1999 International Conference on Information Intelligence and Systems
Software Fault Tolerance: A Tutorial
Software Fault Tolerance: A Tutorial
Partitioning in Avionics Architectures: Requirements, Mechanisms, and Assurance
Partitioning in Avionics Architectures: Requirements, Mechanisms, and Assurance
Java-MaC: A Run-Time Assurance Approach for Java Programs
Formal Methods in System Design
Efficient Decentralized Monitoring of Safety in Distributed Systems
Proceedings of the 26th International Conference on Software Engineering
Probabilistic symbolic model checking with PRISM: a hybrid approach
International Journal on Software Tools for Technology Transfer (STTT) - Special section on tools and algorithms for the construction and analysis of systems
Solving Distributed Constraint Optimization Problems Using Cooperative Mediation
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Formal prototyping in early stages of protocol design
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
GridSAT: A Chaff-based Distributed SAT Solver for the Grid
Proceedings of the 2003 ACM/IEEE conference on Supercomputing
Machine Learning
LIME: A coordination model and middleware supporting mobility of hosts and agents
ACM Transactions on Software Engineering and Methodology (TOSEM)
Delay- and Disruption-Tolerant Networking
Delay- and Disruption-Tolerant Networking
Statistical probabilistic model checking with a focus on time-bounded properties
Information and Computation
PRDC '06 Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing
Using Prior Knowledge to Improve Distributed Hill Climbing
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Self-organization in Autonomous Sensor and Actuator Networks
Self-organization in Autonomous Sensor and Actuator Networks
Confidence: Its Role in Dependability Cases for Risk Assessment
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
ICECCS '07 Proceedings of the 12th IEEE International Conference on Engineering Complex Computer Systems
Learning from Data: Concepts, Theory, and Methods
Learning from Data: Concepts, Theory, and Methods
A logical approach to efficient Max-SAT solving
Artificial Intelligence
Constraint refinement for online verifiable cross-layer system adaptation
Proceedings of the conference on Design, automation and test in Europe
AMOEBA-RT: Run-Time Verification of Adaptive Software
Models in Software Engineering
ZebraNet and beyond: applications and systems support for mobile, dynamic networks
CASES '08 Proceedings of the 2008 international conference on Compilers, architectures and synthesis for embedded systems
Information Sciences: an International Journal
A Lightweight Container Architecture for Runtime Verification
Runtime Verification
Artificial Intelligence - Special issue: Distributed constraint satisfaction
Adopt: asynchronous distributed constraint optimization with quality guarantees
Artificial Intelligence - Special issue: Distributed constraint satisfaction
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Software Verification and System Assurance
SEFM '09 Proceedings of the 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods
The maude LTL model checker and its implementation
SPIN'03 Proceedings of the 10th international conference on Model checking software
MiniMaxSAT: a new weighted Max-SAT solver
SAT'07 Proceedings of the 10th international conference on Theory and applications of satisfiability testing
A probabilistic formal analysis approach to cross layer optimization in distributed embedded systems
FMOODS'07 Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems
Combining formal verification with observed system execution behavior to tune system parameters
FORMATS'07 Proceedings of the 5th international conference on Formal modeling and analysis of timed systems
All about maude - a high-performance logical framework: how to specify, program and verify systems in rewriting logic
A model-based approach to reactive self-configuring systems
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 2
Pushing the envelope: planning, propositional logic, and stochastic search
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 2
Toward distributed declarative control of networked cyber-physical systems
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
An Application Framework for Loosely Coupled Networked Cyber-Physical Systems
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
A distributed logic for networked cyber-physical systems
FSEN'11 Proceedings of the 4th IPM international conference on Fundamentals of Software Engineering
A formal methodology for compositional cross-layer optimization
Formal modeling
Hi-index | 0.00 |
An emerging generation of mission-critical systems employs distributed, dynamically reconfigurable open architectures. These systems may include a variety of devices that sense and affect their environment and the configuration of the system itself. We call such systems Networked Cyber-Physical Systems (NCPS). NCPS can provide complex, situation-aware, and often critical services in applications such as distributed sensing and surveillance, crisis response, self-assembling structures or systems, networked satellite and unmanned vehicle missions, or distributed critical infrastructure monitoring and control. In this paper we lay out research directions centered around a new paradigm for the design of NCPS based on a notion of software fractionation that we are currently exploring which can serve as the basis for a new generation of runtime assurance techniques. The idea of software fractionation is inspired by and complementary to hardware fractionation -- the basis for the fractionated satellites of DARPA's F6 program. Fractionated software has the potential of leading to software that is more robust, leveraging both diversity and redundancy. It raises the level of abstraction at which assurance techniques are applied. We specifically propose research in just-in-time verification and validation techniques, which are agile -- adapting to changing situations and requirements, and efficient -- focusing on properties of immediate concern in the context of locally reachable states, thus largely avoiding the state space explosion problem. We propose an underlying reflective architecture that maintains models of itself, the environment, and the mission that is key for adaptation, verification, and validation.