Spreading Excellence

Total Page:16

File Type:pdf, Size:1020Kb

Spreading Excellence IST-004527 ARTIST2 NoE Year 3 JPASE: Joint Programme of Activities for D3-Mgt-Y3 Spreading Excellence IST-004527 ARTIST2 Network of Excellence on Embedded Systems Design Spreading Excellence Artist2 Technical Coordinator: Bruno Bouyssounouse (Verimag) with inputs from all NoE participants The visibility of the ARTIST2 research effort in embedded systems design is worldwide. This is progressively creating a European embedded systems design community, and spreading the “artist culture” in all major research institutions. To ensure that the next generation of researchers will continue in this direction we, as a consortium, devote a great deal of effort to Spreading Excellence, in both academic and industrial circles. Furthermore, through our links with both core and affiliated partners, we are actively setting up permanents links between industry and public research, leveraging on existing partner collaborations with major industrial players in the area. This document shows that ARTIST2 has a strategic impact on the integration of multiple academic research communities, which are necessary to establish the new area of embedded systems design. 1 / 126 IST-004527 ARTIST2 NoE Year 3 JPASE: Joint Programme of Activities for D3-Mgt-Y3 Spreading Excellence Table of Contents 1. Vision and Strategy for Spreading Excellence - Executive Summary.................................5 1.1 Overall Vision and Strategy .........................................................................................5 1.2 Affiliated partners.........................................................................................................6 1.3 Scientific and Technical Community in the Large........................................................6 1.3.1 International Collaboration.....................................................................................................7 1.3.2 Publications............................................................................................................................7 1.3.3 Tools and Components..........................................................................................................7 1.3.4 Industrial Liaison....................................................................................................................7 1.3.5 Course Materials....................................................................................................................7 2. International Collaboration ...................................................................................................8 2.1 Year 3 Event: First European-SouthAmerican School for Embedded Systems ..........8 2.1.1 Objectives ..............................................................................................................................8 2.1.2 Lecturers ................................................................................................................................8 2.1.3 Organisation.........................................................................................................................10 2.1.4 Participants ..........................................................................................................................10 2.1.5 Conclusion ...........................................................................................................................11 2.2 Year 3 Event: ARTIST2 / UNU-IIST Spring School in China 2007 ............................11 2.2.1 Overview ..............................................................................................................................11 2.2.2 Last Year’s Edition...............................................................................................................11 2.2.3 Lecturers ..............................................................................................................................12 2.2.4 Course Materials..................................................................................................................14 2.2.5 Organisation.........................................................................................................................15 2.2.6 Poster for the school............................................................................................................17 2.2.7 Participants ..........................................................................................................................18 2.3 Year 3 Event: ARTIST2 Workshop on Foundations and Applications of Component- based Design.........................................................................................................................20 2.3.1 Objectives and scope ..........................................................................................................20 2.3.2 Organisation.........................................................................................................................21 2.3.3 Programme and Slides ........................................................................................................21 2.4 Year 3 Event: WESE’06 - Embedded Systems Education ........................................22 2.4.1 Overview ..............................................................................................................................22 2.4.2 Organisation.........................................................................................................................23 2.4.3 WESE 2006 Program ..........................................................................................................23 2.4.4 Sponsors..............................................................................................................................24 2.5 Events Planned for Year 4.........................................................................................24 2.5.1 WESE’07: WS on Embedded Systems Education ..............................................................24 2 / 126 IST-004527 ARTIST2 NoE Year 3 JPASE: Joint Programme of Activities for D3-Mgt-Y3 Spreading Excellence 2.5.2 Artist2 meeting on Integrated Modular Avionics ..................................................................26 2.5.3 Second International Artist2 Workshop on Foundations of Component-based Design ......28 3. Organisation of Schools .....................................................................................................31 3.1 Schools directly Organized and Funded by Artist2 in Year3 .....................................31 3.2 Special Year 3 Event: ARTIST2 Winter School - MOTIVES 2007.............................32 3.2.1 Overview ..............................................................................................................................32 3.2.2 Organisation.........................................................................................................................32 3.2.3 Programme ..........................................................................................................................33 3.2.4 Participants ..........................................................................................................................34 3.2.5 Poster for the school............................................................................................................36 3.3 Schools Partially Organized and/or Funded by Artist2 in Year 3...............................36 3.4 Plans for Year4: Schools Directly Organized and Funded by Artist2 ........................37 3.5 Plans for Year4: Schools Partially Organized and/or Funded by Artist2 ...................37 4. Organisation of Workshops................................................................................................39 4.1 Directly Organized and Funded by Artist2 in Year3...................................................39 4.2 Partially Organized and Funded by Artist2 in Year3..................................................40 4.3 Plans for Year4: Workshops Directly Organized and Funded by Artist2 ...................42 5. Keynotes, Tutorials provided to the Embedded Systems Community ...............................44 5.1 Real-Time Components.............................................................................................44 5.2 Adaptive Real-Time ...................................................................................................51 5.3 Compilers and Timing Analysis .................................................................................58 5.4 Execution Platforms...................................................................................................62 5.5 Control for Embedded Systems.................................................................................69 5.6 Testing and Verification .............................................................................................73 6. Artist2 Web Portal ..............................................................................................................79 6.1 Objectives and Background Information....................................................................79 6.2 Analysis of Visits to the Portal ...................................................................................80 6.2.1 Number of Visits over the past Year....................................................................................80 6.2.2 Visits Distribution .................................................................................................................82 6.2.3 Google keywords used to access the site ...........................................................................83
Recommended publications
  • Towards a Time Model for Circus
    Towards a Time Model for Circus Adnan Sherif and He Jifeng ∗ The United Nations University, International Institute for Software Technology, Casa Silva Mendes, Est. do Engenheiro Trigo No. 4, P.O Box 3058, Macau Tel.:+853 - 712.930, Fax: +853 - 712.940 [email protected], [email protected] Abstract. In this work we propose a time model for Circus. The model is an extension to the model proposed by the unifying theories of pro- gramming and used by Circus. We take a subset of Circus and study its semantics in the new model. We create an abstraction function that maps the timed model to the original model. The main objective of this mapping is to create a relation between the two models. This allows the exploration of some properties of the timed semantics in the untimed model. We study a toy example to illustrate the use of this mapping. 1 Introduction Real time systems have always been a strong candidate for formal develop- ment methods. This fact rises due to the complexity and, usually, critical nature of these systems. The development of formal specification languages, and the adaptation of existing languages with time expressing capacity, was and still is a challenging task. Many languages such as DC [1], and RTL [4] are based on temporal logic and are powerful for expressing timed functionalities. Timed CSP [8] is an extension to the well known CSP [9]. Reed and Roscoe have developed several semantic models for the language [8]. Lately the combination of different languages and techniques have been adapted to obtain formalisms that can be used in a wider range of applications.
    [Show full text]
  • Terahertz Detectors Based on Superconducting Hot Electron Bolometers
    Editorial Board Supported by NSFC Honorary Editor General ZHOU GuangZhao (Zhou Guang Zhao) Editor General ZHU ZuoYan Institute of Hydrobiology, CAS Editor-in-Chief LI Wei Beihang University Executive Associate Editor-in-Chief WANG DongMing Centre National de la Recherche Scientifique Associate Editors-in-Chief GUO Lei Academy of Mathematics and Systems Science, CAS HUANG Ru Peking University QIN YuWen National Natural Science Foundation of China SUN ZengQi Tsinghua University YOU XiaoHu Southeast University ZHAO Wei University of Macau ZHAO QinPing Beihang University Members CHEN JianEr LI Joshua LeWei TSAI WeiTek Texas A&M University University of Electronic Science and Arizona State University Technology of China DU Richard LiMin WANG Ji Voxeasy Institute of Technology LIU DeRong National University of Defense Technology Institute of Automation, CAS GAO Wen WANG JiangZhou Peking University LIN HuiMin University of Kent Institute of Software, CAS GE ShuZhi Sam WANG Long National University of Singapore LIN ZongLi Peking University GUO GuangCan University of Virginia University of Science and Technology of WU YiRong LONG KePing Institute of Electronics, CAS China University of Science and Technology Beijing HAN WenBao XIE WeiXin Shenzhen University PLA Information Engineering University LU Jian Nanjing University HE JiFeng XU Jun Tsinghua University East China Normal University MEI Hong Peking University XU Ke HU WeiWu Beihang University Institute of Computing Technology, CAS MENG LuoMing Beijing University of Posts and YIN QinYe HU ZhanYi
    [Show full text]
  • Dines Bjørner Research, Bibliography, Biography and Publication List
    CV: Dines Bjørner Research, Bibliography, Biography and Publication List Professor of Computing Science (Emeritus). Fredsvej 11, DK-2840 Holte, Denmark Dr.h.c., MAE, MRANS (AB), ACM Fellow, IEEE Fellow May 16, 2010 Dines Bjørner, Sept. 2007 For more photos see Sect. 5 Contents 2.3 Book Covers ............... 5 1 My Research 2 3 Biography 7 2 Publication Notes 3 4 References 9 2.1 Year-by-Year Listing ........... 3 2.2 Statistics ................. 4 5 Photos 24 1 My Research My research, since my IBM Vienna days, has focused on computing science,1 in particular program- ming methodology: on how to construct software. I was never much for the more foundational 1By computing science I understand the study of and knowledge about how to construct the “things” that can exist “inside” computers: data and processes. 1 side of computing, or as I call it, computer science.2 3 I am in particular “smitten” by the question what is a method ?. I see a method as a set of principles to be used in the analysis of problems and in the synthesis of solutions to these problems. I see the analysis and synthesis to be based on techniques and tools. The principles are then about the selection and practical use of the analysis and synthesis techniques and tools — research must uncover these principles, techniques and tools. Software engineering textbooks must cover them.4 I see a good software development method to be one that provides for efficient development approaches resulting in efficient software that meets customers expectations (and only and exactly those) and software that is correct (that is satisfies its requirements).
    [Show full text]
  • Completeness of Higher-Order Duration Calculus *
    Completeness of Higher-Order Duration Calculus Zhan Naijun Lab. of Computer Science and Techonology, Institute of Software, the Chinese Academy of Sciences, Beijing, 100080, P.R. China [email protected] Abstract. In order to describe the real-time behaviour of programs in terms of Duration Calculus (DC), proposed by Zhou Chaochen, C.A.R. Hoare and A.P. Ravn in [3], which can specify real-time requirements of computing systems, quantifications over program variables are inevitable, e.g. to describe local variable declaration, to declare internal channel and so on. So a higher-order duration calculus (HDC) is established in [2]. This paper proves completeness of HDC on abstract domains by encod- ing HDC into a complete first-order two-sorted interval temporal logic (IL2 ). This idea is hinted by [9]. All results shown in this paper are done under the assumption that all program variables have finite variability. Keywords: duration calculus higher-order logic interval temporal logic completeness 1 Introduction In order to describe the real-time behaviour of programs in terms of DC, quan- tifications over program variables are inevitable, e.g. to describe local variable declaration and so on. So a higher-order duration calculus is established in [2]. In [2], a real-time semantics of local variables has been demonstrated, and some real-time properties of programs have been derived using HDC. In order to specify the behaviour of real-time programs, program variables Vi,i≥ 0 are introduced into HDC. Predicates of program variables, constants, and global variables, such as (V<3) and (V = x), are taken as states.
    [Show full text]
  • Manifest Domains:Analysis and Description
    Downloaded from orbit.dtu.dk on: Oct 02, 2021 Manifest domains:analysis and description Bjørner, Dines Published in: Formal Aspects of Computing Link to article, DOI: 10.1007/s00165-016-0385-z Publication date: 2017 Document Version Peer reviewed version Link back to DTU Orbit Citation (APA): Bjørner, D. (2017). Manifest domains:analysis and description. Formal Aspects of Computing, 29(2), 175-225. https://doi.org/10.1007/s00165-016-0385-z General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. 17 June 2016: 11:32 am: Accepted for publication in Formal Aspects of Computing Manifest Domains: Analysis and Description Dines Bjørner1 1 Fredsvej 11, DK-2840 Holte, Denmark. DTU, DK-2800 Kgs. Lyngby, Denmark. e-mail: [email protected], URL: www.imm.dtu.dk/˜dibj To the memory of Peter Lucas: 13 Jan. 1935 – 2 Feb. 2015 Abstract. We show that manifest domains, an understanding of which are a prerequisite for software requirements prescriptions, can be precisely described: narrated and formalised.
    [Show full text]
  • Customized Book List Computer
    ABC springer.de Springer Customized Book List Computer FRANKFURT BUCHMESSE 2007 springer.com/booksellers Computer 1 N. Abdennahder, University of Applied Sciences, Solothurn, J. Abonyi, Pannon University, Hungary; B. Feil, Pannon University, P. Abrahamsson, VTT Technical Research Center, Finland; N. Bad- Switzerland; F. Kordon, Université Pierre & Marie Curie, Paris, Hungary doo, University of Hertfordshire, UK; T. Margaria, University of France (Eds.) Postdam, Germany; R. Messnarz, ISCN, Austria (Eds.) Cluster Analysis for Data Mining Reliable Software Technologies - and System Identification Software Process Improvement Ada-Europe 2007 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007, Proceedings 12th Ada-Europe Intenational Conference on Reliable Soft- ware Technologies, Geneva, Switzerland, June 25-29, 2007, This book presents new approaches to data mining Proceedings and system identification. Algorithmsthat can be used for the clustering of data have been overviewed. This book constitutes the refereed proceeding of the New techniques andtools are presented for the clus- 14th European Software Process Improvement Con- This book constitutes the refereed proceedings of the tering, classification, regression and visualization of- ference, EuroSPI 2007, held in Potsdam, Germany, in 12th International Conference on Reliable Software complex datasets. Special attention is given to the September 2007. The 18 revised full papers present- Technologies, Ada-Europe 2007, held in Geneva, analysis of historical process data,tailored algorithms ed together with an introductory paper were careful- Switzerland, in June 2007. The 18 revised full papers are presented for the data driven modeling of dy- ly reviewed and selected from 60 submissions. The presented were carefully reviewed and selected from namical systems,determining the model order of papers are organized in topical sections on enforce- numerous submissions.
    [Show full text]
  • UNU-IIST Annual Report 2004
    UNU-IIST International Institute for Software Technology UNU-IIST Annual Report 2004 Chris George and Wendy Hoi Iok Wa March 2005 UNU-IIST Report No. 314 A UNU-IIST and UNU-IIST Reports UNU-IIST (United Nations University International Institute for Software Technology) is a Research and Training Centre of the United Nations University (UNU). It is based in Macau, and was founded in 1991. It started operations in July 1992. UNU-IIST is jointly funded by the Governor of Macau and the governments of the People’s Republic of China and Portugal through a contribution to the UNU Endownment Fund. As well as providing two-thirds of the endownment fund, the Macau authorities also supply UNU-IIST with its office premises and furniture and subsidise fellow accommodation. The mission of UNU-IIST is to assist developing countries in the application and development of software technology. UNU-IIST contributes through its programmatic activities: 1. Advanced development projects, in which software techniques supported by tools are applied, 2. Research projects, in which new techniques for software development are investigated, 3. Curriculum development projects, in which courses of software technology for universities in devel- oping countries are developed, 4. University development projects, which complement the curriculum development projects by aiming to strengthen all aspects of computer science teaching in universities in developing countries, 5. Schools and Courses, which typically teach advanced software development techniques, 6. Events, in which conferences and workshops are organised or supported by UNU-IIST, and 7. Dissemination, in which UNU-IIST regularly distributes to developing countries information on international progress of software technology.
    [Show full text]
  • New Results and Trends in Formal Techniques & Tools for the Development of Software for Transportation Systems — a Review1
    NEW RESULTS AND TRENDS IN FORMAL TECHNIQUES & TOOLS FOR THE DEVELOPMENT OF SOFTWARE FOR TRANSPORTATION SYSTEMS — A REVIEW1 Dines Bjørner Computer Science and Engineering, Informatics and Mathematical Modelling Technical University of Denmark, DK–2800 Kgs.Lyngby, Denmark E–Mail: [email protected], URL: www.imm.dtu.dk/˜db Abstract: We characterise what is meant by a metod in the context of software devel- opment. Then what is meant by a formal technique. We refute the possibility of formal methods, but express the desirability of formal techniques. Some such techniques are briefly surveyed. We will outline what has been done recently and what is currently being done using formal techniques in the area predominantly of railway systems. Problems are out- lined, as are avenues for future research. Being an invited survey, the paper features an extensive, albeit far from complete, literature reference list of almost 180 entries, taking up half the paper size ! There are no examples of formal techniques being actually shown in this paper — but there should be at least three papers (Pˇeniˇcka et al., 2003; Strupchanska et al., 2003; Haxthausen and Peleska, 2003b) in these proceedings which illustrate such techniques as are the subject of the current review. Keywords: Formal Method, Domain Description, Requirements Prescription, Software Design, Provable Correctness, Safety Criticality, Real–time, Embedded Systems, Interlock- ing 1. INTRODUCTION 1.2 Sub–System Interfaces Transportation systems pose extraordinary challenge when it comes to their monitor- Thus the challenge is compounded by the ing and control by combinations of classical possibility, when using computers, of com- automatic control systems and digital com- bining many diverse “sub-systems”, sub– puters.
    [Show full text]
  • Domain Science & Engineering. a Foundation for Software Development
    Downloaded from orbit.dtu.dk on: Sep 28, 2021 Domain Science & Engineering. A Foundation for Software Development Bjørner, Dines Publication date: 2020 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Bjørner, D. (2020). Domain Science & Engineering. A Foundation for Software Development. Technical University of Denmark. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Dines Bjørner Domain Science & Engineering A Foundation for Software Development A Dr.Techn. Thesis Submission for The Technical University of Denmark September 6, 2019: 16:27 www.imm.dtu.dk/~dibj/2019/cacm−research/cacm−research−1.pdf Phenomena of a Universe of Discourse External Qualities E Entities = Describables Indescribables Observer function "states" E Endurants Perdurants Materials = Solids = E
    [Show full text]
  • Model Checking Linear Duration Invariants of Networks of Automata ⋆
    Model Checking Linear Duration Invariants of Networks of Automata ⋆ Miaomiao Zhang1, Zhiming Liu2, and Naijun Zhan3 1 School of Software Engineering, Tongji University, Shanghai, China [email protected] 2 International Institute of Software Technology, United Nations University, Macau, China [email protected] 3 Lab. of Computer Science, Institute of Software, CAS, Beijing, China [email protected] Abstract. Linear duration invariants (LDIs) are important safety properties of real-time systems. In this paper, we reduce the problem of verification of a net- work of timed automata against an LDI to an equivalent problem of model check- ing whether a failure state is never reached. Our approach is first to transform each component automaton Ai of the network A to an automaton Gi. The transforma- tion helps us to record entry and exit to critical locations that appear in the LDI. We then introduce an auxiliary checker automaton S and define a failure state to verify the LDI on a given interval. Since a model checker checks exhaustively, a failure of the checker automaton to find the failure state will prove that the LDI holds. 1 Introduction The invariants constructed from linear inequalities of integrated durations of system states are important properties of real-time systems. For example, in a container un- loading system, the required property has the form “for any observation interval that is longer than 60 seconds, the idle time for a device is at most one twentieth of the time”. This kind of properties are often specified by linear duration invariants (LDIs) [13] of the following form: A ≤ ℓ ≤ B ⇒ X csRs ≤ M (1) s∈S where Rs is the duration of a state s, A, B, cs and M are real numbers.
    [Show full text]
  • ACD Fotocanvas Print
    Editorial Board Supported by NSFC . Honorary Editor General ZHOU GuangZhao (Zhou Guang Zhao) Editor General ZHU ZuoYan Institute of Hydrobiology, CAS Editor-in-Chief LI Wei Beihang University Executive Associate Editor-in-Chief WANG DongMing Centre National de la Recherche Scientifique Associate Editors-in-Chief GUO Lei Academy of Mathematics and Systems Science, CAS HUANG Ru Peking University QIN YuWen National Natural Science Foundation of China SUN ZengQi Tsinghua University YOU XiaoHu Southeast University ZHAO QinPing Beihang University ZHAO Wei University of Macau Members CHEN JianEr LI Joshua LeWei TSAI WeiTek Texas A&M University University of Electronic Science and Arizona State University Technology of China DU Richard LiMin WANG Ji Voxeasy Institute of Technology LIU DeRong National University of Defense Technology Institute of Automation, CAS GAO Wen WANG JiangZhou Peking University LIN HuiMin University of Kent Institute of Software, CAS GE ShuZhi Sam University of Electronic Science and WANG Long LIN ZongLi Peking University Technology of China University of Virginia GUO GuangCan WU YiRong LONG KePing University of Science and Technology of Institute of Electronics, CAS University of Science and Technology China Beijing XIE WeiXin HAN WenBao Shenzhen University LU Jian PLA Information Engineering University Nanjing University XU Jun Tsinghua University HE JiFeng MEI Hong East China Normal University Peking University XU Ke HU WeiWu MENG LuoMing Beihang University Institute of Computing Technology, CAS Beijing University of
    [Show full text]
  • Mutation Testing in UTP Bernhard K
    Mutation testing in UTP Bernhard K. Aichernig, He Jifeng To cite this version: Bernhard K. Aichernig, He Jifeng. Mutation testing in UTP. Formal Aspects of Computing, Springer Verlag, 2008, 21 (1-2), pp.33-64. 10.1007/s00165-008-0083-6. hal-00477906 HAL Id: hal-00477906 https://hal.archives-ouvertes.fr/hal-00477906 Submitted on 30 Apr 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. DOI 10.1007/s00165-008-0083-6 BCS © 2008 Formal Aspects Formal Aspects of Computing (2009) 21: 33–64 of Computing Mutation testing in UTP Bernhard K. Aichernig1,2 and He Jifeng3 1Institute for Software Technology, Graz University of Technology, Graz, Austria. E-mail: [email protected] 2International Institute for Software Technology, United Nations University, Macao, S.A.R. China 3East China Normal University, Shanghai, China Abstract. This paper presents a theory of testing that integrates into Hoare and He’s Unifying Theory of Programming (UTP). We give test cases a denotational semantics by viewing them as specification predicates. This reformulation of test cases allows for relating test cases via refinement to specifications and programs. Having such a refinement order that integrates test cases, we develop a testing theory for fault-based testing.
    [Show full text]