Safer PI ISIS May 00 Seattle

67 %
33 %
Information about Safer PI ISIS May 00 Seattle
Science-Technology

Published on September 25, 2007

Author: Nickel

Source: authorstream.com

Slide1:  Model-Integrated Approach to Adaptive Embedded Systems Akos Ledeczi Institute for Software Integrated Systems Vanderbilt University Outline:  Outline Key benefits of MIC Static (design-time) adaptivity Dynamic (run-time) adaptivity Conclusions Benefits of MIC:  Benefits of MIC Level of abstraction: source code vs. high-level system models Constraints: implicit vs. explicit constraints Scope: point solution vs. design space System Models:  System Models Domain-specific language Primarily graphical Multiple-aspects Hierarchical decomposition Model: representation of all the information that is necessary to automatically synthesize the application Constraints:  Constraints Domain-specific: model-integrity constraints Application-specific: compositional resource performance cost etc. Scope: Design-Space:  Scope: Design-Space Explicit alternatives andgt;andgt;andgt; finite design space Parametric, generative models: architectural parameters algorithmic description andgt;andgt;andgt; infinite design space Design-Space Exploration:  Design-Space Exploration Step 1: Search-space pruning symbolic constraint satisfaction (e.g. OBDDs) interactive and iterative (selective constraint relaxation) input: 10n (n andgt;andgt; 1); output: 1-10 configurations Step 2: Simulation Step 3: Optimization Step 4: Automatic system synthesis Automatic System Synthesis:  Automatic System Synthesis Hardware configuration (e.g. VHDL) Source code (C, C++, Java, SQL etc.) Configuration information: real-time schedules message routing maps assignment etc. Slide9:  Target Application - Formal constraints MIC Approach System Models System Synthesis Slide10:  S1 S3 S2 e1[S21]/ / /../ /../ (D1.time - D2.time) andlt; 2 P3 (mode=(S1 or S2))implies(P1=P1i) Pr1 Pr3 C1 if(k = 2 and n andlt; 4) generate(n) else generate(k) Functional models Resource models Behavior models Explicit alternatives Performance constraint Compositional constraint Hierarchical Parallel FSM G n k Generator Parameters Explicit alternatives Design Space Modeling Slide11:  Design Space Pruning Slide12:  Modeling objects are lost at generation step: Fixed configuration or mode-based run-time adaptivity only No incremental changes No feedback to model Static (Design-Time) Adaptivity Models Synthesis Config / source files Application Slide13:  Embedded synthesizer Dynamic (Run-Time) Adaptivity Models Synthesis Application Embedded models replace (augment) configuration / source files: self-describing system incremental change capability system state is communicated in terms of model-based information Adaptive Behavior:  Adaptive Behavior Monitoring Analysis, redesign, verification Reconfiguration Monitoring:  Monitor variables reflect system state in the model What to monitor? Kernel/OS status Application state Events, exceptions Monitoring Embedded synthesizer Analysis, Redesign, Verification:  The evaluator is a system process Varying complexity: table-driven model-defined logic procedural etc. Generator scripts: Controlled by their input parameters in the model Cannot legally be bypassed to change model Reliably handle transitions, sequencing and incremental changes Constraint manager Analysis, Redesign, Verification Embedded synthesizer R/T Executive process 2 process 3 process 4 Evaluator Constraint Manager Generator scripts Evaluator Reconfiguration:  Reconfiguration Embedded synthesizer The embedded synthesizer is a system process Relatively simple translation Conclusions:  Conclusions High-level system models and explicit constraints: postpone implementation decisions as late as possible Design space modeling and automatic system synthesis: amortize initial investment over the lifetime of the application Embedded models and synthesis: self-describing system

Add a comment

Related presentations

Related pages

The Seattle Times | Local news, sports, business, politics ...

The Seattle Times Presents. Washington can do better. Make public education funding a priority. Seattle Times Marketplace. Jobs; NWhomes; NWautos; Shopping ...
Read more

WHL Seattle at Kelowna summary - seattlepi.com

Army deserter turned 'ISIS ... (Kirkland), 5:52 (sh). 3, Kelowna, Kirkland 21 (Baillie, Soustal), 14:00. 4, Seattle, Barzal ... Seattle, Eansor ...
Read more

Gun Safes & Wall Safe Brands for Sale | Safe & Vault Store

$4,265.00 $3,199.00 You ... from SafeandVaultStore.com because ... the valuables in a "safe place," which may actually turn out to not be safe, ...
Read more

Search

Find all the information for from secure and virus free sources. Protect your search experience with safesearch.net.
Read more

Visit Seattle Washington | Travel & Tourism | Official Site

Welcome to the official source for information on visiting Seattle, Washington. Lodging, entertainment, food/drink, sports, attractions & more.
Read more

Pi Day · Celebrate Mathematics on March 14th

Pi Day is celebrated on March 14th (3/14) around the world. Pi (Greek letter ...
Read more

Attacking ISIS Won't Make Americans Safer | Myinforms

It may be used for personal consumption, ... Main Politics Attacking ISIS Won't Make Americans Safer. ... The Seattle Times, ...
Read more

A Your Voice, Your Future Town Hall | News, Weather ...

... sports, weather and local event coverage in the Seattle, Washington area including Bellevue ... All rights reserved. This material may not be ...
Read more

Welcome to Security Safe and Lock, Inc.

Security Safe and Lock has been a family ... In addition to regular type lock and safe services you may think ... 25.00 off any “IN HOME” delivery of safe.
Read more