<?xml version="1.0" encoding="utf-8"?>
<!-- generator="Joomla! - Open Source Content Management" -->
<feed xmlns="http://www.w3.org/2005/Atom"  xml:lang="en-gb">
	<title type="text">Programme</title>
	<subtitle type="text">4th IFAC Workshop on Dependable Control of Discrete Systems</subtitle>
	<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk"/>
	<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised</id>
	<updated>2015-12-04T11:40:48+00:00</updated>
	<generator uri="http://joomla.org" version="2.5">Joomla! - Open Source Content Management</generator>
	<link rel="self" type="application/atom+xml" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised?format=feed&amp;type=atom"/>
	<entry>
		<title>Contact</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/contact"/>
		<published>2013-07-17T04:41:54+00:00</published>
		<updated>2013-07-17T04:41:54+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/contact</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p&gt;You can contact the organisers for information with the following email address: &lt;a href=&quot;mailto:dcds.info@cs.york.ac.uk&quot;&gt;dcds.info@cs.york.ac.uk&lt;/a&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;You can contact the organisers for information with the following email address: &lt;a href=&quot;mailto:dcds.info@cs.york.ac.uk&quot;&gt;dcds.info@cs.york.ac.uk&lt;/a&gt;&lt;/p&gt;</content>
	</entry>
	<entry>
		<title>Session 1: MBSA</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/18-session-1"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/18-session-1</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;Session chair: David Parker&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;10:30 - 12:30 Wednesday 4th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;10:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Towards a unified definition of Minimal Cut Sequences&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;: Pierre-Yves Chaux, Jean-Marc Roussel, Jean-Jacques Lesage, Gilles Deleuze, Marc Bouissou&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; The growing complexity of systems makes the complexity of&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;reliability model growing, implying the need to model both&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;the dynamics of systems and the reparability of components.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;The qualitative reliability analyses aim at finding the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;minimal representation of all the scenarios of failures and&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;repairs of the components, leading to the system failure.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;This minimal representation is the set of Minimal Cut&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Sequences. In order to provide a formal definition of these&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;specific scenarios, whatever the risk analysis model used,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;this paper proposes coherency rules for dynamic and&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;repairable systems &amp;nbsp;those dysfunctional scenarios are&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;modeled by a finite automaton.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Introducing Temporal Behaviour into Binary Decision Diagrams&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Ernest Edem Edifor, Martin Walker, Neil Gordon&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Binary Decision Diagrams (BDDs) are an alternative&amp;nbsp;&lt;span style=&quot;text-align: left;&quot;&gt;technique used in the analyses of safety-critical system&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;fault trees. BDDs have been found to produce the exact&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;top-event probability more efficiently by reducing&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;computing resources drastically. Unfortunately, this&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;efficient technique is not used in the analysis of fault&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;trees featuring sequential ordering of events. However, in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;the real world, the sequential ordering of &amp;nbsp;events cannot be&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;overlooked because it produces a more accurate evaluation&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;of systems. We introduce a new technique, Temporal BDD&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;(TBDD), that incorporates temporal behaviour – via&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;Priority-AND gates – into BDDs. TBDD provides the exact&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;results for both qualitative and quantitative analyses.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;However, unlike BDD, quantitative analyses cannot be&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;performed on 'unminimised' cut sequences yet. It is hoped&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;that this work will form the foundation for the full&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;qualitative and quantitative analyses of Dynamic Fault T&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;rees and Temporal Fault Trees in the near future.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Preliminary System Safety Analysis with Limited Markov Chain Generation&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Pierre-Antoine Brameret, Jean-Marc Roussel, Antoine Rauzy&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Markov chains are powerful and versatile tool to calculate reliability indicators.However, their use is limited for two reasons: the&amp;nbsp;&lt;/span&gt;&lt;/span&gt;exponential blowup of the size of the model, and the&amp;nbsp;difficulty to design models.&amp;nbsp;To overcome this second difficulty, a solution consists in&amp;nbsp;generating automatically the Markov chain from a higher&amp;nbsp;level description, e.g. a stochastic Petri net or an&amp;nbsp;AltaRica model.&amp;nbsp;These higher level models describe the Markov chain&amp;nbsp;implicitely.
&lt;p&gt;In this article, we propose an algorithm to generate partial Markov chains. The idea is to accept a little loss of accuracy in order to reduce the size of the generated chain. The cornerstone of this method is a Relevance Factor associated to each state of the chain. This factor enables the selection of the most representative states. We show on an already published test case, that our method provides very accurate results while reducing dramatically the complexity of the assessment. It is worth noticing that the proposed method does not depend on any particular high-level modeling formalism.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;12:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Using Coloured Petri Nets for integrated reliability and safety evaluations&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Bruno Pinna, Genia Babykina, Nicolae Brinzei, Jean-Francois Petin&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Integrated Deterministic and Probabilistic Dependability&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Analysis (IDPDA) is respectively required for safety&amp;nbsp;properties verication and reliability &amp;amp; availability&amp;nbsp;assessment of critical systems. This paper presents an&amp;nbsp;approach towards IDPDA using Coloured Petri Nets (CPN).&amp;nbsp;Contributions are related to: (a) hierarchical modelling&amp;nbsp;guidelines that cover deterministic and probabilistic&amp;nbsp;features of a physical system under control, (b) coupling&amp;nbsp;Monte-Carlo simulation with CPN model checking that&amp;nbsp;requires a previous determinisation of the CPN stochastic model. Our approach is illustrated using a toy case study.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;Session chair: David Parker&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;10:30 - 12:30 Wednesday 4th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;10:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Towards a unified definition of Minimal Cut Sequences&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;: Pierre-Yves Chaux, Jean-Marc Roussel, Jean-Jacques Lesage, Gilles Deleuze, Marc Bouissou&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; The growing complexity of systems makes the complexity of&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;reliability model growing, implying the need to model both&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;the dynamics of systems and the reparability of components.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;The qualitative reliability analyses aim at finding the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;minimal representation of all the scenarios of failures and&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;repairs of the components, leading to the system failure.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;This minimal representation is the set of Minimal Cut&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Sequences. In order to provide a formal definition of these&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;specific scenarios, whatever the risk analysis model used,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;this paper proposes coherency rules for dynamic and&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;repairable systems &amp;nbsp;those dysfunctional scenarios are&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;modeled by a finite automaton.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Introducing Temporal Behaviour into Binary Decision Diagrams&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Ernest Edem Edifor, Martin Walker, Neil Gordon&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Binary Decision Diagrams (BDDs) are an alternative&amp;nbsp;&lt;span style=&quot;text-align: left;&quot;&gt;technique used in the analyses of safety-critical system&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;fault trees. BDDs have been found to produce the exact&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;top-event probability more efficiently by reducing&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;computing resources drastically. Unfortunately, this&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;efficient technique is not used in the analysis of fault&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;trees featuring sequential ordering of events. However, in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;the real world, the sequential ordering of &amp;nbsp;events cannot be&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;overlooked because it produces a more accurate evaluation&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;of systems. We introduce a new technique, Temporal BDD&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;(TBDD), that incorporates temporal behaviour – via&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;Priority-AND gates – into BDDs. TBDD provides the exact&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;results for both qualitative and quantitative analyses.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;However, unlike BDD, quantitative analyses cannot be&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;performed on 'unminimised' cut sequences yet. It is hoped&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;that this work will form the foundation for the full&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;qualitative and quantitative analyses of Dynamic Fault T&lt;/span&gt;&lt;span style=&quot;text-align: left;&quot;&gt;rees and Temporal Fault Trees in the near future.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Preliminary System Safety Analysis with Limited Markov Chain Generation&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Pierre-Antoine Brameret, Jean-Marc Roussel, Antoine Rauzy&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Markov chains are powerful and versatile tool to calculate reliability indicators.However, their use is limited for two reasons: the&amp;nbsp;&lt;/span&gt;&lt;/span&gt;exponential blowup of the size of the model, and the&amp;nbsp;difficulty to design models.&amp;nbsp;To overcome this second difficulty, a solution consists in&amp;nbsp;generating automatically the Markov chain from a higher&amp;nbsp;level description, e.g. a stochastic Petri net or an&amp;nbsp;AltaRica model.&amp;nbsp;These higher level models describe the Markov chain&amp;nbsp;implicitely.
&lt;p&gt;In this article, we propose an algorithm to generate partial Markov chains. The idea is to accept a little loss of accuracy in order to reduce the size of the generated chain. The cornerstone of this method is a Relevance Factor associated to each state of the chain. This factor enables the selection of the most representative states. We show on an already published test case, that our method provides very accurate results while reducing dramatically the complexity of the assessment. It is worth noticing that the proposed method does not depend on any particular high-level modeling formalism.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;12:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Using Coloured Petri Nets for integrated reliability and safety evaluations&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Bruno Pinna, Genia Babykina, Nicolae Brinzei, Jean-Francois Petin&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Integrated Deterministic and Probabilistic Dependability&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Analysis (IDPDA) is respectively required for safety&amp;nbsp;properties verication and reliability &amp;amp; availability&amp;nbsp;assessment of critical systems. This paper presents an&amp;nbsp;approach towards IDPDA using Coloured Petri Nets (CPN).&amp;nbsp;Contributions are related to: (a) hierarchical modelling&amp;nbsp;guidelines that cover deterministic and probabilistic&amp;nbsp;features of a physical system under control, (b) coupling&amp;nbsp;Monte-Carlo simulation with CPN model checking that&amp;nbsp;requires a previous determinisation of the CPN stochastic model. Our approach is illustrated using a toy case study.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
	<entry>
		<title>Session 2: MBSA (Optimisation)</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/19-session-2"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/19-session-2</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Frank Ortmeier&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;14:00 - 16:00 Wednesday 4th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Combined Optimisation of System Architecture and Maintenance&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;:&amp;nbsp;Shawulu Hunira Nggada, Yiannis Papadopoulos, David J. Parker&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;The dependability analysis of safety-critical engineering&amp;nbsp;&lt;/span&gt;&lt;/span&gt;systems during the early stages of design helps ensure that&amp;nbsp;requirements are met and also reduces cost that may be&amp;nbsp;incurred due to modifications later in the process. One&amp;nbsp;attribute that can be analysed during the infancy of design&amp;nbsp;is scheduled preventive maintenance (PM) through&amp;nbsp;optimisation. PM is normally optimised in isolation to&amp;nbsp;other system design improvement mechanisms. It is however&amp;nbsp;helpful if PM could be optimised in combination with other&amp;nbsp;mechanisms such improving the system's architecture. By&amp;nbsp;combining these optimization objectives more design&amp;nbsp;possibilities can be simultaneously explored, therefore&amp;nbsp;helping to make better design decisions. In this paper we&amp;nbsp;explore this type of optimization by using HiP-HOPS a scalable dependability analysis and optimisation tool.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Multi-objective Architecture Optimisation Modelling for Dependable Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Zhibao Mian, Leonardo Bottaci&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;The design of dependable systems must address both cost and&amp;nbsp;&lt;/span&gt;&lt;/span&gt;dependability (i.e. safety, reliability, availability and&amp;nbsp;maintainability) concerns. For large systems, the design&amp;nbsp;space of alternatives with respect to both dependability&amp;nbsp;and cost is very large and automation is essential to&amp;nbsp;explore this space. The model-based approach to the&amp;nbsp;development and analysis of complex dependable systems is&amp;nbsp;increasingly popular and recently, the Architecture&amp;nbsp;Analysis&amp;nbsp;and Design Language (AADL) has emerged as a potential&amp;nbsp;future standard for model-based development of&amp;nbsp;dependability-critical systems. The paper tackles the&amp;nbsp;problem of describing, within an AADL model, the design&amp;nbsp;space of alternatives. A new AADL property set is proposed&amp;nbsp;for modelling component and system variability for cost and&amp;nbsp;dependability optimisation. The proposed method is&amp;nbsp;illustrated with an example of an AADL model of a safety critical embedded system.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Implementing the functional requirements for determining the optimal arrangement of a distributed charging infrastructure&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Tamás Kurczveil, Eckehard Schnieder&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;The optimized operation of future traffic by intelligent&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;control systems will need to take into account boundary&amp;nbsp;conditions that arise from alternative drive concepts. New&amp;nbsp;challenges will need to be mastered when it comes to&amp;nbsp;corresponding energy systems, control of operations, and&amp;nbsp;communication interfaces, such as needed for the sufficient&amp;nbsp;energy supply of traffic participants. However, they will&amp;nbsp;need to be conformed to existing systems, technologies, and&amp;nbsp;infrastructure to allow the common operation and&amp;nbsp;positioning of charging elements with minimum interference&amp;nbsp;between different modes of transport. Funded by the German&amp;nbsp;Federal Ministry of Transport, Building and Urban&amp;nbsp;Development (Bundesministerium für Verkehr, Bau und&amp;nbsp;Stadtentwicklung) the project emil (Elektromobilität&amp;nbsp;mittels induktiver Ladung - electric mobility via inductive&amp;nbsp;charging) will integrate an inductive vehicle charging&amp;nbsp;system and a compatible prototype bus fleet into&amp;nbsp;Braunschweig's traffic infrastructure. This paper describes&amp;nbsp;the methodic approach and the implementation of functional&amp;nbsp;requirements in a traffic simulation tool that are required&amp;nbsp;for an evaluation of future urban road traffic with an&amp;nbsp;increased rate of electric vehicles. The modifications can&amp;nbsp;subsequently be used to determine the optimal placement of&amp;nbsp;the corresponding charging infrastructure with&amp;nbsp;consideration of conventional traffic demand.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Integrated Monitoring Tasks for the Safety of Critical Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Amer Dheedan, Ajith Kumar Parlikad&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;Nuclear power plants, chemical processes and means of&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;transportation are seen as critical systems, the failure of&amp;nbsp;which may hazard lives and assets. Thus, the safety of such&amp;nbsp;systems is rigorously considered and established during the&amp;nbsp;design and operational stages. In the design stage, an&amp;nbsp;off-line safety analysis investigates, retrofits and&amp;nbsp;affixes whenever necessary fault-tolerant means and&amp;nbsp;reliable components. In the operational stage, the&amp;nbsp;functionality of systems is monitored through the delivery&amp;nbsp;of three safety tasks: fault detection and diagnosis, alarm&amp;nbsp;annunciation and fault controlling. However, systems still&amp;nbsp;showing malfunctions and hazardous failures continue to be&amp;nbsp;recorded. To address this issue, this paper develops a&amp;nbsp;distributed on-line safety monitor. The monitor aims to&amp;nbsp;achieve an effective integration among the delivery of the&amp;nbsp;three safety tasks through the exploitation of the thorough&amp;nbsp;and cost-effective abstraction of the off-line safety&amp;nbsp;analysis and the distributed reasoning of a multi-agent system.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Frank Ortmeier&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;14:00 - 16:00 Wednesday 4th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Combined Optimisation of System Architecture and Maintenance&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;:&amp;nbsp;Shawulu Hunira Nggada, Yiannis Papadopoulos, David J. Parker&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;The dependability analysis of safety-critical engineering&amp;nbsp;&lt;/span&gt;&lt;/span&gt;systems during the early stages of design helps ensure that&amp;nbsp;requirements are met and also reduces cost that may be&amp;nbsp;incurred due to modifications later in the process. One&amp;nbsp;attribute that can be analysed during the infancy of design&amp;nbsp;is scheduled preventive maintenance (PM) through&amp;nbsp;optimisation. PM is normally optimised in isolation to&amp;nbsp;other system design improvement mechanisms. It is however&amp;nbsp;helpful if PM could be optimised in combination with other&amp;nbsp;mechanisms such improving the system's architecture. By&amp;nbsp;combining these optimization objectives more design&amp;nbsp;possibilities can be simultaneously explored, therefore&amp;nbsp;helping to make better design decisions. In this paper we&amp;nbsp;explore this type of optimization by using HiP-HOPS a scalable dependability analysis and optimisation tool.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Multi-objective Architecture Optimisation Modelling for Dependable Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Zhibao Mian, Leonardo Bottaci&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;The design of dependable systems must address both cost and&amp;nbsp;&lt;/span&gt;&lt;/span&gt;dependability (i.e. safety, reliability, availability and&amp;nbsp;maintainability) concerns. For large systems, the design&amp;nbsp;space of alternatives with respect to both dependability&amp;nbsp;and cost is very large and automation is essential to&amp;nbsp;explore this space. The model-based approach to the&amp;nbsp;development and analysis of complex dependable systems is&amp;nbsp;increasingly popular and recently, the Architecture&amp;nbsp;Analysis&amp;nbsp;and Design Language (AADL) has emerged as a potential&amp;nbsp;future standard for model-based development of&amp;nbsp;dependability-critical systems. The paper tackles the&amp;nbsp;problem of describing, within an AADL model, the design&amp;nbsp;space of alternatives. A new AADL property set is proposed&amp;nbsp;for modelling component and system variability for cost and&amp;nbsp;dependability optimisation. The proposed method is&amp;nbsp;illustrated with an example of an AADL model of a safety critical embedded system.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Implementing the functional requirements for determining the optimal arrangement of a distributed charging infrastructure&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Tamás Kurczveil, Eckehard Schnieder&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;The optimized operation of future traffic by intelligent&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;control systems will need to take into account boundary&amp;nbsp;conditions that arise from alternative drive concepts. New&amp;nbsp;challenges will need to be mastered when it comes to&amp;nbsp;corresponding energy systems, control of operations, and&amp;nbsp;communication interfaces, such as needed for the sufficient&amp;nbsp;energy supply of traffic participants. However, they will&amp;nbsp;need to be conformed to existing systems, technologies, and&amp;nbsp;infrastructure to allow the common operation and&amp;nbsp;positioning of charging elements with minimum interference&amp;nbsp;between different modes of transport. Funded by the German&amp;nbsp;Federal Ministry of Transport, Building and Urban&amp;nbsp;Development (Bundesministerium für Verkehr, Bau und&amp;nbsp;Stadtentwicklung) the project emil (Elektromobilität&amp;nbsp;mittels induktiver Ladung - electric mobility via inductive&amp;nbsp;charging) will integrate an inductive vehicle charging&amp;nbsp;system and a compatible prototype bus fleet into&amp;nbsp;Braunschweig's traffic infrastructure. This paper describes&amp;nbsp;the methodic approach and the implementation of functional&amp;nbsp;requirements in a traffic simulation tool that are required&amp;nbsp;for an evaluation of future urban road traffic with an&amp;nbsp;increased rate of electric vehicles. The modifications can&amp;nbsp;subsequently be used to determine the optimal placement of&amp;nbsp;the corresponding charging infrastructure with&amp;nbsp;consideration of conventional traffic demand.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Integrated Monitoring Tasks for the Safety of Critical Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Amer Dheedan, Ajith Kumar Parlikad&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;Nuclear power plants, chemical processes and means of&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;transportation are seen as critical systems, the failure of&amp;nbsp;which may hazard lives and assets. Thus, the safety of such&amp;nbsp;systems is rigorously considered and established during the&amp;nbsp;design and operational stages. In the design stage, an&amp;nbsp;off-line safety analysis investigates, retrofits and&amp;nbsp;affixes whenever necessary fault-tolerant means and&amp;nbsp;reliable components. In the operational stage, the&amp;nbsp;functionality of systems is monitored through the delivery&amp;nbsp;of three safety tasks: fault detection and diagnosis, alarm&amp;nbsp;annunciation and fault controlling. However, systems still&amp;nbsp;showing malfunctions and hazardous failures continue to be&amp;nbsp;recorded. To address this issue, this paper develops a&amp;nbsp;distributed on-line safety monitor. The monitor aims to&amp;nbsp;achieve an effective integration among the delivery of the&amp;nbsp;three safety tasks through the exploitation of the thorough&amp;nbsp;and cost-effective abstraction of the off-line safety&amp;nbsp;analysis and the distributed reasoning of a multi-agent system.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
	<entry>
		<title>Session 3: DES Control</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/20-session-3"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/20-session-3</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Klaus Schmidt&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;16:30 - 18:00 Wednesday 4th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;16:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Fault-Hiding Control Reconfiguration for a Class of Discrete Event Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;:&amp;nbsp;Thomas Wittmann, Jan Richter, Thomas Moor&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;Fault-hiding control reconfiguration aims at hiding a fault from the nominal controller, so that the closed-loop system subject to faults complies as well as possible with the nominal design requirements. This is achieved by suitably influencing the signals between nominal controller and faulty plant using a reconfiguration block. In discrete event systems, the reconfiguration block needs to convert plant events to controller events, and vice versa, such that the self-reconfiguring closed-loop system is non-conflicting, complete, controllable and conforms with the design specifications. In this paper, we discuss the resulting control architecture, state our reconfiguration problem and address the synthesis of discrete event dynamic reconfiguration blocks. To illustrate our results, we provide a running example.&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;17:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Synthesizing bounded-delay communication protocols for decentralized discrete-event systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;John Daniel Maguire, Laurie Ricker&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;A strategy for synthesizing communication protocols for a given upper-bounded delay d is proposed. Although the strategy is illustrated for the decentralized control domain, it is straightforward to adapt this strategy to decentralized diagnosis and prognosis. Previous work in the control domain has examined circumstances when all observations are communicated, under conditions of bounded delay, as well as determining whether or not a synchronous communication protocol is robust w.r.t. a given bounded delay. We are interested, without resorting to fully timed models, in the direct synthesis of communication protocols for a given upper-bounded delay [0,d].&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;17:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Algebraic Synthesis for Online Adaptation of Dependable Discrete Control Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Christian Hillmann, Olaf Stursberg&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;Common practice in industrial design of discrete controllers as well as in most synthesis procedures advocated for discrete control in academia is to create the control logic and to transfer it into a PLC language before start-up. Changes in the operational constraints of the controlled process (e.g. of available resources, nominal set-points, occurrences of failures) have to be accounted for by dedicated alternative routines, i.e. dependability is restricted to variations which are envisaged during design. In contrast, the approach proposed in this paper operates online on an uncontrolled model process model to compute a control strategy that is adapted to the current set of constraints. By using algebraic computations largely resembling techniques for discrete-time continuous-valued controllers, a perceived process variation (including newly defined control-goals) are first assessed with respect to the existence of a feasible successful control strategy, before such a dependable strategy is computed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Klaus Schmidt&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;16:30 - 18:00 Wednesday 4th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;16:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Fault-Hiding Control Reconfiguration for a Class of Discrete Event Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;:&amp;nbsp;Thomas Wittmann, Jan Richter, Thomas Moor&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;Fault-hiding control reconfiguration aims at hiding a fault from the nominal controller, so that the closed-loop system subject to faults complies as well as possible with the nominal design requirements. This is achieved by suitably influencing the signals between nominal controller and faulty plant using a reconfiguration block. In discrete event systems, the reconfiguration block needs to convert plant events to controller events, and vice versa, such that the self-reconfiguring closed-loop system is non-conflicting, complete, controllable and conforms with the design specifications. In this paper, we discuss the resulting control architecture, state our reconfiguration problem and address the synthesis of discrete event dynamic reconfiguration blocks. To illustrate our results, we provide a running example.&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;17:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Synthesizing bounded-delay communication protocols for decentralized discrete-event systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;John Daniel Maguire, Laurie Ricker&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;A strategy for synthesizing communication protocols for a given upper-bounded delay d is proposed. Although the strategy is illustrated for the decentralized control domain, it is straightforward to adapt this strategy to decentralized diagnosis and prognosis. Previous work in the control domain has examined circumstances when all observations are communicated, under conditions of bounded delay, as well as determining whether or not a synchronous communication protocol is robust w.r.t. a given bounded delay. We are interested, without resorting to fully timed models, in the direct synthesis of communication protocols for a given upper-bounded delay [0,d].&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;17:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Algebraic Synthesis for Online Adaptation of Dependable Discrete Control Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Christian Hillmann, Olaf Stursberg&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;Common practice in industrial design of discrete controllers as well as in most synthesis procedures advocated for discrete control in academia is to create the control logic and to transfer it into a PLC language before start-up. Changes in the operational constraints of the controlled process (e.g. of available resources, nominal set-points, occurrences of failures) have to be accounted for by dedicated alternative routines, i.e. dependability is restricted to variations which are envisaged during design. In contrast, the approach proposed in this paper operates online on an uncontrolled model process model to compute a control strategy that is adapted to the current set of constraints. By using algebraic computations largely resembling techniques for discrete-time continuous-valued controllers, a perceived process variation (including newly defined control-goals) are first assessed with respect to the existence of a feasible successful control strategy, before such a dependable strategy is computed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
	<entry>
		<title>Session 4: DES Diagnosis</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/21-session-4"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/21-session-4</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;Session chair: Jose Cury&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;10:30 - 12:30 Thursday 5th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;10:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Conjunctive Decentralized Diagnosis of Discrete Event Systems&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;: Takashi Yamamoto, Shigemasa Takai&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; In this paper, we study conjunctive decentralized diagnosis of discrete event systems. A notion of conjunctive codiagnosability which guarantees that any failure is detected by a conjunctive decentralized diagnoser within a uniformly bounded number of steps has been defined in literature. However, the existing condition for the system not to be conjunctively codiagnosable is sufficient but not necessary. Motivated by this fact, we propose a new algorithm for verifying conjunctive codiagnosability based on a necessary and sufficient condition for the system not to be conjunctively codiagnosable. To construct a conjunctive decentralized diagnoser for a conjunctively codiagnosable system, we need to compute the delay bound. We show how to compute the delay bound.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Supervision Patterns: Formal Diagnosability Checking by Petri Net Unfolding &lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Houssam-Eddine Gougam, Audine Subias, Y. Pencolé&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; This paper addresses the problem of checking diagnosability of supervision patterns in discrete-event systems. With a supervision pattern, it is possible to represent a complex behavior of the system, and especially a faulty behavior. As opposed to classical diagnosability analyzers that check by exploring the marking graph of the underlying net, the proposed method relies on Petri net unfoldings and thus avoids the combinatorial explosion induced by the use of marking graphs. The method is an adaptation of the twin-plant method to net unfolding: a pattern is diagnosable if the unfolding representing the twin-plant does not implicitly contain infinite sequences of events that are ambiguous.&lt;/span&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Active Diagnosis of Deterministic I/O Automata&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Melanie Schmidt, Jan Lunze&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; A method for the active fault diagnosis of systems modeled by sets of deterministic input/output automata is presented, where each automaton describes the behavior of the system subject to a different fault. It is shown that the system is diagnosable if and only if there are no equivalent states in different automata. An active diagnostic algorithm is presented, which generates adequate input sequences for the system and evaluates the outputs of the system in order to identify the present fault. The applicability of the developed method is demonstrated by means of an example.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;12:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;A Discrete Time Consensus Approach for Fault Detection and Recovery in Unreliable Networks&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Maria Pia Fanti, Agostino Marcello Mangini, Walter Ukovich&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; In this paper we address the problem of the fault detection and recovery in networks of agents with discrete time dynamics. In particular, we apply a fault detection and recovery approach, proposed for the standard linear consensus protocol, to a consensus algorithm that has been previously presented by the authors and is based on a triangular splitting of the iteration matrix of the standard consensus algorithm. Moreover, we show that for a particular topology of the communication graph the fault recovery strategy can be implemented by the agents in a fully decentralized and autonomous approach. An example describes how in the considered framework the fault recovery is implemented by each agent.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;Session chair: Jose Cury&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;10:30 - 12:30 Thursday 5th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;10:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Conjunctive Decentralized Diagnosis of Discrete Event Systems&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;: Takashi Yamamoto, Shigemasa Takai&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; In this paper, we study conjunctive decentralized diagnosis of discrete event systems. A notion of conjunctive codiagnosability which guarantees that any failure is detected by a conjunctive decentralized diagnoser within a uniformly bounded number of steps has been defined in literature. However, the existing condition for the system not to be conjunctively codiagnosable is sufficient but not necessary. Motivated by this fact, we propose a new algorithm for verifying conjunctive codiagnosability based on a necessary and sufficient condition for the system not to be conjunctively codiagnosable. To construct a conjunctive decentralized diagnoser for a conjunctively codiagnosable system, we need to compute the delay bound. We show how to compute the delay bound.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Supervision Patterns: Formal Diagnosability Checking by Petri Net Unfolding &lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Houssam-Eddine Gougam, Audine Subias, Y. Pencolé&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; This paper addresses the problem of checking diagnosability of supervision patterns in discrete-event systems. With a supervision pattern, it is possible to represent a complex behavior of the system, and especially a faulty behavior. As opposed to classical diagnosability analyzers that check by exploring the marking graph of the underlying net, the proposed method relies on Petri net unfoldings and thus avoids the combinatorial explosion induced by the use of marking graphs. The method is an adaptation of the twin-plant method to net unfolding: a pattern is diagnosable if the unfolding representing the twin-plant does not implicitly contain infinite sequences of events that are ambiguous.&lt;/span&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Active Diagnosis of Deterministic I/O Automata&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Melanie Schmidt, Jan Lunze&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; A method for the active fault diagnosis of systems modeled by sets of deterministic input/output automata is presented, where each automaton describes the behavior of the system subject to a different fault. It is shown that the system is diagnosable if and only if there are no equivalent states in different automata. An active diagnostic algorithm is presented, which generates adequate input sequences for the system and evaluates the outputs of the system in order to identify the present fault. The applicability of the developed method is demonstrated by means of an example.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;12:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;A Discrete Time Consensus Approach for Fault Detection and Recovery in Unreliable Networks&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Maria Pia Fanti, Agostino Marcello Mangini, Walter Ukovich&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; In this paper we address the problem of the fault detection and recovery in networks of agents with discrete time dynamics. In particular, we apply a fault detection and recovery approach, proposed for the standard linear consensus protocol, to a consensus algorithm that has been previously presented by the authors and is based on a triangular splitting of the iteration matrix of the standard consensus algorithm. Moreover, we show that for a particular topology of the communication graph the fault recovery strategy can be implemented by the agents in a fully decentralized and autonomous approach. An example describes how in the considered framework the fault recovery is implemented by each agent.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
	<entry>
		<title>Session 5: Application</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/22-session-5"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/22-session-5</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Jean-Marc Roussel&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;14:00 - 16:00 Thursday 5th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Systems Modeling with EAST-ADL for Fault Tree Analysis through HiP-HOPS&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;:&amp;nbsp;DeJiu Chen, Nidhal Mahmud, Martin Walker, Lei Feng, Henrik Lonn, Yiannis Papadopoulos&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;EAST-ADL is a domain-specific modeling framework with methodology and language support for the engineering of automotive embedded systems. In regard to functional safety, it aims to provide the maximum possible support for ISO 26262 so that all safety related information can be consolidated seamlessly in a common system model together with the requirements specification. This paper describes the EAST-ADL support for the modeling of plausible error behaviors as an orthogonal system view. We introduce in particular an integration of such EAST-ADL models with the HiP-HOPS method for automated temporal fault tree analysis.&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Boolean and Modular Abstractions for Programmable Logic Controllers&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Sebastian Biallas, Dimitri Bohlender, Stefan Kowalewski&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;This paper introduces a Boolean and a modular abstraction of programs for programmable logic controllers in order to make them amenable for formal verification. In the Boolean abstraction, complex control-flow conditions are replaced by fresh Boolean input variables to defer the evaluation of such conditions. The modular abstraction replaces function block calls by so-called function block summaries, which over-approximate their possible return values. Both abstractions can subsequently be refined in an automatic process to allow for checking of complex programs using expressive formulae. The approach has been implemented in the Arcade.PLC model checker, which is used to show the effectiveness in a case-study.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;An Analytic Expression of the Reliability of Transmissions in Fieldbuses with Propagated Failures&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Damien aza-vallina, Jean-Marc Faure&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;This paper shows first that the behaviour of a fieldbus whose terminals can be represented by multi-state components with propagated failures may be described by a set of connected mode automata; the input and output flows of these automata represent either data exchanges or failure propagations. A method to obtain an analytic expression of the reliability of a transmission between two terminals from this model is then proposed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;On Formal Verification of Function Block Applications in Safety-related Software Development&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Doaa Soliman, Georg Frey, Kleanthis Thramboulidis&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;The realization of application software, which is a part of a safety-related system (SRS), is a challenging engineering task due to the necessary verification activities. To assure that safety-related systems will offer the necessary risk reduction required to achieve safety, the IEC 61508 standard software safety lifecycle requirements. The standard specifies verification activities associated with all the development phases. In this paper, the verification activity of the safety application code against the model design is presented. To this end, the code, which is implemented according to IEC 61131-3 programming standard and PLCopen specification, is automatically transformed to Uppaal formal models using a software tool called SA2TA (Safety Application to Timed Automata). Moreover, to automate the validation of the transformed formal model, another tool called TCG (Test Case Generator) is presented. The method is demonstrated using a case study. The main contribution of this paper is the formalization approach of the application software responsibilities in TCTL (Time Computational Temporal Logic).&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Jean-Marc Roussel&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;14:00 - 16:00 Thursday 5th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Systems Modeling with EAST-ADL for Fault Tree Analysis through HiP-HOPS&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;:&amp;nbsp;DeJiu Chen, Nidhal Mahmud, Martin Walker, Lei Feng, Henrik Lonn, Yiannis Papadopoulos&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;EAST-ADL is a domain-specific modeling framework with methodology and language support for the engineering of automotive embedded systems. In regard to functional safety, it aims to provide the maximum possible support for ISO 26262 so that all safety related information can be consolidated seamlessly in a common system model together with the requirements specification. This paper describes the EAST-ADL support for the modeling of plausible error behaviors as an orthogonal system view. We introduce in particular an integration of such EAST-ADL models with the HiP-HOPS method for automated temporal fault tree analysis.&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Boolean and Modular Abstractions for Programmable Logic Controllers&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Sebastian Biallas, Dimitri Bohlender, Stefan Kowalewski&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;This paper introduces a Boolean and a modular abstraction of programs for programmable logic controllers in order to make them amenable for formal verification. In the Boolean abstraction, complex control-flow conditions are replaced by fresh Boolean input variables to defer the evaluation of such conditions. The modular abstraction replaces function block calls by so-called function block summaries, which over-approximate their possible return values. Both abstractions can subsequently be refined in an automatic process to allow for checking of complex programs using expressive formulae. The approach has been implemented in the Arcade.PLC model checker, which is used to show the effectiveness in a case-study.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;An Analytic Expression of the Reliability of Transmissions in Fieldbuses with Propagated Failures&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Damien aza-vallina, Jean-Marc Faure&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;This paper shows first that the behaviour of a fieldbus whose terminals can be represented by multi-state components with propagated failures may be described by a set of connected mode automata; the input and output flows of these automata represent either data exchanges or failure propagations. A method to obtain an analytic expression of the reliability of a transmission between two terminals from this model is then proposed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;On Formal Verification of Function Block Applications in Safety-related Software Development&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Doaa Soliman, Georg Frey, Kleanthis Thramboulidis&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;The realization of application software, which is a part of a safety-related system (SRS), is a challenging engineering task due to the necessary verification activities. To assure that safety-related systems will offer the necessary risk reduction required to achieve safety, the IEC 61508 standard software safety lifecycle requirements. The standard specifies verification activities associated with all the development phases. In this paper, the verification activity of the safety application code against the model design is presented. To this end, the code, which is implemented according to IEC 61131-3 programming standard and PLCopen specification, is automatically transformed to Uppaal formal models using a software tool called SA2TA (Safety Application to Timed Automata). Moreover, to automate the validation of the transformed formal model, another tool called TCG (Test Case Generator) is presented. The method is demonstrated using a case study. The main contribution of this paper is the formalization approach of the application software responsibilities in TCTL (Time Computational Temporal Logic).&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
	<entry>
		<title>Session 6: DES Control</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/23-session-6"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/23-session-6</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Maria Pia Fanti&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;16:30 - 18:00 Thursday 5th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;16:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Computation of Fault-Tolerant Supervisors for Discrete Event Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Ayse Nur Sulek, Klaus Schmidt&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;Fault-tolerance addresses the problem of operating a system even in case of faults. In this paper, we study fault-tolerance in the supervisory control framework for discrete event systems (DES). We consider DES, where certain events might no longer be possible in case a fault happens. In this setting, we first identify necessary and sufficient conditions for the existence of a supervisor that realizes a given behavioral specification both in the non-faulty and in the faulty case. We further show that it is possible to determine a supremal fault-tolerant sublanguage in case the existence condition is violated. Finally, we propose an algorithm for the computation of this sublanguage and prove its correctness. Different from existing work, our fault-tolerant supervisor allows fault occurrences and system repairs at any time. The concepts and results developed in this paper are illustrated by a manufacturing system example.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;17:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Heuristic Search of Supervisors by Approximated Distinguishers&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Raquel Stella Silva Aguiar, Antonio Eduardo Carrilho da Cunha, Jose E. R. Cury, Max H. de Queiroz&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;The use of distinguishers was introduced for Supervisory Control Theory (SCT) in order to simplify the task of modeling specications, while guaranteeing the synthesis of maximally permissive supervisors. On the other hand, by approximating the language of a distinguisher, a supervisor can be obtained with computational savings in the synthesis, although there is no guarantee that this is the maximally permissive solution. The main purpose of this work is to propose a procedure to obtain the least restrictive achievable supervisor, in the context of approximations in the SCT with distinguishers. The procedure consists of a heuristic search for the supervisor with the highest language measure in the space formed by supervisors obtained using approximated distinguishers. A search procedure based in Genetic Algorithms was implemented and a case study illustrates the results of the method.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Maria Pia Fanti&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;16:30 - 18:00 Thursday 5th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;16:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Computation of Fault-Tolerant Supervisors for Discrete Event Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Ayse Nur Sulek, Klaus Schmidt&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;Fault-tolerance addresses the problem of operating a system even in case of faults. In this paper, we study fault-tolerance in the supervisory control framework for discrete event systems (DES). We consider DES, where certain events might no longer be possible in case a fault happens. In this setting, we first identify necessary and sufficient conditions for the existence of a supervisor that realizes a given behavioral specification both in the non-faulty and in the faulty case. We further show that it is possible to determine a supremal fault-tolerant sublanguage in case the existence condition is violated. Finally, we propose an algorithm for the computation of this sublanguage and prove its correctness. Different from existing work, our fault-tolerant supervisor allows fault occurrences and system repairs at any time. The concepts and results developed in this paper are illustrated by a manufacturing system example.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;17:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Heuristic Search of Supervisors by Approximated Distinguishers&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Raquel Stella Silva Aguiar, Antonio Eduardo Carrilho da Cunha, Jose E. R. Cury, Max H. de Queiroz&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;The use of distinguishers was introduced for Supervisory Control Theory (SCT) in order to simplify the task of modeling specications, while guaranteeing the synthesis of maximally permissive supervisors. On the other hand, by approximating the language of a distinguisher, a supervisor can be obtained with computational savings in the synthesis, although there is no guarantee that this is the maximally permissive solution. The main purpose of this work is to propose a procedure to obtain the least restrictive achievable supervisor, in the context of approximations in the SCT with distinguishers. The procedure consists of a heuristic search for the supervisor with the highest language measure in the space formed by supervisors obtained using approximated distinguishers. A search procedure based in Genetic Algorithms was implemented and a case study illustrates the results of the method.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
	<entry>
		<title>Session 7: MBSA</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/24-session-7"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/24-session-7</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;Session chair: Jean-Marc Faure&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;10:30 - 12:30 Friday 6th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;10:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;The AltaRica 3.0 Project for Model-Based Safety Assessment&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;: Tatiana Prosvirnova, Michel Batteux, Pierre-Antoine Brameret, Leïla Kloul, Abraham Cherfi, Thomas Friedlhuber, Antoine Rauzy&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; The aim of this article is to present the AltaRica 3.0 project. &quot;Traditional&quot; risk modeling formalisms (e.g. Fault Trees, Markov Processes, etc.) are well mastered by safety analysts. Efficient assessment algorithms and tools are available. However, models designed with these formalisms are far from the specifications of the systems under study. They are consequently hard to design and to maintain throughout the life cycle of systems. The high-level modeling language AltaRica has been created to tackle this problem. The objective of the AltaRica 3.0 project is to design a new version of AltaRica and to develop a complete set of authoring and assessment tools for this new version of the language. AltaRica 3.0 improves significantly the expressive power of AltaRica Data-Flow without decreasing the efficiency of assessment algorithms. Prototypes of a compiler to Fault Trees, a compiler to Markov chains, a stochastic and a stepwise simulators have been already developed. Other tools are under specification or implementation.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;A methodology for qualitative/quantitative analysis of weighted attack trees&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; A. Bobbio, Lavinia Egidi, Roberta Terruggia&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Attack and Defense Trees (ADT) constitute a formal modeling technique that has become dominant in recent years in the area of qualitative and quantitative cybersecurity analysis of ICT and digital control systems. A Weighted-ADT (WADT) is augmented with cost or impact attributes to evidence the most convenient attack sequence in term of investment budget and provoked damage and provide an indication on how to mitigate the located breaches by means of suitable countermeasures. The original analysis technique proposed in this paper, is based on the representation of a WADT by means of an extension of Binary Decision Diagrams (BDD), called Multi Terminal Binary Decision Diagrams (MTBDD). MTBDDs allow the modeler to evaluate the probability distribution function of the cost and impact related to any possible attack scenario. A running example illustrates the methodology.&lt;/span&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Engineering Conditional Safety Certificates for Open Adaptive Systems&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Daniel Schneider, Mario Trapp&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; In recent years, we have witnessed a strong trend towards more openness and adaptivity in many application domains of computer-based systems. In this context, the assurance of a sufficient level of safety poses serious challenges because traditional engineering and assurance approaches are usually not applicable without further ado. In order to meet these challenges, we recently introduced a framework that enables runtime safety certification based on conditional safety certificates (ConSerts). Since the definition of ConSerts relies on an adequate safety engineering backbone, we now present an engineering approach for defining ConSerts based on established safety engineering processes and techniques. The presented approach has been evaluated in an industry project in form of a feasibility study in the agricultural domain.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;12:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;An Interdisciplinary Perspective to the Design and Development of Integral Safety Systems&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Christian Berger, Panagiotis Katsaros, Mahdi Bohlouli, Lefteris Angelis&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Next generation integral safety systems are expected to provide better protection against traffic accidents by interlinking sensors and actuators of active and passive safety. A series of advanced functions will be used to mitigate collisions and if they cannot be avoided they will at least reduce their severity. We explore the interplay between key technology areas towards a holistic approach in the design of integral safety systems. First, we refer to the main problems in the design of effective systems and the associated software engineering challenges. Recent advances in sensor data analytics are then explored and their integration with decision support for vehicle control is examined. Finally, we envision that rigorous design techniques are essential for achieving adequate performance and robustness of integral safety systems, but appropriate human-machine interaction models will have to be taken into account.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;Session chair: Jean-Marc Faure&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;10:30 - 12:30 Friday 6th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;10:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;The AltaRica 3.0 Project for Model-Based Safety Assessment&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;: Tatiana Prosvirnova, Michel Batteux, Pierre-Antoine Brameret, Leïla Kloul, Abraham Cherfi, Thomas Friedlhuber, Antoine Rauzy&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; The aim of this article is to present the AltaRica 3.0 project. &quot;Traditional&quot; risk modeling formalisms (e.g. Fault Trees, Markov Processes, etc.) are well mastered by safety analysts. Efficient assessment algorithms and tools are available. However, models designed with these formalisms are far from the specifications of the systems under study. They are consequently hard to design and to maintain throughout the life cycle of systems. The high-level modeling language AltaRica has been created to tackle this problem. The objective of the AltaRica 3.0 project is to design a new version of AltaRica and to develop a complete set of authoring and assessment tools for this new version of the language. AltaRica 3.0 improves significantly the expressive power of AltaRica Data-Flow without decreasing the efficiency of assessment algorithms. Prototypes of a compiler to Fault Trees, a compiler to Markov chains, a stochastic and a stepwise simulators have been already developed. Other tools are under specification or implementation.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;A methodology for qualitative/quantitative analysis of weighted attack trees&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; A. Bobbio, Lavinia Egidi, Roberta Terruggia&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Attack and Defense Trees (ADT) constitute a formal modeling technique that has become dominant in recent years in the area of qualitative and quantitative cybersecurity analysis of ICT and digital control systems. A Weighted-ADT (WADT) is augmented with cost or impact attributes to evidence the most convenient attack sequence in term of investment budget and provoked damage and provide an indication on how to mitigate the located breaches by means of suitable countermeasures. The original analysis technique proposed in this paper, is based on the representation of a WADT by means of an extension of Binary Decision Diagrams (BDD), called Multi Terminal Binary Decision Diagrams (MTBDD). MTBDDs allow the modeler to evaluate the probability distribution function of the cost and impact related to any possible attack scenario. A running example illustrates the methodology.&lt;/span&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;11:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;Engineering Conditional Safety Certificates for Open Adaptive Systems&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Daniel Schneider, Mario Trapp&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: justify; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; In recent years, we have witnessed a strong trend towards more openness and adaptivity in many application domains of computer-based systems. In this context, the assurance of a sufficient level of safety poses serious challenges because traditional engineering and assurance approaches are usually not applicable without further ado. In order to meet these challenges, we recently introduced a framework that enables runtime safety certification based on conditional safety certificates (ConSerts). Since the definition of ConSerts relies on an adequate safety engineering backbone, we now present an engineering approach for defining ConSerts based on established safety engineering processes and techniques. The presented approach has been evaluated in an industry project in form of a feasibility study in the agricultural domain.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;12:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;An Interdisciplinary Perspective to the Design and Development of Integral Safety Systems&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt; Christian Berger, Panagiotis Katsaros, Mahdi Bohlouli, Lefteris Angelis&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: justify; padding: 5px;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; Next generation integral safety systems are expected to provide better protection against traffic accidents by interlinking sensors and actuators of active and passive safety. A series of advanced functions will be used to mitigate collisions and if they cannot be avoided they will at least reduce their severity. We explore the interplay between key technology areas towards a holistic approach in the design of integral safety systems. First, we refer to the main problems in the design of effective systems and the associated software engineering challenges. Recent advances in sensor data analytics are then explored and their integration with decision support for vehicle control is examined. Finally, we envision that rigorous design techniques are essential for achieving adequate performance and robustness of integral safety systems, but appropriate human-machine interaction models will have to be taken into account.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
	<entry>
		<title>Session 8: DES Control</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/25-session-8"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/25-session-8</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Tim Kelly&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;14:00 - 15:30 Friday 6th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Discrete Control for Reconfigurable FPGA-based Embedded Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;:&amp;nbsp;Xin An, Eric Rutten, jean-philippe diguet, Nicolas Le Griguer, Abdoulaye Gamatie&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;This work presents an application of discrete controller synthesis (DCS) techniques to a class of dynamically reconfigurable embedded computing systems, and contributes to the general approach of control for feedback computing. We propose a general model for applications defined as data-flow graphs of computing tasks, and target execution architectures that are dynamically partially reconfigurable Field Programmable Gate Arrays (FPGAs). We define our model in terms of parallel automata. Then, we encode relevant scheduling and control requirements in terms of a DCS problem w.r.t. multiple constraints and objectives. We take into account the system reconfiguration overhead, and the resulting controller is able to make decisions by foreseeing their impact on future requests. We validate our approach by using the BZR programming language and Sigali tool for modelling and simulations, with a video processing system implementation on a specific FPGA platform.&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Abstraction-based Supervisory Control for Reconfigurable Manufacturing Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Harith M. Khalid, Mustafa Sancay Kirik, Klaus Schmidt&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;Reconfiguration control for discrete event systems (DES) is concerned with the realization of different system configurations by modification of the supervisory control loop. In this paper, we study the reconfiguration supervisor design for reconfigurable manufacturing systems (RMS) that comprise multiple components. We construct a modular supervisor for each configuration and system component in order to realize each active configuration and to quickly change between configurations. Different from the existing literature that is focused on monolithic design, our method is abstraction-based, and, hence applicable to large-scale DES.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;State-Stability Analysis of Discrete Event Systems using Petri-net Branching Processes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Alberto Lutz-Ley, Ernesto Lopez-Mellado&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;This paper studies fault tolerance of concurrent discrete event systems (DESs) through the stability analysis of Interpreted Petri nets (IPN) models. An efficient method for determining state stability of safe IPN models is proposed. The method is based on the analysis of the sequentially secure branching process of the DES model, which is a finite representation of a PN unfolding: a sufficient condition for stability and an algorithm for deciding the property are presented.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: center;&quot;&gt;Session chair: Tim Kelly&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;14:00 - 15:30 Friday 6th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Discrete Control for Reconfigurable FPGA-based Embedded Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors&lt;/strong&gt;:&amp;nbsp;Xin An, Eric Rutten, jean-philippe diguet, Nicolas Le Griguer, Abdoulaye Gamatie&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 600px; padding: 5px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;This work presents an application of discrete controller synthesis (DCS) techniques to a class of dynamically reconfigurable embedded computing systems, and contributes to the general approach of control for feedback computing. We propose a general model for applications defined as data-flow graphs of computing tasks, and target execution architectures that are dynamically partially reconfigurable Field Programmable Gate Arrays (FPGAs). We define our model in terms of parallel automata. Then, we encode relevant scheduling and control requirements in terms of a DCS problem w.r.t. multiple constraints and objectives. We take into account the system reconfiguration overhead, and the resulting controller is able to make decisions by foreseeing their impact on future requests. We validate our approach by using the BZR programming language and Sigali tool for modelling and simulations, with a video processing system implementation on a specific FPGA platform.&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;14:30&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;Abstraction-based Supervisory Control for Reconfigurable Manufacturing Systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Harith M. Khalid, Mustafa Sancay Kirik, Klaus Schmidt&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&amp;nbsp;&lt;/strong&gt;Reconfiguration control for discrete event systems (DES) is concerned with the realization of different system configurations by modification of the supervisory control loop. In this paper, we study the reconfiguration supervisor design for reconfigurable manufacturing systems (RMS) that comprise multiple components. We construct a modular supervisor for each configuration and system component in order to realize each active configuration and to quickly change between configurations. Different from the existing literature that is focused on monolithic design, our method is abstraction-based, and, hence applicable to large-scale DES.&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;15:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; padding: 5px; background-color: #e1bbf7;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong&gt;State-Stability Analysis of Discrete Event Systems using Petri-net Branching Processes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; text-align: left; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Authors:&lt;/strong&gt;&amp;nbsp;Alberto Lutz-Ley, Ernesto Lopez-Mellado&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: justify;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&amp;nbsp;This paper studies fault tolerance of concurrent discrete event systems (DESs) through the stability analysis of Interpreted Petri nets (IPN) models. An efficient method for determining state stability of safe IPN models is proposed. The method is based on the analysis of the sequentially secure branching process of the DES model, which is a finite representation of a PN unfolding: a sufficient condition for stability and an algorithm for deciding the property are presented.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
	<entry>
		<title>Invited Speaker</title>
		<link rel="alternate" type="text/html" href="http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/26-invitedspeaker"/>
		<published>2013-06-20T10:08:30+00:00</published>
		<updated>2013-06-20T10:08:30+00:00</updated>
		<id>http://dcds13.net.dcs.hull.ac.uk/programme/2-uncategorised/26-invitedspeaker</id>
		<author>
			<name>Dr David Parker</name>
			<email>d.j.parker@hull.ac.uk</email>
		</author>
		<summary type="html">&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;09:00 - 10:00 Wednesday 4th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;09:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Assessing the probability of failure of 1-out-of-2 software-based systems: now you can multiply two small numbers ...&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: center;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Author&lt;/strong&gt;:&amp;nbsp;Bev Littlewood, Centre for Software Reliability, City University, London, UK&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: center;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;You can download the slides for this talk by clicking &lt;a title=&quot;Bev Littlewood's slides&quot; href=&quot;DCDS2013_York.pptx.pdf&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;09:00 - 10:00 Thursday 5th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;09:00&lt;/td&gt;
&lt;td style=&quot;background-color: #e1bbf7; width: 500px; text-align: center; padding: 5px;&quot;&gt;&lt;strong&gt;Diagnosis and diagnosability of discrete event systems using Petri nets&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Author&lt;/strong&gt;:&amp;nbsp;Alessandro Giua, University of Cagliari, Italy&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;You can download the slides for this talk by clicking &lt;a title=&quot;Invited Speaker Alessandro Giua slides&quot; href=&quot;giua2.pdf&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;09:00 - 10:00 Friday 6th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;09:00&lt;/td&gt;
&lt;td style=&quot;background-color: #e1bbf7; width: 500px; text-align: center; padding: 5px;&quot;&gt;&lt;strong&gt;Stochastic hybrid systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Author&lt;/strong&gt;:&amp;nbsp;Marc Bouissou, Électricité de France, France&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;You can download the slides for this talk by clicking &lt;a href=&quot;Hybrid_stochastic_systems.pdf&quot; title=&quot;Invited Speaker Marc Bouissou Slides&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</summary>
		<content type="html">&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium; text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;09:00 - 10:00 Wednesday 4th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;09:00&lt;/td&gt;
&lt;td style=&quot;width: 500px; text-align: center; padding: 5px; background-color: #e1bbf7;&quot;&gt;&lt;strong&gt;Assessing the probability of failure of 1-out-of-2 software-based systems: now you can multiply two small numbers ...&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: center;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Author&lt;/strong&gt;:&amp;nbsp;Bev Littlewood, Centre for Software Reliability, City University, London, UK&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px; text-align: center;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;You can download the slides for this talk by clicking &lt;a title=&quot;Bev Littlewood's slides&quot; href=&quot;DCDS2013_York.pptx.pdf&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;09:00 - 10:00 Thursday 5th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;09:00&lt;/td&gt;
&lt;td style=&quot;background-color: #e1bbf7; width: 500px; text-align: center; padding: 5px;&quot;&gt;&lt;strong&gt;Diagnosis and diagnosability of discrete event systems using Petri nets&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Author&lt;/strong&gt;:&amp;nbsp;Alessandro Giua, University of Cagliari, Italy&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;You can download the slides for this talk by clicking &lt;a title=&quot;Invited Speaker Alessandro Giua slides&quot; href=&quot;giua2.pdf&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table border=&quot;0&quot; cellspacing=&quot;5&quot; cellpadding=&quot;5&quot;&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;text-align: center; padding: 5px;&quot; colspan=&quot;2&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;strong style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: 16px; text-align: left;&quot;&gt;09:00 - 10:00 Friday 6th September 2013&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 100px;&quot; rowspan=&quot;3&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;09:00&lt;/td&gt;
&lt;td style=&quot;background-color: #e1bbf7; width: 500px; text-align: center; padding: 5px;&quot;&gt;&lt;strong&gt;Stochastic hybrid systems&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;strong&gt;Author&lt;/strong&gt;:&amp;nbsp;Marc Bouissou, Électricité de France, France&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;width: 500px; padding: 5px;&quot; align=&quot;center&quot; valign=&quot;middle&quot;&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;You can download the slides for this talk by clicking &lt;a href=&quot;Hybrid_stochastic_systems.pdf&quot; title=&quot;Invited Speaker Marc Bouissou Slides&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</content>
	</entry>
</feed>
