Tutorials



Tutorial 1: Uncertainty Modeling in Cyber-Physical Systems

Organizer: Manuela Bujorianu, (Manuela.Bujorianu[at]manchester.ac.uk)

Summary

This tutorial will be research oriented, intending to introduce the audience into the state of art and the research problems in a newly emergent domain. The tutorial format is interdisciplinary and multi-speakers, offering perspectives from complementary disciplines. Cyber physical systems represent a modelling paradigm that promotes a holistic perspective on systems that have been previously known as embedded, hybrid, or pervasive. The essential feature of the cyber physical systems is the deep interaction between physics and computation and their behaviour, as well as the interaction with their environment or other systems. The tutorial lectures will present a systematic methodological framework for the holistic modelling. The illustrating examples show the extraordinary application potential of this paradigm. The applications span from nano-scale robots to mega-scale satellites and aircraft. The tutorial will focus on modelling the uncertainty, which is inherent in the behaviour of these complex systems.

More Info

Full-day Tutorial on Sunday Morning. March 21, 2010

Tutorial 2: Security, specification and refinement

Organizer: Annabelle McIver, (anabel[at]ics.mq.edu.au)

Summary

Since 1995 [1] there has been intensive research in source-level assertion-style reasoning for developing probabilistic systems via stepwise refinement [2] through layers of abstraction [3], which work was summarised in a comprehensive text [4] in 2005. Since then the method has been adapted to deal with non-interference-style security, initially without probability [5] but most recently with probability as well [6]. This tutorial will build on a basic understanding of specification and refinement to explain these recent developments and how they fit in to research themes which overlap secure systems and quantitative reasoning. In particular it will focus on systematic source-level developments of a number of well known probabilistic and security-sensitive algorithms, as examples, as well as explaining and illustrating general principles for doing work of this kind. There are many opportunities of up-to-the-minute topics for further research.

[1] Probabilistic predicate transformers. Morgan, McIver, Seidel. ToPLaS 18(3), 1996.
[2] Program development by stepwise refinement. Niklaus Wirth. CACM 14(4), 1971.
[3] The B Book. J-R Abrial. Cambridge University Press, 1996.
[4] Abstraction, Refinement and Proof for Probabilistic Systems: McIver and Morgan. Springer Monographs in Computer Science. 2005.
[5] The Shadow Knows: Refinement of ignorance in sequential programs. Carroll Morgan. In LNCS 4014 Proc. MPC 2006, Tarmo Uustalu (ed).
[6] Security, probability and nearly fair coins in the cryptographers' café. Carroll Morgan. Invited talk in LNCS 5850, Proc. FM09. Cavalcanti, Dams (eds).

More Info

Full-day Tutorial on Sunday Morning. March 21, 2010

Tutorial 3: Executable Models of Gene Regulatory Networks

Organizer: Wan Fokkink, (wanf[at]cs.vu.nl)

Summary

In this tutorial, we will give an introduction to what is phrased executable biology, and the role that formal methods in this context. We will focus on Petri nets, which constitute an excellent formalism for modelling biological systems, in particular gene regulatory networks. We will explain the basic formalism, the analysis method based on Monte Carlo simulations and on state space exploration. The framework will be explained on the basis of three different case studies. The first case study is vulval development of C. elegans, where the Petri net simulations turn out to be in line with in vitro experiments, and moreover new predictions can be made. Next we will explain how to use Petri nets to build the gene regulatory network that captures the hematopoiesis process in mice and how is possible to infer, check, and predict biological properties exploring the generated state space. Furthermore, we will show how we applied the same approach to derive insightful predictions on Yeast behavior during starvation. Moreover, we will present a proof-of-concepts tool used to design and analyze our models. Finally, we will discuss future perspectives, especially with regard to model checking analysis.

More Info

Half-day Tutorial on Sunday Morning. March 21, 2010

Tutorial 4: The DisCoVeri continues ... (On the Application of Concurrency Theory to Fault-Tolerant Distributed Algorithms)

Organizer: Uwe Nestmann , (uwe.nestmann[at]tu-berlin.de)

Summary

The formal verification of distributed algorithms, in particular fault-tolerant ones, still represents a rather non-trivial challenge. The field of Concurrency Theory offers a range of methods and techniques to formally specify and possibly verify concurrent and distributed systems. In this tutorial, we elaborate on a number of different techniques that are often expected to be adequate on this matter. Among them, we touch upon process calculi, temporal logics, I/O automata as well as abstract state machines and the HO model. The emphasis is put on the general approach and applicability of the above-named methods, usually referring to either the comparison between specifications and abstract implementations, using notions of equivalence or simulation, or the satisfaction of logical formulae by such an implementation. A number of examples are presented, where we focus on variants the Disributed Consensus problem; advantages and disadvantages as well as potential pitfalls are outlined.

Half-day Tutorial on Sunday Afternoon. March 21, 2010

Satellite Events Chairs

The satellite organisers can be contacted by sending e-mail to <etaps10_satellite_events@cs.ucy.ac.cy>.