The Rodin Platform. Jean-Raymond Abrial. 2nd Rodin Industrial Day. September 10th 2007
|
|
- Lorraine Helena Bruce
- 5 years ago
- Views:
Transcription
1 The Rodin Platform Jean-Raymond Abrial 2nd Rodin Industrial Day September 10th 2007
2 Prelude 1
3 Prelude 2 - Georges Charpak is a French physicist (Nobel Prize winner in 1992)
4 Prelude 3 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors"
5 Prelude 4 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors" - Question asked to Charpak: "Are you a theoretician?"
6 Prelude 5 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors" - Question asked to Charpak: "Are you a theoretician?" - Answer: "No, I am not. Although I know the theory"
7 Prelude 6 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors" - Question asked to Charpak: "Are you a theoretician?" - Answer: "No, I am not. Although I know the theory" - Answer (cont d):
8 Prelude 7 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors" - Question asked to Charpak: "Are you a theoretician?" - Answer: "No, I am not. Although I know the theory" - Answer (cont d): "AND MY TOOL IS THE MIRROR OF THE THEORY"
9 Which Theory? 8 - The theory of discrete transition systems
10 Which Theory? 9 - The theory of discrete transition systems - As engineers, a theory is used to build a methodology
11 Which Theory? 10 - The theory of discrete transition systems - As engineers, a theory is used to build a methodology - A methodology describes the process allowing to apply a theory
12 Which Theory? 11 - The theory of discrete transition systems - As engineers, a theory is used to build a methodology - A methodology describes the process allowing to apply a theory - The methodology must precede the tool
13 Which Theory? 12 - The theory of discrete transition systems - As engineers, a theory is used to build a methodology - A methodology describes the process allowing to apply a theory - The methodology must precede the tool - But the tool will help us applying the methodology
14 Which Methodology? 13 - That of developing systems which will be correct by construction
15 Which Methodology? 14 - That of developing systems which will be correct by construction - Developing formal models in many different system areas:
16 Which Methodology? 15 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed
17 Which Methodology? 16 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent
18 Which Methodology? 17 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent - parallel
19 Which Methodology? 18 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent - parallel - sequential
20 Which Methodology? 19 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent - parallel - sequential - including external environment
21 Which Methodology? 20 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent - parallel - sequential - including external environment - The tool must be an aid for doing this, not a burden
22 Formal Models with Event-B (reminder) 21 - Models are made of machines and contexts Machine variables invariants theorems events Context carrier sets constants axioms theorems
23 Relationships Between Machines and Contexts (reminder) 22 Machine sees Context refines Machine sees Context extends refines extends
24 Structure of Machines and Contexts in Event-B (reminder) 23 Each section contains modeling elements machine < machine identifier > refines < machine identifier > sees < context identifier >... variables < variable identifier >... invariants < label >: < predicate >... theorems < label >: < predicate >... variant < variant > events < event >... end context < context identifier > extends < context identifier >... sets < set identifier >... constants < constant identifier >... axioms < label >: < predicate >... theorems < label >: < predicate >... end
25 Initial Quick Demo 24
26 Structure of Events in Event-B (reminder) 25 < event identifier > = status {ordinary, convergent, anticipated} refines < event identifier >... any < parameter identif ier >... where < label >: < predicate >... with < label >: < witness >... then < label >: < action >... end
27 Initial Quick Demo (cont d) 26
28 The "Compiler" of Tomorrow 27 D E S I G N A N D V E R I F I C A T I O N P L U G I N S Static Checker Proof Obligation Generator Provers Model Checker D E S I G N D A T A B A S E Animator UML to B Tool I N T E R F A C E Translator
29 The "Compiler" of Tomorrow 28 D E S I G N A N D V E R I F I C A T I O N P L U G I N S Static Checker Proof Obligation Generator Provers Model Checker D E S I G N D A T A B A S E Animator UML to B Tool I N T E R F A C E Translator
30 Outline of Talk 29 - The team
31 Outline of Talk 30 - The team - Main characteristics of the Rodin Platform
32 Outline of Talk 31 - The team - Main characteristics of the Rodin Platform - A Grand Tour of the Rodin Platform by means of an example
33 Outline of Talk 32 - The team - Main characteristics of the Rodin Platform - A Grand Tour of the Rodin Platform by means of an example - Various demos performed during example presentation
34 The ETH Team (a superb team) 33 - Laurent Voisin: Main Architect
35 The ETH Team (a superb team) 34 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator
36 The ETH Team (a superb team) 35 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator - Thai Son Hoang: User Interface, Interactive Prover Rules
37 The ETH Team (a superb team) 36 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator - Thai Son Hoang: User Interface, Interactive Prover Rules - Farhad Mehta: Proof Manager, Well-definedness
38 The ETH Team (a superb team) 37 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator - Thai Son Hoang: User Interface, Interactive Prover Rules - Farhad Mehta: Proof Manager, Well-definedness - Francois Terrier: New Prover
39 The ETH Team (a superb team) 38 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator - Thai Son Hoang: User Interface, Interactive Prover Rules - Farhad Mehta: Proof Manager, Well-definedness - Francois Terrier: New Prover - External participants: Dominique Cansell and Christophe Metayer
40 Main Characteristics of the Rodin Platform 39 - Build on top of Eclipse
41 Main Characteristics of the Rodin Platform 40 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux
42 Main Characteristics of the Rodin Platform 41 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux - Development: 3 years
43 Main Characteristics of the Rodin Platform 42 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux - Development: 3 years - 120,000 lines of Java (after removing blank lines and comment lines)
44 Main Characteristics of the Rodin Platform 43 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux - Development: 3 years - 120,000 lines of Java (after removing blank lines and comment lines) - Open source
45 Main Characteristics of the Rodin Platform 44 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux - Development: 3 years - 120,000 lines of Java (after removing blank lines and comment lines) - Open source - Extensible (plug-ins)
46 The Example 45 - A hotel key card system
47 The Example 46 - A hotel key card system - It is not a software system
48 The Example 47 - A hotel key card system - It is not a software system - The model will allow us to analyze this system
49 The Example 48 - A hotel key card system - It is not a software system - The model will allow us to analyze this system - References:
50 The Example 49 - A hotel key card system - It is not a software system - The model will allow us to analyze this system - References: - Daniel Jackson, Software Abstractions. MIT Press, 2006
51 The Example 50 - A hotel key card system - It is not a software system - The model will allow us to analyze this system - References: - Daniel Jackson, Software Abstractions. MIT Press, Tobias Nipkow, Verifying a Hotel Key Card System. ICTAC, 2006
52 The Specification of a Hotel Key Card System 51 - Upon checking-in, you are given a magnetic card.
53 The Specification of a Hotel Key Card System 52 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must:
54 The Specification of a Hotel Key Card System 53 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must: (1) allow you to enter the room you booked,
55 The Specification of a Hotel Key Card System 54 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must: (1) allow you to enter the room you booked, (2) guarantee that no one else can do so.
56 The Specification of a Hotel Key Card System 55 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must: (1) allow you to enter the room you booked, (2) guarantee that no one else can do so. - At check-out, you are not obliged to return the magnetic card
57 The Specification of a Hotel Key Card System 56 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must: (1) allow you to enter the room you booked, (2) guarantee that no one else can do so. - At check-out, you are not obliged to return the magnetic card - In a classical hotel metallic key system, (2) is not guaranteed (a previous user may have "borrowed" the metallic key)
58 A Proposed Implementation of the Key Card System (1) 57 - Each check-in starts a new booking
59 A Proposed Implementation of the Key Card System (1) 58 - Each check-in starts a new booking - Each booking is associated with a key-card
60 A Proposed Implementation of the Key Card System (1) 59 - Each check-in starts a new booking - Each booking is associated with a key-card - Each key-card carries two electronic keys:
61 A Proposed Implementation of the Key Card System (1) 60 - Each check-in starts a new booking - Each booking is associated with a key-card - Each key-card carries two electronic keys: (1) Its own new key: guaranteed to be fresh
62 A Proposed Implementation of the Key Card System (1) 61 - Each check-in starts a new booking - Each booking is associated with a key-card - Each key-card carries two electronic keys: (1) Its own new key: guaranteed to be fresh (2) the "previous" booking key: the "new" key from the previous booking card
63 A Proposed Implementation of the Key Card System (2) 62 - Each door has an independent electronic lock
64 A Proposed Implementation of the Key Card System (2) 63 - Each door has an independent electronic lock - The lock at the door holds one electronic key
65 A Proposed Implementation of the Key Card System (2) 64 - Each door has an independent electronic lock - The lock at the door holds one electronic key - You insert your card in the lock
66 A Proposed Implementation of the Key Card System (2) 65 - Each door has an independent electronic lock - The lock at the door holds one electronic key - You insert your card in the lock - The lock reads your card
67 A Proposed Implementation of the Key Card System (2) 66 - Each door has an independent electronic lock - The lock at the door holds one electronic key - You insert your card in the lock - The lock reads your card - The door opens if the door key is one of the two keys of your card
68 A Proposed Implementation of the Key Card System (2) 67 - Each door has an independent electronic lock - The lock at the door holds one electronic key - You insert your card in the lock - The lock reads your card - The door opens if the door key is one of the two keys of your card - The door key is replaced by your own key (as read on the card)
69 k1 door key
70 k2 k1 new key previous key k1 door key
71 k2 k1 k2 k1 k1 k2
72 k2
73 k2 k1 k2
74 k2 k1 k2 k1 k2 k2
75 k2
76 k3 k2 k2
77 k3 k2 k3 k2 k2 k3
78 k3
79 k3 k2 k3
80 k3 k2 k3 k2 k3 k3
81 k3
82 k2 k1 k3
83 k2 k1 k2 k1 k3 k3
84 Booking Conventions 68 open closed PAST bookings PRESENT booking FUTUR bookings
85 The Main Transitions 69 - check in: performed by hotel management and guest
86 The Main Transitions 70 - check in: performed by hotel management and guest - check out: performed by hotel management (and guest)
87 The Main Transitions 71 - check in: performed by hotel management and guest - check out: performed by hotel management (and guest) - use: performed by guest (this is the first entrance in the room)
88 Initial Situation 72 Booking b1 is a dummy b1
89 Check in 73 Booking b2 checks in b1 b2
90 Use 74 Booking b2 uses the room. b1 b2 Booking b1 becomes a past booking
91 Check out 75 Booking b2 checks out b1 b2
92 Check in 76 Booking b3 checks in b1 b2 b3
93 Use 77 Booking b3 uses the room. b1 b2 b3 Booking b2 becomes a past booking
94 Check in 78 Booking b4 checks in b1 b2 b3 b4 NOT ALLOWED At most one open booking
95 Use 79 Booking b2 uses the room. b1 b2 b3 Booking b3 becomes a past booking NOT ALLOWED A past booking cannot "use" the room for the first time
96 Check out 80 Booking b3 checks out b1 b2 b3
97 Check in 81 Booking b4 checks in b1 b2 b3 b4
98 Check out 82 Booking b4 checks out without using the room b1 b2 b3 b4
99 Check in 83 Booking b5 checks in b1 b2 b3 b4 b5
100 Check out 84 Booking b5 checks out without using the room b1 b2 b3 b4 b5
101 Check in 85 Booking b6 checks in b1 b2 b3 b4 b5 b6
102 Use 86 Booking b6 uses the room. b1 b2 b3 b4 b5 b6 Booking b3 becomes a past booking
103 Use 87 - Booking b5 uses the room. b1 b2 b3 b4 b5 b6 Open booking b6 becomes a past booking. NOT ALLOWED. Before using a room, one must be sure that its user has checked out. This point will be solved "naturally" in the next refinement
104 DEMO 88
105 1st Data-refinement 89 b1 b2 b3 b4 b4 b6 Abstract (set) b1 b2 b3 b4 b4 b Concrete (sequence)
106 b1 1
107 b1 b2 1 2
108 b1 b2 1 2
109 b1 b2 1 2
110 b1 b2 b
111 b1 b2 b
112 b1 b2 b
113 b1 b2 b3 b
114 b1 b2 b3 b
115 b1 b2 b3 b4 b
116 b1 b2 b3 b4 b
117 b1 b2 b3 b4 b5 b
118 b1 b2 b3 b4 b5 b
119 b1 b2 b3 b4 b5 b
120 b1 b2 b3 b4 b5 b
121 DEMO 90
122 2nd Data-refinement 91 b1 b2 b3 b4 b4 b Abstract (sequence) b1 b2 b3 b4 b4 b6 Concrete (chain)
123 b1
124 b1 b2
125 b1 b2
126 b1 b2
127 b1 b2 b3
128 b1 b2 b3
129 b1 b2 b3
130 b1 b2 b3 b4
131 b1 b2 b3 b4
132 b1 b2 b3 b4 b5
133 b1 b2 b3 b4 b5
134 b1 b2 b3 b4 b5 b6
135 b1 b2 b3 b4 b5 b6
136 b1 b2 b3 b4 b5 b6
137 b1 b2 b3 b4 b5 b6
138 DEMO 92
139 3rd Data-refinement 93 b1 b2 b3 b4 b5 b6 Abstract (chain) b1 b2 b3 b4 b5 b6 Concrete (card)
140 b1
141 b1 b2
142 b1 b2
143 b1 b2
144 b1 b2 b3
145 b1 b2 b3
146 b1 b2 b3
147 b1 b2 b3 b4
148 b1 b2 b3 b4
149 b1 b2 b3 b4 b5
150 b1 b2 b3 b4 b5
151 b1 b2 b3 b4 b5 b6
152 b1 b2 b3 b4 b5 b6
153 b1 b2 b3 b4 b5 b6
154 b1 b2 b3 b4 b5 b6
155 DEMO 94
156 4th Data-refinement 95 b1 b2 b3 b4 b5 b6 Abstract (card) b1 b2 b3 b4 b5 b6 Concrete (card and guest) g1 g2 g3 g4 g5
157 b1
158 b1 b2 g1
159 b1 b2 g1
160 b1 b2 b3 g1 g2
161 b1 b2 b3 g1 g2
162 b1 b2 b3 g1 g2
163 b1 b2 b3 b4 g1 g2 g3
164 b1 b2 b3 b4 g1 g2 g3
165 b1 b2 b3 b4 b5 g1 g2 g3 g4
166 b1 b2 b3 b4 b5 g1 g2 g3 g4
167 b1 b2 b3 b4 b5 b6 g1 g2 g3 g4
168 b1 b2 b3 b4 b5 b6 g1 g2 g3 g4 Here, we have a serious problem Guest g3 has got two cards (he never used the old one) He figures out that the new one does not open the room So, he tries the old one, which allows him to enter into the room he booked But he is not safe: guest g4 can enter the room
169 Solution 96 - Never use an old card, event if it opens the room - Go back to the lobby - Ask someone to open the door with a master-card
170 DEMO 97
171 Summary of Data-refinements 98 b1 b2 b3 b4 b5 b6 set b1 b2 b3 b4 b5 b sequence b1 b2 b3 b4 b5 b6 chain b1 b2 b3 b4 b5 b6 card b1 b2 b3 b4 b5 b6 card and guest g1 g2 g3 g4 g5
172 Conclusion 99 - We ve done our best to build a professional tool - Use it, it s fun - We are in the process of constructing a Rodin Platform web-site - Give us any feedback
173 Thanks for listening
Formal Methods: Theory Becoming Practice
Journal of Universal Computer Science, vol. 13, no. 5 (2007), 619-628 submitted: 7/5/07, accepted: 25/5/07, appeared: 28/5/07 J.UCS Formal Methods: Theory Becoming Practice Jean-Raymond Abrial (ETHZ, Zurich,
More informationFormal Composition for. Time-Triggered Systems
Formal Composition for Time-Triggered Systems John Rushby and Ashish Tiwari Rushby,Tiwari@csl.sri.com Computer Science Laboratory SRI International Menlo Park CA 94025 Rushby, Tiwari, SR I Formal Composition
More informationCITS2211 Discrete Structures Turing Machines
CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new
More informationPervasive Services Engineering for SOAs
Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au
More informationA Healthcare Case Study (Extended abstract)
A Healthcare Case Study (Extended abstract) The MATISSE-project 1 L. Petre, E. Troubitsyna and M. Waldén 2 Åbo Akademi University / TUCS Finland 1. Motivation for using formal methods Within our healthcare
More informationNotes for Recitation 3
6.042/18.062J Mathematics for Computer Science September 17, 2010 Tom Leighton, Marten van Dijk Notes for Recitation 3 1 State Machines Recall from Lecture 3 (9/16) that an invariant is a property of a
More informationRequirements Gathering using Object- Oriented Models
Requirements Gathering using Object- Oriented Models Cycle de vie d un logiciel Software Life Cycle The "software lifecycle" refers to all stages of software development from design to disappearance. The
More informationDay 1: June 6, 2011 (Kristin, Shirley, Sheryle, Amber) 8:30 Norms, parking lot (Shirley) 8:40 Class builder (Sheryle) 8:50 PS 1 Materials: Rulers,
Day 1: June 6, 2011 (Kristin, Shirley, Sheryle, Amber) 8:30 Norms, parking lot (Shirley) 8:40 Class builder (Sheryle) 8:50 PS 1 Materials: Rulers, protractors, colored pencils, shapes printed on colored
More informationLecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.
Lecture 32 Instructor s Comments: This is a make up lecture. You can choose to cover many extra problems if you wish or head towards cryptography. I will probably include the square and multiply algorithm
More informationPolicy for Control Procedures for Examination and Assessment Marking and Recording of Marks
Policy for Control Procedures for Examination and Assessment Marking and Recording of Marks Version: May 2015 Date last amended: 27/05/2015 File name: Marking Review Refer to: GAR Policy- May 2015 Note:
More informationThe AMADEOS SysML Profile for Cyber-physical Systems-of-Systems
AMADEOS Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems FP7-ICT-2013.3.4 - Grant Agreement n 610535 The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems
More informationSign Up Script (This would be used after the Prospect has received their Decision Pack)
Updated 12/24/2003 Sign Up Script (This would be used after the Prospect has received their Decision Pack) If you do not have pre -set appointment with the Prospect when they call you, and they want to
More informationCSSE220 BomberMan programming assignment Team Project
CSSE220 BomberMan programming assignment Team Project You will write a game that is patterned off the 1980 s BomberMan game. You can find a description of the game, and much more information here: http://strategywiki.org/wiki/bomberman
More informationHow to Present a 4 H Computer Assisted Demonstra on
How to Present a 4 H Computer Assisted Demonstra on Copyright Rules If you look under the insert menu of many applications, you may find the option to insert pictures or clip art. If you are going to use
More informationBuildER s Guide. Overlap technique
full color U N O F F I C I A L THE LEGO BuildER s Guide 2 n d e d i t i o n Allan Bedford Overlap Technique Stagger technique Hybrid Column 6 Microscale Building: More Than Meets the Eye In Chapter 5,
More informationAn introduction to software development. Dr. C. Constantinides, P.Eng. Computer Science and Software Engineering Concordia University
An introduction to software development Dr. C. Constantinides, P.Eng. Computer Science and Software Engineering Concordia University What type of projects? Small-scale projects Can be built (normally)
More informationHere s what we re going to do:
Here s what we re going to do: *Get to know each other a little *WE LL DISCUSS Mary Kay'S business PLan & I LL answer any QUESTIOnS *at THE EnD, I LL ask If HavIng your own Mary Kay business is something
More informationCoaching Welcome Pack. One-on-one Coaching Welcome Pack
One-on-one Coaching Welcome Pack 1 V1.4 January 2019 Copyright 2019 The Song Foundry, Inc. 2 Welcome! Congratulations on signing up for a coaching package! I m excited to work with you and hope you get
More informationCOMMUNICATOR GUIDE. Best Seller / Week 3 PRELUDE SOCIAL WORSHIP STORY GROUPS HOME SCRIPTURE TEACHING OUTLINE TENSION
COMMUNICATOR GUIDE Best Seller / Week 3 PRELUDE SOCIAL WORSHIP STORY GROUPS HOME BOTTOM LINE GOAL OF SMALL GROUP Memorizing Scripture makes you stronger. To encourage students to memorize one or two Bible
More informationObject-oriented Analysis and Design
Object-oriented Analysis and Design Stages in a Software Project Requirements Writing Understanding the Client s environment and needs. Analysis Identifying the concepts (classes) in the problem domain
More information8.2 Slippery Slopes. A Solidify Understanding Task
7 8.2 Slippery Slopes A Solidify Understanding Task CC BY https://flic.kr/p/kfus4x While working on Is It Right? in the previous module you looked at several examples that lead to the conclusion that the
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More information18.204: CHIP FIRING GAMES
18.204: CHIP FIRING GAMES ANNE KELLEY Abstract. Chip firing is a one-player game where piles start with an initial number of chips and any pile with at least two chips can send one chip to the piles on
More informationIntroduction to ACL2. Matt Kaufmann The University of Texas at Austin Dept. of Computer Science, GDC April 21-23, 2015
Introduction to ACL2 Matt Kaufmann The University of Texas at Austin Dept. of Computer Science, GDC 7.804 April 21-23, 2015 2/39 OUTLINE Introduction Context Prover Automation and Control ACL2 Variants
More informationReview paper on formal methods
Review paper on formal methods Pooja Sharma Pranveer Singh Institute of Technology Kanpur, U.P. (208020) U.P.T.U., Lucknow Raghuraj singh suryavanshi Pranveer Singh Institute of Technology Kanpur, U.P.
More informationSoftware verification
Software verification Will it ever work? Ofer Strichman, Technion 1 Testing: does the program behave as expected for a given set of inputs? Formal Verification: does the program behave as specified for
More informationSkylands Learning is your trusted learning advisor. That is our promise your trusted learning advisor. Four simple words.
Page 1 of 12 METHODOLOGY Who we are Skylands Learning is your trusted learning advisor. That is our promise your trusted learning advisor. Four simple words. Not enough information? At Skylands, we have
More informationthe gamedesigninitiative at cornell university Lecture 4 Game Grammars
Lecture 4 Sources for Today s Talk Raph Koster (one of original proponents) Theory of Fun, 10 Years Later (GDCOnline 2012) http://raphkoster.com Ernest Adams and Joris Dormans Game Mechanics: Advanced
More informationBegin with Content Conference
WRITING EXCERPT p. 226 229 Begin with Content Conference My experience has been that it takes some convincing to get teachers to focus first on content and initially ignore editing concerns. Editing is
More informationTiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane
Tiling Problems This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane The undecidable problems we saw at the start of our unit
More informationBlock Markov Encoding & Decoding
1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,
More informationDistributed System Security via Logical Frameworks
Distributed System Security via Logical Frameworks Frank Pfenning Carnegie Mellon University Invited Talk Workshop on Issues in the Theory of Security (WITS 05) Long Beach, California, January 10-11, 2005
More informationFrom Proposal to Presentation. 10 ways to help ensure that your proposal makes it to the top of the pile
From Proposal to Presentation 10 ways to help ensure that your proposal makes it to the top of the pile 43RD ANNUAL CONFERENCE NATIONAL WELLNESS National Wellness CONFERENCE NAVIGATING WELLNESS MAPPING
More informationTheorem Proving and Model Checking
Theorem Proving and Model Checking (or: how to have your cake and eat it too) Joe Hurd joe.hurd@comlab.ox.ac.uk Cakes Talk Computing Laboratory Oxford University Theorem Proving and Model Checking Joe
More informationWhat do you see? Are there things about yourself that you don t like? Is there something you re thankful for about yourself?
Identity Look in the mirror, take your time. What do you see? Are there things about yourself that you don t like? Is there something you re thankful for about yourself? Christians believe that God made
More informationNational Association of Rocketry Training Rocketeers for Experience and Knowledge NARTREK. Bronze Achievement Level HOW TO USE THIS PACKET
HOW TO USE THIS PACKET This online copy of the packet is part of a special promotion. With this packet, any NAR member can try out the program with no advance payment! Here s how it works: Print out this
More informationEECS 203 Spring 2016 Lecture 15 Page 1 of 6
EECS 203 Spring 2016 Lecture 15 Page 1 of 6 Counting We ve been working on counting for the last two lectures. We re going to continue on counting and probability for about 1.5 more lectures (including
More informationFORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS Meriem Taibi 1 and Malika Ioualalen 1 1 LSI - USTHB - BP 32, El-Alia, Bab-Ezzouar, 16111 - Alger, Algerie taibi,ioualalen@lsi-usthb.dz
More informationUNIT-III LIFE-CYCLE PHASES
INTRODUCTION: UNIT-III LIFE-CYCLE PHASES - If there is a well defined separation between research and development activities and production activities then the software is said to be in successful development
More informationBellerophon: Tactical Theorem Proving for Hybrid Systems. Nathan Fulton, Stefan Mitsch, Brandon Bohrer, André Platzer Carnegie Mellon University
Bellerophon: Tactical Theorem Proving for Hybrid Systems Nathan Fulton, Stefan Mitsch, Brandon Bohrer, André Platzer Carnegie Mellon University Cyber-Physical Systems Cyber-Physical Systems combine computation
More informationECE 1778: Creative Applications for Mobile Devices
ECE 1778: Creative Applications for Mobile Devices Lecture 7 October 28, 2016 (1) Today 1. Guest Lecture from Jason Hyde 2. Logistics 3. Presentations (2) Jason Hyde n VP Creative & User Experience at
More informationTowards an MDA-based development methodology 1
Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,
More informationCountability. Jason Filippou UMCP. Jason Filippou UMCP) Countability / 12
Countability Jason Filippou CMSC250 @ UMCP 06-23-2016 Jason Filippou (CMSC250 @ UMCP) Countability 06-23-2016 1 / 12 Outline 1 Infinity 2 Countability of integers and rationals 3 Uncountability of R Jason
More informationThe mathematics of the flip and horseshoe shuffles
The mathematics of the flip and horseshoe shuffles Steve Butler Persi Diaconis Ron Graham Abstract We consider new types of perfect shuffles wherein a deck is split in half, one half of the deck is reversed,
More information3.6 Implementation. Dr. Tarek A. Tutunji Philadelphia University, Jordan. Engineering Skills, Philadelphia University
3.6 Implementation Philadelphia University, Jordan Preview In the previous sequence, Analysis and Design was discussed. In this sequence, Implementation will be presented. Seven Design Steps 1. Define
More informationUse Your Business to Grow Your Income
Leigh Kirk & Megan Proctor Good morning to the future of PartyLite! YOU! You are going to take our company and your business to the next level when you leave LITE14! You will be the one to inspire and
More informationConversion Masters in IT (MIT) AI as Representation and Search. (Representation and Search Strategies) Lecture 002. Sandro Spina
Conversion Masters in IT (MIT) AI as Representation and Search (Representation and Search Strategies) Lecture 002 Sandro Spina Physical Symbol System Hypothesis Intelligent Activity is achieved through
More information37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game
37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to
More informationSeptember G Community Resource Day. When: Sept. 27th, 11am-3pm. Where: Silverton Community Center, 421 S. Water St
Silverton Area Community Aid SACA Services UPCOMING EVENTS Figaro s Pizza Night When: Tues., Sept 23rd, 4-8pm Where: 402 McClaine St. Join us at Figaro s for great pizza and a fun way to support SACA!
More informationSubway simulator Case study
Subway simulator Case study Marco Scotto 2004/2005 Outline Requirements Use cases Class Identification Class Diagrams Sequence & Activity Diagrams 2 Vision of the subway control system Terminal station
More informationCS277 - Experimental Haptics Lecture 2. Haptic Rendering
CS277 - Experimental Haptics Lecture 2 Haptic Rendering Outline Announcements Human haptic perception Anatomy of a visual-haptic simulation Virtual wall and potential field rendering A note on timing...
More informationInstruction Manual for Concept Simulators. Signals and Systems. M. J. Roberts
Instruction Manual for Concept Simulators that accompany the book Signals and Systems by M. J. Roberts March 2004 - All Rights Reserved Table of Contents I. Loading and Running the Simulators II. Continuous-Time
More informationImproved Model Generation of AMS Circuits for Formal Verification
Improved Generation of AMS Circuits for Formal Verification Dhanashree Kulkarni, Satish Batchu, Chris Myers University of Utah Abstract Recently, formal verification has had success in rigorously checking
More informationFormally Verified Endgame Tables
Formally Verified Endgame Tables Joe Leslie-Hurd Intel Corp. joe@gilith.com Guest Lecture, Combinatorial Games Portland State University Thursday 25 April 2013 Joe Leslie-Hurd Formally Verified Endgame
More informationHelp With Pepper On It
http://www.phantasmechanics.com/pepper.html Help With Pepper On It We get a lot of questions about the Pepper's Ghost illusion as shown in the Haunted Hotel (Hotel Lugosi) and Tom Marchak's Grim Organist.
More informationToday. Sketching and Toolkits. Questions? Announcements 10/02/2017. February 9, Finishing coding activity. Sketching.
Today Finishing coding activity Sketching and Toolkits February 9, 2017 Sketching Toolkits Winter 2017 COMP 4020 2 Announcements Questions? A1/MSI marks are available on UM Learn Feedback is in an attached
More informationPublish & Flourish: Become a Prolific Scholar. Tara Gray*
Publish & Flourish: Become a Prolific Scholar Tara Gray* The myth persists that prolific scholars are born, not made, but research suggests otherwise. Much is known about how to become more prolific and
More information50 + WAYS TO GET MORE ENGAGEMENT ON YOUR FACEBOOK PAGE DR. JEN BENNETT
1. It s all about the visual right now! Share pictures, lots of pictures! Create some great ain free graphics with apps like: InstaQuote, PicMonkey, Canva and Word Swag that contain a quote or an inspirational
More informationIntroduction to Neuro-Dynamic Programming (Or, how to count cards in blackjack and do other fun things too.)
Introduction to Neuro-Dynamic Programming (Or, how to count cards in blackjack and do other fun things too.) Eric B. Laber February 12, 2008 Eric B. Laber () Introduction to Neuro-Dynamic Programming (Or,
More informationFederation of Genealogical Societies. by Carmen J. Finley, Ph.D., CG. Supplemental Page
Society Strategies Federation of Genealogical Societies P.O. Box 200940 Austin TX 78720-0940 Series Set VI Number 7 2002 Set VI Strategies for Program Chairpersons by Carmen J. Finley, Ph.D., CG Supplemental
More informationDC Motor and Servo motor Control with ARM and Arduino. Created by:
DC Motor and Servo motor Control with ARM and Arduino Created by: Andrew Kaler (39345) Tucker Boyd (46434) Mohammed Chowdhury (860822) Tazwar Muttaqi (901700) Mark Murdock (98071) May 4th, 2017 Objective
More informationPass-Words Help Doc. Note: PowerPoint macros must be enabled before playing for more see help information below
Pass-Words Help Doc Note: PowerPoint macros must be enabled before playing for more see help information below Setting Macros in PowerPoint The Pass-Words Game uses macros to automate many different game
More informationNORTHSIDE COIN CLUB C IN CHATTER
NORTHSIDE COIN CLUB C IN CHATTER P.O. Box 1837 Broomfield, CO 80038-1837 June 2012 Founded in 2001, Member: ANA, CWNA Upcoming Meeting Announcement The monthly Northside Coin Club meeting will be held
More informationBIM 360 with AutoCAD Civil 3D, Autodesk Vault Collaboration AEC, and Autodesk Buzzsaw
BIM 360 with AutoCAD Civil 3D, Autodesk Vault Collaboration AEC, and Autodesk Buzzsaw James Wedding, P.E. Autodesk, Inc. CI4500 The modern design team does not end at the meeting room door, and by leveraging
More information8.2 Slippery Slopes. A Solidify Understanding Task
SECONDARY MATH I // MODULE 8 7 8.2 Slippery Slopes A Solidify Understanding Task CC BY https://flic.kr/p/kfus4x While working on Is It Right? in the previous module you looked at several examples that
More informationStorytelling Toolkit. Use this resource to help you craft stronger and more compelling stories. The Early Childhood Innovation Prize
Storytelling Toolkit Use this resource to help you craft stronger and more compelling stories. The Early Childhood Innovation Prize 1 Why Storytelling? We want to help you craft better stories so that
More informationTian, H. (HaiYun); Brooke, P. J. (Phillip); Bosser, A-G. (Anne-Gwenn)
TeesRep - Teesside's Research Repository Behaviour-based cheat detection in multiplayer games with Event-B Item type Authors Citation DOI Publisher Rights Meetings and Proceedings Tian, H. (HaiYun); Brooke,
More informationFormalising Concurrent UML State Machines Using Coloured Petri Nets
KSE 2014 October 10th, 2014 Hanoi Formalising Concurrent UML State Machines Using Coloured Petri Nets Étienne André, Mohamed Mahdi Benmoussa, Christine Choppy Université Paris 13, Sorbonne Paris Cité,
More informationStep by step success
Step by step success Guaranteed SUCCESS IF FOLLOWED EXACTLY! Completed: Listen to the Welcome/Orientation Tape. Choose your initial inventory level. Call Agnes to assist with placing order. Attend New
More informationWe're excited to announce that the next JAFX Trading Competition will soon be live!
COMPETITION Competition Swipe - Version #1 Title: Know Your Way Around a Forex Platform? Here s Your Chance to Prove It! We're excited to announce that the next JAFX Trading Competition will soon be live!
More informationMa/CS 6a Class 16: Permutations
Ma/CS 6a Class 6: Permutations By Adam Sheffer The 5 Puzzle Problem. Start with the configuration on the left and move the tiles to obtain the configuration on the right. The 5 Puzzle (cont.) The game
More informationCapability Through Collaboration
Capability Through Collaboration Success Factors in creating a capable ADF Capability Capability through collaboration through collaboration Mark Hodge CEO October 2017 DMTC Operational Context Vision:
More informationWith successful coaching you should be holding at least 1 out of every 3 appointments you book. WE WILL TAKE YOU THROUGH THE FOLLOWING 3 STEPS...
P OWER DO YOU NEED A great plan COACHING PROGRAM? A party worth booking is a party worth coaching! You ve booked them... now what? With successful coaching you should be holding at least 1 out of every
More informationDEMYSTIFYING DESIGN-BUILD. How to Make the Design-Build Process Simple and Fun
DEMYSTIFYING DESIGN-BUILD How to Make the Design-Build Process Simple and Fun What would your dream home look like? What would it feel like? What do you need, want, and wish for in the perfect house? It
More informationSalesforce Communities Recognition Badges Implementation Guide
Salesforce Communities Recognition Badges Implementation Guide Salesforce, Winter 19 @salesforcedocs Last updated: December 4, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce
More informationParty Date. Party Type
1 We are going to keep things simple and help you get results. This is a combination of different scripts, coaching systems and hostess programs. The idea is to connect with each potential guest through
More informationVARIATIONS ON NARROW DOTS-AND-BOXES AND DOTS-AND-TRIANGLES
#G2 INTEGERS 17 (2017) VARIATIONS ON NARROW DOTS-AND-BOXES AND DOTS-AND-TRIANGLES Adam Jobson Department of Mathematics, University of Louisville, Louisville, Kentucky asjobs01@louisville.edu Levi Sledd
More informationSOFTWARE ARCHITECTURE
SOFTWARE ARCHITECTURE Foundations, Theory, and Practice Richard N. Taylor University of California, Irvine Nenad Medvidovic University of Southern California Eric M. Dashofy The Aerospace Corporation WILEY
More informationMy Earnings from PeoplePerHour:
Hey students and everyone reading this post, since most of the readers of this blog are students, that s why I may call students throughout this post. Hope you re doing well with your educational activities,
More informationSection Summary. Finite Probability Probabilities of Complements and Unions of Events Probabilistic Reasoning
Section 7.1 Section Summary Finite Probability Probabilities of Complements and Unions of Events Probabilistic Reasoning Probability of an Event Pierre-Simon Laplace (1749-1827) We first study Pierre-Simon
More informationInvestigating Model-Based Autonomy for Solar Probe Plus.
Investigating Model-Based Autonomy for Solar Probe Plus. Workshop on Spacecraft Flight Software. December, 2013. Bill Van Besien Flight Software Engineer (Notice: This presentation does not contain export
More informationLesson 3: Arduino. Goals
Introduction: This project introduces you to the wonderful world of Arduino and how to program physical devices. In this lesson you will learn how to write code and make an LED flash. Goals 1 - Get to
More informationGraduate Programs in Advanced Systems Engineering
Graduate Programs in Advanced Systems Engineering UTC Institute for Advanced Systems Engineering, University of Connecticut Mission To train the engineer of the next decade: the one who is not constrained
More informationThe 30-Day Journaling Challenge
The 30-Day Journaling Challenge Welcome to The Sweet Setup s 30-Day Journaling Challenge! While you don t have to use Day One for the 30-Day Journaling Challenge, we have designed it with Day One in mind.
More informationThe On-Line Encyclopedia of Integer Sequences (OEIS)
The On-Line Encyclopedia of Integer Sequences (OEIS) Thotsaporn Aek Thanatipanonda Mahidol University, International College September 26, 2018 of Integer Sequences (OEIS) September 26, 2018 1 / 14 Introduction
More informationPhase 1: Ideation Getting Started with Concept Testing
Phase 1: Ideation Getting Started with Concept Testing The Social Venture Academy follows a lean-startup model. This means we guide you through figuring out as much as you can about your venture before
More informationiphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book.
iphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book. 1 Contents Chapter 1 3 Welcome to iphoto 3 What You ll Learn 4 Before
More informationSTUDY ON FIREWALL APPROACH FOR THE REGRESSION TESTING OF OBJECT-ORIENTED SOFTWARE
STUDY ON FIREWALL APPROACH FOR THE REGRESSION TESTING OF OBJECT-ORIENTED SOFTWARE TAWDE SANTOSH SAHEBRAO DEPT. OF COMPUTER SCIENCE CMJ UNIVERSITY, SHILLONG, MEGHALAYA ABSTRACT Adherence to a defined process
More informationG51PGP: Software Paradigms. Object Oriented Coursework 4
G51PGP: Software Paradigms Object Oriented Coursework 4 You must complete this coursework on your own, rather than working with anybody else. To complete the coursework you must create a working two-player
More informationHow we Got Here and Where to Take it. Scott Hudson HCI Institute Carnegie Mellon
How we Got Here and Where to Take it Scott Hudson HCI Institute Carnegie Mellon Instagram: Two guys, two years 30 million users (now 300 million) What made that possible? Enablers Making it easy to make
More informationSenior Math Circles February 10, 2010 Game Theory II
1 University of Waterloo Faculty of Mathematics Centre for Education in Mathematics and Computing Senior Math Circles February 10, 2010 Game Theory II Take-Away Games Last Wednesday, you looked at take-away
More informationThe EIS Planning Tool User's Guide
1 of 26 01/11/06 11:49 The EIS Planning Tool User's Guide The EIS Planning Tool User's Guide Introduction About This Guide Software Requirements Structure of a Study Line Lists Rasters Studies A Quick
More informationHow to Harness Your Hypercreativity for Success: The 2 Steps You Must Take Today
Page1 How to Harness Your Hypercreativity for Success: The 2 Steps You Must Take Today What s the secret to harnessing your creativity your hypercreativity to build the success you crave and know you deserve?
More informationLesson Activity Toolkit
Lesson Activity Toolkit Tool name Tool definition Ideas for tool use Screen shot of tool Activities Anagram Unscramble given letters to solve problems. Unscramble for word games Category sort - Category
More informationNSF. Hybrid Systems: From Models to Code. Tom Henzinger. UC Berkeley. French Guyana, June 4, 1996 $800 million embedded software failure
Hybrid Systems: From Models to Code Tom Henzinger UC Berkeley NSF UC Berkeley: Chess Vanderbilt University: ISIS University of Memphis: MSI Foundations of Hybrid and Embedded Software Systems French Guyana,
More informationHow to divide things fairly
MPRA Munich Personal RePEc Archive How to divide things fairly Steven Brams and D. Marc Kilgour and Christian Klamler New York University, Wilfrid Laurier University, University of Graz 6. September 2014
More informationA review of Reasoning About Rational Agents by Michael Wooldridge, MIT Press Gordon Beavers and Henry Hexmoor
A review of Reasoning About Rational Agents by Michael Wooldridge, MIT Press 2000 Gordon Beavers and Henry Hexmoor Reasoning About Rational Agents is concerned with developing practical reasoning (as contrasted
More informationWelcome to SENG 480B / CSC 485A / CSC 586A Self-Adaptive and Self-Managing Systems
Welcome to SENG 480B / CSC 485A / CSC 586A Self-Adaptive and Self-Managing Systems Dr. Hausi A. Müller Department of Computer Science University of Victoria http://courses.seng.uvic.ca/courses/2015/summer/seng/480a
More informationOn the Economics of Synthetic Biology: Is Openness Feasible?
On the Economics of Synthetic Biology: Is Openness Feasible? Joachim Henkel, Steve Maurer Technische Universität München, UC Berkeley SB 3.0, Zürich June 25, 2007 Sharing vs. Patenting what characterizes
More informationBuying and Holding Houses: Creating Long Term Wealth
Buying and Holding Houses: Creating Long Term Wealth The topic: buying and holding a house for monthly rental income and how to structure the deal. Here's how you buy a house and you rent it out and you
More information