Useful Links

Invited Speakers

Liliana CUCU-GROSJEAN, AOSTE, INRIA Paris-Rocquencourt, France

    Title: Probabilistic approaches for time critical embedded systems

    Abstract: An embedded system is a computing system with a dedicated function, embedded within a larger device,e.g., a defibrillator or an airplane. Today 95% of current processors are embedded, making embedded systems central computing systems of our society. Beside constraints like power consumption and weight, embedded systems may have time constraints and such systems are called time critical embedded systems. Time critical embedded systems design is mainly based on commercial processors with a good average time behavior. During the last twenty years different design solutions have been proposed through pessimistic estimation of performances of the processors (thus increased costs) while using average time behavior processors.

    A possible solution to decrease the pessimism while designing time critical embedded systems is to enrich existing models with appropriate probabilistic descriptions. Probabilistic description of a model provides more information to the designer while allowing several values for a parameter, or several states for a property. We define probabilistic upper bounds on all possible values or states as the probabilistic worst case reasoning ensuring the migration of probabilistic methods from modelling soft time constraints to analysing hard time constraints.Two common misconceptions concerning probabilistic time critical embedded systems are discussed: independence and the identical distribution. We summarize recent state-of-the-art research into probabilistic approaches, and we conclude with the main open challenges in this area.

    Gabriel CIOBANU, Romanian Academy, ICS, Iasi, Romania

      Title: Timeout Interaction and Migration in Distributed Systems

      Abstract: When modelling distributed systems it is useful to have an explicit notion of location, local clocks, timed migration and interaction. After introducing the timed distributed pi-calculus, we introduced and studied a formalism called TiMo bridging the gap between the existing process calculi and forthcoming realistic languages for multi-agent systems. Several variants were developed during the last years: a probabilistic extension pTiMo, a real-time version rTiMo, TiMo with access permissions. Interesting properties of distributed systems described by TiMo refer to various time constraints over process migration and communication, bounded liveness and optimal reachability. A verification tool called TiMo@PAT was developed by using an extensible platform for model checkers called PAT (Process Analysis Toolkit). A formal relationship between rTiMo and timed automata allows the use of model checking capabilities provided by UPPAAL. A probabilistic temporal logic called PLTM was introduced to verify properties of pTiMo processes making reference to temporal constraints over local clocks and multisets of actions.

      Short Bio: Gabriel Ciobanu is a senior researcher at the Romanian Academy of Sciences, and a professor at "A.I.Cuza" University of Iasi. He is also a visiting full professor at Newcastle University, School of Computing Science. His research interests include Distributed Systems and Concurrency, Natural Computation (Membrane Systems), and Theory of Programming (Semantics, Formal Methods, Algebraic Models). For his work, he received some Awards of the Romanian Academy of Sciences (2000, 2004 and 2013). Prof. Ciobanu is the Editor-in-Chief of the journal Scientific Annals of Computer Science. Webpage:

      Mohamed Kaâniche, LAAS, Toulouse, France

        Title: Title: Resilience assessment: accidental and malicious threats

        Abstract: A large body of research has been dedicated to the analysis, assessment and protection of cyber-physical systems and critical infrastructures against potential threats that might affect the dependability, the security or the resilience of the services delivered to the users. Traditionally, accidental and malicious threats have been taken into account separately. In this talk we will address the challenges raised by the resilience assessment and analysis of such systems considering accidental and malicious threats in an integrated way and we will present some examples of research studies carried out in this context.