• No results found

Modelling and analysis of real-time coordination patterns Kemper, S.

N/A
N/A
Protected

Academic year: 2021

Share "Modelling and analysis of real-time coordination patterns Kemper, S."

Copied!
2
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

Modelling and analysis of real-time coordination patterns

Kemper, S.

Citation

Kemper, S. (2011, December 20). Modelling and analysis of real-time coordination patterns. IPA Dissertation Series. BOXPress BV, 2011-24. Retrieved from

https://hdl.handle.net/1887/18260

Version: Corrected Publisher’s Version

License: Licence agreement concerning inclusion of doctoral thesis in the Institutional Repository of the University of Leiden

Downloaded from: https://hdl.handle.net/1887/18260

Note: To cite this publication please use the final published version (if applicable).

(2)

Stellingen

behorende bij het proefschrift

Modelling and Analysis of Real-Time Coordination Patterns door Stephanie Kemper

1. Timed Automata have been an adequate formalism to model real-time systems for almost 15 years. Within this period, the number of features that software systems are required to support has increased to a large extent. It is about time that Timed Automata make room for more up-to-date formalisms (Chapter 2).

2. Satisfiability Modulo Theory (SMT) is a relatively recent field of research, which combines the performance and efficiency achievements of SAT solvers with the possibility to include constraints (of a certain theory) that as such are not expressible in propositional logic.

We expect SMT solvers to benefit from SMT competitions in the same way as SAT solvers have benefited from SAT competitions, which makes SMT solvers promising candidates for the verification of large systems (Chapter 3).

3. Automatically finding suitable abstractions—whether depending on or independent from the property under test—is a difficult task. Nevertheless, to support system developers in the design and analysis process as much as possible, it should be an ultimate goal in this field of research to develop fully automatic abstraction refinement techniques for real-time coordination patterns (Chapter 4).

4. While computer scientists and researchers can work very well with mental models only (i.e., without having to visualise them in any way), for non-experts it is important to pro- vide tool support to visualise their mental models. This is particularly true for automata- based models of for example component-based real-time systems. (Chapter 5).

5. The results of Bounded Model Checking seem to be bounded, but in addition to existing (admittedly theoretical) completeness thresholds, a number of approaches exist that can turn Bounded Model Checking into Unbounded Model Checking.

6. Abstraction techniques loose information and gain information at the same time.

7. Correctness of coordination patterns is more important than correctness of the coordi- nated components.

8. It is important to be able to express and impose upper time bounds on the reaction times of component-based systems, but it is equally important to be able to express and impose lower time bounds.

9. To broaden your mind, you should go abroad, even if this is closer in distance than going to some place in your own country.

10. Good coffee machines are bad for devout tea drinkers.

11. If you want your grandmother to be able to answer the question “What is your grand- daughter’s profession?” properly, do NOT work in theoretical computer science. This is equally true if you want other people to not be stunned or to not be confused when you tell them about your profession.

12. In contrast to what seems to be common knowledge, computer science is a very diversified field, with many different research directions. This unfortunately means that computer scientists are not able to instantaneously solve every computer related problem.

Referenties

GERELATEERDE DOCUMENTEN

It is easy to say that we should aim at 50 percent of female mathematicians in our countries, but maybe we will never achieve this goal because there might not be a sufficiently

After the TCA has delayed in location s for a positive amount of time, 5 during which the invariant I(s) of s needs to be satisfied, it executes the transition and moves to location s

License: Licence agreement concerning inclusion of doctoral thesis in the Institutional Repository of the University of Leiden Downloaded.

The work in this thesis has been carried out at the Centrum Wiskunde & Infor- matica (CWI), and under the auspices of the research school IPA (Institute for Programming research

In Section 2.4, we extend the formal model of Timed Network Automata, as presented in [Kem10], with memory cells and concrete data values, and define a formal syntax and semantics..

After the TCA has delayed in location s for a positive amount of time, 5 during which the invariant I(s) of s needs to be satisfied, it executes the transition and moves to location s

4 Without confusion, we use the same formula identifiers for all real-time systems.. All clocks are updated according to their value under λ, data flows through all ports p contained

• by CC(X)| S , we denote the set of clock constraints over clock variables in X that occur in the formula representation of a real-time system S; by DC(P DA ,D CO )| S , we denote