Skip to main content
Log in

Symbolic verification of event–condition–action rules in intelligent environments

  • Original Article
  • Published:
Journal of Reliable Intelligent Environments Aims and scope Submit manuscript

Abstract

In this paper we show how state-of-the art SMT-based techniques for software verification can be employed in the verification of event–condition–action rules in intelligent environments. Moreover, we exploit the specific features of intelligent environments to optimise the verification process. We compare our approach with previous work in a detailed evaluation section, showing how it improves both performance and expressivity of the language for event–condition–action rules.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. It is available at https://gitlab.com/MichelangeloDiamanti/ecaProject.

  2. http://research.microsoft.com/en-us/um/redmond/projects/z3/z3-commercial-license.pdf.

References

  1. Barrett C, Stump A, Tinelli C, Boehme S, Cok D, Deharbe D, Dutertre B, Fontaine P, Ganesh V, Griggio A, Grundy J, Jackson P, Oliveras A, Krstiäg S, Moskal M, Moura LD, Sebastiani R, Cok TD, Hoenicke JC (2010) The SMT-LIB standard: version 2.0. In: Technical report, Department of Computer Science, The University of Iowa

  2. Berndtsson M, Mellin J (2009) ECA rules, pp 959–960. Springer, Boston. doi:10.1007/978-0-387-39940-9_504

  3. Beyer D, Stahlbauer A (2014) BDD-based software verification. Int J Softw Tools Technol Transf 16(5):507–518. doi:10.1007/s10009-014-0334-1

  4. Beyer D, Wendler P (2012) Algorithms for software model checking: predicate abstraction vs. impact. In: 2012 formal methods in computer-aided design (FMCAD), pp 106–113

  5. Bryant RE (1986) Graph-based algorithms for Boolean function manipulation. IEEE Trans Comput 35(8):677–691. doi:10.1109/TC.1986.1676819

  6. Cano J, Delaval G, Rutten E (2014) Coordination models and languages. In: 16th IFIP WG 6.1 international conference, coordination 2014, held as part of the 9th international federated conferences on distributed computing techniques, DisCoTec 2014, Berlin, 3–5 June 2014. Proceedings, chapter Coordination of ECA rules by verification and control, pp 33–48. Springer, Berlin. doi:10.1007/978-3-662-43376-8_3

  7. Corradini F, Culmone R, Mostarda L, Tesei L, Raimondi F (2015) A constrained ECA language supporting formal verification of WSNs. In: 29th IEEE international conference on advanced information networking and applications workshops, AINA 2015 workshops, Gwangju, 24–27 March 2015, pp 187–192. doi:10.1109/WAINA.2015.109

  8. De Moura L, Bjørner N (2008) Z3: an efficient SMT solver. In: Proceedings of the theory and practice of software, 14th international conference on tools and algorithms for the construction and analysis of systems, TACAS’08/ETAPS’08, pp 337–340. Springer, Berlin. http://dl.acm.org/citation.cfm?id=1792734.1792766

  9. De Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Brazilian symposium on formal methods, pp 23–36. Springer, New York

  10. Delaval G, Rutten E, Marchand H (2013) Integrating discrete controller synthesis into a reactive programming language compiler. Discrete Event Dyn Syst 23(4):385–418. doi:10.1007/s10626-013-0163-5

    Article  MATH  Google Scholar 

  11. Dijkstra EW (1975) Guarded commands, nondeterminacy and formal derivation of programs. Commun ACM 18(8):453–457. doi:10.1145/360933.360975

  12. Dumas M, Hofstede AHMT (2001) UML activity diagrams as a workflow specification language. In: Proceedings of the fourth international conference on the unified modeling language, modeling languages, concepts, and tools. Springer, London, pp 76–90. http://dl.acm.org/citation.cfm?id=647245.719456

  13. Ericsson A (2009) Enabling tool support for formal analysis of ECA rules. Ph.D. thesis, University of Skövde

  14. Gries D (1989) The science of programming. Monographs in computer science. Springer, New York

    Google Scholar 

  15. Gu T, Wang XH, Pung HK, Zhang DQ (2004) An ontology-based context model in intelligent environments. In: Proceedings of communication networks and distributed systems modeling and simulation conference, vol 2004, San Diego, pp 270–275

  16. Jin X, Lembachar Y, Ciardo G (2013) Symbolic verification of ECA rules. In: Joint proceedings of the international workshop on petri nets and software engineering (PNSE’13) and the international workshop on modeling and business environments (ModBE’13), Milano, 24–25 June 2013, pp 41–59. http://ceur-ws.org/Vol-989/paper17.pdf

  17. Lee WS, Lee SY, Lee KC (2007) Conflict detection and resolution method in WS-ECA framework. In: The 9th international conference on advanced communication technology, vol 1, pp 786–791. IEEE, New York

  18. Marchand H, Bournai P, Borgne ML, Guernic PL (2000) Synthesis of discrete-event controllers based on the signal environment. Discrete Event Dyn Syst 10(4):325–346. doi:10.1023/A:1008311720696

  19. Mostarda L, Marinovic S, Dulay N (2010) Distributed orchestration of pervasive services. In: 24th IEEE IAINA 2010, Perth, 13–20 April 2010, pp 166–173

  20. Sun Y, Wang X, Luo H, Li X (2015) Conflict detection scheme based on formal rule model for smart building systems. IEEE Trans Hum Mach Syst 45(2):215–227. doi:10.1109/THMS.2014.2364613

    Article  Google Scholar 

  21. Vannucchi C, Cacciagrano DR, Corradini F, Culmone R, Mostarda L, Raimondi F, Tesei L (2016) A formal model for event-condition-action rules in intelligent environments. In: Proceedings of the 11th international conference on intelligent environments, pp 56–65. doi:10.3233/978-1-61499-690-3-56

  22. Whitmore A, Agarwal A, Da Xu L (2015) The internet of things—a survey of topics and trends. Inf Syst Front 17(2):261–274. doi:10.1007/s10796-014-9489-2

  23. Yoon JP (1989) Techniques for data and rule validation in knowledge based systems. In: Computer assurance, 1989. In: Proceedings of the fourth annual conference on COMPASS ’89, ’systems integrity, software safety and process security’, pp 62–70. doi:10.1109/CMPASS.1989.76042

  24. Zhang J, Moyne J, Tilbury D (2008) Verification of ECA rule based management and control systems. In: 2008 IEEE international conference on automation science and engineering, pp 1–7. doi:10.1109/COASE.2008.4626431

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Claudia Vannucchi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vannucchi, C., Diamanti, M., Mazzante, G. et al. Symbolic verification of event–condition–action rules in intelligent environments. J Reliable Intell Environ 3, 117–130 (2017). https://doi.org/10.1007/s40860-017-0036-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40860-017-0036-z

Keywords

Navigation