Verification for Autonomous Underwater Systems

  • Christoph LüthEmail author
  • Nicole Megow
  • Rolf Drechsler
  • Udo Frese
Part of the Intelligent Systems, Control and Automation: Science and Engineering book series (ISCA, volume 96)


Since underwater systems operate out of immediate reach, often autonomously, for extended periods of time, the correctness of both the software and hardware constituting these systems is of high concern. In this contribution, we review existing techniques to ensure the correctness of hardware and software using formal methods, and assess their applicability to underwater robotics. We identify several promising areas: system modelling, program verification and algorithm design for guaranteed efficiency and correctness (certifying algorithms).


  1. 1.
    Albers S (2010) Energy-efficient algorithms. Commun ACM 53(5):86–96CrossRefGoogle Scholar
  2. 2.
    Alkassar E, Bohme S, Mehlhorn K, Schweitzer P (2011) An introduction to certifying algorithms. IT–Inf Technol 53:287–293Google Scholar
  3. 3.
    Bampis E, Kononov AV, Letsios D, Lucarelli G, Sviridenko M (2018) Energy-efficient scheduling and routing via randomized rounding. J Sched 21(1):35–51MathSciNetCrossRefGoogle Scholar
  4. 4.
    Blum M, Kannan S (1995) Designing programs that check their work. J ACM 42(1):269–291CrossRefGoogle Scholar
  5. 5.
    Bonifaci V, Chan H-L, Marchetti-Spaccamela A, Megow N (2012) Algorithms and complexity for periodic real-time scheduling. ACM Trans Algorithms 9:601–619MathSciNetCrossRefGoogle Scholar
  6. 6.
    Bonifaci V, Marchetti-Spaccamela A, Megow N, Wiese A (2013) Polynomial-time exact schedulability tests for harmonic real-time tasks. In: Proceedings of RTSS. IEEE, pp 236–245Google Scholar
  7. 7.
    Chen L, Megow N, Rischke R, Stougie L (2015) Stochastic and robust scheduling in the cloud. In: Proceedings of APPROX, LIPIcs,vol 40. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, pp 175–186Google Scholar
  8. 8.
    Chen L, Megow N, Schewior K (2018) An \(\cal{O}(\log m)\)-competitive algorithm for online machine minimization. SIAM J Comput 47(6):2057–2077MathSciNetCrossRefGoogle Scholar
  9. 9.
    Irani S, Pruhs K (2005) Algorithmic problems in power management. SIGACT News 36(2):63–76CrossRefGoogle Scholar
  10. 10.
    Klein G (2010) The L4. Verified project: next steps. In: Proceedings of the third international conference on verified software: theories, tools, experiments, VSTTE’10. Springer, Berlin, pp 86–96CrossRefGoogle Scholar
  11. 11.
    Koczor A, Matoga L, Penkala P, Pawlak A (2016) Verification approach based on emulation technology. In: International symposium on design and diagnostics of electronic circuits & systems (DDECS), pp 169–174Google Scholar
  12. 12.
    Kühne U, Beyer S, Bormann J, Barstow J (2010) Automated formal verification of processors based on architectural models. Form Methods Comput Aided Des 9:129–136Google Scholar
  13. 13.
    Le HM, Große D, Herdt V, Drechsler R (2013) Verifying System C using an intermediate verification language and symbolic simulation. In: Design automation conference, pp 116Google Scholar
  14. 14.
    LEDA (Library of Efficient Data Types and Algorithms).
  15. 15.
    Leroy X (2009) Formal verification of a realistic compiler. Commun ACM 52(7):107–115CrossRefGoogle Scholar
  16. 16.
    Lüth C, Ring M, Drechsler R (2017) Towards a methodology for self-verification. In: Khatri S (ed) 6th International conference on reliability, infocom technologies and optimization (ICRITO 2017)Google Scholar
  17. 17.
    Lüth C, Walter D (2009) Certifiable specification and verification of C programs. In: FM 2009: Formal methods, Lecture notes in computer science, vol 5350. Springer, pp 419–434Google Scholar
  18. 18.
    McConnell RM, Mehlhorn K, Näher S, Schweitzer P (2011) Certifying algorithms. Comput Sci Rev 5(2):119–161CrossRefGoogle Scholar
  19. 19.
    Megow N, Mehlhorn K, Schweitzer P (2012) Online graph exploration: new results on old and new algorithms. Theor Comput Sci 463:62–72MathSciNetCrossRefGoogle Scholar
  20. 20.
    Megow N, Skutella M, Verschae J, Wiese A (2016) The power of recourse for online MST and TSP. SIAM J Comput 45:859–880MathSciNetCrossRefGoogle Scholar
  21. 21.
    Megow N, Uetz M, Vredeveld T (2006) Models and algorithms for stochastic online scheduling. Math Oper Res 31(3):513–525MathSciNetCrossRefGoogle Scholar
  22. 22.
    Megow N, Verschae J (2018) Dual techniques for scheduling on a machine with varying speed. SIAM J Discret Math 32:1541–1571MathSciNetCrossRefGoogle Scholar
  23. 23.
    Nipkow T, Paulson LC, Wenzel M (2002) Isabelle/HOL: a proof assistant for higher-order logic, vol 2283. Lecture notes in computer science. SpringerGoogle Scholar
  24. 24.
    Ring M, Bornebusch F, Lüth C, Wille R, Drechsler R (2019) Better late than never: verification of embedded systems after deployment. In: Design, automation and test in Europe. Florence, Italy. IEEEGoogle Scholar
  25. 25.
    Smith D, Simpson K (2004) Functional safety, 2nd edn. ElsevierGoogle Scholar
  26. 26.
    Täubig H, Frese U, Hertzberg C, Lüth C, Mohr S, Vorobev E, Walter D (2012) Guaranteeing functional safety: design for provability and computer-aided verification. Auton Robot 32:303–331CrossRefGoogle Scholar
  27. 27.
    Thrun S, Martin C, Liu Y, Hahnel D, Emery-Montemerlo R, Chakrabarti D, Burgard W (2004) A real-time expectation-maximization algorithm for acquiring multiplanar maps of indoor environments with mobile robots. IEEE Trans Robot Autom 20(3):433–443CrossRefGoogle Scholar
  28. 28.
    Yao FF, Demers AJ, Shenker S (1995) A scheduling model for reduced CPU energy. In: Proceedings of the 36th annual symposium on foundations of computer science (FOCS 1995), pp 374–382Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Christoph Lüth
    • 1
    Email author
  • Nicole Megow
    • 2
  • Rolf Drechsler
    • 1
  • Udo Frese
    • 1
  1. 1.Deutsches Forschungszentrum für Künstliche Intelligenz (DFKI) and University of BremenBremenGermany
  2. 2.University of BremenBremenGermany

Personalised recommendations