Zusammenfassung
Da Unterwassersysteme oft autonom und über längere Zeiträume außerhalb der unmittelbaren Reichweite arbeiten, ist die Korrektheit sowohl der Software als auch der Hardware, die diese Systeme bilden, von großer Bedeutung. In diesem Beitrag überprüfen wir bestehende Techniken zur Sicherstellung der Korrektheit von Hardware und Software mit formalen Methoden und bewerten ihre Anwendbarkeit auf Unterwasserrobotik. Wir identifizieren mehrere vielversprechende Bereiche: Systemmodellierung, Programmverifikation und Algorithmusdesign für garantierte Effizienz und Korrektheit (zertifizierende Algorithmen).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In der oben genannten Form fehlt allerdings die Anforderung, dass out tatsächlich einer der Punkte in ps ist.
Literatur
Albers S (2010) Energy-efficient algorithms. Commun ACM 53(5):86–96
Alkassar E, Bohme S, Mehlhorn K, Schweitzer P (2011) An introduction to certifying algorithms. IT–Inf Technol 53:287–293
Bampis E, Kononov AV, Letsios D, Lucarelli G, Sviridenko M (2018) Energy-efficient scheduling and routing via randomized rounding. J Sched 21(1):35–51
Blum M, Kannan S (1995) Designing programs that check their work. J ACM 42(1):269–291
Bonifaci V, Chan H-L, Marchetti-Spaccamela A, Megow N (2012) Algorithms and complexity for periodic real-time scheduling. ACM Trans Algorithms 9:601–619
Bonifaci V, Marchetti-Spaccamela A, Megow N, Wiese A (2013) Polynomial-time exact schedulability tests for harmonic real-time tasks. In: Proceedings of RTSS. IEEE, S 236–245
Chen L, Megow N, Rischke R, Stougie L (2015) Stochastic and robust scheduling in the cloud. In: Proceedings of APPROX, LIPIcs,vol 40. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, S 175–186
Chen L, Megow N, Schewior K (2018) An \(\cal{O}(\log m)\)-competitive algorithm for online machine minimization. SIAM J Comput 47(6):2057–2077
Irani S, Pruhs K (2005) Algorithmic problems in power management. SIGACT News 36(2):63–76
Klein G (2010) The L4. Verified project: next steps. In: Proceedings of the third international conference on verified software: theories, tools, experiments, VSTTE’10. Springer, Berlin, S 86–96
Koczor A, Matoga L, Penkala P, Pawlak A (2016) Verification approach based on emulation technology. In: International symposium on design and diagnostics of electronic circuits & systems (DDECS), S 169–174
Kühne U, Beyer S, Bormann J, Barstow J (2010) Automated formal verification of processors based on architectural models. Form Methods Comput Aided Des 9:129–136
Le HM, Große D, Herdt V, Drechsler R (2013) Verifying System C using an intermediate verification language and symbolic simulation. In: Design automation conference, S 116
LEDA (Library of Efficient Data Types and Algorithms). www.algorithmic-solutions.com
Leroy X (2009) Formal verification of a realistic compiler. Commun ACM 52(7):107–115
Lüth C, Ring M, Drechsler R (2017) Towards a methodology for self-verification. In: Khatri S (Hrsg) 6th International conference on reliability, infocom technologies and optimization (ICRITO 2017)
Lüth C, Walter D (2009) Certifiable specification and verification of C programs. In: FM 2009: Formal methods, Lecture notes in computer science, vol 5350. Springer, S 419–434
McConnell RM, Mehlhorn K, Näher S, Schweitzer P (2011) Certifying algorithms. Comput Sci Rev 5(2):119–161
Megow N, Mehlhorn K, Schweitzer P (2012) Online graph exploration: new results on old and new algorithms. Theor Comput Sci 463:62–72
Megow N, Skutella M, Verschae J, Wiese A (2016) The power of recourse for online MST and TSP. SIAM J Comput 45:859–880
Megow N, Uetz M, Vredeveld T (2006) Models and algorithms for stochastic online scheduling. Math Oper Res 31(3):513–525
Megow N, Verschae J (2018) Dual techniques for scheduling on a machine with varying speed. SIAM J Discret Math 32:1541–1571
Nipkow T, Paulson LC, Wenzel M (2002) Isabelle/HOL: a proof assistant for higher-order logic, vol 2283. Lecture notes in computer science. Springer
Ring M, Bornebusch F, Lüth C, Wille R, Drechsler R (2019) Better late than never: verification of embedded systems after deployment. In: Design, automation and test in Europe. Florence, Italy. IEEE
Smith D, Simpson K (2004) Functional safety, 2. Aufl. Elsevier
Täubig H, Frese U, Hertzberg C, Lüth C, Mohr S, Vorobev E, Walter D (2012) Guaranteeing functional safety: design for provability and computer-aided verification. Auton Robot 32:303–331
Thrun S, Martin C, Liu Y, Hahnel D, Emery-Montemerlo R, Chakrabarti D, Burgard W (2004) A real-time expectation-maximization algorithm for acquiring multiplanar maps of indoor environments with mobile robots. IEEE Trans Robot Autom 20(3):433–443
Yao FF, Demers AJ, Shenker S (1995) A scheduling model for reduced CPU energy. In: Proceedings of the 36th annual symposium on foundations of computer science (FOCS 1995), S 374–382
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 Der/die Autor(en), exklusiv lizenziert an Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lüth, C., Megow, N., Drechsler, R., Frese, U. (2023). Verifizierung für autonome Unterwassersysteme. In: Kirchner, F., Straube, S., Kühn, D., Hoyer, N. (eds) KI-Technologie für Unterwasserroboter. Springer Vieweg, Cham. https://doi.org/10.1007/978-3-031-42369-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-42369-7_15
Published:
Publisher Name: Springer Vieweg, Cham
Print ISBN: 978-3-031-42368-0
Online ISBN: 978-3-031-42369-7
eBook Packages: Computer Science and Engineering (German Language)