Abstract Co-evolution accounts have generally been used to describe how problems and solutions both change during the design process. More generally, problems and solutions can be considered as analytic categories, where change is seen to occur within categories or across categories. There are more categories of interest than just problems and solutions, for example, the participants in a design process (such as members of a design team or different design teams) and categories defined by design ontologies (such as function-behaviour-structure or concept-knowledge). In this paper, we consider the co-evolution of different analytic categories (not just problems and solutions), by focussing on how changes to a category originate either from inside or outside that category. We then illustrate this approach by applying it to data from a single design session using three different systems of categorisation (problems and solutions, different designers and function, behaviour and structure). This allows us to represent the reciprocal influence of change within and between these different categories, while using a common notation and common approach to graphing quantitative data. Our approach demonstrates how research traditions that are currently distinct from each other (such as co-evolution, collaboration and function-behaviour-structure) can be connected by a single analytic approach.
more »
« less
Do Not Overpay for Fault Tolerance!
In this paper, we argue that distributed real-time and embedded systems sometimes 'overpay' for fault tolerance, by using a protocol that is more powerful than what is actually needed, or by failing to take advantage of unique features in these systems. As a result, these systems sometimes perform more computation or communication than is strictly necessary, or they can be unnecessarily complex, and thus more difficult to analyze. We take a look at the design space for two common problems, broadcast and consensus, and we show that, in a number of scenarios that would be common in real-time systems, these problems have trivial solutions. We then examine two solutions from the literature and propose alternatives that are substantially simpler, less expensive, and more reliable.
more »
« less
- PAR ID:
- 10282458
- Date Published:
- Journal Name:
- Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS '21)
- Page Range / eLocation ID:
- 374 to 386
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
The confluent hypergeometric equation, also known as Kummer's equation, is one of the most important differential equations in physics, chemistry, and engineering. Its two power series solutions are the Kummer function, M(a,b,z), often referred to as the confluent hypergeometric function of the first kind, and M ≡ z1-bM(1+a-b, 2-b,z), where a and b are parameters that appear in the differential equation. A third function, the Tricomi function, U(a,b,z), sometimes referred to as the confluent hypergeometric function of the second kind, is also a solution of the confluent hypergeometric equation that is routinely used. Contrary to common procedure, all three of these functions (and more) must be considered in a search for the two linearly independent solutions of the confluent hypergeometric equation. There are situations, when a, b, and a - b are integers, where one of these functions is not defined, or two of the functions are not linearly independent, or one of the linearly independent solutions of the differential equation is different from these three functions. Many of these special cases correspond precisely to cases needed to solve problems in physics. This leads to significant confusion about how to work with confluent hypergeometric equations, in spite of authoritative references such as the NIST Digital Library of Mathematical Functions. Here, we carefully describe all of the different cases one has to consider and what the explicit formulas are for the two linearly independent solutions of the confluent hypergeometric equation. The procedure to properly solve the confluent hypergeometric equation is summarized in a convenient table. As an example, we use these solutions to study the bound states of the hydrogenic atom, correcting the standard treatment in textbooks. We also briefly consider the cutoff Coulomb potential. We hope that this guide will aid physicists to properly solve problems that involve the confluent hypergeometric differential equation.more » « less
-
Model predictive control (MPC) provides a useful means for controlling systems with constraints, but suffers from the computational burden of repeatedly solving an optimization problem in real time. Offline (explicit) solutions for MPC attempt to alleviate real time computational challenges using either multiparametric programming or machine learning. The multiparametric approaches are typically applied to linear or quadratic MPC problems, while learning-based approaches can be more flexible and are less memory-intensive. Existing learning-based approaches offer significant speedups, but the challenge becomes ensuring constraint satisfaction while maintaining good performance. In this paper, we provide a neural network parameterization of MPC policies that explicitly encodes the constraints of the problem. By exploring the interior of the MPC feasible set in an unsupervised learning paradigm, the neural network finds better policies faster than projection-based methods and exhibits substantially shorter solve times. We use the proposed policy to solve a robust MPC problem, and demonstrate the performance and computational gains on a standard test system.more » « less
-
Narrative planning generates a sequence of actions which must achieve the author's goal for the story and must be composed only of actions that make sense for the characters who take them. A causally necessary action is one that would make the plan impossible to execute if it were left out. We hypothesize that action sequences which are solutions to narrative planning problems are more likely to feature causally necessary actions than those which are not solutions. In this paper, we show that prioritizing sequences with more causally necessary actions can lead to solutions faster in ten benchmark story planning problems.more » « less
-
Distributed protocols should be robust to both benign malfunction (e.g. packet loss or delay) and attacks (e.g. message replay). In this paper we take a formal approach to the automated synthesis of attackers, i.e. adversarial processes that can cause the protocol to malfunction. Specifically, given a formal threat model capturing the distributed protocol model and network topology, as well as the placement, goals, and interface of potential attackers, we automatically synthesize an attacker. We formalize four attacker synthesis problems - across attackers that always succeed versus those that sometimes fail, and attackers that may attack forever versus those that may not - and we propose algorithmic solutions to two of them. We report on a prototype implementation called KORG and its application to TCP as a case-study. Our experiments show that KORG can automatically generate well-known attacks for TCP within seconds or minutes.more » « less
An official website of the United States government

