Simulation

The imitation of the operation of a real-world process or system over time.
event

Visible to the public  VECoS 2018
Sep 26, 2018 7:00 am - Sep 28, 2018 6:00 pm CEST

12th International Conference on Verification and Evaluation of Computer and Communication Systems (VECoS 2018)

The VECoS conference series focuses on the analysis of computer and communication systems, where functional and extra-functional properties are inter-related. VECoS encourages the cross fertilization between the various formal verification and evaluation approaches, methods and techniques, especially those developed for concurrent and distributed hardware/software systems.

Topics of interest include, but are not limited to:

file

Visible to the public Interdisciplinary Undergraduate Workshop on Dynamics of Excitable Systems

This project is a component of a larger effort is to develop the foundations of modeling, synthesis and development of verified medical device software and systems from verified closed-loop models of the device and organ(s). This research spans both implantable medical devices such as cardiac pacemakers and physiological control systems such as drug infusion pumps which have multiple networked medical systems. Here we focus on an education and outreach activity associated with the project.

file

Visible to the public Modal Logic and Bisimulation for Generalized Synchronization Trees

This poster surveys results obtained by the project team in the area of logical characterizations for bisimulation over a general mathematical model for cyber-physical systems (CPSs) called Generalized Synchronization Trees (GSTs). GSTs extend traditional models for discrete-event systems with capabilities for modeling non-discrete behavior, and are intended to serve as a vehicle for giving mathematically well-defined notions of compositions for CPSs. Bisimulation represents a notion of equivalence over GSTs that captures when two GSTs are indistinguishable to an outside observer.

file

Visible to the public Model-based Specification Reconstruction

This poster surveys results in the area of specification reconstruction for system models obtained by teams from the University of Maryland and Fraunhofer Center as part of the NSF CPS Frontier program "CyberCardia". The specification-reconstruction problem is this: given a system model, and a template of a property describing a pattern of behavior, determine how to complete the template so that the resulting property holds for all behaviors of the system.

file

Visible to the public CPS: Synergy: Collaborative Research: Safe and Efficient Cyber-Physical Operation System for Construction Equipment

Equipment operation represents one of the most dangerous tasks on a construction sites and accidents related to such operation often result in death and property damage on the construction site and the surrounding area. Such accidents can also cause considerable delays and disruption, and negatively impact the efficiency of operations. This Cyber Physical System (CPS) research project will conduct research to improve the safety and efficiency of cranes by integrating advances in robotics, computer vision, and construction management.

file

Visible to the public CPS: Synergy: Cyber Physical Regional Freight Transportation

In this project we consider the development of a Cyber Physical Freight Transportation System for load balancing in multimodal transportation networks. We use on line simulation models to capture the nonlinear and complex dynamical characteristics of the transportation networks. The simulation models generate the states of the network that are used to solve an optimization problem which finds the optimum routes.

file

Visible to the public CAREER: Resilient Design of Networked Infrastructure Systems: Models, Validation, and Synthesis

This project advances the scientific knowledge on design methods for improving the resilience of civil infrastructures to disruptions. To improve resilience, critical services in civil infrastructure sectors must utilize new diagnostic tools and control algorithms that ensure survivability in the presence of both security attacks and random faults, and also include the models of incentives of human decision makers in the design process.