Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Enrico Tronci is active.

Publication


Featured researches published by Enrico Tronci.


formal methods | 2006

Finite horizon analysis of Markov Chains with the Murϕ verifier

Giuseppe Della Penna; Benedetto Intrigila; Igor Melatti; Enrico Tronci; Marisa Venturini Zilli

In this paper we present an explicit disk-based verification algorithm for Probabilistic Systems defining discrete time/finite state Markov Chains. Given a Markov Chain and an integer k (horizon), our algorithm checks whether the probability of reaching an error state in at most k steps is below a given threshold. We present an implementation of our algorithm within a suitable extension of the Murϕ verifier. We call the resulting probabilistic model checker FHP-Murϕ (Finite Horizon ProbabilisticMurϕ). We present experimental results comparing FHP-Murϕ with (a finite horizon subset of) PRISM, a state-of-the-art symbolic model checker for Markov Chains. Our experimental results show that FHP-Murϕ can handle systems that are out of reach for PRISM, namely those involving arithmetic operations on the state variables (e.g. hybrid systems).


international conference on formal engineering methods | 1998

Automatic synthesis of controllers from formal specifications

Enrico Tronci

Many safety critical reactive systems are indeed embedded control systems. Usually a control system can be partitioned into two main subsystems: a controller and a plant. Roughly speaking: the controller observes the state of the plant and sends commands (stimulus) to the plant to achieve predefined goals. We show that when the plant can be modeled as a deterministic finite state system (FSS) it is possible to effectively use formal methods to automatically synthesize the program implementing the controller from the plant model and the given formal specifications for the closed loop system (plant+controller). This guarantees that the controller program is correct by construction. To the best of our knowledge there is no previously published effective algorithm to extract executable code for the controller from closed loop formal specifications. We show practical usefulness of our techniques by giving experimental results on their use to synthesize C programs implementing optimal controllers (OCs) for plants with more than 10/sup 9/ states.


asia-pacific software engineering conference | 2001

A probabilistic approach to automatic verification of concurrent systems

Enrico Tronci; G. Della Penna; Benedetto Intrigila; Marisa Venturini Zilli

The main barrier to automatic verification of concurrent systems is the huge amount of memory required to complete the verification task (state explosion). In this paper we present a probabilistic algorithm for automatic verification via model checking. Our algorithm trades space with time. In particular, when memory is full because of state explosion our algorithm does not give up verification. Instead it just proceeds at a lower speed and its results will only hold with some arbitrarily small error probability. Our preliminary experimental results show that by using our probabilistic algorithm we can typically save more than 30% of RAM with an average time penalty of about 100% w.r.t. a deterministic state space exploration with enough memory to complete the verification task. This is better than giving up the verification task because of lack of memory.


Reliability Engineering & System Safety | 2003

Fluid Petri Nets and hybrid model-checking: a comparative case study

Marco Gribaudo; András Horváth; Andrea Bobbio; Enrico Tronci; Ester Ciancamerla; Michele Minichino

The modeling and analysis of hybrid systems is a recent and challenging research area which is actually dominated by two main lines: a functional analysis based on the description of the system in terms of discrete state (hybrid) automata (whose goal is to ascertain conformity and reachability properties), and a stochastic analysis (whose aim is to provide performance and dependability measures). This paper investigates a unifying view between formal methods and stochastic methods by proposing an analysis methodology of hybrid systems based on Fluid Petri Nets (FPNs). FPNs can be analyzed directly using appropriate tools. Our paper shows that the same FPN model can be fed to different functional analyzers for model checking. In order to extensively explore the capability of the technique, we have converted the original FPN into languages for discrete as well as hybrid as well as stochastic model checkers. In this way, a first comparison among the modeling power of well known tools can be carried out. Our approach is illustrated by means of a ‘real world’ hybrid system: the temperature control system of a co-generative plant. q 2003 Elsevier Ltd. All rights reserved.


formal methods in computer aided design | 2002

Exploiting Transition Locality in the Disk Based Mur phi Verifier

Giuseppe Della Penna; Benedetto Intrigila; Enrico Tronci; Marisa Venturini Zilli

The main obstruction to automatic verification of Finite State Systems is the huge amount of memory required to complete the verification task (state explosion). This motivates research on distributed as well as disk based verification algorithms.In this paper we present a disk based Breadth First Explicit State Space Exploration algorithm as well as an implementation of it within the Mur? verifier. Our algorithm exploits transition locality (i.e. the statistical fact that most transitions lead to unvisited states or to recently visited states) to decrease disk read accesses thus reducing the time overhead due to disk usage.A disk based verification algorithm for Mur? has been already proposed in the literature. To measure the time speed up due to locality exploitation we compared our algorithm with such previously proposed algorithm. Our experimental results show that our disk based verification algorithm is typically more than 10 times faster than such previously proposed disk based verification algorithm.To measure the time overhead due to disk usage we compared our algorithm with RAM based verification using the (standard) Mur? verifier with enough memory to complete the verification task. Our experimental results show that even when using 1/10 of the RAM needed to complete verification, our disk based algorithm is only between 1.4 and 5.3 times (3 times on average) slower than (RAM) Mur? with enough RAM memory to complete the verification task at hand.Using our disk based Mur? we were able to complete verification of a protocol with about 109 reachable states. This would require more than 5 gigabytes of RAM using RAM based Mur?.


Lecture Notes in Computer Science | 2001

Exploiting Transition Locality in Automatic Verification

Enrico Tronci; Giuseppe Della Penna; Benedetto Intrigila; Marisa Venturini Zilli

In this paper we present an algorithm to contrast state explosion when using Explicit State Space Exploration to verify protocols. We show experimentally that protocols exhibit transition locality. We present a verification algorithm that exploits transition locality as well as an implementation of it within the Murϕ verifier. Our algorithm is compatible with all Breadth First (BF) optimization techniques present in the Murϕ verifier and it is by no means a substitute for any of them. In fact, since our algorithm trades space with time, it is typically most useful when one runs out of memory and has already used all other state reduction techniques present in the Murϕ verifier. Our experimental results show that using our approach we can typically save more than 40% of RAM with an average time penalty of about 50% when using (Murϕ) bit compression and 100% when using bit compression and hash compaction.


Knowledge Engineering Review | 2010

Validation and verification issues in a timeline-based planning system

Amedeo Cesta; Alberto Finzi; Simone Fratini; Andrea Orlandini; Enrico Tronci

To foster effective use of artificial intelligence planning and scheduling (PS moreover, they employ resolution processes designed to optimize the solution with respect to non-trivial evaluation functions. Knowledge engineering environments aim at simplifying direct access to the technology for people other than the original system designers, while the integration of validation and verification (V&V) capabilities in such environments may potentially enhance the users’ trust in the technology. Somehow, V&V techniques may represent a complementary technology, with respect to P&S, that contributes to developing richer software environments to synthesize a new generation of robust problem-solving applications. The integration of V&V and P&S techniques in a knowledge engineering environment is the topic of this paper. In particular, it analyzes the use of state-of-the-art V&V technology to support knowledge engineering for a timeline-based planning system called MrSPOCK. The paper presents the application domain for which the automated solver has been developed, introduces the timeline-based planning ideas, and then describes the different possibilities to apply V&V to planning. Hence, it continues by describing the step of adding V&V functionalities around the specialized planner, MrSPOCK. New functionalities have been added to perform both model validation and plan verification. Lastly, a specific section describes the benefits as well as the performance of such functionalities.


international conference on knowledge-based and intelligent information and engineering systems | 2004

Electric Power System Anomaly Detection Using Neural Networks

Marco Martinelli; Enrico Tronci; Giovanni Dipoppa; Claudio Balducelli

The aim of this work is to propose an approach to monitor and protect Electric Power System by learning normal system behaviour at substations level, and raising an alarm signal when an abnormal status is detected; the problem is addressed by the use of autoassociative neural networks, reading substation measures. Experimental results show that, through the proposed approach, neural networks can be used to learn parameters underlaying system behaviour, and their output processed to detecting anomalies due to hijacking of measures, changes in the power network topology (i.e. transmission lines breaking) and unexpected power demand trend.


ACM Transactions on Software Engineering and Methodology | 2014

Model-based synthesis of control software from system-level formal specifications

Federico Mari; Igor Melatti; Ivano Salvo; Enrico Tronci

Many embedded systems are indeed software-based control systems, that is, control systems whose controller consists of control software running on a microcontroller device. This motivates investigation on formal model-based design approaches for automatic synthesis of embedded systems control software. We present an algorithm, along with a tool QKS implementing it, that from a formal model (as a discrete-time linear hybrid system) of the controlled system (plant), implementation specifications (that is, number of bits in the Analog-to-Digital, AD, conversion) and system-level formal specifications (that is, safety and liveness requirements for the closed loop system) returns correct-by-construction control software that has a Worst-Case Execution Time (WCET) linear in the number of AD bits and meets the given specifications. We show feasibility of our approach by presenting experimental results on using it to synthesize control software for a buck DC-DC converter, a widely used mixed-mode analog circuit, and for the inverted pendulum.


conference on decision and control | 2012

Automatic control software synthesis for quantized discrete time hybrid systems

Vadim Alimguzhin; Federico Mari; Igor Melatti; Ivano Salvo; Enrico Tronci

Many Embedded Systems are indeed Software Based Control Systems, that is control systems whose controller consists of control software running on a microcontroller device. This motivates investigation on Formal Model Based Design approaches for automatic synthesis of embedded systems control software. This paper addresses control software synthesis for discrete time nonlinear hybrid systems. We present a methodology to overapproximate the dynamics of a discrete time nonlinear hybrid system ℌ by means of a discrete time linear hybrid system Lℌ, in such a way that controllers for Lℌ are guaranteed to be controllers for ℌ. We present experimental results on control software synthesis for the inverted pendulum, a challenging and meaningful control problem.

Collaboration


Dive into the Enrico Tronci's collaboration.

Top Co-Authors

Avatar

Igor Melatti

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar

Federico Mari

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar

Ivano Salvo

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Toni Mancini

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Annalisa Massini

Sapienza University of Rome

View shared research outputs
Researchain Logo
Decentralizing Knowledge