Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kerstin Eder is active.

Publication


Featured researches published by Kerstin Eder.


logic based program synthesis and transformation | 2017

Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models

Umer Liqat; Steve Kerrison; Alejandro Serrano; Kyriakos Georgiou; Pedro López-García; Neville Grech; Manuel V. Hermenegildo; Kerstin Eder

Energy consumption analysis of embedded programs requires the analysis of low-level program representations. This is challenging because the gap between the high-level program structure and the low-level energy models needs to be bridged. Here, we describe techniques for recreating the structure of low-level programs and transforming these into Horn clauses in order to make use of a generic resource analysis framework (CiaoPP). Our analysis, which makes use of an energy model we produce for the underlying hardware, characterises the energy consumption of the program, and returns energy formulae parametrised by the size of the input data. We have performed an initial experimental assessment and obtained encouraging results when comparing the statically inferred formulae to direct energy measurements from the hardware running a set of benchmarks. Static energy estimation has applications in program optimisation and enables more energy-awareness in software development.


Lecture Notes in Computer Science | 2014

Using Models at Runtime to Address Assurance for Self-Adaptive Systems

Betty H. C. Cheng; Kerstin Eder; Martin Gogolla; Lars Grunske; Marin Litoiu; Hausi A. Müller; Patrizio Pelliccione; Anna Perini; Nauman A. Qureshi; Bernhard Rumpe; Daniel Schneider; Norha M. Villegas

A self-adaptive software system modifies its behavior at runtime in response to changes within the system or in its execution environment. The ful- fillment of the system requirements needs to be guaranteed even in the presence of adverse conditions and adaptations. Thus, a key challenge for self-adaptive software systems is assurance. Traditionally, confidence in the correctness of a system is gained through a variety of activities and processes performed at de- velopment time, such as design analysis and testing. In the presence of self- adaptation, however, some of the assurance tasks may need to be performed at runtime. This need calls for the development of techniques that enable contin- uous assurance throughout the software life cycle. Fundamental to the develop- ment of runtime assurance techniques is research into the use of models at runtime


congress on evolutionary computation | 2011

Improving XCS performance on overlapping binary problems

Charalambos Ioannides; Geoff Barrett; Kerstin Eder

Extended classifier systems (XCS) suffer from suboptimal performance when the optimal classifiers of the functions they deal with overlap. As this overlap is the property of Boolean functions and the generalization capabilities of the ternary alphabet {0,1,#}, it is necessary to improve XCS to better deal with those functions that make up most of the possible Boolean functions. This paper proposes two techniques that improve XCS performance, both in terms of system and population state metrics. The first technique, termed Essentiality Assessment, alters the current fitness update mechanism by disallowing competition between potentially essential classifiers. The second technique, named Individualized Learning Rate, proposes an individually computed learning rate for each classifier based on the level of generality of each classifier. The results obtained show improvement and significance both in absolute and statistical terms, for the vast majority of system and population state metrics. This paper is a contribution toward improving XCS performance when dealing with single-step problems that necessarily require overlapping classifiers for their optimal solution.


international cryptology conference | 2015

Energy Modeling of Software for a Hardware Multithreaded Embedded Microprocessor

Steve Kerrison; Kerstin Eder

This article examines a hardware multithreaded microprocessor and discusses the impact such an architecture has on existing software energy modeling techniques. A framework is constructed for analyzing the energy behavior of the XMOS XS1-L multithreaded processor and a variation on existing software energy models is proposed, based on analysis of collected energy data. It is shown that by combining execution statistics with sufficient data on the processor’s thread activity and instruction execution costs, a multithreaded software energy model used with Instruction Set Simulation can yield an average error margin of less than 7%.


intelligent robots and systems | 2013

Joint action understanding improves robot-to-human object handover

Elena Corina Grigore; Kerstin Eder; Anthony G. Pipe; Chris Melhuish; Ute Leonards

The development of trustworthy human-assistive robots is a challenge that goes beyond the traditional boundaries of engineering. Essential components of trustworthiness are safety, predictability and usefulness. In this paper we demonstrate that the integration of joint action understanding from human-human interaction into the human-robot context can significantly improve the success rate of robot-to-human object handover tasks. We take a two layer approach. The first layer handles the physical aspects of the handover. The robots decision to release the object is informed by a Hidden Markov Model that estimates the state of the handover. Inspired by human-human handover observations, we then introduce a higher-level cognitive layer that models behaviour characteristic for a human user in a handover situation. In particular, we focus on the inclusion of eye gaze / head orientation into the robots decision making. Our results demonstrate that by integrating these non-verbal cues the success rate of robot-to-human handovers can be significantly improved, resulting in a more robust and therefore safer system.


robot and human interactive communication | 2014

Towards the safety of human-in-the-loop robotics: Challenges and opportunities for safety assurance of robotic co-workers'

Kerstin Eder; Chris Harper; Ute Leonards

The success of the human-robot co-worker team in a flexible manufacturing environment where robots learn from demonstration heavily relies on the correct and safe operation of the robot. How this can be achieved is a challenge that requires addressing both technical as well as human-centric research questions. In this paper we discuss the state of the art in safety assurance, existing as well as emerging standards in this area, and the need for new approaches to safety assurance in the context of learning machines. We then focus on robotic learning from demonstration, the challenges these techniques pose to safety assurance and outline opportunities to integrate safety considerations into algorithms “by design”. Finally, from a human-centric perspective, we stipulate that, to achieve high levels of safety and ultimately trust, the robotic co-worker must meet the innate expectations of the humans it works with. It is our aim to stimulate a discussion focused on the safety aspects of human-in-the-loop robotics, and to foster multidisciplinary collaboration to address the research challenges identified.


software and compilers for embedded systems | 2015

Static analysis of energy consumption for LLVM IR programs

Neville Grech; Kyriakos Georgiou; James Pallister; Steve Kerrison; Jeremy Morse; Kerstin Eder

Energy models can be constructed by characterizing the energy consumed by executing each instruction in a processor’s instruction set. This can be used to determine how much energy is required to execute a sequence of assembly instructions, without the need to instrument or measure hardware. However, statically analyzing low-level program structures is hard, and the gap between the high-level program structure and the low-level energy models needs to be bridged. We have developed techniques for performing a static analysis on the intermediate compiler representations of a program. Specifically, we target LLVM IR, a representation used by modern compilers, including Clang. Using these techniques we can automatically infer an estimate of the energy consumed when running a function under different platforms, using different compilers. One of the challenges in doing so is that of determining an energy cost of executing LLVM IR program segments, for which we have developed two different approaches. When this information is used in conjunction with our analysis, we are able to infer energy formulae that characterize the energy consumption for a particular program. This approach can be applied to any languages targeting the LLVM toolchain, including C and XC or architectures such as ARM Cortex-M or XMOS xCORE, with a focus towards embedded platforms. Our techniques are validated on these platforms by comparing the static analysis results to the physical measurements taken from the hardware. Static energy consumption estimation enables energy-aware software development, without requiring hardware knowledge.Energy models can be constructed by characterizing the energy consumed when executing each instruction in a processors instruction set. This can be used to determine how much energy is required to execute a sequence of assembly instructions, without the need to instrument or measure hardware. However, statically analyzing low-level program structures is hard, and the gap between the high-level program structure and the low-level energy models needs to be bridged. We have developed techniques for performing a static analysis on the intermediate compiler representations of a program. Specifically, we target LLVM IR, a representation used by modern compilers, including Clang. Using these techniques we can automatically infer an estimate of the energy consumed when running a function under different platforms and compilers. One of the challenges in doing so is that of determining the energy cost of executing LLVM IR program segments, for which we have developed two different approaches. When this information is used in conjunction with our analysis, we are able to infer energy formulae that characterize the energy consumption for a particular program. This approach can be applied to any languages targeting the LLVM toolchain, including C and XC or architectures such as ARM Cortex-M or XMOS xCORE, with a focus towards embedded platforms. Our techniques are validated on these platforms by comparing the static analysis results to the physical measurements taken from the hardware. Static energy consumption estimation enables energy-aware software development by providing instant feedback to the developer, without requiring simulations or hardware knowledge.


compilers, architecture, and synthesis for embedded systems | 2014

A high-level model of embedded flash energy consumption

James Pallister; Kerstin Eder; Simon J. Hollis; Jeremy Bennett

The alignment of code in the flash memory of deeply embedded SoCs can have a large impact on the total energy consumption of a computation. We investigate the effect of code alignment in six SoCs and find that a large proportion of this energy (up to 15% of total SoC energy consumption) can be saved by changes to the alignment. A flexible model is created to predict the read-access energy consumption of flash memory on deeply embedded SoCs, where code is executed in place. This model uses the instruction level memory accesses performed by the processor to calculate the flash energy consumption of a sequence of instructions. We derive the model parameters for five SoCs and validate them. The error is as low as 5%, with a 11% average normalized RMS deviation overall. The scope for using this model to optimize code alignment is explored across a range of benchmarks and SoCs. Analysis shows that over 30% of loops can be better aligned. This can significantly reduce energy while increasing code size by less than 4%. We conclude that this effect has potential as an effective optimization, saving significant energy in deeply embedded SoCs.


high level design validation and test | 2006

Test Directive Generation for Functional Coverage Closure Using Inductive Logic Programming

Hsiou-Wen Hsueh; Kerstin Eder

Functional verification is a complex and time-consuming task in the design process. Recently, various approaches have been developed to improve verification efficiency, including advanced coverage analysis techniques, coverage-driven verification methodologies and coverage-directed stimulus generation techniques. One remaining challenge is to fully automate functional coverage closure. This paper presents a novel approach for coverage-directed stimulus generation based on inductive learning from examples. Test sequences and their related coverage are examined to induce general rules which describe the characteristics of these tests. Coverage closure can be automated by applying the rule learning to clusters similar to the target coverage hole and combining the resulting rules to obtain directives for test generation. The validity of the approach is demonstrated on a pilot case study


conference towards autonomous robotic systems | 2015

Symmetry Reduction Enables Model Checking of More Complex Emergent Behaviours of Swarm Navigation Algorithms

Laura R. Antuña; Dejanira Araiza-Illan; Sérgio Vale Aguiar Campos; Kerstin Eder

The emergent global behaviours of robotic swarms are important for them to achieve their navigation task goals. These emergent behaviours can be verified to assess their correctness, through techniques like model checking. Model checking exhaustively explores all possible behaviours, based on a discrete model of the system, such as a swarm in a grid. A common problem in model checking is the state-space explosion that arises when the states of the model are numerous. We propose a novel implementation of symmetry reduction, in the form of encoding navigation algorithms relatively with respect to a reference, exploiting the symmetrical properties of swarms in grids. We applied the relative encoding to a swarm navigation algorithm, Alpha, modelled for the NuSMV model checker. A comparison of the state-space and verification results with an absolute (or global) and a relative encoding of the Alpha algorithm highlights the advantages of our approach, allowing model checking both larger grid sizes and higher numbers of robots, and consequently verifying more complex emergent behaviours. For example, a property was verified for a grid with 3 robots and a maximum allowed size of \(8 \times 8\) cells in a global encoding, whereas this size was increased to \(16 \times 16\) using a relative encoding. Also, the time to verify a property for a swarm of 3 robots in a \(6 \times 6\) grid was reduced from almost 10 hours to only 7 minutes. Our approach is transferable to other swarm navigation algorithms.

Collaboration


Dive into the Kerstin Eder's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anthony G. Pipe

University of the West of England

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge