SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
The Challenges of
Probabilis1c Thinking
David S. Rosenblum
Na1onal University of Singapore
National University of Singapore
Last year at ASE 2016 …
National University of Singapore
– Norman Vincent Peale,

The Power of Posi,ve Thinking
“Do not build up obstacles

in your imagina1on.”
Three Key Challenges for
Probabilis1c Methods
1. Where do the probabili0es come from?
2. What if the probabili0es are wrong?
3. What if uncertainty masks faulty behavior?
Acknowledgments
Guoxin
Su
University of
Wollongong
Yamilet
Serrano
Na1onal University
of Singapore
Genaína
Rodrigues
Universidade de
Brasília
LeFcia
Duboc
E1cas Research

& Consul1ng
and Sebas1an Uchitel, Yuan Feng, Taolue Chen, P.S. Thiagarajan,

Giordano Tamurrelli, MaS Dwyer, David Shirver, Tony Wicks
Sebas0an
Elbaum
University of
Nebraska - Lincoln
Where Do the
Probabili1es Come
From?
Quan1fying Uncertainty
self-inflicted uncertainty: randomiza1on deliberately
introduced into a system for some desirable effect
coin flipping, symmetry breaking (Leader Elec,on), …
epistemic uncertainty: reducible systema1c uncertainty that
is too difficult to resolve or quan1fy more precisely
choice of node address (Zeroconf), user’s input commands, ...
aleatoric uncertainty: irreducible sta1s1cal noise that varies
from execu1on to execu1on
latency of a message delivery, collision on an Ethernet link, …
… in both a model and its proper,es
Assigning Probabili1es
Requirements Engineering
Le^cia Duboc, Emmanuel Le1er and David S. Rosenblum, “Systema1c Elabora1on of Scalability Requirements through Goal-Obstacle Analysis”,
IEEE Transac,ons on SoGware Engineering, Jan. 2013.
Par,al KAOS
Goal Model for
IEF Financial
Transac,on Fraud
Detec,on System
Assigning Probabili1es
Requirements Engineering
Le^cia Duboc, Emmanuel Le1er and David S. Rosenblum, “Systema1c Elabora1on of Scalability Requirements through Goal-Obstacle Analysis”,
IEEE Transac,ons on SoGware Engineering, Jan. 2013.
Example KAOS
Goal Specifica,on
for IEF
Assigning Probabili1es
Distribu1ons MaSer Too!
Ana Le^cia de Cerqueira Le1e Duboc, “A Framework for the Characterisa1on and Analysis of Sofware Systems Scalability”,

PhD thesis, University College London, 2010.
U1lity of Two Hypothe1cal Designs
as a Func1on of Number of IEF En11es
pdf 1 pdf 2
Assigning Probabili1es
Run1me Sampling
Guoxin Su, David S. Rosenblum and Giordano Tamburrelli, “Reliability of Run-Time Quality-of-Service Evalua1on

using Parametric Model Checking”, Proc. ICSE 2016.
What If the Probabili1es
Are Wrong?
Probabilis1c Model Checking
Changing the Model Probabili1es
! ¬p → ◊q( )∧"( )
Model
Checker
✓
State Machine
Model
Temporal

Property
Results
System
Requirements
P≥0.95 [ ]
0.4
0.6
Quan1ta1ve Results
0.9732Probabilis1c
Probabilis1c
Probabilis1c Model Checking
Changing the Model Probabili1es
! ¬p → ◊q( )∧"( )
Model
Checker
✕
State Machine
Model
Temporal

Property
Results
Counterexample
Trace
System
Requirements
P≥0.95 [ ]
Quan1ta1ve Results
Probabilis1c
Probabilis1c
0.41
0.59
0.6211
Perturbed Probabilis1c Systems
Current Research
Overall approach
• Compute asympto1c bounds for efficiency
• Apply the bounds for non-asympto1c es1ma1on
Star@ng Point
• Parametric Discrete-Time Markov Chains
• “Small” perturba1ons of probability parameters
• Reachability proper1es P≤p [ ]
• Linear bounds for es1ma1ng verifica1on impact
S? U S!
Example
The Zeroconf Protocol
s1s0 s2 s3
q
1
1
{ok} {error}
{start} s4
s5
s6
s7
s8
1
1-q
1-p
1-p
1-p
1-p
p p p
p
1
DTMC model from the PRISM group

(Kwiatkowska et al.)
P=? [ true U error ]
0.1
0.9
0.5
0.5
0.10.10.1
0.9
0.9
0.9
S?
S!
Perturba1on Distance
•Perturba1on is captured in distribu1on parameters,
a vector x of probability parameters xi
•The norm of total variance measures the amount of
perturba1on
•Perturba1on distance is computed with respect to
reference values r
v = vi∑
x − r ≤ Δ
Guoxin Su and David S. Rosenblum, “Asympto1c Bounds for Quan1ta1ve Verifica1on of Perturbed Probabilis1c Systems”, Proc. ICFEM 2013.
Example
The Zeroconf Protocol
s1s0 s2 s3
q
1
1
{ok} {error}
{start} s4
s5
s6
s7
s8
1
1-q
1-p
1-p
1-p
1-p
p p p
p
1
DTMC model from the PRISM group

(Kwiatkowska et al.)
0.1
0.9
0.5
0.5
0.10.10.1
0.9
0.9
0.9
Example
The Zeroconf Protocol
s1s0 s2 s3
q
1
1
{ok} {error}
{start} s4
s5
s6
s7
s8
1
1-q
1-p
1-p
1-p
1-p
p p p
p
1
DTMC model from the PRISM group

(Kwiatkowska et al.)
0.1
0.9
0.5
0.5
0.10.10.1
0.9
0.9
0.9
x1
1-x1
x2
1-x2
1-x3
x3
x4
1-x4
• Perturba1on Func1on captures effect of perturba1on on
verifica1on result p
where i? is the ini1al state distribu1on
and A is the transi1on probability sub-matrix for S?
and b is the vector of one-step probabili1es from S? to S!
and h•(x-r) is the linear approxima1on of ρ near r
• Condi1on Number provides asympto1c bound of ρ
• Predicted varia1on to verifica1on result p due to perturba1on Δ
ρ x( )= ι? i A x( )i
i b x( )( )− A r
i
i b r( )( )i=0
∞
∑ ≈ hi x − r( )
κ = lim
Δ→0
sup
ρ(x)
δ
: x − r ≤ Δ,0 < δ ≤ Δ
⎧
⎨
⎩
⎫
⎬
⎭
≈
1
2
max h( )− min h( )( )
ˆp = p ±κΔ
Guoxin Su and David S. Rosenblum, “Asympto1c Bounds for Quan1ta1ve Verifica1on of Perturbed Probabilis1c Systems”, Proc. ICFEM 2013.
Asympto1c Perturba1on
Bounds on Verifica1on Impact
• Perturba1on Func1on captures effect of perturba1on on
verifica1on result p
where i? is the ini1al state distribu1on
and A is the transi1on probability sub-matrix for S?
and b is the vector of one-step probabili1es from S? to S!
and h•(x-r) is the linear approxima1on of ρ near r
• Condi1on Number provides asympto1c bound of ρ
• Predicted varia1on to verifica1on result p due to perturba1on Δ
ρ x( )= ι? i A x( )i
i b x( )( )− A r
i
i b r( )( )i=0
∞
∑ ≈ hi x − r( )
κ = lim
Δ→0
sup
ρ(x)
δ
: x − r ≤ Δ,0 < δ ≤ Δ
⎧
⎨
⎩
⎫
⎬
⎭
≈
1
2
max h( )− min h( )( )
ˆp = p ±κΔ
Guoxin Su and David S. Rosenblum, “Asympto1c Bounds for Quan1ta1ve Verifica1on of Perturbed Probabilis1c Systems”, Proc. ICFEM 2013.
Asympto1c Perturba1on
Bounds on Verifica1on Impact
Case Study Results
Noisy Zeroconf (35000 Hosts)
x
Probability of Reaching error State
Actual (PRISM) Predicted (via κ)
0.095 -19.8% -21.5%
0.096 -16.9% -17.2%
0.097 -12.3% -12.9%
0.098 -8.33% -8.61%
0.099 -4.23% -4.30%
0.100 1.8567 ✕ 10-4 —
0.101 +4.38% +4.30%
0.102 +8.91% +8.61%
0.103 +13.6% +12.9%
0.104 +18.4% +17.2%
0.105 +23.4% +21.5%
Guoxin Su and David S. Rosenblum, “Perturba1on Analysis of Stochas1c Systems with Empirical Distribu1on Parameters”, Proc. ICSE 2014.
Addi1onal Results
[ICSE 2014] ω-regular proper1es and quadra1c perturba1on bounds
[CONCUR 2014]
Asympto1c and non-asympto1c bounds for

three addi1onal perturba1on distance norms
[ATVA 2014]
Interval approxima1ons for reachability proper1es with

nested P operators
[FSE 2014 Doctoral
Symposium]
Heuris1cs for Markov Decision Processes (MDPs)
(Yamilet Serrano’s PhD)
[FASE 2016] Applica1on to decision making in self-adap1ve systems
[ICSE 2016] Applica1on to run1me QoS evalua1on
[IEEE TSE 2016] Integra1on of previous results and new case studies
[ICSE 2017] Con1nuous-Time Markov Chains (CTMCs)
[ESEC/FSE 2017] Markov Decision Processes (MDPs)
MDP Example
Cloud Service Migra1on in a Mobile Network
adversaries resolve
nondeterminis1c choices
The Challenge for MDPs
Iden1fying Relevant Adversaries
0 1Pmin Pmax
op1mal adversaries
The Challenge for MDPs
Iden1fying Relevant Adversaries
0 1Pmin Pmax
op1mal adversaries
Op1mal adversaries may not induce minimum and
maximum probabili1es in presence of perturba1on
Approaches

Iden1fying Relevant Adversaries
✓Approximate: ignore the problem, find the maximum
condi1on number over the op1mal adversaries
✓Heuris1c: apply a range of brute-force adversary
enumera1on schemes to find the maximum condi1on
number
✓Algorithmic: efficiently find the maximum condi0on
number over the most relevant adversaries
Case Study Results
Cloud Migra1on (5 & 8 Rings, 3 Proper1es)
Yamilet R. Serrano Llerena, Guoxin Su and David S. Rosenblum, “Probabilis1c Model Checking of Perturbed MDPs

with Applica1ons to Cloud Compu1ng”, Proc. ESEC/FSE 2017.
Model States Transi0ons Adversaries Property
Maximum

Condi0on
Number
Time (seconds)
Exhaus0ve
Our
Algorithm
5
Rings
9 17 32
P1 0.1111 3.28 0.15
P2 0.5 4.02 0.21
P3 0.5 2.95 0.10
8
Rings
15 32 2048
P1 0.0102 197.10 141.06
P2 0.5 288.97 202.42
P3 0.1111 199.05 139.75
Case Study Results
Cloud Migra1on (5 & 8 Rings, 3 Proper1es)
Yamilet R. Serrano Llerena, Guoxin Su and David S. Rosenblum, “Probabilis1c Model Checking of Perturbed MDPs

with Applica1ons to Cloud Compu1ng”, Proc. ESEC/FSE 2017.
Model States Transi0ons Adversaries Property
Maximum

Condi0on
Number
Time (seconds)
Exhaus0ve
Our
Algorithm
5
Rings
9 17 32
P1 0.1111 3.28 0.15
P2 0.5 4.02 0.21
P3 0.5 2.95 0.10
8
Rings
15 32 2048
P1 0.0102 197.10 141.06
P2 0.5 288.97 202.42
P3 0.1111 199.05 139.75
What If Uncertainty in
the Modeled System
Masks Faulty Behavior?
Challenge
Pinpoin1ng the Root Cause of Uncertainty
“There are known knowns; there are
things we know we know. We also
know there are known unknowns; that
is to say, we know there are some
things we do not know. But there are
also unknown unknowns – the ones
we don’t know we don’t know.”
— Donald Rumsfeld
Known Unknowns in

Modern Systems
✓ Autonomous Vehicles
✓ Cyber Physical Systems
✓ Internet of Things
✓ Extensive reliance on machine learning
see
Deep Learning and Understandability versus

SoGware Engineering and Verifica,on
by Peter Norvig, Director of Research at Google
hSp://www.youtube.com/watch?v=X769cyzBNVw
Uncertainty in Tes1ng
Current Research
Test

Execu1on
System
Under Test
Result Interpreta1on
Uncertainty in Tes1ng
Current Research
Test

Execu1on
System
Under Test
Result Interpreta1on
Unacceptable
Acceptable✓
✕
Uncertainty in Tes1ng
Current Research
Test

Execu1on
System
Under Test
Result Interpreta1on
Unacceptable
Acceptable
Acceptable
✓
✕
✕
Acceptable misbehaviors can mask real faults!
One Possible Solu1on
Distribu1on Fing
System
Under Test
Training

Data WEKA
Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
One Possible Solu1on
Distribu1on Fing
System
Under Test
WEKA
Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
One Possible Solu1on
Distribu1on Fing
System
Under Test
WEKA
Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
One Possible Solu1on
Distribu1on Fing
System
Under Test
Result Interpreta1on
Test

Execu1on
Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
One Possible Solu1on
Distribu1on Fing
System
Under Test
Result Interpreta1on
Unacceptable
Acceptable
Inconclusive
p < 0.99
Test

Execu1on p < 0.37
p < 0.0027
Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
Characterizing
Recommenda1on Systems
David Shriver, MaShew B. Dwyer, Sebas1an Elbaum and David S. Rosenblum, “Characteris1c Proper1es of Recommenda1on Systems”,

under review, 2017.
Summary
The Challenges of
Probabilis1c Thinking
David S. Rosenblum
Na1onal University of Singapore

Weitere ähnliche Inhalte

Ähnlich wie The Challenges of Probabilistic Thinking (keynote talk at ICFEM 2017)

Characterization of Subsurface Heterogeneity: Integration of Soft and Hard In...
Characterization of Subsurface Heterogeneity: Integration of Soft and Hard In...Characterization of Subsurface Heterogeneity: Integration of Soft and Hard In...
Characterization of Subsurface Heterogeneity: Integration of Soft and Hard In...Amro Elfeki
 
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...cscpconf
 
CEHS 2016 Poster
CEHS 2016 PosterCEHS 2016 Poster
CEHS 2016 PosterEric Ma
 
Do Fractional Norms and Quasinorms Help to Overcome the Curse of Dimensiona...
Do Fractional Norms and Quasinorms Help to Overcome the Curse of Dimensiona...Do Fractional Norms and Quasinorms Help to Overcome the Curse of Dimensiona...
Do Fractional Norms and Quasinorms Help to Overcome the Curse of Dimensiona...Alexander Gorban
 
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular AutomataCost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automataijait
 
PPI, GCA, and DCM in resting-state
PPI, GCA, and DCM in resting-statePPI, GCA, and DCM in resting-state
PPI, GCA, and DCM in resting-stateXin Di
 
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling MethodsContextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling MethodsNeal Lathia
 
American Statistical Association October 23 2009 Presentation Part 1
American Statistical Association October 23 2009 Presentation Part 1American Statistical Association October 23 2009 Presentation Part 1
American Statistical Association October 23 2009 Presentation Part 1Double Check ĆŐNSULTING
 
When Prediction Met PLS: What We learned in 3 Years of Marriage
When Prediction Met PLS: What We learned in 3 Years of MarriageWhen Prediction Met PLS: What We learned in 3 Years of Marriage
When Prediction Met PLS: What We learned in 3 Years of MarriageGalit Shmueli
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautzbutest
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautzbutest
 
Reliability Evaluation of Reconfigurable NMR Architecture Supported with Hot ...
Reliability Evaluation of Reconfigurable NMR Architecture Supported with Hot ...Reliability Evaluation of Reconfigurable NMR Architecture Supported with Hot ...
Reliability Evaluation of Reconfigurable NMR Architecture Supported with Hot ...Koorosh Aslansefat
 
a brief introduction to epistasis detection
a brief introduction to epistasis detectiona brief introduction to epistasis detection
a brief introduction to epistasis detectionHyun-hwan Jeong
 
Modeling Big Count Data: An IRLS Framework for COM-Poisson Regression and GAM
Modeling Big Count Data: An IRLS Framework for COM-Poisson Regression and GAMModeling Big Count Data: An IRLS Framework for COM-Poisson Regression and GAM
Modeling Big Count Data: An IRLS Framework for COM-Poisson Regression and GAMSuneel Babu Chatla
 
BASIC STATISTICS AND PROBABILITY.pptx
BASIC STATISTICS AND PROBABILITY.pptxBASIC STATISTICS AND PROBABILITY.pptx
BASIC STATISTICS AND PROBABILITY.pptxRanjuBijoy
 

Ähnlich wie The Challenges of Probabilistic Thinking (keynote talk at ICFEM 2017) (20)

Characterization of Subsurface Heterogeneity: Integration of Soft and Hard In...
Characterization of Subsurface Heterogeneity: Integration of Soft and Hard In...Characterization of Subsurface Heterogeneity: Integration of Soft and Hard In...
Characterization of Subsurface Heterogeneity: Integration of Soft and Hard In...
 
kape_science
kape_sciencekape_science
kape_science
 
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
 
CEHS 2016 Poster
CEHS 2016 PosterCEHS 2016 Poster
CEHS 2016 Poster
 
Do Fractional Norms and Quasinorms Help to Overcome the Curse of Dimensiona...
Do Fractional Norms and Quasinorms Help to Overcome the Curse of Dimensiona...Do Fractional Norms and Quasinorms Help to Overcome the Curse of Dimensiona...
Do Fractional Norms and Quasinorms Help to Overcome the Curse of Dimensiona...
 
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular AutomataCost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
 
PPI, GCA, and DCM in resting-state
PPI, GCA, and DCM in resting-statePPI, GCA, and DCM in resting-state
PPI, GCA, and DCM in resting-state
 
Extensive Survey on Datamining Algoritms for Pattern Extraction
Extensive Survey on Datamining Algoritms for Pattern ExtractionExtensive Survey on Datamining Algoritms for Pattern Extraction
Extensive Survey on Datamining Algoritms for Pattern Extraction
 
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling MethodsContextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
 
Study on atome probe
Study on atome probe Study on atome probe
Study on atome probe
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
American Statistical Association October 23 2009 Presentation Part 1
American Statistical Association October 23 2009 Presentation Part 1American Statistical Association October 23 2009 Presentation Part 1
American Statistical Association October 23 2009 Presentation Part 1
 
When Prediction Met PLS: What We learned in 3 Years of Marriage
When Prediction Met PLS: What We learned in 3 Years of MarriageWhen Prediction Met PLS: What We learned in 3 Years of Marriage
When Prediction Met PLS: What We learned in 3 Years of Marriage
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautz
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautz
 
Reliability Evaluation of Reconfigurable NMR Architecture Supported with Hot ...
Reliability Evaluation of Reconfigurable NMR Architecture Supported with Hot ...Reliability Evaluation of Reconfigurable NMR Architecture Supported with Hot ...
Reliability Evaluation of Reconfigurable NMR Architecture Supported with Hot ...
 
a brief introduction to epistasis detection
a brief introduction to epistasis detectiona brief introduction to epistasis detection
a brief introduction to epistasis detection
 
Modeling Big Count Data: An IRLS Framework for COM-Poisson Regression and GAM
Modeling Big Count Data: An IRLS Framework for COM-Poisson Regression and GAMModeling Big Count Data: An IRLS Framework for COM-Poisson Regression and GAM
Modeling Big Count Data: An IRLS Framework for COM-Poisson Regression and GAM
 
BASIC STATISTICS AND PROBABILITY.pptx
BASIC STATISTICS AND PROBABILITY.pptxBASIC STATISTICS AND PROBABILITY.pptx
BASIC STATISTICS AND PROBABILITY.pptx
 
Week08.pdf
Week08.pdfWeek08.pdf
Week08.pdf
 

Mehr von David Rosenblum

Known Unknowns: Testing in the Presence of Uncertainty (talk at ACM SIGSOFT F...
Known Unknowns: Testing in the Presence of Uncertainty (talk at ACM SIGSOFT F...Known Unknowns: Testing in the Presence of Uncertainty (talk at ACM SIGSOFT F...
Known Unknowns: Testing in the Presence of Uncertainty (talk at ACM SIGSOFT F...David Rosenblum
 
Career Management (invited talk at ICSE 2014 NFRS)
Career Management (invited talk at ICSE 2014 NFRS)Career Management (invited talk at ICSE 2014 NFRS)
Career Management (invited talk at ICSE 2014 NFRS)David Rosenblum
 
SIGSOFT Impact Award: Reflections and Prospects (invited talk at SIGSOFT FSE ...
SIGSOFT Impact Award: Reflections and Prospects (invited talk at SIGSOFT FSE ...SIGSOFT Impact Award: Reflections and Prospects (invited talk at SIGSOFT FSE ...
SIGSOFT Impact Award: Reflections and Prospects (invited talk at SIGSOFT FSE ...David Rosenblum
 
Content-Based Publish/Subscribe: A Re-Assessment (keynote talk at DOA 2005)
Content-Based Publish/Subscribe: A Re-Assessment (keynote talk at DOA 2005)Content-Based Publish/Subscribe: A Re-Assessment (keynote talk at DOA 2005)
Content-Based Publish/Subscribe: A Re-Assessment (keynote talk at DOA 2005)David Rosenblum
 
Scalability in Software Systems Engineering: The Good, the Bad, and the Ugly ...
Scalability in Software Systems Engineering: The Good, the Bad, and the Ugly ...Scalability in Software Systems Engineering: The Good, the Bad, and the Ugly ...
Scalability in Software Systems Engineering: The Good, the Bad, and the Ugly ...David Rosenblum
 
Some Open Problems in Publish/Subscribe Networking (keynote talk at DEBS 2003)
Some Open Problems in Publish/Subscribe Networking (keynote talk at DEBS 2003)Some Open Problems in Publish/Subscribe Networking (keynote talk at DEBS 2003)
Some Open Problems in Publish/Subscribe Networking (keynote talk at DEBS 2003)David Rosenblum
 
Assertions a Decade Later (invited talk at ICSE 2002)
Assertions a Decade Later (invited talk at ICSE 2002)Assertions a Decade Later (invited talk at ICSE 2002)
Assertions a Decade Later (invited talk at ICSE 2002)David Rosenblum
 
Scalability: What It Is and How to Analyze It (keynote talk at SBES 2007)
Scalability: What It Is and How to Analyze It (keynote talk at SBES 2007)Scalability: What It Is and How to Analyze It (keynote talk at SBES 2007)
Scalability: What It Is and How to Analyze It (keynote talk at SBES 2007)David Rosenblum
 
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)David Rosenblum
 
Applications and Abstractions: A Cautionary Tale (invited talk at a DIMACS Wo...
Applications and Abstractions: A Cautionary Tale (invited talk at a DIMACS Wo...Applications and Abstractions: A Cautionary Tale (invited talk at a DIMACS Wo...
Applications and Abstractions: A Cautionary Tale (invited talk at a DIMACS Wo...David Rosenblum
 

Mehr von David Rosenblum (10)

Known Unknowns: Testing in the Presence of Uncertainty (talk at ACM SIGSOFT F...
Known Unknowns: Testing in the Presence of Uncertainty (talk at ACM SIGSOFT F...Known Unknowns: Testing in the Presence of Uncertainty (talk at ACM SIGSOFT F...
Known Unknowns: Testing in the Presence of Uncertainty (talk at ACM SIGSOFT F...
 
Career Management (invited talk at ICSE 2014 NFRS)
Career Management (invited talk at ICSE 2014 NFRS)Career Management (invited talk at ICSE 2014 NFRS)
Career Management (invited talk at ICSE 2014 NFRS)
 
SIGSOFT Impact Award: Reflections and Prospects (invited talk at SIGSOFT FSE ...
SIGSOFT Impact Award: Reflections and Prospects (invited talk at SIGSOFT FSE ...SIGSOFT Impact Award: Reflections and Prospects (invited talk at SIGSOFT FSE ...
SIGSOFT Impact Award: Reflections and Prospects (invited talk at SIGSOFT FSE ...
 
Content-Based Publish/Subscribe: A Re-Assessment (keynote talk at DOA 2005)
Content-Based Publish/Subscribe: A Re-Assessment (keynote talk at DOA 2005)Content-Based Publish/Subscribe: A Re-Assessment (keynote talk at DOA 2005)
Content-Based Publish/Subscribe: A Re-Assessment (keynote talk at DOA 2005)
 
Scalability in Software Systems Engineering: The Good, the Bad, and the Ugly ...
Scalability in Software Systems Engineering: The Good, the Bad, and the Ugly ...Scalability in Software Systems Engineering: The Good, the Bad, and the Ugly ...
Scalability in Software Systems Engineering: The Good, the Bad, and the Ugly ...
 
Some Open Problems in Publish/Subscribe Networking (keynote talk at DEBS 2003)
Some Open Problems in Publish/Subscribe Networking (keynote talk at DEBS 2003)Some Open Problems in Publish/Subscribe Networking (keynote talk at DEBS 2003)
Some Open Problems in Publish/Subscribe Networking (keynote talk at DEBS 2003)
 
Assertions a Decade Later (invited talk at ICSE 2002)
Assertions a Decade Later (invited talk at ICSE 2002)Assertions a Decade Later (invited talk at ICSE 2002)
Assertions a Decade Later (invited talk at ICSE 2002)
 
Scalability: What It Is and How to Analyze It (keynote talk at SBES 2007)
Scalability: What It Is and How to Analyze It (keynote talk at SBES 2007)Scalability: What It Is and How to Analyze It (keynote talk at SBES 2007)
Scalability: What It Is and How to Analyze It (keynote talk at SBES 2007)
 
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
Software System Scalability: Concepts and Techniques (keynote talk at ISEC 2009)
 
Applications and Abstractions: A Cautionary Tale (invited talk at a DIMACS Wo...
Applications and Abstractions: A Cautionary Tale (invited talk at a DIMACS Wo...Applications and Abstractions: A Cautionary Tale (invited talk at a DIMACS Wo...
Applications and Abstractions: A Cautionary Tale (invited talk at a DIMACS Wo...
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

The Challenges of Probabilistic Thinking (keynote talk at ICFEM 2017)

  • 1. The Challenges of Probabilis1c Thinking David S. Rosenblum Na1onal University of Singapore
  • 2. National University of Singapore Last year at ASE 2016 …
  • 4. – Norman Vincent Peale,
 The Power of Posi,ve Thinking “Do not build up obstacles
 in your imagina1on.”
  • 5. Three Key Challenges for Probabilis1c Methods 1. Where do the probabili0es come from? 2. What if the probabili0es are wrong? 3. What if uncertainty masks faulty behavior?
  • 6. Acknowledgments Guoxin Su University of Wollongong Yamilet Serrano Na1onal University of Singapore Genaína Rodrigues Universidade de Brasília LeFcia Duboc E1cas Research
 & Consul1ng and Sebas1an Uchitel, Yuan Feng, Taolue Chen, P.S. Thiagarajan,
 Giordano Tamurrelli, MaS Dwyer, David Shirver, Tony Wicks Sebas0an Elbaum University of Nebraska - Lincoln
  • 8. Quan1fying Uncertainty self-inflicted uncertainty: randomiza1on deliberately introduced into a system for some desirable effect coin flipping, symmetry breaking (Leader Elec,on), … epistemic uncertainty: reducible systema1c uncertainty that is too difficult to resolve or quan1fy more precisely choice of node address (Zeroconf), user’s input commands, ... aleatoric uncertainty: irreducible sta1s1cal noise that varies from execu1on to execu1on latency of a message delivery, collision on an Ethernet link, … … in both a model and its proper,es
  • 9. Assigning Probabili1es Requirements Engineering Le^cia Duboc, Emmanuel Le1er and David S. Rosenblum, “Systema1c Elabora1on of Scalability Requirements through Goal-Obstacle Analysis”, IEEE Transac,ons on SoGware Engineering, Jan. 2013. Par,al KAOS Goal Model for IEF Financial Transac,on Fraud Detec,on System
  • 10. Assigning Probabili1es Requirements Engineering Le^cia Duboc, Emmanuel Le1er and David S. Rosenblum, “Systema1c Elabora1on of Scalability Requirements through Goal-Obstacle Analysis”, IEEE Transac,ons on SoGware Engineering, Jan. 2013. Example KAOS Goal Specifica,on for IEF
  • 11. Assigning Probabili1es Distribu1ons MaSer Too! Ana Le^cia de Cerqueira Le1e Duboc, “A Framework for the Characterisa1on and Analysis of Sofware Systems Scalability”,
 PhD thesis, University College London, 2010. U1lity of Two Hypothe1cal Designs as a Func1on of Number of IEF En11es pdf 1 pdf 2
  • 12. Assigning Probabili1es Run1me Sampling Guoxin Su, David S. Rosenblum and Giordano Tamburrelli, “Reliability of Run-Time Quality-of-Service Evalua1on
 using Parametric Model Checking”, Proc. ICSE 2016.
  • 13. What If the Probabili1es Are Wrong?
  • 14. Probabilis1c Model Checking Changing the Model Probabili1es ! ¬p → ◊q( )∧"( ) Model Checker ✓ State Machine Model Temporal
 Property Results System Requirements P≥0.95 [ ] 0.4 0.6 Quan1ta1ve Results 0.9732Probabilis1c Probabilis1c
  • 15. Probabilis1c Model Checking Changing the Model Probabili1es ! ¬p → ◊q( )∧"( ) Model Checker ✕ State Machine Model Temporal
 Property Results Counterexample Trace System Requirements P≥0.95 [ ] Quan1ta1ve Results Probabilis1c Probabilis1c 0.41 0.59 0.6211
  • 16. Perturbed Probabilis1c Systems Current Research Overall approach • Compute asympto1c bounds for efficiency • Apply the bounds for non-asympto1c es1ma1on Star@ng Point • Parametric Discrete-Time Markov Chains • “Small” perturba1ons of probability parameters • Reachability proper1es P≤p [ ] • Linear bounds for es1ma1ng verifica1on impact S? U S!
  • 17. Example The Zeroconf Protocol s1s0 s2 s3 q 1 1 {ok} {error} {start} s4 s5 s6 s7 s8 1 1-q 1-p 1-p 1-p 1-p p p p p 1 DTMC model from the PRISM group
 (Kwiatkowska et al.) P=? [ true U error ] 0.1 0.9 0.5 0.5 0.10.10.1 0.9 0.9 0.9 S? S!
  • 18. Perturba1on Distance •Perturba1on is captured in distribu1on parameters, a vector x of probability parameters xi •The norm of total variance measures the amount of perturba1on •Perturba1on distance is computed with respect to reference values r v = vi∑ x − r ≤ Δ Guoxin Su and David S. Rosenblum, “Asympto1c Bounds for Quan1ta1ve Verifica1on of Perturbed Probabilis1c Systems”, Proc. ICFEM 2013.
  • 19. Example The Zeroconf Protocol s1s0 s2 s3 q 1 1 {ok} {error} {start} s4 s5 s6 s7 s8 1 1-q 1-p 1-p 1-p 1-p p p p p 1 DTMC model from the PRISM group
 (Kwiatkowska et al.) 0.1 0.9 0.5 0.5 0.10.10.1 0.9 0.9 0.9
  • 20. Example The Zeroconf Protocol s1s0 s2 s3 q 1 1 {ok} {error} {start} s4 s5 s6 s7 s8 1 1-q 1-p 1-p 1-p 1-p p p p p 1 DTMC model from the PRISM group
 (Kwiatkowska et al.) 0.1 0.9 0.5 0.5 0.10.10.1 0.9 0.9 0.9 x1 1-x1 x2 1-x2 1-x3 x3 x4 1-x4
  • 21. • Perturba1on Func1on captures effect of perturba1on on verifica1on result p where i? is the ini1al state distribu1on and A is the transi1on probability sub-matrix for S? and b is the vector of one-step probabili1es from S? to S! and h•(x-r) is the linear approxima1on of ρ near r • Condi1on Number provides asympto1c bound of ρ • Predicted varia1on to verifica1on result p due to perturba1on Δ ρ x( )= ι? i A x( )i i b x( )( )− A r i i b r( )( )i=0 ∞ ∑ ≈ hi x − r( ) κ = lim Δ→0 sup ρ(x) δ : x − r ≤ Δ,0 < δ ≤ Δ ⎧ ⎨ ⎩ ⎫ ⎬ ⎭ ≈ 1 2 max h( )− min h( )( ) ˆp = p ±κΔ Guoxin Su and David S. Rosenblum, “Asympto1c Bounds for Quan1ta1ve Verifica1on of Perturbed Probabilis1c Systems”, Proc. ICFEM 2013. Asympto1c Perturba1on Bounds on Verifica1on Impact
  • 22. • Perturba1on Func1on captures effect of perturba1on on verifica1on result p where i? is the ini1al state distribu1on and A is the transi1on probability sub-matrix for S? and b is the vector of one-step probabili1es from S? to S! and h•(x-r) is the linear approxima1on of ρ near r • Condi1on Number provides asympto1c bound of ρ • Predicted varia1on to verifica1on result p due to perturba1on Δ ρ x( )= ι? i A x( )i i b x( )( )− A r i i b r( )( )i=0 ∞ ∑ ≈ hi x − r( ) κ = lim Δ→0 sup ρ(x) δ : x − r ≤ Δ,0 < δ ≤ Δ ⎧ ⎨ ⎩ ⎫ ⎬ ⎭ ≈ 1 2 max h( )− min h( )( ) ˆp = p ±κΔ Guoxin Su and David S. Rosenblum, “Asympto1c Bounds for Quan1ta1ve Verifica1on of Perturbed Probabilis1c Systems”, Proc. ICFEM 2013. Asympto1c Perturba1on Bounds on Verifica1on Impact
  • 23. Case Study Results Noisy Zeroconf (35000 Hosts) x Probability of Reaching error State Actual (PRISM) Predicted (via κ) 0.095 -19.8% -21.5% 0.096 -16.9% -17.2% 0.097 -12.3% -12.9% 0.098 -8.33% -8.61% 0.099 -4.23% -4.30% 0.100 1.8567 ✕ 10-4 — 0.101 +4.38% +4.30% 0.102 +8.91% +8.61% 0.103 +13.6% +12.9% 0.104 +18.4% +17.2% 0.105 +23.4% +21.5% Guoxin Su and David S. Rosenblum, “Perturba1on Analysis of Stochas1c Systems with Empirical Distribu1on Parameters”, Proc. ICSE 2014.
  • 24. Addi1onal Results [ICSE 2014] ω-regular proper1es and quadra1c perturba1on bounds [CONCUR 2014] Asympto1c and non-asympto1c bounds for
 three addi1onal perturba1on distance norms [ATVA 2014] Interval approxima1ons for reachability proper1es with
 nested P operators [FSE 2014 Doctoral Symposium] Heuris1cs for Markov Decision Processes (MDPs) (Yamilet Serrano’s PhD) [FASE 2016] Applica1on to decision making in self-adap1ve systems [ICSE 2016] Applica1on to run1me QoS evalua1on [IEEE TSE 2016] Integra1on of previous results and new case studies [ICSE 2017] Con1nuous-Time Markov Chains (CTMCs) [ESEC/FSE 2017] Markov Decision Processes (MDPs)
  • 25. MDP Example Cloud Service Migra1on in a Mobile Network adversaries resolve nondeterminis1c choices
  • 26. The Challenge for MDPs Iden1fying Relevant Adversaries 0 1Pmin Pmax op1mal adversaries
  • 27. The Challenge for MDPs Iden1fying Relevant Adversaries 0 1Pmin Pmax op1mal adversaries Op1mal adversaries may not induce minimum and maximum probabili1es in presence of perturba1on
  • 28. Approaches
 Iden1fying Relevant Adversaries ✓Approximate: ignore the problem, find the maximum condi1on number over the op1mal adversaries ✓Heuris1c: apply a range of brute-force adversary enumera1on schemes to find the maximum condi1on number ✓Algorithmic: efficiently find the maximum condi0on number over the most relevant adversaries
  • 29. Case Study Results Cloud Migra1on (5 & 8 Rings, 3 Proper1es) Yamilet R. Serrano Llerena, Guoxin Su and David S. Rosenblum, “Probabilis1c Model Checking of Perturbed MDPs
 with Applica1ons to Cloud Compu1ng”, Proc. ESEC/FSE 2017. Model States Transi0ons Adversaries Property Maximum
 Condi0on Number Time (seconds) Exhaus0ve Our Algorithm 5 Rings 9 17 32 P1 0.1111 3.28 0.15 P2 0.5 4.02 0.21 P3 0.5 2.95 0.10 8 Rings 15 32 2048 P1 0.0102 197.10 141.06 P2 0.5 288.97 202.42 P3 0.1111 199.05 139.75
  • 30. Case Study Results Cloud Migra1on (5 & 8 Rings, 3 Proper1es) Yamilet R. Serrano Llerena, Guoxin Su and David S. Rosenblum, “Probabilis1c Model Checking of Perturbed MDPs
 with Applica1ons to Cloud Compu1ng”, Proc. ESEC/FSE 2017. Model States Transi0ons Adversaries Property Maximum
 Condi0on Number Time (seconds) Exhaus0ve Our Algorithm 5 Rings 9 17 32 P1 0.1111 3.28 0.15 P2 0.5 4.02 0.21 P3 0.5 2.95 0.10 8 Rings 15 32 2048 P1 0.0102 197.10 141.06 P2 0.5 288.97 202.42 P3 0.1111 199.05 139.75
  • 31. What If Uncertainty in the Modeled System Masks Faulty Behavior?
  • 32. Challenge Pinpoin1ng the Root Cause of Uncertainty “There are known knowns; there are things we know we know. We also know there are known unknowns; that is to say, we know there are some things we do not know. But there are also unknown unknowns – the ones we don’t know we don’t know.” — Donald Rumsfeld
  • 33. Known Unknowns in
 Modern Systems ✓ Autonomous Vehicles ✓ Cyber Physical Systems ✓ Internet of Things ✓ Extensive reliance on machine learning see Deep Learning and Understandability versus
 SoGware Engineering and Verifica,on by Peter Norvig, Director of Research at Google hSp://www.youtube.com/watch?v=X769cyzBNVw
  • 34. Uncertainty in Tes1ng Current Research Test
 Execu1on System Under Test Result Interpreta1on
  • 35. Uncertainty in Tes1ng Current Research Test
 Execu1on System Under Test Result Interpreta1on Unacceptable Acceptable✓ ✕
  • 36. Uncertainty in Tes1ng Current Research Test
 Execu1on System Under Test Result Interpreta1on Unacceptable Acceptable Acceptable ✓ ✕ ✕ Acceptable misbehaviors can mask real faults!
  • 37. One Possible Solu1on Distribu1on Fing System Under Test Training
 Data WEKA Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
  • 38. One Possible Solu1on Distribu1on Fing System Under Test WEKA Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
  • 39. One Possible Solu1on Distribu1on Fing System Under Test WEKA Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
  • 40. One Possible Solu1on Distribu1on Fing System Under Test Result Interpreta1on Test
 Execu1on Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
  • 41. One Possible Solu1on Distribu1on Fing System Under Test Result Interpreta1on Unacceptable Acceptable Inconclusive p < 0.99 Test
 Execu1on p < 0.37 p < 0.0027 Sebas1an Elbaum and David S. Rosenblum, “Known Unknowns: Tes1ng in the Presence of Uncertainty”, Proc. FSE 2014.
  • 42. Characterizing Recommenda1on Systems David Shriver, MaShew B. Dwyer, Sebas1an Elbaum and David S. Rosenblum, “Characteris1c Proper1es of Recommenda1on Systems”,
 under review, 2017.
  • 44. The Challenges of Probabilis1c Thinking David S. Rosenblum Na1onal University of Singapore