IMITATOR II User Manual
نویسنده
چکیده
We present here the user manual of Imitator II, a tool implementing the “inverse method” in the framework of parametric timed automata: given a reference valuation of the parameters, its generates a constraint such that the system behaves the same as under the reference valuation in terms of traces, i.e., alternating sequences of locations and actions. This is useful for safely relaxing some values of the reference valuation, and optimizing timing bounds of the system. Besides the inverse method, Imitator II also implements the “behavioral cartography algorithm”, allowing to solve the following good parameters problem: find a set of valuations within a given rectangle for which the system behaves well. We give here the installation requirements and the launching commands of Imitator II, as well as the source code of a toy example.
منابع مشابه
Étienne André Everything You Always Wanted to Know About IMITATOR (But Were Afraid to Ask)
We present here the user manual of Imitator, a tool for synthesizing constraints on timing bounds (seen as parameters) in the framework of timed automata. Unlike classical synthesis methods, the tool Imitator takes advantage of a given reference valuation of the parameters for which the system is known to behave properly. The goal of Imitator is to generate a constraint such that, under any val...
متن کاملIMITATOR II: A Tool for Solving the Good Parameters Problem in Timed Automata
We present here IMITATOR II, a new version of IMITATOR, a tool implementing the “inverse method” for parametric timed automata: given a reference valuation of the parameters, it synthesizes a constraint such that, for any valuation satisfying this constraint, the system behaves the same as under the reference valuation in terms of traces, i.e., alternating sequences of locations and actions. IM...
متن کاملLogtalk 3 User Manual User Manual Logtalk Features Logtalk Nomenclature Message Sending Ii Logtalk User Manual Predicates Inheritance Event-driven Programming Multi-threading Programming Iv Logtalk User Manual Error Handling Documenting Logtalk Programs Installing Logtalk Writing, Running, and Debugging Logtalk Programs
متن کامل
Logtalk 3 User Manual User Manual Logtalk Features Logtalk Nomenclature Message Sending Ii Logtalk User Manual Predicates Inheritance Event-driven Programming Multi-threading Programming Iv Logtalk User Manual Error Handling Documenting Logtalk Programs Installing Logtalk Writing, Running, and Debugging Logtalk Applications
متن کامل
The Correspondence Problem
The identification of any form of social learning, imitation, copying or mimicry presupposes a notion of correspondence between two autonomous agents. Judging whether a behavior has been transmitted socially requires the observer to identify a mapping between the demonstrator and the imitator. If the demonstrator and imitator have similar bodies, e.g. are animals of the same species, of similar...
متن کامل