Towards Programming and Verification for Activity-Oriented Smart Home Systems
Smart home systems are becoming increasingly popular. Engineering such systems hence becomes a prominent software engineering challenge.In this specific engineering paradigm,users are often interested in considering sensor states while they are performing various activities. Existing works have proposed initial efforts on incremental development method with activity-oriented requirements. However, there is no systematic way of ensuring reliability and security of such systems which may be developed incrementally by various developers and may execute in a complex environment. Some properties, especially those including metric timing constraints, need to be satisfied. In this paper, we introduce ACTOM, a framework for identification of activity-oriented requirements and runtime verification.ACTOM supports the development of the mapping between activities and required sensor readings (activity-sensor mapping) based on the physical requirements of activities. At runtime, ACTOM receives results of activity recognition and is able to trigger actuators to provide the required physical conditions for the activities, as determined by the activity-sensor mapping. Moreover, ACTOM continuously monitors whether activity-sensor mapping holds over a time period during the activity. We plan to evaluate ACTOM with a case study in a smart home in which various activities are observed to show its effectiveness. The end product will be a systematic framework to facilitate the development of activity-oriented requirements and monitor properties related to metric timing constraints to improve reliability and security.
Tue 22 Sep Times are displayed in time zone: (UTC) Coordinated Universal Time
10:20 - 11:20: LBR + DS Poster (1)Late Breaking Results / Doctoral Symposium at Koala Chair(s): Kevin LeeDeakin University | |||
10:20 - 10:25 Poster | Efficient Multiplex Symbolic Execution with Adaptive Search Strategy Late Breaking Results Tianqi ZhangNational University of Defense Technology, Yufeng ZhangCollege of Information Science and Engineering, Hunan University, Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Ziqi ShuaiNational University of Defense Technology, Ji WangNational University of Defense Technology | ||
10:25 - 10:30 Poster | Styx: A Data-Oriented Mutation Framework to Improve the Robustness of DNN Late Breaking Results Meixi LiuNational University of Defense Technology, Changsha, China, Weijiang HongNational University of Defense Technology, Changsha, China, Weiyu PanNational University of Defense Technology, Changsha, China, Chendong FengCollege of Computer, National University of Defense Technology, Changsha, China, Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Ji WangNational University of Defense Technology | ||
10:30 - 10:35 Poster | Synthesizing Smart Solving Strategy for Symbolic Execution Late Breaking Results Zehua ChenNational University of Defense Technology, Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Ziqi ShuaiNational University of Defense Technology, Yufeng ZhangCollege of Information Science and Engineering, Hunan University, Weiyu PanNational University of Defense Technology, Changsha, China | ||
10:35 - 10:40 Poster | Privacy Assessment of Android Clipboard Late Breaking Results Zach Wei WangThe University of Adelaide, Ruoxi SunThe University of Adelaide, Jason Minhui XueThe University of Adelaide, Damith C. RanasingheThe University of Adelaide DOI | ||
10:40 - 10:45 Poster | The Symptom, Cause and Repair of Workaround Late Breaking Results Daohan SongShanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University, Li JiaShanghai Jiao Tong University | ||
10:45 - 10:50 Poster | Edge4Sys: A Device-Edge Collaborative Framework for MEC based Smart Systems Late Breaking Results Han GaoSchool of Computer Science and Technology, Anhui University, Yi XuSchool of Computer Science and Technology, Anhui University, Xiao LiuSchool of Information Technology, Deakin University, Jia XuSchool of Computer Science and Technology, Anhui University, Tianxiang ChenSchool of Computer Science and Technology, Anhui University, Bowen ZhouSchool of Computer Science and Technology, Anhui University, Rui LiSchool of Information Technology, Deakin University, Xuejun LiSchool of Computer Science and Technology, Anhui University | ||
10:50 - 10:55 Poster | Towards Immersive Comprehension of Software Systems Using Augmented Reality - An Empirical Evaluation Late Breaking Results Rohit MehraAccenture Labs, India, Vibhu Saujanya SharmaAccenture Labs, Bangalore, India, Vikrant KaulgudAccenture Labs, India, Sanjay PodderAccenture, Adam P. BurdenAccenture | ||
10:55 - 11:00 Poster | Towards Programming and Verification for Activity-Oriented Smart Home Systems Late Breaking Results Xuansong LiSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Wei SongSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Xiangyu ZhangPurdue University, USA | ||
11:00 - 11:05 Talk | Towards Robust Production Machine Learning Systems: Managing Dataset Shift Doctoral Symposium Hala AbdelkaderApplied Artificial Intelligence Institute, Deakin University | ||
11:05 - 11:10 Talk | Using Defect Prediction to Improve the Bug Detection Capability of Search-Based Software Testing Doctoral Symposium Anjana PereraMonash University DOI Pre-print |