Difference between revisions of "Old Name of the new project"
Line 1: | Line 1: | ||
{{StudentProjectTemplate | {{StudentProjectTemplate | ||
− | |Summary= | + | |Summary=(High Priority) Rigorous Real-time Network Modeling and Verification |
|Programme=EIS Masters 15hpc | |Programme=EIS Masters 15hpc | ||
|TimeFrame=6 months | |TimeFrame=6 months | ||
Line 9: | Line 9: | ||
|Status=Finished | |Status=Finished | ||
}} | }} | ||
− | + | The core research question is to demonstrate that state of the art modeling and verification methods can be used to help design the communication infrastructure at the AstaZero test track. | |
− | + | This project will be aligned with the KK AstaMoCA project involving professors Taha, Mousavi, and Vinel. | |
− | + | The research question involves primarily modeling communication systems, and extending verification tools to handle such models. | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | The first component of the work is to build models of communication systems, starting from queuing systems and building up to full systems. | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | The second component is the evaluation of current verification tools using these models. This involves using the models to test the tools to see if they are able to produce the expected results in a satisfactory manner. | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | The third component of the work is extension of current verification technologies to improve the state of the art. | |
− | + | ||
− | + | ||
− | + | ||
− | + | The fourth component is scholarship, consisting of reading related research papers and writing up the results of the work. | |
− | + | ||
− | + | ||
− | + | ||
− | + | The deliverables are a) a series of communication systems models that are mathematically valid and practically relevant, b) an extensive table evaluating the extent to which the verification technology is able to function on the benchmarks, c) an extension of the verification technology to handle key features of the benchmarks (which are relevant to the scientific community), and d) a thesis document and presentation. | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + |
Revision as of 11:57, 20 October 2016
Title | Old Name of the new project |
---|---|
Summary | (High Priority) Rigorous Real-time Network Modeling and Verification |
Keywords | |
TimeFrame | 6 months |
References | Contact instructor |
Prerequisites | |
Author | |
Supervisor | Walid Taha |
Level | Flexible |
Status | Finished |
The core research question is to demonstrate that state of the art modeling and verification methods can be used to help design the communication infrastructure at the AstaZero test track.
This project will be aligned with the KK AstaMoCA project involving professors Taha, Mousavi, and Vinel.
The research question involves primarily modeling communication systems, and extending verification tools to handle such models.
The first component of the work is to build models of communication systems, starting from queuing systems and building up to full systems.
The second component is the evaluation of current verification tools using these models. This involves using the models to test the tools to see if they are able to produce the expected results in a satisfactory manner.
The third component of the work is extension of current verification technologies to improve the state of the art.
The fourth component is scholarship, consisting of reading related research papers and writing up the results of the work.
The deliverables are a) a series of communication systems models that are mathematically valid and practically relevant, b) an extensive table evaluating the extent to which the verification technology is able to function on the benchmarks, c) an extension of the verification technology to handle key features of the benchmarks (which are relevant to the scientific community), and d) a thesis document and presentation.