Skip to main content

Verification for Autonomous Underwater Systems

  • Chapter
  • First Online:
AI Technology for Underwater Robots

Part of the book series: Intelligent Systems, Control and Automation: Science and Engineering ((ISCA,volume 96))

  • 1199 Accesses

Abstract

Since underwater systems operate out of immediate reach, often autonomously, for extended periods of time, the correctness of both the software and hardware constituting these systems is of high concern. In this contribution, we review existing techniques to ensure the correctness of hardware and software using formal methods, and assess their applicability to underwater robotics. We identify several promising areas: system modelling, program verification and algorithm design for guaranteed efficiency and correctness (certifying algorithms).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In the form above, not quite: what is lacking is the requirement that out is actually one of the points in ps.

References

  1. Albers S (2010) Energy-efficient algorithms. Commun ACM 53(5):86–96

    Article  Google Scholar 

  2. Alkassar E, Bohme S, Mehlhorn K, Schweitzer P (2011) An introduction to certifying algorithms. IT–Inf Technol 53:287–293

    Google Scholar 

  3. Bampis E, Kononov AV, Letsios D, Lucarelli G, Sviridenko M (2018) Energy-efficient scheduling and routing via randomized rounding. J Sched 21(1):35–51

    Article  MathSciNet  Google Scholar 

  4. Blum M, Kannan S (1995) Designing programs that check their work. J ACM 42(1):269–291

    Article  Google Scholar 

  5. Bonifaci V, Chan H-L, Marchetti-Spaccamela A, Megow N (2012) Algorithms and complexity for periodic real-time scheduling. ACM Trans Algorithms 9:601–619

    Article  MathSciNet  Google Scholar 

  6. Bonifaci V, Marchetti-Spaccamela A, Megow N, Wiese A (2013) Polynomial-time exact schedulability tests for harmonic real-time tasks. In: Proceedings of RTSS. IEEE, pp 236–245

    Google Scholar 

  7. Chen L, Megow N, Rischke R, Stougie L (2015) Stochastic and robust scheduling in the cloud. In: Proceedings of APPROX, LIPIcs,vol 40. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, pp 175–186

    Google Scholar 

  8. Chen L, Megow N, Schewior K (2018) An \(\cal{O}(\log m)\)-competitive algorithm for online machine minimization. SIAM J Comput 47(6):2057–2077

    Article  MathSciNet  Google Scholar 

  9. Irani S, Pruhs K (2005) Algorithmic problems in power management. SIGACT News 36(2):63–76

    Article  Google Scholar 

  10. Klein G (2010) The L4. Verified project: next steps. In: Proceedings of the third international conference on verified software: theories, tools, experiments, VSTTE’10. Springer, Berlin, pp 86–96

    Chapter  Google Scholar 

  11. Koczor A, Matoga L, Penkala P, Pawlak A (2016) Verification approach based on emulation technology. In: International symposium on design and diagnostics of electronic circuits & systems (DDECS), pp 169–174

    Google Scholar 

  12. Kühne U, Beyer S, Bormann J, Barstow J (2010) Automated formal verification of processors based on architectural models. Form Methods Comput Aided Des 9:129–136

    Google Scholar 

  13. Le HM, Große D, Herdt V, Drechsler R (2013) Verifying System C using an intermediate verification language and symbolic simulation. In: Design automation conference, pp 116

    Google Scholar 

  14. LEDA (Library of Efficient Data Types and Algorithms). www.algorithmic-solutions.com

  15. Leroy X (2009) Formal verification of a realistic compiler. Commun ACM 52(7):107–115

    Article  Google Scholar 

  16. Lüth C, Ring M, Drechsler R (2017) Towards a methodology for self-verification. In: Khatri S (ed) 6th International conference on reliability, infocom technologies and optimization (ICRITO 2017)

    Google Scholar 

  17. Lüth C, Walter D (2009) Certifiable specification and verification of C programs. In: FM 2009: Formal methods, Lecture notes in computer science, vol 5350. Springer, pp 419–434

    Google Scholar 

  18. McConnell RM, Mehlhorn K, Näher S, Schweitzer P (2011) Certifying algorithms. Comput Sci Rev 5(2):119–161

    Article  Google Scholar 

  19. Megow N, Mehlhorn K, Schweitzer P (2012) Online graph exploration: new results on old and new algorithms. Theor Comput Sci 463:62–72

    Article  MathSciNet  Google Scholar 

  20. Megow N, Skutella M, Verschae J, Wiese A (2016) The power of recourse for online MST and TSP. SIAM J Comput 45:859–880

    Article  MathSciNet  Google Scholar 

  21. Megow N, Uetz M, Vredeveld T (2006) Models and algorithms for stochastic online scheduling. Math Oper Res 31(3):513–525

    Article  MathSciNet  Google Scholar 

  22. Megow N, Verschae J (2018) Dual techniques for scheduling on a machine with varying speed. SIAM J Discret Math 32:1541–1571

    Article  MathSciNet  Google Scholar 

  23. Nipkow T, Paulson LC, Wenzel M (2002) Isabelle/HOL: a proof assistant for higher-order logic, vol 2283. Lecture notes in computer science. Springer

    Google Scholar 

  24. Ring M, Bornebusch F, Lüth C, Wille R, Drechsler R (2019) Better late than never: verification of embedded systems after deployment. In: Design, automation and test in Europe. Florence, Italy. IEEE

    Google Scholar 

  25. Smith D, Simpson K (2004) Functional safety, 2nd edn. Elsevier

    Google Scholar 

  26. Täubig H, Frese U, Hertzberg C, Lüth C, Mohr S, Vorobev E, Walter D (2012) Guaranteeing functional safety: design for provability and computer-aided verification. Auton Robot 32:303–331

    Article  Google Scholar 

  27. Thrun S, Martin C, Liu Y, Hahnel D, Emery-Montemerlo R, Chakrabarti D, Burgard W (2004) A real-time expectation-maximization algorithm for acquiring multiplanar maps of indoor environments with mobile robots. IEEE Trans Robot Autom 20(3):433–443

    Article  Google Scholar 

  28. Yao FF, Demers AJ, Shenker S (1995) A scheduling model for reduced CPU energy. In: Proceedings of the 36th annual symposium on foundations of computer science (FOCS 1995), pp 374–382

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christoph Lüth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lüth, C., Megow, N., Drechsler, R., Frese, U. (2020). Verification for Autonomous Underwater Systems. In: Kirchner, F., Straube, S., Kühn, D., Hoyer, N. (eds) AI Technology for Underwater Robots. Intelligent Systems, Control and Automation: Science and Engineering, vol 96. Springer, Cham. https://doi.org/10.1007/978-3-030-30683-0_15

Download citation

Publish with us

Policies and ethics