2019
DOI: 10.1007/978-3-030-21290-2_41
|View full text |Cite
|
Sign up to set email alerts
|

A Constraint Mining Approach to Support Monitoring Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…It is generally infeasible to know all constraints initially due to lack of deep domain knowledge or data, whereas some requirements can only be known after going into the operations due to environmental variability [7]. For example, defining constraints for power system state estimation requires determining confidence on measured data.…”
Section: Constraints Learnermentioning
confidence: 99%
See 1 more Smart Citation
“…It is generally infeasible to know all constraints initially due to lack of deep domain knowledge or data, whereas some requirements can only be known after going into the operations due to environmental variability [7]. For example, defining constraints for power system state estimation requires determining confidence on measured data.…”
Section: Constraints Learnermentioning
confidence: 99%
“…Though we consider a static value for that required number of events, we plan to determine it dynamically in future extension. Moreover, there are ongoing research efforts to mine such constraints at real-time from observations such as runtime event logs or physical world information [7].…”
Section: Constraints Learnermentioning
confidence: 99%
“…Step 1: Mining constraints for datasets. The approach then uses constraint mining [8] to extract constraints in an existing DSL [12] for both datasets. This step uses all the constraints produced by the constraint mining algorithm with a confidence of at least 90% (based on initial experiments) to filter irrelevant constraints and therefore does not require user input.…”
Section: Evolution Analysis Approachmentioning
confidence: 99%
“…Our existing constraint mining approach [8] extracts the behavior of a software system by analyzing execution logs collected during system runs. These logs contain complex events consisting of an event type, a timestamp, and (optionally) event data elements, such as sensor values or status messages.…”
Section: Background: Constraint Miningmentioning
confidence: 99%
See 1 more Smart Citation