We present the main features of Eclectic CSP - an experimental language designed to support the specification and implementation of intelligent telecommunication network services, but applicable to any field requiring...
详细信息
The paper describes an experience in developing and using a system for real-time field support to archaeological excavations. The experience is made possible by using mobile computers in outdoor environments, like arc...
详细信息
ISBN:
(纸本)1581130864
The paper describes an experience in developing and using a system for real-time field support to archaeological excavations. The experience is made possible by using mobile computers in outdoor environments, like archaeological sites.
The representation and execution of business processes have generated some important challenges in Computer Science. An important related concern is the choosing of the best formal foundation to specify processes beha...
详细信息
ISBN:
(纸本)1595934804;9781595934802
The representation and execution of business processes have generated some important challenges in Computer Science. An important related concern is the choosing of the best formal foundation to specify processes behavior, mainly representing control-flow patterns in cooperative environments. The first contribution of this research is the complete definition of the Navigation Plan Definition Language (NPDL) as an alternative for business process managing in cooperative environments. The second contribution is a complete implementation of control-flow patterns using NPDL. These control-flow patterns have been proposed by Aalst's group. Our experience in applying suggestion of Aalst's group to use control-flow patterns as a basis for comparison among control-flow specification languages shows that this comparison method is feasible and the results are useful. The simplicity of NPDL representations shows the advantages of NPDL as a process specification language. NPDL uses a declarative specification (similar to process algebra) to describe the workflow and adds new operators to compensate for the limitations of process algebra and Petri nets. NPDL also increases the modeling flexibility by allowing the reuse of process expressions in relational data-base systems. Copyright 2007 acm.
In this paper, we consider the load balancing problem as a bi-objective problem which includes minimization of jobs' response time and utilization imbalance among servers. We consider both the objectives in an int...
详细信息
ISBN:
(纸本)9781450368667
In this paper, we consider the load balancing problem as a bi-objective problem which includes minimization of jobs' response time and utilization imbalance among servers. We consider both the objectives in an integrated manner and formulated as an optimization model. We cast into the game-theoretic setting. To derive the solution of the game, we propose a co-evolutionary computing framework, called CO-evolutionary framework based on Differential Evolution (CODE). Simulation results show that the CODE not only minimizes the jobs' response time but also significantly reduces the utilization imbalance among servers.
Component based software engineering has been claimed as a suitable approach to improve the flexibility and reuse in software development. In this context, the Compor infrastructure provides mechanisms to promote the ...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Component based software engineering has been claimed as a suitable approach to improve the flexibility and reuse in software development. In this context, the Compor infrastructure provides mechanisms to promote the dynamic composition of software systems, addressing applications with support for unanticipated requirement changes. In this paper, the formal modelling and verification of the COMPOR component model is presented. Hierarchical Colored Petri Nets are used for modelling and simulation, purposing to show the correct behavior for some scenarios. Model checking is used to prove that the scenarios analyzed with simulation are correct for all possible behaviors of the model. Copyright 2007 acm.
Medical computer based applications always require very careful work to attain correct and patient-safe results. A good procedure to gain them is to apply learning methods like evolutionary algorithms. The use of such...
详细信息
ISBN:
(纸本)9780897916585
Medical computer based applications always require very careful work to attain correct and patient-safe results. A good procedure to gain them is to apply learning methods like evolutionary algorithms. The use of such kind of optimizing methods depends on the construction of a so called objective function which offers the direction and base of the learning process. But the development of those function is limited by the power of today's computer architectures. This paper will show this for the case of medical applications.
In our previous work, we developed a nested Petri net framework for modeling multi-agent systems. In this paper, we present a method to analyze the nested Petri net model using model checking. Our method systematicall...
详细信息
This paper presents a framework for ranking components by utilizing types of failures and pre-defined ranking features. The ultimate goal is that such a framework can help system developers in prioritizing components ...
详细信息
ISBN:
(纸本)9781450316569
This paper presents a framework for ranking components by utilizing types of failures and pre-defined ranking features. The ultimate goal is that such a framework can help system developers in prioritizing components systematically for achieving a more reliable software system. Copyright 2013 acm.
Context-aware recommender systems (CARS) emerged during recent years in order to adapt to users' preferences in different contextual situations. For example, users may choose different movies if they are going to ...
详细信息
ISBN:
(纸本)9781450331968
Context-aware recommender systems (CARS) emerged during recent years in order to adapt to users' preferences in different contextual situations. For example, users may choose different movies if they are going to see movies with their partners rather than with kids. The motivation behind is that users' preferences on items are always changing from contexts to contexts. Copyright 2015 acm.
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t. to complex functional and/or security policies. To this end, we define a bytecode specification language (BCSL) and ...
详细信息
ISBN:
(纸本)1595931082
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t. to complex functional and/or security policies. To this end, we define a bytecode specification language (BCSL) and a weakest precondition calculus for sequential Java bytecode. BCSL and the calculus are expressive enough for verifying non-trivial properties of programs, and cover most of sequential Java bytecode, including exceptions, subroutines, references, object creation and method calls. Our approach does not require that bytecode components are provided with their source code. Nevertheless, we provide a means to compile JML annotations into BCSL annotations by defining a compiler from the Java Modeling Language (JML) to BCSL. Our compiler can be used in combination with most Java compilers to produce extended class files from JML-annotated Java source programs. All components, including the verification condition generator and the compiler are implemented and integrated in the Java Applet Correctness Kit (JACK). Copyright 2006 acm.
暂无评论