We report the first formal verification of a reintegration protocol for a safety-critical distributed embedded system. A reintegration protocol increases system survivability by allowing a transiently-faulty node to r...
详细信息
ISBN:
(纸本)1595930914
We report the first formal verification of a reintegration protocol for a safety-critical distributed embedded system. A reintegration protocol increases system survivability by allowing a transiently-faulty node to regain state. The protocol is verified in the Symbolic Analysis Laboratory (SAL), where bounded model-checking and decision procedures are used to verify infinite-state systems by k-induction. The protocol and its environment are modeled using a recently-developed explicit real-time model. Because k-induction has exponential complexity, we optimize this model to reduce the size of k necessary for the verification and to make k invariant to the number of nodes. A corollary of the verification is that a clique avoidance property is satisfied. Copyright 2005 ACM.
Penalty functions are often used to handle constraints for constrained optimization problems in evolutionary algorithms. However it is difficult to control penalty parameters. To overcome this shortcoming, a new penal...
详细信息
In this paper, we propose a new constraint handling approach that transforms constrained optimization problem of any number of constraints into a two objective preference optimization problem. We design a new crossove...
详细信息
Communication skills are important to software engineers. Yet, this topic is sometimes overlooked in computerscience and software engineering curricula. To address this problem, we attempted to explicitly teach commu...
详细信息
Communication skills are important to software engineers. Yet, this topic is sometimes overlooked in computerscience and software engineering curricula. To address this problem, we attempted to explicitly teach communication skills in a software engineering course. We experimented with a number of approaches, including lectures by the instructor, student presentations, mini-lectures mixed with in-class discussions, and other in-class activities such as student-designed scenarios. The results of these approaches were mixed. There were approaches that clearly worked better than one or more other approaches;there were also approaches to which students with different backgrounds responded differently. Overall, after taking this course, students communicated better and were more self-confident in team environments. Our experience shows that with careful planning and innovative pedagogy, we can help our students become both technically competent software engineers or computer scientists, and good team players in the same time.
Web-based teaching-support systems are overwhelmingly accepted by instructors, students, and educational institutions. In order to improve quality of existing systems, the questions must be answered are what underlyin...
详细信息
ISBN:
(纸本)9806560426
Web-based teaching-support systems are overwhelmingly accepted by instructors, students, and educational institutions. In order to improve quality of existing systems, the questions must be answered are what underlying dimensions of user's satisfaction exist and on which of those dimensions we should apply the resources. In this study, the principal component analysis was undertaken to determine the underlying dimensions. Then the scores for each dimension were calculated, and bivariate correlations between the dimensions and the user's satisfaction were used to assess the marginal importance of each dimension in improving web course management systems. In addition, the survey instrument was tested for reliability and validity.
In this paper we argue for the serious need for research on the theme of not so much "the professor at risk", but "the student at risk" in online learning. Our aim is thus not to try to save the pr...
详细信息
ISBN:
(纸本)1920017119
In this paper we argue for the serious need for research on the theme of not so much "the professor at risk", but "the student at risk" in online learning. Our aim is thus not to try to save the professor and the lectern from extinction. We are more seriously pleading the case for research in online learning to explore the learning dynamic of the student masses that are now 'multimediated' learners. The type of research that we are advocating is inquiry into the thinking that grounds online learning itself. The theoretical framework of online learning draws on a wide range of theoretical substance: theory of media and of semiotics (Tomaselli & Sheperson, 1996;Ryder, 1998), theory of distributed cognition (Brown, 2000;Brown, Collins & Duguid, 1989;Salomon, 1999;Saljö,1999), theory of activity (Engeström, 1991) and theory of learning and of knowledge (Bransford, Brown & Cocking (eds.) 2000;Vygotsky, 1992;Kozulin, 1990;Rogoff, 1990;Phillips, 2000). Our concern regarding research is thus not so much with issues of access, course delivery and 'packaging' and of management of all of these enterprises, but about learning design, about the shifting epistemologies that are grounding online learning (Henning & Van Rensburg, 2002;Henning & Van Der Westhuizen, 2003), about issues of design of learning contents and the student engagement with and use of learning objects as raw asset data, issues of content as metadata, and issues of knowledge content and the place in the hierarchy/network of knowledge pools in a domain of learning. We are less motivated to look at products, of learning, although in randomised experiments, for example, as part of a whole plethora of mixed methods, we would advocate comparisons of learning outcomes, both off- and online. Nothing less, we argue, would be viable to address the complexities of learning of the new student population in its exciting multimedia environment. We make the claim that the field of online learning is still largely under-resea
A novel genetic algorithm for the degree-constrained minimum spanning tree (d-MST) is proposed in this paper. In the proposed algorithm, a candidate solution is directly represented by set of the edges contained in th...
详细信息
One of the current trends in computerscience leads to the design of computing organizations based on the activity of a multitude of tiny cheap decentralized computing entities. Whether these chips are integrated into...
详细信息
作者:
Man, K.L.Formal Methods Group
Department of Mathematics and Computer Science Eindhoven University of Technology P.O.Box 513 5600 MB Eindhoven Netherlands
In this paper, we define a formal communication semantics for SystemCdouble-struck F sign double-struck L sign that deals with concurrency and interaction. The communication semantics of SystemCdouble-struck F sign do...
详细信息
作者:
Man, K.L.Formal Methods Group
Department of Mathematics and Computer Science Eindhoven University of Technology P.O.Box 513 5600 MB Eindhoven Netherlands
SystemCdouble struck F sign double struck L sign is a formal language for hardware/software co-design. Principally, SystemCdouble struck F sign double struck L sign;is the formalization of SystemC based on classical p...
详细信息
ISBN:
(纸本)0780390660
SystemCdouble struck F sign double struck L sign is a formal language for hardware/software co-design. Principally, SystemCdouble struck F sign double struck L sign;is the formalization of SystemC based on classical process algebra ACP. The language Is aimed to give formal specification of SystemC designs and perform formal analysis of SystemC processes. This paper, designed for the first-time user of SystemCdouble struck F sign double struck L sign;, guides the reader through modeling, analyzing and verifying designs using SystemCdouble struck F sign double struck L sign;. This paper Illustrates the use of SystemCdouble struck F sign double struck L sign;with two case studies taken from literature.
暂无评论