The main structure and key techniques of our Virtual Exhibition software are summarized. It demonstrates the practice of software Engineering during the development of our project and discusses the use of UML in it.
The main structure and key techniques of our Virtual Exhibition software are summarized. It demonstrates the practice of software Engineering during the development of our project and discusses the use of UML in it.
In this paper, the representability of a family of theories as the set of extensions of a default theory is studied. First, a new necessary condition is given for the representability by means of general default theor...
详细信息
In this paper, the representability of a family of theories as the set of extensions of a default theory is studied. First, a new necessary condition is given for the representability by means of general default theories; then a sufficient one is presented. The families of theories represented by default theories are also fully characterized. Finally, the paper gives an example of denumerable families of mutually inconsistent theories that are represented by a default theory but not by normal ones.
This paper introduces a non-Horn rule WRM which is a weak form of rational monotony. We explore the effects of adding this non-Horn rule to the rules for the preferential inference. In this paper, a relation |~ is sai...
详细信息
This paper introduces a non-Horn rule WRM which is a weak form of rational monotony. We explore the effects of adding this non-Horn rule to the rules for the preferential inference. In this paper, a relation |~ is said to be P + WRM iff it is a preferential inference and satisfies the rule WRM. We establish the representation theorem for P + WRM, and compare the strength of WRM with some non-Horn rules appearing in literatures. Moreover, we explore the relation between P + WRM and conditional logic, and demonstrate that P + WRM is equivalent to 'flat' fragment of conditional logic CS4.2. Another contribution of this paper is to explore the relation between two special kinds of preferential models, i.e., PRC model and quasi-linear model. Main result reveals that the latter is a special form of the former.
In this paper, we show that for a class of linear hybrid automata called zero loop-closed automata, the satisfaction problem for linear duration properties can be solved efficiently by linear programming. We give an a...
详细信息
This article goes into the analysis of program executive path at length, performs a system of program executive path visualization, compares several aspects of different path coverage criteria and discusses the implem...
详细信息
ISBN:
(纸本)9539676932
This article goes into the analysis of program executive path at length, performs a system of program executive path visualization, compares several aspects of different path coverage criteria and discusses the implementation of two specific, yet important, path combinations. In the end, it discusses briefly the significance based on this system and further study.
Formal verification has been widely needed in the development of safety critical systems. In order to introduce the design verification activity in UML developing process, we have developed a verifier of UML statechar...
详细信息
Formal verification has been widely needed in the development of safety critical systems. In order to introduce the design verification activity in UML developing process, we have developed a verifier of UML statecharts by using the model checker SMV. The approach is to transform a system model in UML statecharts to one in SMV input language via an intermediate language and then to verify the system properties specified in CTL by invoking SMV. The current experiences, including the formal verification of a simplified directory based cache coherence protocol in UML statecharts, show that automatic verification can be integrated as a new step of the software process nicely.
This article goes into the analysis of program executive path at length, performs a system of program executive path visualization, compares several aspects of different path coverage criteria and discusses the implem...
详细信息
This article goes into the analysis of program executive path at length, performs a system of program executive path visualization, compares several aspects of different path coverage criteria and discusses the implementation of two specific, yet important, path combinations. In the end, it discusses briefly about the significance based on this system and further study.
We first introduce a simple distance-vector protocol for routing in networks having unidirectional links. The protocol can be seen as an adaptation for these networks of the strategy as used in the popular RIP protoco...
详细信息
This paper presents a novel approach for recognizing and interpreting dimensions in engineering drawings. It starts by detecting potential dimension frames, each comprising only the line and text components of a dimen...
详细信息
ISBN:
(纸本)0769512720
This paper presents a novel approach for recognizing and interpreting dimensions in engineering drawings. It starts by detecting potential dimension frames, each comprising only the line and text components of a dimension, then verifies them by detecting the dimension symbols. By removing the prerequisite of symbol recognition from detection of dimension sets, our method is capable of handling low quality drawings. We also propose a reconstruction algorithm for rebuilding the drawing entities based on the recognized dimension annotations. A coordinate grid structure is introduced to represent and analyze two-dimensional spatial constraints between entities; this simplifies and unifies the process of rectifying deviations of entity dimensions induced during scanning and vectorization.
Agent mobility presents challenges to the design of efficient message transport protocols for mobile agent communications. A practical mobile agent communication protocol should provide location transparency to the pr...
详细信息
暂无评论