The use of property classifications and patterns, i.e., high-level abstractions that describe common behavior have been shown to assist practitioners in generating formal specifications that can be used informal verif...
详细信息
ISBN:
(纸本)9780769530437
The use of property classifications and patterns, i.e., high-level abstractions that describe common behavior have been shown to assist practitioners in generating formal specifications that can be used informal verification techniques. The Specification Pattern System (SPS) provides descriptions of a collection of patterns. The extent of program execution over which a pattern must hold is described by the notion of scope. SPS provides a manual technique for obtaining formal specifications from a pattern and a scope. The Property Specification Tool (Prospec) extends SPS by introducing Composite Propositions (CPs), a classification for defining sequential and concurrent behavior to represent pattern and scope parameters, and provides a tool to support users. This work provides general templates for generating formal specifications in Linear Temporal Logic (LTL) for all pattern, scope, and CP combinations. In addition, the work explains the methodology for the verification of the correctness of these templates.
Information Retrieval systems used in digital libraries need to find the extent of similarity between a pair of text documents for providing access to topically relevant documents on one hand and for identifying docum...
详细信息
ISBN:
(纸本)9781615677214
Information Retrieval systems used in digital libraries need to find the extent of similarity between a pair of text documents for providing access to topically relevant documents on one hand and for identifying document replication on the other hand. In this paper the details of a Rough Set based Document Ranking system (RSDRS) developed by the authors are presented. The terms associated with related concepts are grouped together to form equivalence classes by clustering the terms of the vocabulary. The query passage and the documents are represented as rough sets using these equivalence classes of terms and further partitioned into families of rough sets in higher level approximation spaces which impose partial ordering on the families of documents with reference to the query passage. Documents falling in the same family are ordered in accordance with their similarity to the query to form the relevance ranking of the documents. The performance of the RSDRS is analyzed using Average Precision metric by computing the precision at different positions in the ranking list.
This paper shows that one of soft actuators, Ionic Polymer-Metal Composite (IPMC) can be modeled in terms of distributed port-Hamiltonian systems with multi-scale. The physical structure of IPMC consists of three part...
详细信息
This paper shows that one of soft actuators, Ionic Polymer-Metal Composite (IPMC) can be modeled in terms of distributed port-Hamiltonian systems with multi-scale. The physical structure of IPMC consists of three parts. The first part is an electric double layer at the interface between the polymer and the metal electrodes. The frequency response of the polymer-metal interface shows a fractal degree of gain slope. Then we adopt a black-box circuit model to this part and give considerations for distributed impedance parameters. The second part is an electrostress diffusion coupling model with bending and relaxation dynamics. This part is represented by an electro-osmosis, which is a water transport by an electric field, and a streaming potential, which is an electric field created by a water transport. We discuss the relationship of stress and bending moment induced by swelling. The third part is a mechanical system modeled as a flexible beam with large deformations. The representation has the capability extracting the control structure based on passivity from distributed parameter systems possessing a complex behavior.
The Bowl Championship Series (BCS) is the system used to select the top two college football teams to play in a championship game at the end of a season. During the nine seasons played under the BCS, few have not caus...
详细信息
Publish/Subscribe model has become a prevalent paradigm for building distributed event delivering systems. Content-based publish/subscribe allows high expresses in subscriptions and thus is more appropriate for conten...
详细信息
software patch generation is a critical phase in the life-cycle of a software vulnerability. The longer it takes to generate a patch, the higher the risk a vulnerable system needs to take to avoid from being compromis...
详细信息
ISBN:
(纸本)1595935746
software patch generation is a critical phase in the life-cycle of a software vulnerability. The longer it takes to generate a patch, the higher the risk a vulnerable system needs to take to avoid from being compromised. However, in practice, it is a rather lengthy process to generate and release software patches. For example, the analysis on 10 recent Microsoft patches (MS06-045 to MS06-054) shows that, for an identified vulnerability, it took 75 days on average to generate and release the patch. In this paper, we present the design, implementation, and evaluation of AutoPaG, a system that aims at reducing the time needed for software patch generation. In our current work, we mainly focus on a common and serious type of software vulnerability: the out-of-bound vulnerability which includes buffer overflows and general boundary condition errors. Given a working out-of-bound exploit which may be previously unknown, AutoPaG is able to catch on the fly the out-of-bound violation, and then, based on data flow analysis, automatically analyzes the program source code and identifies the root cause - vulnerable source-level program statements. Furthermore, within seconds, AutoPaG generates a fine-grained source code patch to temporarily fix it without any human intervention. We have built a proof-of-concept system in Linux and the preliminary results are promising: AutoPaG is able to successfully identify the root cause and generate a source code patch within seconds for every vulnerability test in the Wilander's buffer overflow benchmark test-suite. In addition, the evaluation with a number of real-world out-of-bound exploits also demonstrates its effectiveness and practicality in automatically identifying (vulnerable) source code root causes and generating corresponding patches. Copyright 2007 ACM.
This paper introduces a fault-adaptive control approach for the robust and reliable performance management of computing systems. Fault adaptation involves the detection and isolation of faults, and then taking appropr...
详细信息
In this paper, a robust vibration suppression control method for a multi-inertia (a three-inertia and a four-inertia) system by a digital modified-IPD controller is proposed. The controller consists of integral, propo...
详细信息
ISBN:
(纸本)9788986510089
In this paper, a robust vibration suppression control method for a multi-inertia (a three-inertia and a four-inertia) system by a digital modified-IPD controller is proposed. The controller consists of integral, proportional, derivative and time lag of first order element. We apply the Taguchi Method for the determination of the controller gains for several noise factors (load side inertias and stiffness of the shafts). To confirm the effectiveness of the controller structure with several conditions and the tuning method, we use a real-time simulator based on a RTLinux.
Developer mailing lists are a rich source of information about Open Source software (OSS) development. The unstructured nature of email makes extracting information difficult. We use a psychometrically-based linguisti...
详细信息
This paper proposes to use a cluster of call servers for switching calls on a telecommunication switch. Using a call server cluster has a number of advantages that includes enhanced reliability and performance. When a...
详细信息
ISBN:
(纸本)9781622763559
This paper proposes to use a cluster of call servers for switching calls on a telecommunication switch. Using a call server cluster has a number of advantages that includes enhanced reliability and performance. When a call is generated, it is necessary to determine which call server in the cluster is to switch the call. In this paper we have introduced three call server selection strategies that are based on call characteristics. Using a simulation model the performance of these strategies is analyzed. A number of insights that capture the impact of system and workload parameters on performance is discussed.
暂无评论