In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so o...
详细信息
In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so on. However, there are not too many methods for detecting data-flow errors. This paper defines Petri nets with data operations(PN-DO) that can model the operations on data such as read, write and delete. Based on PN-DO, we define some data-flow errors in this paper. We construct a reachability graph with data operations for each PN-DO, and then propose a method to reduce the reachability graph. Based on the reduced reachability graph, data-flow errors can be detected rapidly. A case study is given to illustrate the effectiveness of our methods.
The development of VLSI technology results in the dramatically improvement of the performance of integrated circuits. However, it brings more challenges to the aspect of reliability. Integrated circuits become more su...
详细信息
The development of VLSI technology results in the dramatically improvement of the performance of integrated circuits. However, it brings more challenges to the aspect of reliability. Integrated circuits become more susceptible to soft errors. Therefore, it is imperative to study the reliability of circuits under the soft error. This paper implements three probabilistic methods (two pass, error propagation probability, and probabilistic transfer matrix) for estimating gate-level circuit reliability on PC. The functions and performance of these methods are compared by experiments using ISCAS85 and 74-series circuits.
With the proliferation of IoT devices, there is an escalating demand for enhanced computing and communication capabilities. Mobile Edge computing (MEC) addresses this need by relocating computing resources to the netw...
详细信息
Inter-organizational workflow nets(IWF-nets) can well model the interactions among multiple processes by sending/receiving messages. Compatibility and weak compatibility are crucial properties for *** latter guarantee...
详细信息
Inter-organizational workflow nets(IWF-nets) can well model the interactions among multiple processes by sending/receiving messages. Compatibility and weak compatibility are crucial properties for *** latter guarantees that a system is deadlock-free and livelock-free while the former also guarantees that it has no dead tasks. Our previous work proved that the(weak) compatibility problem is PSPACE-complete for safe IWF-nets. This paper defines a class of IWF-nets in which some simple circuits are allowed. Necessary and sufficient conditions are presented to decide compatibility and weak compatibility for this class, and they are dependent on the net structures only. Algorithms are developed based on these conditions. In addition, we show that the traditional net structures like siphon cannot be easily used to decide the(weak) compatibility of IWF-nets.
The rapid development of location-based social networks(LBSNs) provides people with an opportunity of better understanding their mobility behavior which enables them to decide their next *** example,it can help travel...
详细信息
The rapid development of location-based social networks(LBSNs) provides people with an opportunity of better understanding their mobility behavior which enables them to decide their next *** example,it can help travelers to choose where to go next,or recommend salesmen the most potential places to deliver advertisements or sell *** this paper,a method for recommending points of interest(POIs)is proposed based on a collaborative tensor factorization(CTF)***,a generalized objective function is constructed for collaboratively factorizing a tensor with several feature ***,a 3-mode tensor is used to model all users' check-in behaviors,and three feature matrices are extracted to characterize the time distribution,category distribution and POI correlation,***,each user's preference to a POI at a specific time can be estimated by using *** order to further improve the recommendation accuracy,PCTF(Partitionbased CTF) is proposed to fill the missing entries of a tensor after clustering its every *** on a real checkin database show that the proposed method can provide more accurate location recommendation.
This paper presents a central pattern generator (CPG) and vestibular reflex combined control strategy for a quadruped robot. An oscillator network and a knee-to-hip mapping function are presented to realize the rhyt...
详细信息
This paper presents a central pattern generator (CPG) and vestibular reflex combined control strategy for a quadruped robot. An oscillator network and a knee-to-hip mapping function are presented to realize the rhythmic motion for the quadruped robot. A two-phase parameter tuning method is designed to adjust the parameters of oscillator network. First, based on the numerical simulation, the influences of the parameters on the output signals are analyzed, then the genetic algorithm (GA) is used to evolve the phase relationships of the oscillators to realize the basic animal-like walking pattern. Moreover, the animal's vestibular reflex mechanism is mimicked to realize the adaptive walking of the quadruped robot on a slope terrain. Coupled with the sensory feedback information, the robot can walk up and down the slope smoothly. The presented bio-inspired control method is validated through simulations and experiments with AIBO. Under the control of the presented CPG and vestibular reflex combined control method, AIBO can cope with slipping, falling down and walk on a slope successfully, which demonstrates the effectiveness of the proposed walking control method.
service-oriented computing is a new software development paradigm that allows application developers to select available services from the Internet and to form new web services. A main problem is how to efficiently de...
详细信息
Dynamically selecting suitable Web services (WSs) is crucial to users in Web services Composition (WSC). Generally, most works regard a Web service (WS) as the basic unit and compose the composite WS (CWS) end to end....
详细信息
Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence...
详细信息
Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence has become a problem. For this condition, we should analyze unknown correspondence due to the influence of different *** this paper we obtain the relations of transitions based on event relations using branching processes, and build a behavioral matrix of relations. Based on the permutation of behavioral matrix, we express different correspondences, and define a new formula to compute the maximal consistency degree of two workflow nets. Additionally, this paper utilizes an example to show these definitions, computation as well as the advantages.
An adaptive output feedback control was proposed to deal with a class of nonholonomic systems in chained form with strong nonlinear disturbances and drift terms. The objective was to design adaptive nonlinear output f...
详细信息
An adaptive output feedback control was proposed to deal with a class of nonholonomic systems in chained form with strong nonlinear disturbances and drift terms. The objective was to design adaptive nonlinear output feedback laws such that the closed-loop systems were globally asymptotically stable, while the estimated parameters remained bounded. The proposed systematic strategy combined input-state-scaling with backstepping technique. The adaptive output feedback controller was designed for a general case of uncertain chained system. Furthermore, one special case was considered. Simulation results demonstrate the effectiveness of the proposed controllers.
暂无评论