Delayed input deterministic finite automata (D2FA) reduces the transition edges of deterministic finite automata (DFA) by introducing default edges. The relevance between DFA (∧X) and DFA (X) is analyzed to improve t...
详细信息
Delayed input deterministic finite automata (D2FA) reduces the transition edges of deterministic finite automata (DFA) by introducing default edges. The relevance between DFA (∧X) and DFA (X) is analyzed to improve the efficiency of constructing algorithm to create D2FA. A constructing algorithm is presented to create D2FA from DFA. The algorithm expresses the state of DFA (X) with the state sequence of DFA (∧X), hence the choice of default edges is relayed on the state sequence, rather than creating actual DFA (X). Experiments show that the algorithm greatly reduces the complexity of constructing D2FA, meanwhile it ensures a lower time bounds of pattern match and capacity of reducing state transition.
Based on the planning via model checking paradigm, we address the problem of coalitional planning in this paper. Informally, coalitional planning is the problem of planning for a subset of agents in a multi-agent syst...
详细信息
Based on the planning via model checking paradigm, we address the problem of coalitional planning in this paper. Informally, coalitional planning is the problem of planning for a subset of agents in a multi-agent system to force the whole multi-agent system to satisfy some goals. We use the language of ATL as the goal language and the semantic structure of ATL, i.e., concurrent game structure, to formalize the planning domain. We separate the concept of goal and planning object and use execution structures to interpret the goals. And then, we define a algorithm for coalitional planning and formally prove its correctness. Distinguished from the previous work, in coalitional planning all the ATL formulas can be considered as goals, thus the expressive power of ATL is sufficiently applied.
Gabor feature based classification approaches are widely used in face recognition, because they are insensitive to changes in illumination and facial expression. However, most of strategies only use the magnitude of t...
详细信息
The Internetware is a new initiative to develop software on the web for web applications. The open and dynamic nature of Internet applications suggest new ways of thinking will be needed for this initiative. This pape...
详细信息
ISBN:
(纸本)9781605588728
The Internetware is a new initiative to develop software on the web for web applications. The open and dynamic nature of Internet applications suggest new ways of thinking will be needed for this initiative. This paper discusses several important issues in Internetware and put forward to some relevant research directions. The relevant issues include lifecycle models, ontology and context systems, modeling and simulation, social networking, and adaptive control. Copyright 2009 ACM.
Abstraction plays a fundamental role in combating state-space explosion in model checking. In a complete abstract interpretation-based view, the authors reduce the state space of a Kripke structure in order to obtain ...
详细信息
Abstraction plays a fundamental role in combating state-space explosion in model checking. In a complete abstract interpretation-based view, the authors reduce the state space of a Kripke structure in order to obtain a minimal abstract state translation system that strongly preserves a given temporal specification language CTL. According to a relation between completeness of abstract interpretations and strong preservation of abstract model checking, the problem of minimally refining abstract model in order to make it strongly preserving CTL can be formulated as a minimal abstract domain refinement in abstraction interpretation in order to get completeness, and this refined complete abstract domain always exists. Given initial abstract domain, we can obtain a minimal abstract domain which is complete for the standard operators of CTL by the iterative computation of the fixpoint. Moreover, the corresponding partition is the coarsest partition which is strong preserving for CTL. The authors show that the abstract domain is complete for the standard operators of CTL iff it is complete for complement and standard predecessor transformer operators.
We present a calculus of concurrent objects for specification and security analysis of ad hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are...
详细信息
We present a calculus of concurrent objects for specification and security analysis of ad hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow analysis which can be used to automatically check properties such as security routing. The attacker model is integrated into the analysis as set values containing the knowledge of the attacker.
"computer Organization and Architecture" is one of the most important fundamental courses for those majoring in computerscience and engineering. The contents of the curriculum are crucial for entire compute...
详细信息
"computer Organization and Architecture" is one of the most important fundamental courses for those majoring in computerscience and engineering. The contents of the curriculum are crucial for entire computer discipline and computer systems. As a result, the curriculum plays an important role in training computerscience students. This paper begins with the discussion on principles and goals of the curriculum. Then, it describes teaching philosophy and methods, improvements of contents, along with their effects, for lectures and experiments of the curriculum. Finally we review some experiences from the development and teaching of the curriculum. This paper intends to share experiences in teaching the curriculum with other institutes in China and provide them with a potentially useful instructional model.
Program understanding plays an important role in the maintenance and reuse of open source code. Rapid evolving and bad documentation makes the understanding and reusing difficult. Design patterns are widely employed i...
详细信息
Program understanding plays an important role in the maintenance and reuse of open source code. Rapid evolving and bad documentation makes the understanding and reusing difficult. Design patterns are widely employed in the open source code. In this paper, we propose a design pattern directed clustering approach to help understand the structure of open source code. According to the approach, we have implemented a prototype tool. We also conducted an experiment on an open source system to evaluate it.
Interaction testing offers a stable cost-benefit ratio in identifying faults. But in many testing scenarios, the entire test suite cannot be fully executed due to limited time or cost. In these situations, it is essen...
详细信息
ISBN:
(纸本)9781424459124
Interaction testing offers a stable cost-benefit ratio in identifying faults. But in many testing scenarios, the entire test suite cannot be fully executed due to limited time or cost. In these situations, it is essential to take the importance of interactions into account and prioritize these tests. To tackle this issue, the biased covering array is proposed and the Weighted Density Algorithm (WDA) is developed. To find a better solution, in this paper we adopt ant colony optimization (ACO) to build this prioritized pairwise interaction test suite (PITS). In our research, we propose four concrete test generation algorithms based on Ant System, Ant System with Elitist, Ant Colony System and Max-Min Ant System respectively. We also implement these algorithms and apply them to two typical inputs and report experimental results. The results show the effectiveness of these algorithms.
This paper presents the design of a decentralized storage scheme to support multi-dimensional range queries over sensor networks. We build a distributed k-d tree based index structure over sensor network, so as to eff...
详细信息
This paper presents the design of a decentralized storage scheme to support multi-dimensional range queries over sensor networks. We build a distributed k-d tree based index structure over sensor network, so as to efficiently map high dimensional event data to a two-dimensional space of sensors while preserving the proximity of events. We propose a dynamic programming based methodology to control the granularity of the index tree in an optimized approach, and an optimized routing scheme for range query processing to achieve best energy efficiency. The simulation results demonstrate the efficiency of the design.
暂无评论