Abstraction plays a fundamental role in combating state-space explosion in model checking. In a complete abstract interpretation-based view, the authors reduce the state space of a Kripke structure in order to obtain ...
详细信息
Abstraction plays a fundamental role in combating state-space explosion in model checking. In a complete abstract interpretation-based view, the authors reduce the state space of a Kripke structure in order to obtain a minimal abstract state translation system that strongly preserves a given temporal specification language CTL. According to a relation between completeness of abstract interpretations and strong preservation of abstract model checking, the problem of minimally refining abstract model in order to make it strongly preserving CTL can be formulated as a minimal abstract domain refinement in abstraction interpretation in order to get completeness, and this refined complete abstract domain always exists. Given initial abstract domain, we can obtain a minimal abstract domain which is complete for the standard operators of CTL by the iterative computation of the fixpoint. Moreover, the corresponding partition is the coarsest partition which is strong preserving for CTL. The authors show that the abstract domain is complete for the standard operators of CTL iff it is complete for complement and standard predecessor transformer operators.
We present a calculus of concurrent objects for specification and security analysis of ad hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are...
详细信息
We present a calculus of concurrent objects for specification and security analysis of ad hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow analysis which can be used to automatically check properties such as security routing. The attacker model is integrated into the analysis as set values containing the knowledge of the attacker.
"computer Organization and Architecture" is one of the most important fundamental courses for those majoring in computerscience and engineering. The contents of the curriculum are crucial for entire compute...
详细信息
"computer Organization and Architecture" is one of the most important fundamental courses for those majoring in computerscience and engineering. The contents of the curriculum are crucial for entire computer discipline and computer systems. As a result, the curriculum plays an important role in training computerscience students. This paper begins with the discussion on principles and goals of the curriculum. Then, it describes teaching philosophy and methods, improvements of contents, along with their effects, for lectures and experiments of the curriculum. Finally we review some experiences from the development and teaching of the curriculum. This paper intends to share experiences in teaching the curriculum with other institutes in China and provide them with a potentially useful instructional model.
Program understanding plays an important role in the maintenance and reuse of open source code. Rapid evolving and bad documentation makes the understanding and reusing difficult. Design patterns are widely employed i...
详细信息
Program understanding plays an important role in the maintenance and reuse of open source code. Rapid evolving and bad documentation makes the understanding and reusing difficult. Design patterns are widely employed in the open source code. In this paper, we propose a design pattern directed clustering approach to help understand the structure of open source code. According to the approach, we have implemented a prototype tool. We also conducted an experiment on an open source system to evaluate it.
Interaction testing offers a stable cost-benefit ratio in identifying faults. But in many testing scenarios, the entire test suite cannot be fully executed due to limited time or cost. In these situations, it is essen...
详细信息
ISBN:
(纸本)9781424459124
Interaction testing offers a stable cost-benefit ratio in identifying faults. But in many testing scenarios, the entire test suite cannot be fully executed due to limited time or cost. In these situations, it is essential to take the importance of interactions into account and prioritize these tests. To tackle this issue, the biased covering array is proposed and the Weighted Density Algorithm (WDA) is developed. To find a better solution, in this paper we adopt ant colony optimization (ACO) to build this prioritized pairwise interaction test suite (PITS). In our research, we propose four concrete test generation algorithms based on Ant System, Ant System with Elitist, Ant Colony System and Max-Min Ant System respectively. We also implement these algorithms and apply them to two typical inputs and report experimental results. The results show the effectiveness of these algorithms.
This paper presents the design of a decentralized storage scheme to support multi-dimensional range queries over sensor networks. We build a distributed k-d tree based index structure over sensor network, so as to eff...
详细信息
This paper presents the design of a decentralized storage scheme to support multi-dimensional range queries over sensor networks. We build a distributed k-d tree based index structure over sensor network, so as to efficiently map high dimensional event data to a two-dimensional space of sensors while preserving the proximity of events. We propose a dynamic programming based methodology to control the granularity of the index tree in an optimized approach, and an optimized routing scheme for range query processing to achieve best energy efficiency. The simulation results demonstrate the efficiency of the design.
To support hairstyling effectively, it's crucial for hairstyling tools to find a tradeoff between realism and interaction. This paper presents an interactive hairstyling method which can handle both global and loc...
详细信息
Topology control is one of the most important energy-saving techniques used in wireless sensor networks. It has evolved into two dominant research directions: power control and sleep scheduling. Although many topology...
详细信息
Topology control is one of the most important energy-saving techniques used in wireless sensor networks. It has evolved into two dominant research directions: power control and sleep scheduling. Although many topology control algorithms and protocols are claimed to be highly energy-efficient, this is not necessarily the case in real systems due to various isolated considerations. In this paper, based on a simple and comprehensive analysis of energy consumption, we propose three necessary principles for energy-efficient topology control for wireless sensor networks. Topology control should (1) consider power control and sleep scheduling jointly, (2) be aware of traffic load, and (3) be done in conjunction with routing. We wish this paper could contribute to the development of the research on topology control for wireless sensor networks.
Co-training, a paradigm of semi-supervised learning, may alleviate effectively the data scarcity problem (i.e., the lack of labeled examples) in supervised learning. The standard two-view co-training requires the data...
详细信息
Applying SRGMs (software Reliability Growth Models) to real projects is a major concern in software reliability. Sometimes, it is hard to decide the best model for a specific project. Researchers have made a first ste...
详细信息
ISBN:
(纸本)9781424449095
Applying SRGMs (software Reliability Growth Models) to real projects is a major concern in software reliability. Sometimes, it is hard to decide the best model for a specific project. Researchers have made a first step on solving this problem by combination, but the effect was limited in accuracy and adaptability. Aiming to improve the usability of the SRGMs, we propose a neural network based combination method to build accurate and adaptive SNN (Selective Neural Network) model. It avoids relying on a single model, thus reduces the risk to produce inaccurate predictions and improves the average performance in accuracy. Neural network and multi-criteria model selection strategy enable the SNN model to be adapted to various projects, producing accurate predictions. Experiment results show that the SNN model makes a notable improvement in accuracy compared with its component models and other combinational models do.
暂无评论