Computer and information sciences topic list of research papers
-
Combining Monitors for Runtime System Verification1 1This research is sponsored by DARPA under contract number N66001-00-C-8058. The views herein are those of the authors and do not necessarily reflect the views of the supporting agency.
Abstract Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, such as general-purpose operating systems and software...
2004 / Joshua Levy, Hassen Saïdi, Tomás E. Uribe -
Reflective remote method invocation2005 / G. K. Thiruvathukal, L. S. Thomas, A. T. Korczynski
-
Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent Types
Abstract This paper presents a shallow and hence efficient embedding of the security protocol specification language MSR into rewriting logic with dependent types, an instance of the open calculus of constructions which integrates key concepts from...
2005 / Iliano Cervesato, Mark-Oliver Stehr -
A Distributed Cooperative Dynamic Task Planning Algorithm for Multiple Satellites Based on Multi-agent Hybrid Learning
Abstract Traditionally, heuristic re-planning algorithms are used to tackle the problem of dynamic task planning for multiple satellites. However, the traditional heuristic strategies depend on the concrete tasks, which often affect the result's...
2011 / Chong WANG, Jun LI, Ning JING, Jun WANG, Hao CHEN -
Classifying categories for partial equational logic
Abstract Along the lines of classical categorical type theory for total functions, we establish correspondence results between certain classes of partial equational theories on the one hand and suitable classes of categories having certain finite...
2004 / Lutz Schröder -
Analysis of the MPEG-2 Encoding Algorithm with ROSA1 1This work has been supported by the CICYT project “Performance Evaluation of Distributed Systems”, TIC2000-0701-C02-02.
Abstract The authors present both the specification and a performance analysis of the MPEG2 algorithm for video encoding, by using the Stochastic Process Algebra ROSA. This process algebra is a very general framework for describing and analyzing...
2004 / Fernando L. Pelayo, Fernando Cuartero, Valentín Valero, Diego Cazorla -
GS·Λ Theories
Abstract Graphs and term graphs have proved strikingly flexible and expressive in modeling and specifying distributed, concurrent systems. However, even if the theory of (term) graph transformation systems is well developed, it has not yet included...
2004 / Matteo Coccia, Fabio Gadducci, Ugo Montanari -
Using Assumptions to Distribute Alternation Free μ-Calculus Model Checking
Abstract In this work we extend the approach used in [6] to perform distributed-memory AFMC model checking. The part of a system held in one computer is modeled as a Kripke structure with border states. Moreover, we use assumptions about the truth...
2005 / Luboš Brim, Jitka Žídková -
Modifying Esterel Concepts to Model Hybrid Systems
Abstract A hallmark of the Esterel language is the combination of perfect synchrony with total orthogonality and powerful constructs for preemption, suspension and trap handling. It is desirable to make this kind of expressiveness available for the...
2005 / Michael Baldamus, Thomas Stauner -
Coordination by means of Synchronous and Asynchronous Communication in Concurrent Constraint Programming
Abstract Concurrent constraint programming has been thought as providing coordination of concurrent processes on the basis of the availability and sharing of information. It classically incorporates a form of asynchronous communication via a shared...
2005 / Jean-Marie Jacquet, Luboaš Brim, David Gilbert, Mojmír Křetínský -
Experience with Abstraction-carrying Code
Abstract Abstraction-carrying Code (ACC) certifies a general temporal property for a mobile program using an abstract interpretation of the mobile program. A client receiving the code and the certificate will first validate the abstraction and then...
2005 / Songtao Xia, James Hook -
An Algebraic Foundation for Graph-based Diagrams in Computing
Abstract We develop an algebraic foundation for some of the graph-based structures underlying a variety of popular diagrammatic notations for the specification, modelling and programming of computing systems. Using hypergraphs and higraphs as...
2004 / John Power, Konstantinos Tourlas -
Preface
Abstract Semantics preservation between source and target program is the commonly accepted minimum requirement to be ensured by compilers. It is the key term compiler verification and optimization are centered around. The precise meaning, however,...
2005 / Jens Knoop, Wolf Zimmermann -
Secrecy in Security Protocols as Non Interference
Abstract Non Interference [8] has been proposed for modelling and analysing information flow in systems. In [4,7] we have indeed shown that the Non Interference property called NDC can be applied also in the area of network security, for the...
2004 / R. Focardi, R. Gorrieri, F. Martinelli -
The Digital Battlefield: A Behind-the-Scenes Look from a Systems Perspective
Abstract The last decade and a half has seen major advances in computing, communication, and display technologies. The U.S. Army has been proactive in harnessing and combining these technologies under a common rubric called the “digital...
2014 / Neil G. Siegel, Azad M. Madni -
Comparative Analysis between Training Tools in Spatial Skills for Engineering Graphics Students based in Virtual Reality, Augmented Reality and PDF3D Technologies
Abstract One of the skills that all engineering professional must develop very extensively during their formation is the mental management of the three dimensional reality in which they develop their professional actions. This competence is called...
2013 / J. Martín-Gutiérrez, M. García-Domínguez, C. Roca-González, A. Sanjuán-HernanPérez, C. Mato-Carrodeguas -
Improving Information Security Behaviour in the Healthcare Context
Abstract The privacy of patient information is important yet healthcare professionals are resistant to Health Information Systems, Information Technology usage and particularly information security mechanisms. In this paper, a literature review is...
2014 / Debra Box, Dalenca Pottas -
SOAda: Service Oriented Architecture with a Decision Aspect
Abstract The importance of the service orientation and its advantages regard to the information system of the company, confront us to a new challenge. It is primarily a question, of ensuring the decisional aspect of the information system of company ...
2013 / Fatima Boumahdi, Rachid Chalal -
The Development of a Bilingual Fuzzy Expert System Shell
Abstract Fuzzy logic has been incorporated in many expert systems to solve real world problems that are inherently ambiguous. With fuzzy logic it is possible to program human intuition through the development of fuzzy expert system shells. A fuzzy...
2013 / Hassan Mathkour, Israa Al-Turaiki, Ameur Touir -
Employing Learning to Improve the Performance of Meta-RaPS
Abstract In their search for satisfactory solutions to complex combinatorial problems, metaheuristics methods are expected to intelligently explore the solution space. Various forms of memory have been used to achieve this goal and improve the...
2013 / Fatemah Al-Duoli, Ghaith Rabadi