Assumption Generation for Software Component Verification

Size: px
Start display at page:

Download "Assumption Generation for Software Component Verification"

Transcription

1 Assumption Genertion for Softwre Component Verifiction Dimitr Ginnkopoulou Corin S. Păsărenu RIACS/USRA Kestrel Technologies LLC NASA Ames Reserch Center Moffett Field, CA , USA {dimitr, Howrd Brringer Deprtment of Computer Science University of Mnchester Oxford Rod, Mnchester, M13 9PL, UK Abstrct Model checking is n utomted technique tht cn be used to determine whether system stisfies certin required properties. The typicl pproch to verifying properties of softwre components is to check them for ll possible environments. In relity, however, component is only required to stisfy properties in specific environments. Unless these environments re formlly chrcterized nd used during verifiction (ssume-gurntee prdigm), the results returned by verifiction cn be overly pessimistic. This work defines frmework tht brings new dimension to model checking of softwre components. When checking component ginst property, our model checking lgorithms return one of the following three results: the component stisfies property for ny environment; the component violtes the property for ny environment; or finlly, our lgorithms generte n ssumption tht chrcterizes exctly those environments in which the component stisfies its required property. Our pproch hs been implemented in the LTSA tool nd hs been pplied to the nlysis of NASA ppliction. 1. Introduction Our work is motivted by n ongoing project t NASA Ames Reserch Center on the verifiction of utonomous softwre. Autonomous softwre involves complex concurrent behviours for recting to externl stimuli without humn intervention. Extensive verifiction is pre-requisite for the deployment of missions tht involve utonomy. Model checking is n utomted verifiction technique tht cn be used to determine whether concurrent system stisfies certin properties by exhustively exploring ll its possible executions. Softwre model checking is typiclly This uthor is most grteful for the prtil support received from RI- ACS/USRA to undertke this reserch whilst on leve t NASA Ames Reserch Center. pplied to components of lrger system for severl resons. For exmple: softwre component my be embedded s is the cse for utonomous softwre; one would typiclly ignore the detils of the operting system in which component opertes; system my be prtilly specified; finlly, given the fct tht the stte explosion problem [9] is prticulrly cute in softwre systems, one relisticlly needs to divide nd conquer, tht is, to brek up the verifiction tsk in smller tsks. In order to model check component in isoltion one needs to incorporte model of the environment intercting with the component. By defult, this is the most generl environment, n environment tht cn invoke, in ny order, ny ction of the interfce between the two, or tht my refuse ny service tht the component requires. We believe tht the bove pproch to component checking is overly pessimistic; the underlying ssumption is tht the environment is free to behve s it pleses, nd tht the component will stisfy the required property for ny environment. A similr observtion is mde by De Alfro nd Henzinger in the context of interfce comptibility checking [10, 11]. In the world of model checking, this problem hs given rise to the ssume-gurntee style of resoning [36], where the model of the environment is restricted by ssumptions provided by the developer. This style of resoning is typiclly performed in n interctive fshion. Developers first check component with the most generl environment. If counterexmple is returned tht is unrelistic for the system under nlysis, they mke severl ttempts t defining n ssumption tht is strong enough to eliminte flse violtions, but tht lso reflects ppropritely the remining system. In this pper we propose nd describe novel frmework for model checking of components tht provides more useful user feedbck thn the usul counter-exmple genertion for property violtions. When model checking component ginst property, our lgorithms return one of the following three results: (i) the component stisfies the property for ny environment; (ii) the component violtes the property for ny environment; or finlly, (iii) n utomticlly

2 generted ssumption tht chrcterizes exctly those environments in which the component stisfies the property. Let us illustrte this with smll exmple. A multithreded component uses mutex to coordinte ccesses to shred vrible, which my lso be ccessed by the environment. The requirement is tht rce violtions should not occur in the system. If some thred within the component performs unprotected ccesses to the vrible, the requirement my be violted irrespective of the environment. Our pproch reports this fct, together with counterexmple illustrting it. Now ssume tht ll ccesses to the vrible within the component re protected by the mutex. Model checking under the most generl environment would return violtion. Our lgorithms would return n ssumption, reflecting the fct tht ll ccesses to the shred vrible by the environment must be protected by the lock. In fct, our pproch genertes the wekest environment ssumption tht enbles the property to hold. Therefore, in selecting n pproprite environment for component, one cn sfely reject ny environment tht does not stisfy the ssumption generted. Assumption genertion my lso be seen s wy of providing extr utomted support for ssume-gurntee resoning. Finlly, for systems like the ones we study, the environment is often unpredictble. Some ssumptions re typiclly mde bout it, but loss of mission must be voided even if the environment flls outside these ssumptions. For such cses, ssumptions cn be used s runtime monitors of the ctul environment [20]. Monitors cn generte pproprite wrnings when the environment flls outside expected behviour nd trigger specil system behviour, if necessry. We hve implemented our pproch in the Lbelled Trnsition Systems Anlyzer (LTSA) tool [31, 30], which provides good support for incrementl system design nd verifiction. It implements such fetures s component bstrction nd minimiztion tht mke the integrtion of our pproch strightforwrd. The problem of ssumption genertion cn be ssocited with such problems s submodule construction, controller synthesis nd model mtching. To our knowledge, such work hs not been directly pplied to model checking before; the reltion of our pproch with these domins is further discussed in Section 6. The reminder of the pper is orgnized s follows. Section 2 briefly discusses the LTSA tool nd the theory tht underlies our pproch. It is followed by the presenttion of our pproch in Section 3. Section 4 describes our experience with nlyzing the Executive module of n experimentl Mrs Rover developed t NASA Ames. We discuss the pplicbility of our pproch in prctice nd extensions tht we re considering in Section 5. Finlly, Section 6 presents relted work, nd Section 7 concludes the pper. 2. Bckground In this section, we describe the LTSA frmework in which our pproch hs been introduced. We provide forml definitions for those spects of the tool tht we hve used nd/or modified The LTSA Tool The LTSA [31, 30] is n utomted tool tht supports Compositionl Rechbility Anlysis (CRA) of softwre system bsed on its rchitecture. In generl, the softwre rchitecture of concurrent system hs hierrchicl structure [29]. CRA incrementlly computes nd bstrcts the behviour of composite components bsed on the behviour of their immedite children in the hierrchy. Abstrction consists of hiding the ctions tht do not belong to the interfce of component, nd minimizing with respect to observtionl equivlence [17]. The input lnguge FSP of the tool is process-lgebr style nottion with Lbelled Trnsition Systems (LTS) semntics. A property is lso expressed s n LTS, but with extended semntics, nd is treted s n ordinry component during composition. Properties re combined with the components to which they refer. They do not interfere with system behviour, unless they re violted. In the presence of violtions, the properties introduced my reduce the stte spce of the (sub)systems nlyzed. As in our pproch, the LTSA frmework trets components s open systems tht my only stisfy some requirements in specific contexts. By composing components with their properties, it postpones nlysis until the system is closed, mening tht ll contextul behviour tht is pplicble hs been provided. We extend this frmework by performing useful nlysis t the component level. The LTSA tool lso fetures grphicl disply of LTSs, interctive simultion nd grphicl nimtion of behviour models [32], ll helpful ids in both design nd verifiction of system models Progrm Model We use lbelled trnsition systems (LTSs) to model the behviour of communicting components in concurrent system. Let Act be the universl set of observble ctions, nd Act τ = Act {τ}, where τ denotes locl ction unobservble to component s environment. We use π to denote specil error stte, which models the fct tht sfety violtion hs occurred in the ssocited system. A lbelled trnsition system T is qudruple S,αT,R,s 0, where S is set of sttes, αt Act is set of ctions clled the lphbet of T, R S αt {τ} S

3 Mutex: E.cquire W.cquire Writer: W.cquire 0 W.enterCS W.exitCS W.relese 1 W.relese W.enterCS W.exitCS Figure 1. LTSs for Mutex nd Writer 1 W.exitCS W.enterCS 0 2 π W.exitCS Figure 2. Mutul exclusion property 2 W.enterCS is trnsition reltion nd s 0 S is the initil stte. We use Π to denote the LTS {π}, Act,,π. For exmple, Figure 1 illustrtes LTSs for Writer component nd Mutex. In ll illustrtions of LTSs in this pper, stte 0 is the initil stte. The Writer cquires the mutex (ction W.cquire), enters nd subsequently exists criticl section (W.enterCS, W.exitCS) used to model the fct tht the Writer updtes some shred vrible, nd then releses the mutex W.relese. The Mutex component cn be cquired nd relesed by the Writer (W.cquire, W.relese) or its environment (E.cquire, ), but single component cn hold it t ny one time. We cll n LTS well formed if the error stte π hs no outgoing trnsitions. We only consider well formed LTSs in this work. An LTS T = S,αT,R,s 0 is non-deterministic if (s,, s ), (s,, s ) R such tht s s (otherwise T is deterministic). A trce σ of n LTS T is sequence of observble ctions tht T cn perform strting t its initil stte. For exmple, <W.cquire> nd <W.cquire, W.enterCS, W.exitCS> re both trces of the Writer component of Figure 1. The set of trces of T is denoted s Tr(T ). For A Act, we use σ A to denote the trce obtined by removing from σ ll occurrences of ctions A. We denote s errtr(t ) the set of trces tht led to the error stte π, which we cll error trces of T. Opertors In the following, we provide semntics for the opertors defined on LTSs tht re used in our work. Although we provide trnsitionl semntics in typicl process lgebr style, our im here is not to define n lgebr. Let T = S,αT,R,s 0 nd T = S,αT,R,s 0. We sy tht T trnsits into T with ction, denoted T T, iff (s 0,,s 0) R nd: either αt = αt nd R = R for s 0 π, or, in the specil cse where s 0 = π, T =Π. The interfce opertor is used to mke unobservble those ctions in the LTS of component tht re not prt of its interfce. Formlly, given n LTS T nd set of observble ctions A Act, T Ais defined s follows. For T =Π, T A=Π.ForT Π, T Ais n LTS with the sme set of sttes nd initil stte s T. The lphbet of T Ais αt A, nd its trnsition reltion is described by the following rules: T T, A T A T A T T, A T A τ T A Prllel composition is commuttive nd ssocitive opertor tht combines the behviour of two components by synchroniztion of the ctions common to their lphbets nd interleving of the remining ctions. For exmple, in computing the prllel composition of components Writer nd Mutex of Figure 1, ctions W.cquire nd W.relese will ech be synchronized. Formlly, let T 1 = S 1,αT 1,R 1,s 1 0 nd T 2 = S 2,αT 2,R 2,s 2 0 be two LTSs. If either T 1 = Π or T 2 =Π, then T 1 T 2 =Π. Otherwise, T 1 T 2 is n LTS T = S,αT,R,s 0, where S = S 1 S 2, s 0 =(s 1 0,s 2 0), αt = αt 1 αt 2, nd R is defined s follows: T 1 T 1, αt 2 T 1 T 1, T 2 T 2, τ T 1 T 2 T 1 T 2 T 1 T 2 T 1 T 2 Properties A sfety property is specified s deterministic LTS tht contins no τ trnsitions, nd no π stte. The set of trces Tr(P ) of property P defines the set of cceptble behviours over αp.anltst stisfies P, denoted s T = P iff Tr(T αp ) Tr(P ). The LTSA utomticlly derives from property P n error LTS denoted P err, which trps possible violtions with the π stte. Formlly, the error LTS of property P = S,αP,R,s 0 is P err = S {π},αp err,r,s 0, where αp err = αp nd R = R {(s,, π) αp nd s S :(s,, s ) R}. Note tht the error utomton is complete, i.e., ech stte (other thn the error stte) hs outgoing trnsitions for every ction in the lphbet. For exmple, Figure 2 illustrtes mutul exclusion property for system consisting of the LTSs of Figure 1.

4 Property LTSA + Assumption Genertion E.cquire Component (1) Composition nd Minimistion Property True (ll environments) 0 E.cquire (2) Bckwrd Error Propgtion (3) Property Extrction Property Flse (ll environments) Property True (some environments) + Assumption τ π Figure 4. Composite LTS Figure 3. Model Checking with Assumption Genertion The property comprises sttes 0, 1, 2 nd the trnsitions denoted by solid rrows. It expresses the fct tht the component nd its environment should never be in their criticl sections t the sme time. In other words, the intervls defined by their mutul entercs nd exitcs ctions should never overlp. The dshed rrows illustrte the trnsitions to the error stte tht re dded to the property to obtin its error LTS. Let T be n LTS tht hs no error trces. To detect violtions of property P by component T, the LTSA computes T P err. It hs been proven in [8] tht T violtes P iff the π stte is rechble in T P err, or equivlently, iff errtr(t P err ). The error stte hs specil tretment during minimiztion, so tht violtion does not dispper s result of bstrction. In fct, n error stte within component cn only dispper with composition, i.e., if component with which it intercts blocks the erroneous behviour. 3. Assumption Genertion In this section we describe in detil our proposed extensions to trditionl model checking, nd their implementtion in LTSA. We lso provide forml proof of correctness Generl Method The trditionl pproch to verifying property of n open system (i.e., softwre component tht intercts with n environment, represented by other components) is to check it for ll the possible environments. The result of verifiction is either true, if the property holds for ll the possible environments, or flse, if there exists some environment tht cn led the component to flsify the property. We believe tht this pproch is overly pessimistic nd only pproprite for the nlysis of closed systems, where no further interction with the environment is expected. When nlyzing open systems, n optimistic view, which ssumes helpful environment, is more pproprite. Usully, softwre components re required to stisfy properties in specific environments, so it is nturl to ccept component if there re some environments in which the component does not violte the property. In our pproch, the result of component verifiction is lso true, if the property holds for ll environments. However, the result is flse only if the property is flsified in ll environments. If there exist some environments in which the component stisfies the property, the result of verifiction is not flse, s in the trditionl pproch, but rther true in environments tht stisfy specific ssumption. This ssumption, i.e. property LTS, is utomticlly generted nd chrcterizes exctly those environments. Intuitively, this environment ssumption encodes ll possible winning strtegies of the environment in gme between the system, which ttempts to get to the error stte, nd the environment, which ttempts to prevent this. Figure 3 illustrtes our pproch together with the steps we follow to build the ssumptions (tht re described below). Step 1: Composition nd Minimiztion Given n open system nd property LTS tht my relte the behviour of the system with the behviour of the environment, our first step is to compute ll the violting trces of the system for unrestricted environments, nd turn into τ ll ctions in these trces over which the environment hs no control, i.e., the internl ctions of the system. We perform this step by building the composition of the system with the error LTS of the property, nd subsequently hiding the internl ctions of the system. The resulting LTS cn be minimized with respect to observtionl equivlence, since such minimiztion preserves trces. For exmple, Figure 4 depicts the result of composing the components depicted in Figure 1 with the mutul exclu-

5 E.cquire E.cquire, θ, E.cquire E.cquire π Figure 5. The Result fter Bckwrd Error Propgtion sion property of Figure 2, fter minimiztion. The internl ctions of the system, i.e. the W lbelled trnsitions, were bstrcted to τ. If the error stte is not rechble in this composition, the property is true in ny environment, nd this is reported to the user. Otherwise, we identify whether there exist environments tht cn help the system void the error in ll circumstnces; this is chieved through the following steps. Step 2: Bckwrd Error Propgtion This step first performs bckwrd propgtion of the error stte over τ trnsitions, thus pruning the sttes where the environment cnnot prevent the error stte from being entered vi one or more τ steps. Since we re interested only in the error trces, we lso eliminte the sttes tht re not bckwrd rechble from the error stte. If, s result of this trnsformtion, the initil stte becomes n error stte, it mens tht no environment cn prevent the system from possibly reching the error stte, so the property is flse (for ll environments) nd this is reported to the user. Consider gin the composite system in Figure 4. The thicker line mrks the only τ trnsition tht remins in the system fter minimiztion. As result of bckwrd propgtion, we identify stte 1 with the error stte; the result is shown in Figure 5. The intuition here is tht, if the component is in stte from which it cn violte the property by some number of internl moves, then no environment cn prevent the violtion from occurring. Step 3: Property Extrction This step builds the property LTS tht is our ssumption. It performs this in two stges; first it builds the error LTS for the ssumption, from which it extrcts the corresponding property LTS. Note tht the LTS resulting from Step 2 might not be n error LTS, lthough it contins n error stte. Recll from the bckground section tht the error LTS is deterministic nd complete. In order to get n error LTS we mke the LTS obtined from step 2 deterministic by pplying to it τ elimintion nd the subset construction [3], but by tking specil cre of the π stte s follows. During subset construction, the sttes 0 E.cquire 3 2 Figure 6. Generted Assumption of the deterministic LTS tht is being generted re sets of sttes in the originl non-deterministic LTS. In our context, if ny one of the sttes in the set is π, the entire set becomes π. Intuitively, trce tht non-deterministiclly my or my not led to n error hs to be considered s n error trce. Such non-determinism reflects the fct tht, by performing prticulr sequence of ctions, the environment cnnot gurntee tht the component will void error sttes. For exmple, consider gin the composite system in Figure 4. There re two outgoing trnsitions from the initil stte 0 tht re lbelled by the sme environment ction : one leds to the error stte, while the other one leds to stte 1. This mens tht if the environment performs ction, it cn not prevent the system from getting to the error, so we would like to identify stte 1 with π. In our exmple in Figure 4, this ws chieved during Step 2, but this my not be the cse in generl. Wht remins to be performed t this stge is to mke the resulting LTS complete. Completion is performed by dding new sink stte to the LTS, nd dding trnsition to this stte for ech missing trnsition in the incomplete LTS. The missing trnsitions in the incomplete LTS represent behviour of the environment tht is never exercised by the open system under nlysis. As result, no ssumptions need to be mde bout these behviours. The sink stte reflects exctly this fct, since it poses no implementtion restrictions to the environment. Once we hve the error LTS, we obtin the ssumption by deleting the error stte nd the trnsitions tht led to it. Figure 6 depicts the ssumption generted for our exmple. Since the result from Step 2 is lredy deterministic, we get the ssumption by completing it with the sink stte, denoted by θ, nd deleting the π stte. The ssumption expresses the fct tht the environment should only ccess its criticl section protected by the mutex. Moreover, s imposed by the mutex, E.cquire nd ctions of the environment cn only lternte, nd therefore ny different behviour is inconsequentil. Notice for exmple tht from stte 0, ction leds to stte θ.

6 Implementtion in the LTSA As mentioned, the LTSA provides frmework tht fcilittes the introduction of the extensions we hve presented. For exmple, we took dvntge of its support for composition, bstrction, minimiztion nd determiniztion. The extr fetures tht our pproch required re: Specil tretment of the error stte, π, during determiniztion. The specil semntics of this stte were not previously tken into ccount. Bckwrds rechbility nd error propgtion s required by step 2. We believe tht error propgtion should be performed during CRA for incresed efficiency, irrespective of our pproch. Completion with the sink stte, θ, nd property extrction from the error LTS Correctness of Approch Let T denote n open system with lphbet αt nd let E denote nother system representing n rbitrry environment for T, whose lphbet is αe. Let P denote property LTS with lphbet αp αt αe ( property my refer to ctions in both T nd E). Let C = αt αe be the set of common ctions between T nd E, nd let I = αt C denote the internl ctions of the system. Our tool genertes the property LTS A with lphbet αa = C (αp I), representing the wekest ssumption chrcterizing ll the environments tht, composed with the system, stisfy the property, i.e., E = A if nd only if E T = P. The following proposition sys tht the error trces of A err re obtined from the trces in T P err tht my led to n error stte, from which we remove the ctions not present in αa. Proposition 3.1 errtr(a err ) = {σ αa σ errtr(t P err ) σ = σ αa}. The following theorem mkes precise the clim tht A is the wekest ssumption bout the environment E of T tht ensures property T. Theorem 3.2 E, E = A if nd only if E T = P. Proof. E such tht E = A, we hve to show tht E T = P. The proof is by contrdiction. Assume E T = P. Then, there is trce σ in E T P err tht leds to the error stte (i.e., σ errtr(e T P err )). We use σ to build trce σ Tr(E) such tht σ αa errtr(a err ), thus contrdicting E = A. Since σ is n error trce in E T P err, it follows tht σ αe Tr(E) nd σ (αt αp ) errtr(t P err ). From proposition 3.1, it follows tht (σ (αt αp )) αa errtr(a err ). Since αa αe nd αa αt αp, we lso hve tht (σ αe) αa =(σ (αt αp )) αa. Let σ = σ αe. We then hve tht σ αa =(σ (αt αp )) αa errtr(a err ), nd thus we hve contrdiction. E such tht E T = P, we hve to show tht E = A. Agin, we prove this by contrdiction. Assume E = A. Then, there is trce σ Tr(E) such tht σ αa errtr(a err ). From proposition 3.1, it follows tht there is trce σ errtr(t P err ) such tht σ αa = σ αa. We use σ nd σ to build trce σ in E T P err such tht σ αp errtr(p err ), thus reching the contrdiction of E T = P. Since σ is trce of E, σ is trce of T P err, σ αa = σ αa nd C αa it follows tht σ nd σ my differ only on non-common ctions. It follows tht there exists trce σ in E T P err such tht σ αe = σ nd σ (αt αp )=σ. (we build σ by composing σ nd σ using the sme rules s for prllel composition of systems). Since σ errtr(t P err ), it follows tht σ αp errtr(p err ). We lso hve σ αp = σ αp, since σ my introduce in σ only ctions tht re not present in αa or αp. It follows tht σ αp errtr(p err ), nd thus we hve contrdiction. 4. Appliction: the Rover Executive We experimented with our pproch in the context of the verifiction of the executive subsystem for the K9 Mrs Rover, developed t NASA Ames. The executive receives flexible plns from Plnner, which it executes ccording to the pln lnguge semntics. A pln is hierrchicl structure of ctions tht the Rover must perform. Trditionlly, plns re deterministic sequences of ctions. However, incresed Rover utonomy requires dded flexibility. The pln lnguge therefore llows for brnching bsed on stte or temporl conditions tht need to be checked, nd lso for flexibility with respect to the strting time of n ction. The pln lnguge llows the ssocition of ech ction with number of stte or temporl pre-, mintennce, nd postconditions, which must hold before, during, nd on completion of the ction execution, respectively.

7 The executive hs been implemented s multi-threded system, mde up of min coordinting component nmed Executive, components for monitoring the stte conditions ExecCondChecker, nd temporl conditions Exec- TimerChecker - ech further decomposed into two threds - nd finlly n ActionExecution thred tht is responsible for issuing the commnds to the Rover. Synchroniztion between these threds is performed through mutexes nd condition vribles. The developers provided some design documents to us, which described the synchroniztion between these components in n dd-hoc flowchrt-style lnguge. They looked very much like LTSs, which llowed us to trnslte them in strightforwrd nd systemtic, lbeit mnul, wy into FSP for the LTSA. We first checked the occurrence of rce conditions for the cse of vrible of the ExecCondChecker shred with the Executive. We checked the property on the ExecCond- Checker (tht consists internlly of two threds) together with the mutexes it uses, since mutexes constitute the synchroniztion mechnism in this system. The ExecCond- Checker with mutexes nd the property hd 426 sttes but minimized to 18 sttes. The propgtion of the error stte produced n LTS of just 10 sttes, nd the finl ssumption generted hd 12 sttes (one being the sink stte). We were surprised to see tht our pproch did not generte the expected ssumption, i.e. tht ccesses to the shred vrible by the environment must be protected by the pproprite mutex, s in the exmple of Section 3. In fct, the ssumption obtined ws weker. It reflected the knowledge tht, once the environment holds the mutex, the vlues tht the environment reds reflect chnges tht only the environment my hve mde. For exmple, ssume tht, while holding the mutex, the environment ssigns vlue x to the vrible. Reding ny vlue x x would led the environment to the sink stte, becuse this behviour will never ctully be exercised in the context of the ExecCondChecker. The second property tht we checked in this fshion ws one tht the developer thought might be violted by the code, but could ctully not produce n execution tht would demonstrte this fct. For specific vrible of the ExecCondChecker shred with the Executive, the property stted the following: if the Executive reds the vlue of the vrible, then the ExecCondChecker should not red this vlue until the Executive clers it first. Agin, we used the ExecCondChecker together with mutexes nd the property to generte n ssumption on the behviour of the Executive. The result hd 524 sttes, minimized to 9 sttes, reduced to 7 sttes with error propgtion, nd to 6 sttes with determiniztion. The resulting ssumption hd 7 sttes (including the sink stte). It stted tht the environment of the component should red the vrible fter cquiring mutex, nd should hold on to tht mutex until it clers the vrible. Note tht, gin, there were trnsitions to the sink stte, expressing the fct tht some behviour of the environment is never exercised. For exmple, the ssumption mde cler tht the ExecCondChecker only updtes the vrible with vlues lrger thn the one it currently holds. The ssumption generted ws stisfied by the design level Executive. Our result gve confidence to the developers bout the correctness of their design nd implementtion. They lso found it useful to be ble to understnd how the property decomposes cross modules of the system. 5. Discussion The complexity bottleneck of our pproch is the determiniztion step, which, in the worst cse, is exponentil in the number of the sttes of the given LTS. There re severl resons tht led us to believe tht this my not be the cse often in prctice. In our experiments such s the Rover study reported in Section 4, non-determinism lmost disppers by propgtion of the error stte. As we only study modules of lrger system, we expect tht the stte spce of these modules will be reltively smll. This will be the cse in prticulr when they interct through limited interfces with their environment, which will llow the minimiztion step to considerbly reduce their behviour. Note lso tht, if we extend our results to other frmeworks, the ssumption my not be required to be deterministic. Admittedly, however, deterministic ssumptions tend to be clerer to understnd. From our extensive experience with compositionl rechbility nlysis (CRA) techniques, we re only too wre of the potentil intermedite stte explosion ssocited with them [18]. This problem describes the fct tht, in lck of context, component my exhibit n excessively lrge stte-spce. However, this does not occur in the generl cse for well-designed softwre rchitectures. Moreover, severl pproches hve been proposed in the literture [18, 7, 26] for ddressing the problem. Our pproch extends the LTSA tool in severl useful wys. First of ll, it chieves further reduction of component behvior by pplying propgtion of the error sttes, computtionlly inexpensive but efficient step. Moreover, our pproch genertes the wekest environment ssumptions. As such, these ssumptions my be used for runtime monitoring, or for component retrievl, cpbilities tht were not formerly provided by the tool. As fr s component retrievl is concerned, we would like to stress the following observtion from our experiments (Section 4). The sink stte tht our ssumptions contin, reflects the fct tht some services tht component provides will never be used in the context of system. Our ssumptions llow free implementtions for these services, nd simply ensure tht the used services comply with the requirements.

8 The bility to generte ssumptions lso opens up number of other interesting reserch directions: we mention few to give some flvour. Assumptions my be further nlyzed. Assume tht component does not violte property in ny environment. However, it my be tht, when put in the context of the wekest ssumption tht our lgorithms generte, no useful behvior is obtined s result. In the extreme, the component with the ssumption my result in single dedlock stte. Or the ssumption my be tht the environment will hold on to specific lock for ever. All these re indictions tht there is something inherently wrong with the behvior of the component under nlysis. Our work hs been performed with limited but importnt set of properties (sfety) expressed within specific frmework tht fcilittes the development of our lgorithms. However, we believe our pproch hs ppliction in other frmeworks. In prticulr, we re investigting the extension of our pproch for the cse of firness nd/or liveness properties, which requires more expressive formlism. When the behvior of the environment, or prt thereof, is provided, we wish to find effective wys of dischrging ssumptions on the environment. One wy would be to use the ssumption s property, nd model check in the sme fshion components in the environment. This process cn be seen s wy of decomposing, utomticlly, property cross components of system. Indeed, n ssumption reflects those spects of the property tht hve not been stisfied by the component nd tht remin to be stisfied by its environment. Property decomposition is n extremely difficult problem, nd our pproch my be seen helpful step in its fcilittion. Of course, such decomposition will not be effective in ll cses. It is esy to imgine tht there will be cses where ssumptions my grdully grow in size during this process, problem referred to in the literture s property explosion. Our pproch to ssumption genertion cn strightforwrdly be used for submodule construction, where the submodule is plced s n intercting component in prllel with the given one. Generliztion to other forms of composition is nturl step, e.g. find progrm context for the given component to chieve the desired property in some pproprite environment. 6. Relted Work For over three decdes now, there hs been reserch effort focused on finding trctble pproches to the forml specifiction, design nd development of complex systems. Significnt erly progress occurred with techniques nd tools for sequentil, non-intercting or trnsformtionl, systems. However, the quest for obtining effective methods nd tools for the forml support of compositionl nd/or modulr development nd resoning for rective systems still remins, in our view, mjor chllenge. As there is insufficient spce to do justice to the work tht hs been undertken, we refer the interested reder to the proceedings [14] - its introductory chpter in prticulr [12] - nd the recent book [13]. In more recent yers with the development nd tke-up of OO-design technology, forml techniques for support of component-bsed design is lso gining prominence, see for exmple [10, 11], for which modulr-bsed resoning is key. The work of Inverrdi nd collegues, see [22] nd [21] for exmple, hs lso been imed t providing support for the modulr checking of certin properties, s dedlock freedom, but is somewht limited in the checks performed for comptibility between components. In order to mke progress in ny of these res, some form of ssumption (either implicit or explicit) bout the interction with, or interference from, the environment hs to be mde, [23, 2]. Even though we hve sound nd complete resoning systems for such rely-gurntee (or ssumptioncommitment) style of resoning, see for exmple [24, 39] nd most recently [41], it is lwys mentl chllenge to obtin the most pproprite ssumption (if there is such). It is even more of chllenge to find utomted techniques to support this resoning style - the thred modulr resoning underlying the Clvin tool [16] is one strt in this direction. In the frmework of temporl logic, the work on Alternting time Temporl Logic ATL (nd trnsition systems) [5] ws proposed for the specifiction nd verifiction of open systems together with utomted support vi symbolic model checking procedures, lbeit of rther high complexity; the Moch toolkit [4] provides support for modulr verifiction of components with requirement specifiction bsed on the ATL. It goes without sying tht if tool support is lcking, tke-up of these techniques will be rther low. The underlying pproch to utomted ssumption genertion tht we ve dopted nd implemented in LTSA hs similrity to number of other problems tht hve been considered by number of reserchers over the pst two decdes. Closest to our our work in the softwre engineering nd concurrency theory re the sub-module construction problem, scheduler synthesis nd interfce eqution solving problems. In the discrete event community, it ppers s the supervisory control problem, in control theory there is the model mtching problem nd in the logic synthesis world there is the intercting FSM synthesis. Of course, the prticulr frmeworks in which these problems re considered mkes ll the difference to their

9 solution(s) nd s such it would be quite inpproprite to clim they re solving the sme problem. However, in very generl terms, ech cn be seen s n instnce of the following problem, given component, C, nd desired behviour, B, find context for C, X, such tht X(C) B, for some pproprite notion of equivlence. Merlin nd Bochmnn [33] were probbly the first to ddress the bove s submodule construction in the world of communiction protocol specifiction nd synthesis. In setting of lbelled trnsition systems, given module specifiction M 0 nd submodule specifiction M 1, they outlined nd exemplified mnul pproch to construct n intercting submodule M 2 such tht M 1 nd M 2 together chieve the desired specifiction of M 0. Their construction hs much in common with ours lthough some significnt spects of the construction were left to the reder s imgintion. The lter work of [38, 19] hs revisited the Merlin-Bochmnn pproch nd provided new, detiled, lgorithms for the sub-module construction nd implemented n utomted tool. One recognized limittion of the Merlin- Bochmnn is tht the notion of correctness, nmely just trce equivlence, does not cpture number of behviourl properties, e.g. potentil dedlock. The work of Shields [37], over decde lter, introduces the Interfce Eqution in the setting of the process lgebr, CCS [34], under observtionl equivlence. In order to solve (C X)\ L = B for the process X, he restricts to cses where B is deterministic, with some minor restrictions on the sorts of C nd B, nd provides necessry nd sufficient conditions for solution to exist nd then in such situtions presents n explicit construction. Prrow [35] lso ddressed the interfce eqution nd presented procedure for solving the equtions vi successive trnsformtion of the CCS equtions to simpler ones, generting solution long the wy; his pproch is bsed upon tbleu method. Prrow s method ttempts to find most generl solution, but even if it exists, it is not necessrily pproprite for implementtion. Continuing in the process lgebr frmework, Lrsen nd Xinxin [28] consider the more generl problem of solving system of equtions C i (X) P i, for 0 <i n, where the C i re rbitrry contexts, P i re rbitrry processes nd X is the process to be found - the equivlence is tken s bisimultion. They considered the problem in the context of disjunctive modl trnsition systems, [27] nd implemented n utomted tool for solving the equtions (in the finite stte cse) when solution exists. As stted bove, there is further body of work in supervisory control synthesis, discrete event systems, nd logic synthesis res, see for exmple [1, 15, 40, 25, 6]. However, we should stress tht whilst these pproches re in generl set in FSM/DFA context, the principl gol is quite different in comprison with ours. 7. Conclusions We presented n pproch to model checking components s open, rther thn closed systems. Our pproch reports whether there is something inherently wrong with the component behviour, or whether stisfying requirement is simply mtter of providing the right environment. Moreover, it chrcterizes exctly ll helpful environments. The possibility of generting ssumptions provides incresed flexibility in model checking, nd opens up number of interesting reserch topics. It llows, for exmple, the dischrge of ssumptions t run-time for unpredictble environments, the retrievl of components focused on only relevnt spects of their behviour, or the decomposition of properties cross components. It remins to further investigte how useful our pproch is in prctice. Open reserch issues include optimiztions nd extensions for firness/liveness properties nd other frmeworks. However, our erly experiments with rel cse studies provide strong evidence in fvour of this line of reserch. References [1] A. Aziz, F. Blrin, R. K. Bryton, M. D. Dibenedetto, A. Sldnh, nd A. L. Sngiovnni- Vincentelli. Supervisory control of finite stte mchines. In 7th Int. Conference on Computer Aided Verifiction, volume 939 of Lecture Notes in Computer Science, Liège, Belgium. Springer Verlg. [2] M. Abdi nd L. Lmport. Composing specifictions. ACM Trnsctions on Progrmming Lnguges nd Systems, 15(1):73 132, Jnury [3] A. V. Aho, J. E. Hopcroft, nd J. D. Ullmn. Introduction to Automt Theory, Lnguges, nd Computtion. Addison- Wesley, [4] R. Alur, T. Henzinger, F. Mng, S. Qdeer, S. Rjmni, nd S. Tsirn. Moch: Modulrity in model checking. In Proceedings of 10th Interntionl Conference on Computer Aided Verifiction, volume 1427 of Lecture Notes in Computer Science, pges Springer Verlg, [5] R. Alur, T. A. Henzinger, nd O. Kupfermn. Alterntingtime temporl logic. In de Roever et l. [14], pges [6] S. Blemi, G. Hoffmnn, P. Gyugyi, H. Wong-Toi, nd G. Frnklin. Supervisory control of rpid therml multiprocessor. IEEE Trnsctions on Automtic Control, 38(7): , July [7] S. Cheung nd J. Krmer. Context constrints for compositionl rechbility nlysis. ACM Trnsctions on Softwre Engineering nd Methodology, 5(4): , [8] S. Cheung nd J. Krmer. Checking sfety properties using compositionl rechbility nlysis. ACM Trnsctions on Softwre Engineering nd Methodology, 8(1):49 78, [9] E. M. Clrke, O. Grumberg, nd D. Peled. Model Checking. MIT Press, [10] L. de Alfro nd T. Henzinger. Interfce utomt. In Proc. of the Joint 8th Europen Softwre Engineering Conference nd 9th ACM SIGSOFT Interntionl Symposium on Foundtions of Softwre Engineering. ACM Press, 2001.

10 [11] L. de Alfro nd T. Henzinger. Interfce theories for component-bsed design. In Proceedings of EMSOFT 01: Embedded Softwre, volume 2211 of Lecture Notes in Computer Science, pges Springer Verlg, [12] W.-P. de Roever. The need for compositionl proof systems: A survey. In de Roever et l. [14], pges [13] W.-P. de Roever, F. de Boer, U. Hnnemn, J. Hoomn, Y. Lkhnech, M. Poel, nd J. Zwiers. Concurrency Verifiction: Introduction to Compositionl nd Non-compositionl Methods. Cmbridge University Press, [14] W.-P. de Roever, H. Lngmck, nd A. Pnueli, editors. Compositionlity: The Significnt Difference - An Interntionl Symposium, COMPOS 97, volume 1536 of Lecture Notes in Computer Science. Springer-Verlg, [15] M. di Benedetto nd A. Sngiovnni-Vincentelli. Model mtching for finite-stte mchines. IEEE Trnsctions on Automtic Control, 46(11): , November [16] C. Flngn, S. Freund, nd S. Qdeer. Thred-modulr verifiction for shred-memory progrms. In Proceedings of the Europen Symposium on Progrmming, [17] D. Ginnkopoulou, J. Krmer, nd S. Cheung. Anlysing the behviour of distributed systems using Trct. Journl of Automted Softwre Engineering, specil issue on Automted Anlysis of Softwre, 6(1):7 35, [18] S. Grf, B. Steffen, nd G. Lüttgen. Compositionl minimistion of finite stte systems using interfce specifictions. Forml Aspects of Computtion, 8, [19] E. Hghverdi nd H. Url. Submodule construction from concurrent system specifictions. Informtion nbd Softwre Technology, 41: , [20] K. Hvelund nd G. Rosu. Monitoring Jv progrms with Jv PthExplorer. In First Workshop on Runtime Verifiction (RV 01), volume 55(2) of Electronic Notes in Theoreticl Computer Science, Pris, Frnce, [21] P. Inverrdi nd S. Scriboni. Connectors synthesis for dedlock-free component bsed rchitectures. In Proceedings of 16th IEEE Annul Interntionl Conference on Automted Softwre Engineering, pges , [22] P. Inverrdi, A. Wolf, nd D. Ynkelevich. Sttic checking of system behviors using derived component ssumptions. ACM Trnsctions on Softwre Engineering Methods, 9(3): , July [23] C. Jones. Specifiction nd design of (prllel) progrms. In R. Mson, editor, Informtion Processing 83: Proceedings of the IFIP 9th World Congress, pges IFIP: North Hollnd, [24] C. Jones. Tenttive steps towrds development method for interfering progrms. ACM Trnsctions on Progrmming Lnguges nd Systems, 5(4): , [25] S. Khtri, A. Nryn, S. Krishnn, K. McMilln, R. Bryton, nd A. Sngiovnni-Vincentelli. Engineering chnge in non-deterministic FSM setting. In Proceedings of 33rd IEEE/ACM Design Automtion Conference, [26] J.-P. Krimm nd L. Mounier. Compositionl stte spce genertion from LOTOS progrms. In E. Brinksm, editor, 3rd Interntionl Workshop on Tools nd Algorithms for the Construction nd Anlysis of Systems (TACAS 97), volume 1217 of Lecture Notes in Computer Science, Enschede, The Netherlnds, Springer. [27] K. Lrsen nd B. Thomsen. A modl process logic. In Proceedings of the IEEE/ACM Conference on Logic in Computer Science, LICS 88, [28] K. Lrsen nd L. Xinxin. Eqution solving using modl trnsition systems. In Proceedings of the IEEE/ACM Conference on Logic in Computer Science, LICS 90, [29] J. Mgee, N. Duly, nd J. Krmer. Regis: A constructive development environment for prllel nd distributed progrms. Distributed Systems Engineering Journl, Specil Issue on Configurble Distributed Systems, 1(5): , [30] J. Mgee nd J. Krmer. Concurrency: Stte Models & Jv Progrms. John Wiley & Sons, [31] J. Mgee, J. Krmer, nd D. Ginnkopoulou. Behviour nlysis of softwre rchitectures. In 1st Working IFIP Conference on Softwre Architecture (WICSA1), Sn Antonio, TX, USA, [32] J. Mgee, N. Pryce, D. Ginnkopoulou, nd J. Krmer. Grphicl nimtion of behvior models. In 22d Interntionl Conference on Softwre Engineering (ICSE 2000), Limerick Irelnd, ACM. [33] P. Merlin nd G. V. Bochmnn. On the construction of submodule specifiction nd communiction protocols. ACM Trnsctions on Progrmming Lnguges nd Systems, 5:1 25, [34] R. Milner. Communiction nd Concurrency. Prentice-Hll, [35] J. Prrow. Submodule construction s eqution solving CCS. Theoreticl Computer Science, 68: , [36] C. Păsărenu, M. Dwyer, nd M. Huth. Assume-gurntee model checking of softwre: A comprtive cse study. In D. Dms, R. Gerth, S. Leue, nd M. Mssink, editors, Theoreticl nd Prcticl Aspects of SPIN Model Checking, volume 1680 of Lecture Notes in Computer Science, pges Springer-Verlg, [37] M. Shields. A note on the simple interfce eqution. The Computer Journl, 32(5): , [38] D. P. Sidhu nd J. Aristizbl. Constructing submodule specifictions nd network protocols. IEEE Trnsctions on Softwre Engineering, 14(11): , November [39] K. Stølen. A method for the development of totlly correct shred-stte prllel progrms. In J. Beten nd J. Groote, editors, Proceedings of Concur 91, volume 527 of Lecture Notes in Computer Science. Springer Verlg, [40] E. Tronci. Automtic synthesis of controllers from forml specifictions. In Proc. of 2nd IEEE Int. Conf. on Forml Engineering Methods, Brisbne, Austrli, [41] Q. Xu, W.-P. de Roever, nd J. He. The rely-gurntee method for verifying shred vrible concurrent progrms. Forml Aspects of Computing, 9(2): , 1997.

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Modular Generic Verification of LTL Properties for Aspects

Modular Generic Verification of LTL Properties for Aspects Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Generating In-Line Monitors For Rabin Automata

Generating In-Line Monitors For Rabin Automata Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

Model Checking for Software Architectures

Model Checking for Software Architectures Model Checking for Softwre Architectures position pper Rdu Mteescu INRIA Rhône-Alpes / VASY 655, venue de l Europe F-38330 Montbonnot Sint Mrtin http://www.inrilpes.fr/vsy 1 Outline Introduction Constructing

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

ASG Techniques of Adaptivity

ASG Techniques of Adaptivity ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

In-circuit temporal monitors for runtime verification of reconfigurable designs

In-circuit temporal monitors for runtime verification of reconfigurable designs In-circuit temporl monitors for runtime verifiction of reconfigurble designs Tim Todmn Deprtment of Computing Imperil College London tephn tilkerich Airbus Group Innovtions Willy-Messerschmitt tr., Wyne

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

On decidability of LTL model checking for process rewrite systems

On decidability of LTL model checking for process rewrite systems Act Informtic (2009) 46:1 28 DOI 10.1007/s00236-008-0082-3 ORIGINAL ARTICLE On decidbility of LTL model checking for process rewrite systems Lur Bozzelli Mojmír Křetínský Vojtěch Řehák Jn Strejček Received:

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

Learning Workflow Petri Nets

Learning Workflow Petri Nets Lerning Workflow Petri Nets Jvier Esprz, Mrtin Leucker, nd Mximilin Schlund Technische Universität München, Boltzmnnstr. 3, 85748 Grching, Germny {esprz,leucker,schlund}@in.tum.de Abstrct. Workflow mining

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

Reputation management for distributed service-oriented architectures

Reputation management for distributed service-oriented architectures Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive

More information

Solving BAMO Problems

Solving BAMO Problems Solving BAMO Problems Tom Dvis tomrdvis@erthlink.net http://www.geometer.org/mthcircles Februry 20, 2000 Abstrct Strtegies for solving problems in the BAMO contest (the By Are Mthemticl Olympid). Only

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Learning to Search Better than Your Teacher

Learning to Search Better than Your Teacher Ki-Wei Chng University of Illinois t Urbn Chmpign, IL Akshy Krishnmurthy Crnegie Mellon University, Pittsburgh, PA Alekh Agrwl Microsoft Reserch, New York, NY Hl Dumé III University of Mrylnd, College

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

Modeling POMDPs for Generating and Simulating Stock Investment Policies

Modeling POMDPs for Generating and Simulating Stock Investment Policies Modeling POMDPs for Generting nd Simulting Stock Investment Policies Augusto Cesr Espíndol Bff UNIRIO - Dep. Informátic Aplicd Av. Psteur, 458 - Térreo Rio de Jneiro - Brzil ugusto.bff@uniriotec.br Angelo

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

ORBITAL MANEUVERS USING LOW-THRUST

ORBITAL MANEUVERS USING LOW-THRUST Proceedings of the 8th WSEAS Interntionl Conference on SIGNAL PROCESSING, ROBOICS nd AUOMAION ORBIAL MANEUVERS USING LOW-HRUS VIVIAN MARINS GOMES, ANONIO F. B. A. PRADO, HÉLIO KOII KUGA Ntionl Institute

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified

More information

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion

More information

Online Multicommodity Routing with Time Windows

Online Multicommodity Routing with Time Windows Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny TOBIAS HARKS 1 STEFAN HEINZ MARC E. PFETSCH TJARK VREDEVELD 2 Online Multicommodity Routing with Time Windows 1 Institute

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

One Minute To Learn Programming: Finite Automata

One Minute To Learn Programming: Finite Automata Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge

More information

According to Webster s, the

According to Webster s, the dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly

More information

Outline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)

Outline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4) Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST

More information

Physics 6010, Fall 2010 Symmetries and Conservation Laws: Energy, Momentum and Angular Momentum Relevant Sections in Text: 2.6, 2.

Physics 6010, Fall 2010 Symmetries and Conservation Laws: Energy, Momentum and Angular Momentum Relevant Sections in Text: 2.6, 2. Physics 6010, Fll 2010 Symmetries nd Conservtion Lws: Energy, Momentum nd Angulr Momentum Relevnt Sections in Text: 2.6, 2.7 Symmetries nd Conservtion Lws By conservtion lw we men quntity constructed from

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

CHAPTER 11 Numerical Differentiation and Integration

CHAPTER 11 Numerical Differentiation and Integration CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

How To Study The Effects Of Music Composition On Children

How To Study The Effects Of Music Composition On Children C-crcs Cognitive - Counselling Reserch & Conference Services (eissn: 2301-2358) Volume I Effects of Music Composition Intervention on Elementry School Children b M. Hogenes, B. Vn Oers, R. F. W. Diekstr,

More information

Object Semantics. 6.170 Lecture 2

Object Semantics. 6.170 Lecture 2 Object Semntics 6.170 Lecture 2 The objectives of this lecture re to: to help you become fmilir with the bsic runtime mechnism common to ll object-oriented lnguges (but with prticulr focus on Jv): vribles,

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2 Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution

More information

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming

Research of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming Reserch of Flow Alloction Optimiztion in Hybrid Softwre Defined Netwo Bsed on Bi-level Progrmming Abstrct Lulu Zho, Mingchun Zheng b School of Shndong Norml Univeity, Shndong 250014, Chin fryrlnc@163.com,

More information

Your duty, however, does not require disclosure of matter:

Your duty, however, does not require disclosure of matter: Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or

More information

NOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1

NOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1 Cohsset Assocites, Inc. Expnding Your Skill Set: How to Apply the Right Serch Methods to Your Big Dt Problems Juli L. Brickell H5 Generl Counsel MER Conference My 18, 2015 H5 POWERING YOUR DISCOVERY GLOBALLY

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata N Lecture Notes on Regulr Lnguges nd Finite Automt for Prt IA of the Computer Science Tripos Mrcelo Fiore Cmbridge University Computer Lbortory First Edition 1998. Revised 1999, 2000, 2001, 2002, 2003,

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

Optiml Control of Seril, Multi-Echelon Inventory (E&I) & Mixed Erlng demnds

Optiml Control of Seril, Multi-Echelon Inventory (E&I) & Mixed Erlng demnds Optiml Control of Seril, Multi-Echelon Inventory/Production Systems with Periodic Btching Geert-Jn vn Houtum Deprtment of Technology Mngement, Technische Universiteit Eindhoven, P.O. Box 513, 56 MB, Eindhoven,

More information

Distributions. (corresponding to the cumulative distribution function for the discrete case).

Distributions. (corresponding to the cumulative distribution function for the discrete case). Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive

More information

Algebra Review. How well do you remember your algebra?

Algebra Review. How well do you remember your algebra? Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then

More information