|
|
- Marshall Kennedy
- 8 years ago
- Views:
Transcription
1 Averiedmodelcheckerforthemodal -calculusincoq SwissFederalInstituteofTechnology,Lausanne,Switzerland ComputerNetworkingLaboratory, ChristophSprenger Abstract.Wereportontheformalisationandcorrectnessproofofa ory.usingcoq'sextractionmechanismweobtainanexecutablecaml modelcheckerforthemodal-calculusincoq'sconstructivetypethe- 1Introduction exampleillustratesitsapplicationincombinationwithdeduction. program,whichisaddedasasafedecisionproceduretothesystem.an techniquesforthevericationofreactivesystems.theexpressivenessofthetheoremprover's(oftenhigher-order)logiccanbeusedtoaccommodateavarietyof designscanbeveried.however,usingatheoremproverisnottransparentand Thereisanobviousadvantageincombiningtheoremprovingandmodelchecking programmodellingandvericationparadigms,soinnitestateandparametrised whenusedinisolation. thetwotechniquescanthereforealleviatetheproblemsinherenttoeachofthem plicationisthuslimitedtosystemswithsmallstatespaces.acombinationof transparent,butexponentialinthenumberofconcurrentcomponents.itsap- mayrequireafairamountofexpertise.ontheotherhand,modelcheckingis areabstractinterpretation[4,11,7]andinductivereasoningattheprocesslevel smallenoughtobeamenabletomodelchecking.examplesofsuchtechniques ductiontechniqueswhichtransforminnitestateorparametrisedsystemsinto nitestateones,whilepreservingthepropertiesofinterest.theseareoften Suchanintegrationpaysoevenmore,whenusedincombinationwithre- [23,10]. environments[20,14,8].commontoallthesecasesisthatthemodelcheckerisan posed.inthispaper,wetakethepositionthatthisisanimportantquestion, aretrusted.thequestionofthecorrectnessofthemodelcheckeritselfisrarely externalprogramthatisinvokedasneededand,mostimportantly,whoseresults Variousmodelcheckershavealreadybeenintegratedintheoremproving whenevertheproofenvironmentweuseshouldbehighlyreliable.thisquestion gainsevenmoreimportanceinthecontextofproversbasedonintuitionistic (i.e.-terms)areconstructedduringtheproof.theseproofobjectsarethen typetheorysuchascoq[3],alf[1]andlego[12],whereexplicitproofobjects veriedbyaninferenceengineimplementingthebasicproofrules.sincethere
2 areonlyafewrulesandthecorrectnessofanyproofdependsonlyonthecorrect implementationoftheserules,thesesystemscanberegardedasveryreliable. necessaryproofobjectandadditasatactictothesystemor(2)weprovethe procedure.inbothapproachestheproofsystemforthetemporalormodallogic modelcheckeritselfformallycorrectandthenconsideritasatrusteddecision aframework:(1)weimplementitasanexternalprogramthatgeneratesthe Weseetwopossibilitiesfortheintegrationofamodelcheckerintosuch isimplementedintheproverandisthereforeavailablefordeductiveproofs. proofobjectsgrowslinearlywiththenumberofapplicationsofproofrules.this isclosesttoours.theyhaveimplementedamodelcheckerforthemodalcalculusforlegointhisway.whileintegratingverysmoothlyintotheprover, TherstapproachhasbeenfollowedbyYuandLuo[24],theworkwhich thisapproachhastheproblemofbeinginecient.thesizeofthegenerated ismoreecient,butintegratessomewhatlesssmoothlyintotheproofenvironment,astheresultsproducedbythemodelcheckerhavetobeintroducedas generateslargeproofobjectsevenforquitesmallexamples.thesecondapproach (safe)axiomsintotheprover. translatedintoanexecutablecamlprogram.moreover,wealsohavethepossibilitytodirectlyrunthe(proofofthe)modelcheckerincoqitselfandgenerate Ourapproachisacompromisebetweenthetwo.Wehaveformalisedthe modal-calculus,aspecicationofthemodelcheckerin[22]andprovedit correctincoq.usingcoq'sprogramextractionmechanismourproofisthen calculuscanbeusedtoprovepropertiesof(possiblyinnite)transitionsystems. istherstformallyveriedmodelchecker.secondly,theformalisationoftheablycorrectsequential(functional)programs.tothebestofourknowledge,this correctnessproofofthemodelcheckerprovidesacasestudyindevelopingprov- aproofobject.weseeourcontributionastwo-fold.firstly,thespecicationand Fornitestatesystems,themodelcheckerprovidesausefuldecisionprocedure whichrelievestheuserfromtediousdetailsofaproof.reductiontechniquescan beusedtoreduceinnitestatesystemstonitestate,whichcanthenbeproved -calculus,theproofsystemunderlyingthemodelcheckerandthecorrectness anoverviewofthecoqsystem.section3recallsthesyntaxandsemanticsof themodal-calculus.insection4wedescribeourformalisationofthemodal automaticallywiththemodelchecker.weillustratethisusewithanexample. proofofthealgorithm.section5reportsonanexampleillustratingthecombinationofdeductiveproofandautomaticproofusingthemodelchecker. Theoutlineoftherestofthepaperisasfollows.Thenextsectiongives 2OverviewofCoq Coq[3]isaninteractiveproofdevelopmentsystemimplementingtheCalculusof structions[6]isthemostpowerfulsysteminbarendregt's-cube[2].itcombines provideapowerfulandnaturalmechanismforthedenitionofdatatypes,spec- InductiveConstructions(CIC)[18,21].TheunderlyingpureCalculusofCon- polymorphic,higherorderanddependenttypes.theadditionalinductivetypes
3 toderivejudgementsoftheform `t:tmeaningthatincontext,termt CICisatypedlambdacalculus.Itsnaturaldeductionstyleproofrulesareused hastypet.sinceprovingtincontext involvestheexplicitconstructionofa -termtinhabitingt,thecurry-howardcorrespondenceallowsustoidentify icationsandpredicatesaswellasforproofsbystructuralinduction.formally, 2.1Thepurecalculus InCoqthefollowingnotationforthebasictermandtypeconstructionsisused: proofswithprogramsandtypeswithspecications. associatestotheleftandproductstotheright.inthispaper,wewritethe specialcaseoftheproductwhenxdoesnotoccurfreeinb.functionapplication [x:a]mistheabstractionofx:afromm(usuallynotedx:a:m),(mn) dependentproductas8x:a:minordertoimprovereadability. B(oftennoted8x:A:Morx:A:M).ThefunctionspaceA!Bisthe denotesapplicationofmtonand(x:a)bthedependentproductofaand fprop;set;typeg,axiomsa=fprop:type;set:typegandrulesr=ss. Thepurecalculuscanbespeciedasthepuretypesystem[2]withsortsS= Moreover,therearethethreeconstantsProp,SetandType,calledsorts. arityisofsorts.alongwitheachinductivetypeastructuralinductionprinciple arityisatypeoftheform8x1:a1:::8xn:an:s,wheresisasort.wesaythe 2.2Inductivetypesandrecursion isautomaticallygenerated.forourpurpose,thedenitionofinductivetypesis bestexplainedwithacoupleofexamples. Apositiveinductivetypeisspeciedbyanarity,andasetofconstructors.An Example1.(Naturalnumbers)The(data)typeofnaturalnumbersisspecied bythefollowinginductivedenition: ThistypehasaritySetandtwoconstructorsO:natandS:nat!nat.Inthis case,theinductionprincipleisatermnatindofthefamiliartype: Inductivenat:Set:=O:natjS:nat!nat: instance,additiononnaturalnumberscanbedenedbyprimitiverecursion: combinedwiththefixpointconstructtodeneprimitiverecursivefunctions.for TheconstructCases:::of:::enddenesafunctionbycaseanalysis;itmaybe 8P:nat!Prop:(PO)!(8n:nat:(Pn)!(P(Sn)))!8n:nat:(Pn) Fixpointadd[n:nat]:nat!nat:= teeingitstermination. verifythatitbecomesstructurallysmallerineachrecursivecall,thusguaran- Notethatbyemphasisingtherstargument(namedn),thesystemisableto [m:nat]casesnofo)mj(sp))(s(addpm))end:
4 Example2.(Predicates)Thepredicateonnaturalnumbersisdenedby: Inductivele[n:nat]:nat!Prop:= tobegreaterorequalton. Infact,thisdenesthefamilyofinductivepredicates\n:",indexedbyn:nat, jles:8m:nat:(lenm)!(len(sm)): len:(lenn) quantication: tionprincipleprovidestheeliminationrule.asanexample,wetakeexistential Example3.Logicalconnectivescanbedenedasnon-recursiveinductivetypes. Thetypesoftheconstructorstaketheroleofintroductionrules,whiletheinduc- naturaldeduction: Theassociatedinductionprincipleremindsofthe9-eliminationruleknownfrom Inductiveex[A:Set;P:A!Prop]:Prop:= exintro:8x:a:(px)!(exap): 2.3Programdevelopmentandextraction exind:8a:set:8p:a!prop:8q:prop: (8x:A:(Px)!Q)!(exAP)!Q Pandinput-outputrelationQ. AccordingtoHeyting'sconstructiveinterpretationofpropositions[9],aproofof theformula8x:a:(px)!9y:b:(qxy)isafunctiontakingavalueianda acomputationalpointofview,weareonlyinterestedintheinputandoutput proofof(pi)andconstructsvalueoalongwithaproofthat(qio).so,this valuesandnotintheproofsofpandq,whichareofpurelylogicalcontent.the formulacanbeunderstoodasthespecicationofaprogramwithprecondition content,respectively.theextractionmechanismstripso(sub-)termswhose twosortssetandpropareusedtomarktermsofcomputationalandoflogical Anyproofofthisspecicationisavalidimplementation.However,from functionalsoforgetsaboutdependenciesoftypesonterms.itscodomainis specicationlanguageforfind typeareofsortprop,whilekeepingthosewithtypesofsortset.theextraction executablecamlprograms1. thesubsystemofcicwithoutdependenttypes,calledfind replacesexinspecications.(sigap)iswrittenasfx:aj(px)g.extraction InCoq,thereisatypesigisomorphictoexbutwhosearityisofsortSet.It!programs.Thesemaythenbetranslatedinto!.CICisusedas proofofthespecication8x:a:(px)!fy:bj(qxy)gextractstoafunction f:a!b.thecorrectnessoftheextractumisjustiedbytherealisability A!(sig0A).Thistypecanbesimpliedtotheisomorphictype[A:Set]A.So,a yieldstheinductivetypesig0ofarityset!setwithitsonlyconstructoroftype 1providedtheyaretypableinCaml,whichisthecaseformostpracticalapplications
5 interpretation[16,17],ensuringinthiscasethatfsatises8x:a:(ix)! (Qx(fx)). arityofsortset)givenby: Decisionproceduresarespeciedbyavariantoflogicaldisjunction(with Inductivesumbool[A:Prop;B:Prop]:Set:= tothetypeofbooleans.forexample,8x;y:nat:fx=yg+f:x=ygspeciesa Thenotationfor(sumboolAB)isfAg+fBg.Itsextractionisisomorphic left:a!(sumboolab)jright:b!(sumboolab) decisionprocedureforequalityonthenaturalnumbers. arguments.moresophisticatedpatternmatchingrequiresstatingandproving specialisedinductionprinciples,whicharethenappliedtoobtainthedesired Proofmethods.Therearetwopossibilitiestoproveaprogramspecication. controlstructure[19]. TherstoneistousetheusualtacticsandtacticalsprovidedbyCoq.Primitiverecursivefunctionsareconstructedbystructuralinductionononeoftheir systemrightfromthebeginningandthenapplyaspecialprogramtacticwhich triestosynthesisethecomputationalpartsoftheproofandgeneratesthelogical lemmasnecessarytocompletetheproof.thisistheinversetotheextraction process.however,asextractionisnotinvertible,therawfind Theideaofthesecondmethodisroughlytogivethedesiredprogramtothe andthelanguageofrealizersiscalledreal. programwithspecications[15].suchannotatedprogramsarecalledrealizers sucientandthetacticneedssomehintswhicharegivenbyannotatingthe!programisnot Themodal-calculussubsumesinexpressivepowermanymodalandtemporal logicssuchasltlandctl.itisinterpretedoverlabelledtransitionsystems 3Thepropositionalmodal-calculus states,actisasetofactionsand!stactstisthetransitionrelation. anenvironmentwhichassignstoeachvariableandatomicpropositionasetof APofatomicpropositions.Amodelisapair(T;)consistingofaLTSTand Wewritesa!tfor(s;a;t)2!.AssumeacountablesetsVarofvariablesand (LTS),whicharestructuresoftheformT=(St;Act;!),whereStisasetof states.theabstractsyntaxofthemodal-calculusisnowdenedby anaction.thexedpointoperatorsandaretaggedwithanitesetuof wherex2varisavariable,a2apisanatomicpropositionand2actis ::=XjAj:Aj_j^jhij[]jXfUg:jXfUg: states.wewritewheneverwemeaneitherofor.thesemanticsisthen
6 inductivelydenedasfollows: kxk=(x) k0^1k=k0k\k1k k0_1k=k0k[k1k k:ak=stnkak kak=(a) kxfug:k=s:( khik=fs2sj9s02s:s!s0^s02kkg k[]k=fs2sj8s02s:s!s0)s02kkg thefalse(f)andtrue(t)propositionsaredenableasx:xandx:x,respectively.thispresentationofthecalculus,wherenegationoccursonlyinfront (S)) (S)=kk[S=X].TheusualX:isdenedasXf?g:.Notethat kxfug:k=s:(u[ (S)nU) 4Implementationofthemodelchecker ofatomicpropositioniscalledpositivenormalform. mentationandcorrectnessproofofthemodelcheckerdescribedin[22]. 4.1Fixedpoints Thissectiondescribestheformalisationofthe-calculusinCoqandtheimple- AssumeanarbitrarytypeU.Then(EnsembleU)isthetypeofsetsoverU (whichareimplementedaspredicatesu!prop).weabbreviatethistypeto inclusionordering.wedenethefollowingtwooperatorsmuandnu: EnsU.SupposefurtherthatF:EnsU!EnsUisamonotonefunctionw.r.t.the Denitionmu:(EnsU!EnsU)!EnsU:= Denitionnu:(EnsU!EnsU)!EnsU:= [F:EnsU!EnsU][s:U]8X:EnsU:(Included(FX)X)!(InXs): Winskel'sreductionlemma,whichformsthebasisforthemodelchecker: AccordingtoTarski'stheorem,thesetwooperatorsdenetheleastandgreatest xedpointsoff,respectively,asiseasilyprovedincoq.thenextingredientis [F:EnsU!EnsU][s:U]9X:EnsU:(IncludedX(FX))^(InXs): ItstatesthatasetPiscontainedinthegreatestxedpointofamonotone TheoremReductionlemma: functionexactlyifitiscontainedinacertainkindofunfoldingofthatxed (IncludedP(F(nu[S:EnsU]UnionP(FS)))): (IncludedP(nuF))$ point,wherepisaddedtofunderthexedpointoperator.
7 4.2-calculussyntaxandsemantics s.thisisexpressedinthefollowinglines: functionwhich,foranystatesandactiona,computesalistofa-successorsof sitionsystem.weassumethatthesetofstatesisniteandthatwehavea Ourdevelopmentofthemodelcheckerwillbeparametrisedbyalabelledtran- ParameterAct;St:Set: ParameterTrans:St!Act!St!Prop. Theinductivetypedeningthesyntaxisthendenedby: Axiompostspec: Axiomfinitestate:(Finite(FullsetSt)): InductiveMuForm:Set:= 8s:St:8a:Act:fl:(listSt)j8t:St:(Elemtl)$(Transsat)g: jor: jand:muform!muform!muform jlit:(st!bool)!muform Var:nat!MuForm jnu: jmu: jdia:act!muform!muform jbox:act!muform!muform (listst)!muform!muform. predicatesoftypest!bool.sincethistypeisclosedundernegationwecan ofatomicpropositionsisdirectlycodedintothesyntaxintheformofcomputable dropnegationaltogetherfromthesyntax.thexedpointoperatorsaretagged withalistofstates. VariablesareencodedinthestandardwayusingdeBruijnindices.Thevaluation aninnitelistsofsetsofstates.weintroduceanoperationenvcons:ensst! functionrecursivelycomputingthesemanticsofaformulawithrespectto environmentisdenedby: Env!Envwith(envconsR)returningRforOand(j)forj+1.The ThetypeEnvofenvironmentsisdenedasnat!EnsSt,whichcanbeseenas FixpointSem[:MuForm]:Env!EnsSt:= [:Env]Casesof j(litp) (Vari) )(i) j(diaa))(diasema(sem)) j(boxa))(boxsema(sem)) j(or12))(unionst(sem1)(sem2)) j(and12))(intersectionst(sem1)(sem2)) )(cf2ensstp) end: j(mul) j(nul) )(MuSeml[R:EnsSt](Sem(envconsR))) )(NuSeml[R:EnsSt](Sem(envconsR)))
8 Thefunction(cf2ensSt)transformsapredicateoftypeSt!boolintothe setofstates(oftypeensst)verifyingthepredicate.boxsem,diasemarethe freevariablesbyone,accountingfortheincreasedabstractiondepthunderthese pointoperator.here,envconshastheeectofshiftingtheinterpretationof debruijnversionofs:kk[s=x]whenxisthevariableboundtothexed ofthexedpointoperators,thesecondargumenttomusemandnusemisthe predicatetransformersdeningthesemanticsofthemodalities.inthecases operators.forillustration,wegivethedenitionsofdiasemandnusem. InductiveDiaSem[a:Act;R:EnsSt]:EnsSt:= DenitionNuSem:(listSt)!(EnsSt!EnsSt)!EnsSt:= diaintro:8s;t:st:(transsat)!(instrt)!(inst(diasemar)s): [P:(listSt)][:EnsSt!EnsSt] typenat!muformassigningeachvariablea-calculusformula.substitutionis Substitution.WedenethetypeofsubstitutionsSubsttobethefunctionsof (nust[r:ensst](unionst(list2ensstp)(r))): ducessomenotationwhichisusefulinthecontextofdebruijn-codedvariables: thusafunctionsubst:muform!subst!muform.thefollowingtableintro- notationdenition 0 id " [i:nat](vari) [i:nat](var(si)) name *() [i:nat]casesiofo)j(sk))(k)end\cons" [i:nat](subst(i)0) O(") \lift" \shift" \composition" \identity" of(subst).insubst,thecasesofthexedpointoperatorsuse'lift'to pushsubstitutioninside,i.e.wehave(l Inordertoimprovereadability,wewillusetheusualnotation[]instead Lemma4.(0)=*()(0): operatorisusefulinunfoldingxedpointformulas: totheunfoldingof(nul ).Withthesedenitions,wecanprove: )[]=(l( [(Nul[*()])).The'cons' )id]corresponds stitutionandenvironment.itisprovedisbystructuralinductionon. Thenextlemmaestablishesastandardsemanticalcorrespondencebetweensub- LemmaSubstitutionlemma: 4.3Correctnessassertions 8:MuForm:8:Env:8:Subst: (Sem[])=(Sem[i:nat](Sem(i))): Thesatisfactionrelationsatonstatesandformulasisdenedas:
9 Wecalltheproposition(sats)acorrectnessassertionandwriteitassj=. InCoq,wecanprovethefollowinglemma: Inductivesat[s:St;:MuForm]:Prop:= satintro:(8:env:(inst(sem)s))!(sats): Lemma5.For';'0;'1and(l 1.sj=(And01)$sj=0^sj=1 2.sj=(Or01)$sj=0_sj=1 3.sj=(Diaa)$9s0:St:(Transsas0)^s0j= )closedformulas,wehave 4.sj=(Boxa)$8s0:St:(Transsas0)!s0j= Proof.Items(1)-(5)followdirectlyfromthesemanticdenition.For(6),weneed 6.if:(Elemsl)thenfor2fMu;Nug: 5.if(Elemsl)then(a):(sj=(Mul sj=(l )$sj=[((conssl))),and(b)sj=(nul )id] ) thereductionandsubstitutionlemmas.inthecaseoftheleastxedpoint,a ertiesofarbitrary(possiblyinnitestate)transitionsystemsdeductively. dualversionofthereductionlemmaisused. Theseequivalences,whencastintoproofrules,canbeusedtoestablishprop- ut 4.4Thealgorithm themassimplicationrules(ingoingfromlefttoright). correctnessassertionsbyexploringtheneighbourhoodofthestateofinterest. Inthissection,wedescribethespecicationandcorrectnessproofofWinskel's TheideaistoexploittheequivalencesofthepreviousLemma5byconsidering localmodelcheckingalgorithm[22]incoq.itdecidesthetruthorfalsityof oritnot.thisleadsustothefollowingcoqspecication: transitionsystem,themodelcheckerissupposedtodecidewhetherssatises Specication.Givenaclosedformulaofthe-calculusandastatesofthe (booleancombinationsof)simplerones.thexedpointoperatorsaredealtwith byunfoldingthemwhileaddingthecurrentstatetothetag,wheneveritisnot WeapplyLemma5inordertograduallytransformthedecisionprobleminto MuChk:8:MuForm:(Closed)!8s:St:fsj=g+f:(sj=)g: openorclosed.thisleadstothefollowinggeneralisedspecicationmuchkplus, proofalsorequiresthatweextendourspecicationtoarbitraryformulas,bethey thatthecorrectnessproofwillproceedbywell-foundedinduction.however,the alreadythere.incases1-4thereisastructuralreductioningoingfromleftto right.case5providesthebase.incase6thereductionislessobvious.thismeans usingtheauxiliarypredicatesqandq+.
10 DenitionQ+:MuForm!Set:= DenitionQ:MuForm!Set:= [:MuForm]8:Subst: [:MuForm]8s:St:fsj=g+f:(sj=)g: MuChkplus:8:MuForm:(Q+) 8i:nat:(Elemi(fv))!(Closed(i))! 8i:nat:(Elemi(fv))!(Q(i))!(Q[]): TherstconditioninthedenitionofQ+meansthatthesubstitute(i)for isequivalenttoqinthiscase.withthesedenitionstheoriginalspecication eachfreevariableiofisaclosedformula.thesecondconditionexpresses substitutes.sinceaclosedformulatriviallysatisesbothoftheseconditions,q+ MuChkreads8:MuForm:(Closed)!(Q). theassumptionthatweknowhowtodecidethesatisfactionproblemforthese partofthecoqlibrary.itisstatedinthefollowing. well-foundedinduction.thewell-foundedinductionprinciple(wfi)isatheorem Correctnessproof.WeprovethegeneralisedspecicationMuChkplusby wellfoundedinduction: 8A:Set:8R:A!A!Prop:(wellfoundedAR)! P)!P)!A!P.Note,however,thatbytherecursiverealisabilityinterpretation[19]anyprogramextractedfromaproofbywell-foundedinductionis guaranteedtoterminateonargumentssatisfyingthespeciedpreconditions. tryheretopointouttheapplicationoftheproofmethodprovidedbyrealizers ProofofmaintheoremMuChkplus.Aswefollowbasicallytheproofin[22],we obtainedbyextractionisageneralrecursor.itstypeis8a;p:set:(a!(a! Thecomputationalcontentoftheproofofthewell-foundedinductionprinciple 8P:A!Set:(8x:A: 8y:A:(Ryx)!(Py))!(Px)!8a:A:(Pa) formulas.thenrelationr:muform!muform!propisdenedby: andtheprogramtactic. Denition6.Letbetheproperone-step2subformularelationon-calculus isnite.bythewell-foundedinductionprinciple,muchkplusfollowsfrom: Well-foundednessofRfollowsfromtheassumptionthatthesetofstatesSt [;0:MuForm] 0_9s:St:9l:(listSt):9 (:(Elemsl)^((conssl))^0(l :MuForm: )) Theproofproceedsbycaseanalysisontheformof,whichgenerateseight subgoals,oneforeachconstructorofmuform.wepickoutthecaseofthegreatest xedpointwhichwestateasthelemma: 8:MuForm:(8 :MuForm:(R )!(Q+ ))!(Q+): (1) 2i.e.if0thenthereisno00s.t.000
11 AfterunfoldingthedenitionsofQ+andQ,introducingthehypothesisintothe LemmachkNuplus: contextandpushingsubstitutioninsidenu,weobtainthesequent: 8l:(listSt):8:MuForm: (8:MuForm:(R(Nul))!(Q+))!(Q+(Nul)): h:8 80:Subst: :MuForm:(R (8j:nat:(Elemj(fv(Nul)))!(Closed(0j)))! (8j:nat:(Elemj(fv(Nul))!(Q(0j)))!(Q (Nul))! h1:8i0:nat:(elemi0(fv(nul))!(q(i0)) s:st :Subst h0:8i0:nat:(elemi0(fv(nul)))!(closed(i0)) [0]) Therealizerforthisgoaldependsontwolemmaswhichareprovedinthecontext above.therstoneis: ============================ fsj=(nul([*()]))g+f:(sj=(nul([*()])))g righthandsideoflemma5(6): ItisautomaticallyprovedbyProgramall.Thesecondonecorrespondstothe LemmaQNucons::(Elemsl)!(Q(Nu(conssl))[]) Realizer(h(Nu(conssl)h1)): UsingLemma4,werstrewritethisto(Q[(Nu(conssl)([*()]))]).Now, sincebylemmaqnuconsweknowhowtodecide(nu(conssl)([*()])) LemmaQNuunfold: :(Elemsl)! Q([*()])(Nu(conssl)([*()]))id thefollowingrealizer howtodosoforeach(i),wecanusetheinductionhypothesishtoconstruct (whichisconvertiblewith(nu(conssl))[])andbyhypothesish1weknow ApplyingthetacticProgramallleavesuswithtwosubgoalswhichareeasily solved.now,withlemma5(5b)and(6)inmind,wearereadytogivetherealizer Realizer h(nu(conssl)([*()])) [i:nat]casesiofo)qnuconsj(sj))(h1j)end forthegoalofouroriginalsequent: and5(6). subgoalsgeneratedbyprogramallarealleasilyprovedusinglemmas5(5b) whereiselemspec:8s:st:8l:(listst):f(elemsl)g+f:(elemsl)g.the Realizerif(iselemspecsl)thentrueelse(QNuunfolds):
12 realizerformuchkplus: (applicationofthewfiandcaseanalysis)canbereplacedbythefollowing ArealizerforthecontrolstructureThestepstakeninthebeginningoftheproof Realizer<Q+>recmuchkplus::::fRg [:MuForm]Casesof j(constrargs))(chkconstrplusargsmuchkplus) j(litp) j::: (Vari) )(chklitplusp) )(chkvarplusi) hypothesisandm:p,issyntacticsugarfor(wellfoundedinductionap[a: Thenotation<P>rech::::fRg[a:A]M,wherehisthenameoftheinduction end: A][h:A!P]M).Theidentierschkconstrplus,whereconstristhenameof 5Application insubgoal(1). arecursiveconstructorofmuform,denotelemmasprovingthedierentcasesfor CCSandthespecicationpreorder.Werecallthebasicdenitions.For ematicalnotationforbrevity. AllthenotionsinthissectionhavebeenformalisedinCoq.WeuseusualmathplementsA=fljl2AgandthesetoflabelsL=A[A.Wesetl=l.fDene moredetail,wereferthereaderto[13,5].letabeasetofnames,theircom- thesetofactionsbyact=l[fg,wherewiththeinvisible/silentaction.f isarelabellingfunctioniff(l)=f(l)andf()=.supposeasetkofprocess constants.thesetpofprocessesisdenedbytheabstractsyntax: bytherules: wherea2act,farelabellingfunction,llanda2k.lettbethe transitionsystem(p;act;!),whosetransitionrelation!isinductivelydened p::=nilj?ja:pjp0+p1jp0jp1jp[f]jpnlja a:pa!p pa!p0;a;a62l)pnla!p0nl pa!p0;adef pa!p0)p+qa!p0;q+pa!p0; =p)aa!p0 pjqa!p0;qjpa!p0;pffgf(a)!p0ffg Thepartialitypredicate"isthecomplementof#whichisdenedby:(i)nil# ;a:p#,(ii)p#;q#)p+q#;pjq#,(iii)p#)pnl#;p[f]#,(iv) Adef =p;p#)a#.intuitively,"denotestheunderdenedprocesses.
13 Denition7.Letl2Landa2Act.Dene 1.l)=!l!!and)= p+(p+a)isthecomplementsofp*(p*a).wesaythataprocesspistotally 3.p*aip*_9p0:(p")p0^p0*) 2.p*i9p0:p")p0^p"! s.t.p+awehave: Denition8.Denethespecicationpreorderasthegreatestxedpointof thefunctionfonrelationsoverpdenedby(p;q)2f(r)iforalla2act denedifforallp0reachablefromp:p+.otherwise,itispartiallydened. Letdenoteweakbisimulationequivalence[13]. 3.ifqa!q0then9p0:pa)p0^(p0;q0)2R. 1.q+a, 2.ifpa!p0then9q0:qa)q0^(p0;q0)2R, Lemma9.Ifpqandpistotallydened,thenqistotallydenedandpq. Theorem10.([5])Thepreorderisaprecongruencew.r.t.parallelcomposition,restrictionandrelabelling,i.e.ifpqthenpjrqjr;pffgqffgand Vericationofusingthemodelchecker.Weintroducethetransition systemt+=(pp;act]act;!+),where!+isdenedby: pnlqnl. thetransitionsystemt+: Next,wedenesomeleftandrightmodalitiesforthe-calculusinterpretedover pa!p0)(p;q)0(a)!+(p0;q);(q;p)1(a)!+(q;p0) Ofallthesewedene\right"versions,butwithhair=h1(a)i.Wealso hh`iil=hilh`ilhil(`2l) hail=h0(a)i hhiil=hil hil=x:_hilx(x62fv()) Similarly,\right"versionsaredenedusing"r=P".Now,supposingtheset introduceleft/rightversionsofthepartialitypredicates: Actisnite,thefunctionFfromdenition8canbeexpressedasthe-calculus formula:~f(x)=^ "l="p *l=hhiil"l *l(a)=*l_hhaiil*l Wedene=X:~F(X).Thenwehavethefollowingresult: a2act:*l(a)_ *r(a)^[a]lhhaiirx^[a]rhhaiilx
14 Lemma11.ForActnite:pq,(p;q)j=. Asimpleprotocol.AsimpleprotocolPniscomposedofasenderSsynchronouslytransmittingsignalsoverabuerBnofsizentoareceiverR.With XkYdef =(X[out=z]jY[in=z])nfzg,thedenitionis: Bdef =in:out:b Bndef =kni=1b Sdef =send:in:ack:s Rdef =out:recv:ack:r Edef =(SjR)nfackg Pndef =(EjBn)nfin;outg WedeneaspecicationoftheprotocolbySpecdef =send:recv:spec.wewantto showthatthebehaviouroftheprotocolisindependentofthesizeofthebuer. Theorem12.Foralln1:SpecPn. Proof.Theproofisdecomposedintothefollowingtwosteps: 1.ndanetworkinvariantJsuchthatforalln1:JBn 2.verifythatSpec(EjJ)nfin;outg TheresultthenfollowsfromTheorem10andLemma9,afactwhichisproved bydeductionincoq.wedenejdef =in:j0andj0def =out:j+in:?. Step(1)isprovedbyanimplicitinductiononn:(a)JB(basecase)(b) JBkJ(inductivestep).Boththesestepscanbeprovedwiththemodel checker,byusingthecharacteristicformula.that(a)and(b)imply(1)is proved\byhand"incoq.step(2)canbedelegatedtothemodelcheckeras well. ut Asanyproperty,expressedinaversionofthemodal-calculuswithweak modalitiesonly,ispreservedbyweakbisimulationequivalence,wecanverifyit onthespecicationspecandconcludethatitalsoholdsforeachofthepn. References 1.L.Augustsson,T.Coquand,andB.Nordstrom.Ashortdescriptionofanother logicalframework.ing.huetandp.g.,editors,preliminaryproceedingsoflogical Frameworks, H.P.Barendregt.Lambdacalculiwithtypes.InS.Abramsky,D.M.Gabbay, andt.s.e.maibaum,editors,handbookoflogicincomputerscience,volume2: Background:ComputationalStructures,pages118{309.OxfordUniversityPress, B.Barras,S.Boutin,C.Cornes,J.Courant,j.-C.Fili^atre,E.Gimenez,H.Herbelin, G.Huet,andal.TheCoqProofAssistantReferenceManual,Version6.1.Projet Coq,INRIARocquencourt,CNRS-ENSLyon,Dec E.M.Clarke,O.Grumberg,andD.E.Long.Modelcheckingandabstraction. ACMTransactionsonProgrammingLanguagesandSystems,16(5):1512{1542, Sept.1994.
15 5.R.CleavelandandB.Steen.Apreorderforpartialprocessspecications.In CONCUR'90,volume458ofLectureNotesinComputerScience.Springer-Verlag, T.CoquandandG.Huet.Thecalculusofconstructions.InformationandComputation,76:95{120, D.Dams,O.Grumberg,andR.Gerth.Abstractinterpretationofreactivesystems. ACMTransactionsonProgrammingLanguagesandSystems,19(2):253{291, J.DingelandT.Filkorn.Modelcheckingforinnitestatesystemsusingdata abstraction,assumption-commitmentstylereasoningandtheoremproving.incav '95,volume939ofLectureNotesinComputerScience.Springer-Verlag, J.-Y.Girard,Y.Lafont,andP.Taylor.ProofsandTypes,volume7ofCambrdge TractsinTheoreticalComputerScience.CambridgeUniversityPress, R.P.KurshanandK.McMillan.Astructuralinductiontheoremforprocesses. In8thACMSymposiumonPrinciplesofDistributedComputing,pages239{248, C.Loiseaux,S.Graf,J.Sifakis,A.Bouajjani,andB.S.Propertypreserving abstractionsforthevericationofconcurrentsystems.formalmethodsinsystem Design,6:11{44, Z.LuoandR.Pollack.Legoproofdevelopmentsystem:User'smanual.TechnicalReportECS-LFCS ,DepartmentofComputerScience,Universityof Edinburgh, R.Milner.CommunicationandConcurrency.PrenticeHallInternationalSeriesin ComputerScience.PrenticeHall, O.MullerandT.Nipkow.CombiningmodelcheckinganddeductionforI/Oautomata.InTACAS95,volume1019ofLectureNotesinComputerScience, pages1{16.springer-verlag, C.Parent.SynthesedepreuvesdeprogrammesdansleCalculdesConstructions Inductives.PhDthesis,EcoleNormaleSuperieuredeLyon,Jan C.Paulin-Mohring.ExtractingF!programsfromproofsintheCalculusofConstructions.InSixteenthAnnualACMSymposiumonthePriciplesofProgramming Languages,Austin,Texas,Jan C.Paulin-Mohring.ExtractiondeprogrammesdansleCalculdesConstructions. PhDthesis,UniversitedeParisVII,Jan C.Paulin-Mohring.InductivedenitionsinthesystemCoq{rulesandproperties. TechnicalReport92-49,Laboratoiredel'InformatiqueduParallelisme,ENSLyon, France,Dec C.Paulin-MohringandB.Werner.SynthesisofMLprogramsinthesystemcoq. JournalofSymbolicComputation,11:1{34, S.Rajan,N.Shankar,andM.K.Srivas.Anintegrationofmodelcheckingwith automatedproofchecking.incav'95,volume939oflecturenotesincomputer Science,pages84{97.Springer-Verlag, B.Werner.UneTheoriedesConstructionsInductives.PhDthesis,Universitede Paris7,France, G.Winskel.Anoteonmodelcheckingthemodal-calculus.TheoreticalComputer Science,83:157{167, P.WolperandV.Lovinfosse.Verifyingpropertiesoflargesetsofprocesseswith networkinvariants.inj.sifakis,editor,internationalworkshoponautomatic VericationMethodsforFiniteStateSystems,volume407ofLectureNotesin ComputerScience,pages68{80.Springer-Verlag, S.YuandZ.Luo.ImplementingamodelcheckerforLEGO.InFormalMethods Europe,1997.
GarbageCollectioninObjectOriented DatabasesUsingTransactionalCyclic PrasanRoy1 ReferenceCounting S.Sudarshan1 S.Seshadri1S.Ashwin1 AviSilberschatz2 fprasan,seshadri,sudarshag@cse.iitb.ernet.in 1IndianInstituteofTechnology,
More informationPROGRAM OF STUDIES FORM MASTERS OF SCIENCE IN EDUCATION Concentration: Curriculum and Instruction and Secondary English licensure combined
PROGRAM OF STUDIES FORM MASTERS OF SCIENCE IN EDUCATION Concentration: Curriculum and Instruction and Secondary English licensure combined INSTRUCTIONS: Please complete this form and meet with your academic
More informationDATABASE DESIGN. - Developing database and information systems is performed using a development lifecycle, which consists of a series of steps.
DATABASE DESIGN - The ability to design databases and associated applications is critical to the success of the modern enterprise. - Database design requires understanding both the operational and business
More informationEnvironmental Compliance Reporting Mastering a Moving Target
Environmental Compliance Reporting Mastering a Moving Target Peter Robinson TPP Fort Walton Beach, Florida Abstract: Authors: Cathy Iler, Nikki Johnson, and Peter Robinson Total Parts Plus, Inc. Companies
More informationMIDDLEWARE AUTOMATION
MIDDLEWARE AUTOMATION SHARE RESPONSIBILITY WITHOUT LOSING CONTROL CONNECTIVITY & INTEGRATION SOLUTIONS Jürgen Efeish Enterprise Middleware Bloomberg LP jefeish@bloomberg.net Michael Joyce Enterprise Middleware
More informationWhy should our fitness center administer fitness tests?
Why should our fitness center administer fitness tests? There are two basic reasons for administering fitness tests: 1. Assessing a participant s current fitness. 2. Measuring fitness improvement over
More informationLICENSURE ONLY PROGRAM REQUIREMENTS FORM Elementary Education UNDERGRADUATE ROUTE
Radford University College of Education and Human Development LICENSURE ONLY PROGRAM REQUIREMENTS FORM Elementary Education UNDERGRADUATE ROUTE Name: Mailing Address: Phone: Bachelor or Master s degree:
More informationInstitutional Research Database Study
Institutional Research Database Study The Office of Institutional Research uses data provided by Administrative Computing to perform reporting requirements to SCHEV and other state government agencies.
More informationHEALTH INSURANCE CERTIFICATION GUIDE FOR FALL 2015
UT GRADUATE SCHOOL OF BIOMEDICAL SCIENCES (GSBS) Finance HEALTH INSURANCE CERTIFICATION GUIDE FOR FALL 2015 Log-In to MyUTH https://my.uth.tmc.edu/psp/myuth/myuth/entp/h/?tab=ut_ep_nvt_signon Click details
More informationAmerican Women Artists National Show, R.S. Hanna Gallery, Fredericksburg, TX. American Impressionist Society National Show, M. Gallery, Charleston, SC
Contact: beckyjoy@beckyjoy.com Galleries: Good Art Co, Fredericksburg, TX Copper Sun Gallery, Big Fork, MT Born & Raised: 1950 Oregon City, OR Education: Scottsdale Artists School Influences: Turner, Camille
More informationIs it Possible to Live Without Having Real Estate?
S max n i 1 a i q maxi n a i i 1 1 - - - - - - - - Information Security Goals Confidentiality Requirements Integrity Requirements Availability Requirements Mission Criticality C0 C1 C2 C3 I0
More informationHEALTH INSURANCE CERTIFICATION GUIDE FOR SPRING 2016
UT GRADUATE SCHOOL OF BIOMEDICAL SCIENCES (GSBS) Finance HEALTH INSURANCE CERTIFICATION GUIDE FOR SPRING 2016 Log-In to MyUTH https://my.uth.tmc.edu/psp/myuth/myuth/entp/h/?tab=ut_ep_nvt_signon Click details
More informationWhen printed the document is for reference only and is considered uncontrolled - refer to the Document Control System for the most current version
QM-1 SUPPLEMENT QUALITY MANAGEMENT SYSTEMS MANUAL Revision 6 Page: 1 of 6 APPROVED BY: TITLE DATE Electronic Signature on file Quality Director 10/3/15 D. Picciotti Page: 2 of 6 DOCUMENT REVISION HISTORY
More informationOpportunities for cooperation with South Med region
Opportunities for cooperation with South Med region Education and Culture 1-International credit mobility Education and Culture WHY is student mobility important? Better knowledge of higher education in
More informationLogo. International Symposium Security Dimensions in Europe Today 2004/12/20
Logo International Symposium Security Dimensions in Europe Today 2004/12/20 state A Institution hostility state B state C state A state B state C Need for Institutionalized Cooperation among
More informationInthispaper,weareinterestedinrandomgraphswithaxeddegree
ACRITICALPOINTFORRANDOM GRAPHSWITHAGIVENDEGREE DepartmentofMathematics PittsburghPA15213,U.S.A. Carnegie-MellonUniversity SEQUENCE MichaelMolloy UniversitePierreetMarieCurie EquipeCombinatoire BruceReed
More informationAgenda. Overview. Federation Requirements. Panlab IST034305 Teagle for Partners
Agenda Panlab IST034305 Teagle for Partners Sebastian Wahle, sebastian.wahle@fokus.fraunhofer.de Overview Testbed Federation Requirements Panlab Roles Federation Architecture Functional Components of Teagle
More informationCOMMUTATIVE RINGS. Definition: A domain is a commutative ring R that satisfies the cancellation law for multiplication:
COMMUTATIVE RINGS Definition: A commutative ring R is a set with two operations, addition and multiplication, such that: (i) R is an abelian group under addition; (ii) ab = ba for all a, b R (commutative
More informationsqlcmd -S.\SQLEXPRESS -Q "select name from sys.databases"
A regularly scheduled backup of databases used by SyAM server programs (System Area Manager, Management Utilities, and Site Manager can be implemented by creating a Windows batch script and running it
More informationData to Advance Economic Access and Justice for Tribes: Patterns of Consumer Credit Use in Tribal Communities
Data to Advance Economic Access and Justice for Tribes: Patterns of Consumer Credit Use in Tribal Communities Richard M. Todd, with Valentina Dimitrova-Grajzl, Peter Grajzl, A. Joseph Guse, and Michael
More informationProcedure for Nominating Renewable Energy Credit Offsets
Procedure for Nominating Renewable Energy Credit Offsets A. Nominations for renewable energy credit offsets shall be made jointly by the generating facility owner and the intended recipients of the offsets.
More informationMOOCs and the Opening Up of Higher Education
MOOCs and the Opening Up of Higher Education Professor Jeff Haywood, Vice Principal, CIO & Librarian University of Edinburgh, UK jeff.haywood@ed.ac.uk http://homepages.ed.ac.uk/jhaywood 1 2 3 MOOCs.. are
More informationDigital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie
Digital signature and e-government: legal framework and opportunities Raúl Rubio Baker & McKenzie e-government concept Utilization of Information and Communication Technologies (ICTs) to improve and/or
More informationMOOCs - a European university perspective
MOOCs - a European university perspective Making sense of MOOCs ACA-EUA Brussels 10 10 2013 Michael Gaebel Have you heard about MOOCs? 2013 membership consultation: 175 responses (1/5 of EUA s membership)
More informationVulnerability assessment of ecosystem services for climate change impacts and adaptation (VACCIA)
Vulnerability assessment of ecosystem services for climate change impacts and adaptation (VACCIA) Action 2: Derivation of GMES-related remote sensing data Deliverable 1: Time-series of Earth Observation
More informationFig. 1 Southwest Credit s Continuous Improvement Strategy
Collections contact centers and Accounts Receivables Management (ARM) firms face a constant challenge: being able to maximize payments while staying compliant and up to date with new rules and regulations.
More informationInformation Session for Peking University Fall 2013 Overseas Admissions
Information Session for Peking University Fall 2013 Overseas Admissions Brief Introduction of PKU Peking University is a comprehensive and national key university. The campus, known as "Yan Yuan"(the garden
More informationOptimizing Cost and Performance for Content Multihoming
Optimizing Cost and Performance for Content Multihoming Hongqiang Harry Liu Ye Wang Yang Richard Yang Hao Wang Chen Tian Aug. 16, 2012 Yale LANS Content Multihoming is Widely Used Content Publisher Content
More informationA.) Using the pulley system B.) Lifting it straight up C.) Both using the pulley system or lifting it straight up require the same effort (force)
Name: Date: Pulleys Test Instructions: Circle only one letter to indicate your answer for each question. Q1) If we ignore friction, which of the following two pulleys systems will require less effort (force)
More informationEVALUATION OF WELL TESTS USING RADIAL COMPOSITE MODEL AND DIETZ SHAPE FACTOR FOR IRREGULAR DRAINAGE AREA. Hana Baarová 1
The International Journal of TRANSPORT & LOGISTICS Medzinárodný časopis DOPRAVA A LOGISTIKA Mimoriadne číslo 8/2010 ISSN 1451 107X EVALUATION OF WELL TESTS USING RADIAL COMPOSITE MODEL AND DIETZ SHAPE
More informationSession 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits
Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits Best of both/ Best of all regarding specific needs, based on the use of resources Hybrid cloud is simply a mix of private
More informationGoulds Water Technology
APPLICATIONS Specifically designed for: Homes Farms Cottages Booster service SPECIFICATIONS Pump: Pipe connections: 1¼" NPT suction, 1" NPT discharge, 1" NPT drive (pressure) Pressure switch: AS4 preset
More informationFloatingpointvericationinHOLLight:theexponentialfunction 1 Floatingpointverication theexponentialfunction inhollight: UniversityofCambridge JohnHarrison Introduction Floatingpointcorrectness Ourimplementationlanguage
More informationsolutionsintheareaofdistributedtransactionsystemsandreplicated disseminationwithinsuchaserviceinadynamiclooselycoupledenvironment. databases.
AHighlyAvailableApplicationintheTransis E-mail:oramir,yairamir,dolev@cs.huji.ac.il TheHebrewUniversityofJerusalem,Israel OrAmir,YairAmirandDannyDolev InstituteofComputerScience Environment Abstract.Thispaperpresentsatypicalreplicatedapplicationinadistributedsystem.TheapplicationwasdevelopedontopofTransis,a
More informationFIRE Project. Open communications day Brussels, Feb., the 7th, 2013
Supported under: Trustworthy ICT for the IT Security Industry. A collaboration of IT Security Associations. Supporting the competitiveness of the European IT Security market and defining the research agenda.
More informationID: FDA-2015-N-2048-0001:
October 26, 2015 Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane Rm. 1061 Rockville, MD 20852 Submitted electronically via regulations.gov Re: Docket ID: FDA-2015-N-2048-0001:
More informationmanagedip Trunking TDS Table of Contents Essentials Special Calling Features
Table of Contents Flash Hook Features... 2 Feature Access Code Calls... 4 Additional Support... 5 167485/9-15/9072 1 Flash Hook Features Features using the flash hook are available on devices with flash
More informationBeyondPVM3.4:WhatWe'veLearned, G.A.Geist,J.A.Kohl,P.M.Papadopoulos,andS.L.Scott What'sNext,andWhy ComputerScienceandMathematicsDivision OakRidge,TN,37831-6367,USA OakRidgeNationalLaboratory havemadepvmbotheectiveandwidespread:asimplesystemabstraction.fromahigh-performanceprogrammingpointofview,weexamine
More informationNorstar Plus Programming and Feature Card - Automation
Norstar Plus Programming and Feature Card for ISDN Terminals Telephone buttons This guide shows the Business Series Terminal (BST) buttons. The following table shows how the buttons compare with the M7100N,
More informationConfiguring the SST DeviceNet OPC Server
Overview This application note describes the steps necessary to configure the SST DeviceNet OPC Server for use under Windows NT (Service Pack 3 or higher). This example shows how to set up a configuration
More informationFixed Point Theorems in Topology and Geometry
Fixed Point Theorems in Topology and Geometry A Senior Thesis Submitted to the Department of Mathematics In Partial Fulfillment of the Requirements for the Departmental Honors Baccalaureate By Morgan Schreffler
More informationQuality Procedure ISO 9001: 2008 Control of Documents
Quality Procedure ISO 9001: 2008 Control of Documents 1 Purpose FablessSemi Inc 1 controls all documents that are required by our Quality Management System (QMS). The purpose of this procedure is to define
More informationNorth Star Heating & Air Conditioning. 3520 Fenchurch Rd. West Jordan, UT (801) 285-9022. http://northstarheatingandairutah.com
http://northstarheatingandairutah.com When it comes to Air conditioning in West Jordon Utah, the only best HVAC contractor with 100% satisfied customers is North Star Heating and Air Conditioning. For
More informationThe Process Below are the steps for creating and presenting digital short courses:
Guidance on Proposing, Organizing, and Presenting a SETAC Digital Short Course: Best Practices and Things to Consider Version 1: March 2015 Updated: July 2015 SETAC is planning to launch digitally recorded
More informationMechanics 1: Vectors
Mechanics 1: Vectors roadly speaking, mechanical systems will be described by a combination of scalar and vector quantities. scalar is just a (real) number. For example, mass or weight is characterized
More informationMaine State Innovation Model Risk and Issue Mitigation Plan and Process
Maine State Innovation Model Risk and Issue Mitigation Plan and Process Table of Contents 1) Maine SIM Risk and Issue Mitigation Process a) Risk Log b) Steps for SIM Risk Creation c) Governance Involvement
More informationSTAMPIN UP! Customer Manager and Mailing Selector Users Guide
STAMPIN UP! Customer Manager and Mailing Selector Users Guide STAMPIN UP! Customer Manager and Mailing Selector Users Guide 2006 Stampin' Up! 12907 South 3600 West Riverton, UT 84065 www.stampinup.com
More informationE L E C T R O N I C V E H I C L E R E G I S T R A T I O N S Y S T E M. data management
E L E C T R O N I C V E H I C L E R E G I S T R A T I O N S Y S T E M data management Information storage mechanism on vehicles registration into data base Various connection options are shown on Pic.1
More informationPolicy for Promotion of Agro-Processing and Agri-Business, 2010. Government of Rajasthan
Policy for Promotion of Agro-Processing and Agri-Business, 2010 Government of Rajasthan For further information, Please contact : Telephone - 0141-2227824, 9413355045 New Email Id : rsamb@rajasthan.gov.in
More informationS.GRAF C.LOISEAUX loiseaux@imag.fr. Keywords:abstractinterpretation,simulation,propertypreservation,model-checking. 1.Introduction
VericationofConcurrentSystems* PropertyPreservingAbstractionsforthe c1995kluweracademicpublishers,boston.manufacturedinthenetherlands. FormalMethodsinSystemDesign,6,1{36(1995) S.GRAF C.LOISEAUX loiseaux@imag.fr
More informationState of the Storage Virtualization Market 2008
State of the Storage Virtualization Market 2008 Executive Summary Nothing is more important to IT than information. Rapid storage growth, combined with increasing network complexity and the rising importance
More informationCase:14-04744-BKT11 Doc#:67 Filed:10/09/14 Entered:10/09/14 15:14:42 Document Page 1 of 7
Case:-0-BKT Doc#: Filed:0/0/ Entered:0/0/ :: Document Page of IN THE UNITED STATES BANKRUPTCY COURT FOR THE DISTRICT OF PUERTO RICO 0 IN RE: CASE NO. -0 Chapter TRIPLE A & R CAPITAL INVESTMENT, INC Debtor(s)
More informationNonlinear Systems and Control Lecture # 15 Positive Real Transfer Functions & Connection with Lyapunov Stability. p. 1/?
Nonlinear Systems and Control Lecture # 15 Positive Real Transfer Functions & Connection with Lyapunov Stability p. 1/? p. 2/? Definition: A p p proper rational transfer function matrix G(s) is positive
More informationFact Sheet: Building the First Link to the Force of the Future
Fact Sheet: Building the First Link to the Force of the Future On his first day in office, Secretary Carter announced his goal to build the Force of the Future in order for the Department of Defense to
More information! Page!1!/!10! Figure'1.'DE+miniTED'participants'
Page1/10 ReportonDE+miniTED:DigitalEconomyTechnology,Entrepreneurship,Design, theukepsrcdigitaleconomycentresfordoctoraltrainingsummerschool inparis,france(1+4july2014) ElaineChew 15August2014 The2014SummerSchooloftheUKEngineeringandPhysicalSciencesResearchCouncil
More informationThe Perfect Number Theorem
The Perfect Number Theorem Mark IJbema April 17, 2016 Abstract This document presents the formal of the Perfect Number Theorem. The result can also be found as number 70 on the list of top 100 mathematical
More informationDo Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16
Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Overview What are Containers? Containers and The Cloud Containerization vs. H/W Virtualization
More informationHow To Use Payables Automation
M&T Bank and Visa Present: Payables Automation: Streamlining Payment Processes Featuring Dave Meaney, Senior Business Leader, Commercial Solutions Doug Dunbar, M&T Bank Commercial Card Senior Product Manager
More informationHILLENBRAND A GLOBAL DIVERSIFIED INDUSTRIAL COMPANY
HILLENBRAND A GLOBAL DIVERSIFIED INDUSTRIAL COMPANY PURSUING GROWTH BUILDING VALUE Hillenbrand Participants Joe Raver President and Chief Executive Officer Kristina Cerniglia Senior Vice President and
More informationChanges to New York State Publication Requirements for Non-Corporate Entities
Changes to New York State Publication Requirements for Non-Corporate Entities July 20, 2006 On June 1, 2006, a number of changes in the publication requirements under New York State law applicable to several
More informationSecuring public cloud
Securing public cloud The value of trust in the supply chain John Parkinson SaaS Assured Business Manager john.parkinson@nccgroup.com 0161 209 5204 The shift to cloud and SaaS SaaS dominant due to maturity,
More informationINDUSTRIAL SERVICES PRESSURE EQUIPMENT CERTIFICATION (PED) Pressure equipment certification. Your key to market access in Europe. www.tuv.
INDUSTRIAL SERVICES PRESSURE EQUIPMENT CERTIFICATION (PED) Pressure equipment certification. Your key to market access in Europe. www.tuv.com Comply with legal regulations and requirements. We help you
More informationDynamic Trust Management for the Internet of Things Applications
Dynamic Trust Management for the Internet of Things Applications Fenye Bao and Ing-Ray Chen Department of Computer Science, Virginia Tech Self-IoT 2012 1 Sept. 17, 2012, San Jose, CA, USA Contents Introduction
More informationRed Three Consulting
Presentation Red Three Consulting Lawson Top 20 Copyright 2002. Red Three Consulting, Inc About Us Data for Finance and Accounting Complex Operational and Financial Reporting Financially Aware BI Data
More informationModule 8: QUALITY CONTROL SYSTEM (QCS) and RESIDENT MANAGEMENT SYSTEM (RMS) Submodule 1: Introduction and Overview
Module 8: QUALITY CONTROL SYSTEM (QCS) and RESIDENT MANAGEMENT SYSTEM (RMS) Submodule 1: Introduction and Overview (Module 8 is mandatory for Contractors having Corps of Engineer contracts. It is optional
More information( F O R M E R LY M Y A C C O U N T ) Quick Reference Guide - Updated Sept 21, 2015
MANAGING YOUR MGE ONLINE ACCOUNT ON CUSTOMER CONNECTION ( F O R M E R LY M Y A C C O U N T ) Quick Reference Guide - Updated Sept 21, 2015 WELCOME TO CUSTOMER CONNECTION Customer Connection is a new online
More informationNational Insurance Numbers and Immigration figures for Eastern Europeans
National Insurance Numbers and Immigration figures for Eastern Europeans European Union: MW 380 Summary 1. Official figures for Eastern European net migration could have been underestimated by more than
More informationPeak load reduction for distributed backup scheduling
Peak load reduction for distributed backup scheduling Peter van de Ven joint work with Angela Schörgendorfer (Google) and Bo Zhang (IBM Research) 2002-2007 2014-2007-2011 2011-2014 2006-2007 My research
More informationSpring 2011 Conference Sandanski, May 13th 15th 2011 Oracle SOA Suite 11g Rapid service integration and process automation with a no-coding approach
Spring 2011 Conference Sandanski, May 13th 15th 2011 Oracle SOA Suite 11g Rapid service integration and process automation with a no-coding approach George Moykin Senior Consultant, Middleware george.moykin@oracle.com
More informationIdentity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH
Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving
More informationInterreg CENTRAL EUROPE 1 st Call for proposals
Interreg CENTRAL EUROPE 1 st Call for proposals Lead applicant training step 2, 20.10.2015, Prague Exercise Please note that this exercise presents only an example of how to technically link the project
More informationAGILE SOFTWARE TESTING
AGILE SOFTWARE TESTING Business environments continue to rapidly evolve, leaving many IT organizations struggling to keep up. This need for speed has led to an increased interest in the Agile software
More informationIndependent Contractors: Utah
CHRISTINA M. JEPSON AND NICOLE G. FARRELL, PARSONS BEHLE & LATIMER, WITH PRACTICAL LAW LABOR & EMPLOYMENT A Q&A guide to state law on independent contractor status for private employers in Utah. This Q&A
More informationALPHA SAMPLE FUND, L.P. ACCOUNT STATEMENT FOR THE QUARTER AND YEAR ENDED 12/31/07
ALPHA SAMPLE FUND, L.P. ALPHA SAMPLE FUND, L.P. TABLE OF CONTENTS Page Strategic Asset Management Confirmation Report 1 Balance Sheet 2 Statement of Profit and Loss 3 Notes to Account Statement 4 Addendum
More informationBridge Development and Operations for faster delivery of applications
Technical white paper Bridge Development and Operations for faster delivery of applications HP Continuous Delivery Automation software Table of contents Application lifecycle in the current business scenario
More informationA-B: Mrs. Marshall C-G: Mrs. Lassiter H-Ma: Mrs. Wilson Mb-R: Mrs. Green S-Z: Mrs. Smith. Class of 2016
A-B: Mrs. Marshall C-G: Mrs. Lassiter H-Ma: Mrs. Wilson Mb-R: Mrs. Green S-Z: Mrs. Smith Class of 2016 Know Your Grad Plan! Recommended (default) or Distinguished eligible to go directly to a university
More informationApplication Security Testing as a Foundation for Secure DevOps
Application Security Testing as a Foundation for Secure DevOps White Paper - April 2016 Introduction Organizations realize that addressing the risk of attacks on their Website applications is critical.
More informationFWT-8848 GSM (GATEWAY) USER S MANUAL
FWT-8848 GSM (GATEWAY) USER S MANUAL COPYRIGHT -2009 1 ST VERSION 1 1,General Description: FWT-8848 is a GSM to Analog Converter(single port,insert 1 sim card only), the device can produce a FXS line to
More informationData Quality. Tips for getting it, keeping it, proving it! Central Coast Ambient Monitoring Program
Data Quality Tips for getting it, keeping it, proving it! Central Coast Ambient Monitoring Program Why do we care? Program goals are key what do you want to do with the data? Data utility increases directly
More informationNetwork Drive Access Policy
Network Drive Access Policy Responsible Parties Prepared By Document Version Number Phone Number Ken Gebken Version 1.0 314-977-7295 Effective Date 2/2/2012 Last Updated 1/31/2012 Department(s) Responsible
More informationA Review ISO 9001:2015 Draft
A Review ISO 9001:2015 Draft ISO 9001 Why is it changing? Disclaimers Verbal statements made by the presenter may represent personal opinions and/or interpretations. The presentation includes information
More information[ SHERRYANNE MEYER. SAP CRM at Applied Materials. Session 34380. Al Linke Director, IT Sales & Marketing [ STEVE RUGGIERO [ ED HUDAK
SAP CRM at Applied Materials Session 34380 ] Al Linke Director, IT Sales & Marketing [ ED HUDAK ASUG INSTALLATION MEMBER MEMBER SINCE: 1998 [ STEVE RUGGIERO ASUG INSTALLATION MEMBER MEMBER SINCE: 2000
More informationOA S. ITEC - State University of New York. Our Banner Customers. Presentation Outcomes
The Business Intelligence Cloud Presented by: Marco Cestaro, Dan Brint, State University of New York March 23, 2011 Session Rules of Etiquette Please turn off your cell phone/pager If you must leave the
More informationEfficient Similarity Search over Encrypted Data
UT DALLAS Erik Jonsson School of Engineering & Computer Science Efficient Similarity Search over Encrypted Data Mehmet Kuzu, Saiful Islam, Murat Kantarcioglu Introduction Client Untrusted Server Similarity
More informationWelcome to the Center for International Studies Ohio University
Welcome to the Center for International Studies Ohio University 1 OHIO s Vision Ohio University will be the Nation s Best TRANSFORMATIVE Learning Community where Students realize their promise, Faculty
More informationQualysoft Group Company Presentation 2015
Qualysoft Group Company Presentation 2015 Qualysoft Group Headquarter Austria 1999 Germany 2000 Hungary 2001 Serbia 2003 Romania 2007 Slovakia 2007 Ukraine 2010 Albania 2014 Switzerland 2015 EU 40 000
More informationETICS - A Clean Approach to Open Source Cloud Software
ETICS: quality certification of open source cloud software the ETICS approach and the way it's planned to be adopted within the Ocean project Gabriele Giammatteo Open source Often open source components
More informationHow Service Manager 7 Licensing works
How Service Manager 7 Licensing works HP Management Software Service Management Software Introduction to Service Manager Licensing...2 The Licensing Facts...3 The Named license...3 The Floating license...3
More informationGE Medical Systems The Basic Structure of DICOM Charles Parisot, GE Medical Systems SSRPM Course Neuchâtel June 2003
GE Medical Systems This has no direct impact on existing Product Conformance! ISDN Link or Dial-Up Local Area Network Local Area Network ISDN Link or Dial-Up Unique ID: 1.2.840.10008.5.1.4.1.1.2
More informationVendor Code Request Procedures
Vendor Code Request Procedures for The University of Texas Health Science Center at Houston Vendor Code Request Procedures Page 2 Vendor File Maintenance Vendor Code Request Procedures for External Vendors:
More informationOnline Application Procedure Guide. Feb. 2015
Online Application Procedure Guide Feb. 2015 1. Visit SNU website 2. Log-in OR Create new account 3. How to create new account 4. Go to SNU main website again, then click apply online for Undergraduate/Graduate
More informationEuropean Approach for Quality Assurance of Joint Programmes
European Quality Assurance Register for Higher Education European Approach for Quality Assurance of Joint Programmes Seminar on Joint Degrees, 11 July 2014, Zagreb Colin Tück 1. Current
More informationDeveloping Joint Masters Programmes for Europe: lessons from the EUA Joint Masters Project
Developing Joint Masters Programmes for Europe: lessons from the EUA Joint Masters Project BFUG Workshop: Joint Degrees Further Development Stockholm, Sweden 6-7 May 2004 Kate Geddie European University
More informationROYAL REHAB COLLEGE AND THE ENTOURAGE EDUCATION GROUP. UPDATED SCHEDULE OF VET UNITS OF STUDY AND VET TUITION FEES Course Aug 1/2015
UPDATED SCHEDULE OF UNITS OF STUDY AND TUITION FEES Course Aug 1/2015 Course Name: Delivery Mode: BSB50215 Diploma of Business Online DBTEU01 01/08/2015 19/08/2015 31/10/2015 0.25 $4245 $3265 DBTEU02 01/11/2015
More informationUnit Testing with FlexUnit. by John Mason mason@fusionlink.com
Unit Testing with FlexUnit by John Mason mason@fusionlink.com So why Test? - A bad release of code or software will stick in people's minds. - Debugging code is twice as hard as writing the code in the
More informationThe Rise in Mobile Phone Internet Usage by Media Partners
Press Release June 10, 2013 Hakuhodo DY Media Partners As smartphone use spreads, mobile Internet usage time continues to increase. Significantly increased use among 20s, 30s women. HDYMP Institute of
More informationBeyond the Software Life Cycle
Beyond the Software Life Cycle CA-Endevor Facilitates Ad-hoc Job Processing Southern CA Endevor User Group June 2008 Rose A. Sakach Endevor Practice Leader - RSH Consulting, Inc. R.Sakach@RSHConsulting.com
More informationP R E F E I T U R A M U N I C I P A L D E J A R D I M
C O N T R A T O N 7 8 / 2 0 1 4 C o n t r a t o d e P r e s t a ç ã o d e S e r v i ç o s A d v o c a t í c i o s q u e e n t r e s i c e l e b r a m o M u n i c í p i o d e J A R D I M - M S e A IR E
More information