Model Checking for Software Architectures

Size: px
Start display at page:

Download "Model Checking for Software Architectures"

Transcription

1 Model Checking for Softwre Architectures position pper Rdu Mteescu INRIA Rhône-Alpes / VASY 655, venue de l Europe F Montbonnot Sint Mrtin 1

2 Outline Introduction Constructing stte spces Checking correctness requirements Hndling lrge systems Conclusion 2

3 Introduction Softwre Architectures (SA) [Shw-Grln-96] Gross orgniztion of system into elements Protocols for communiction nd dt ccess Functionlity of design elements Architecture Description Lnguges (ADLs) Specify SA formlly Anlyze its structure nd behviour Complex, industril-scle systems need computer-ssisted nlysis methodologies 3

4 Model checking methodology ADL description Correctness requirement Compiler (simultor) Model (stte spce) Model checker Verdict (Yes/No) + Dignostic 4

5 Model checking for ADLs (1/2) WRIGHT [Allen-97] CSP FDR (dedlock detection, refinement) Dynmic WRIGHT [Allen-Douence-Grln-98] Reconfigurtion + stedy-stte behviour Configuror process DARWIN [Mgee-Duly-Eisenbch-Krmer-95] π-clculus + FSP LTSA (LTL properties) 5

6 Model checking for ADLs (2/2) PADL [Abte-Bernrdo-02] Finite repliction + trnsprent routers TwoTowers (equivlence nd model checking) Publish-subscribe [Grln-Khersonsky-Kim-03] π-spce [Chudet-Oquendo-00] ArchWre ADL [Oquendo-Alloui- Cîmpn-Verjus-02] higher-order polydic π-clculus Dynmicity Mobility Evolution 6

7 Constructing stte spces Develop from scrtch n ADL simultor Accurte w.r.t. the opertionl semntics Complex to develop Trnslte the ADL into trget lnguge Esier to develop Reuse the existing tools Trget lnguges LOTOS [ISO-88] nd E-LOTOS [ISO-01] CADPtoolbox ( 7

8 Dynmic process cretion Finite-stte models bound the number of SA element replics!p P (1) P (2) P (10)... LOTOS: process Q := P Q endproc E-LOTOS: pr n:1..10 in P (n) endpr 8

9 Chnnel mobility (1/2) Dynmic topology (π-clculus) P Q R Q b b! P!c b R 9

10 Chnnel mobility (2/2) Sttic topology (LOTOS, E-LOTOS) P [G P,QR ] ( Q [G Q,R ] R ) Q b G Q,R!QtoR!b! G P,QR G Q,R P G P,QR b R G Q,R!RtoP!!c 10

11 Higher-order process hndling Evolvbility higher-order constructs P c!r Q Trnsltion from higher-order to first-order π-clculus [Sngiorgi-01] P c!refr Q R refr 11

12 Checking correctness requirements Temporl logics + mu-clculi Well-developed theory Robust model checkers Optimistion of model checking lgorithms Memory-efficient lgorithms (e.g., on trces) Improvement of user interfces Extension of TLs with higher-level constructs Identifiction of domin-specific properties Interprettion of dignostics w.r.t. ppliction 12

13 Hndling lrge systems Industril-scle systems Mny SA elements (prllel processes) Complex dt types Stte explosion problem Techniques to combt stte explosion On-the-fly verifiction Prtil order reduction Compositionl verifiction Sufficient loclity conditions 13

14 On-the-fly verifiction Incrementl construction of the stte spce initil stte dedlock stte unexplored stte spce OPEN/CAESAR environment [Grvel-98] Generic API for stte spce explortion Powerful librries for grph mnipultion 14

15 Prtil order reduction Independent (prllel) components redundnt interlevings of ctions unobservble ctions τ τ τ b τ b τ b τ reduction τ τ b Tu-confluence reduction [Groote-Pol-00] Preserves brnching equivlence 15

16 Compositionl verifiction Exploit the hierrchicl structure of the SA Construct the stte spces of SA elements Reduce them modulo suitble equivlence reltion Compose them to obtin the globl stte spce P Q SVL environment [Grvel-Lng-01] P Q R P Q R 16

17 Sufficient loclity conditions Prticulr requirements (e.g., no dedlock) Check requirements loclly on SA elements Ensure they hold on the whole SA P cyclic interconnection topology locl dedlock check Q S R Topology-relted sufficient conditions [Bernrdo-Cincrini-Dontiello-01] 17

18 Conclusion Importnt spects of model checking SA Constructing stte spces Checking requirements Hndling lrge systems combine different techniques Clim effective wy to proceed: reuse, enhnce, nd dpt the existing model checking technologies in the frmework of softwre rchitectures 18

Verifying Business Processes using SPIN

Verifying Business Processes using SPIN Verifying Business Proesses using SPIN Wil Jnssen Telemtis Institute (Enshede, The Netherlnds) Rdu Mteesu INRIA Rhône-Alpes / VASY (Montonnot, Frne) Sjouke Muw Eindhoven University of Tehnology (Eindhoven,

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

Assumption Generation for Software Component Verification

Assumption Generation for Software Component Verification Assumption Genertion for Softwre Component Verifiction Dimitr Ginnkopoulou Corin S. Păsărenu RIACS/USRA Kestrel Technologies LLC NASA Ames Reserch Center Moffett Field, CA 94035-1000, USA {dimitr, pcorin}@emil.rc.ns.gov

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

Generating In-Line Monitors For Rabin Automata

Generating In-Line Monitors For Rabin Automata Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec

More information

Outline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)

Outline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4) Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

MONITOR AND CONTROL SOFTWARE FOR GROUND SYSTEMS IN THE DEEP SPACE NETWORK

MONITOR AND CONTROL SOFTWARE FOR GROUND SYSTEMS IN THE DEEP SPACE NETWORK MONITOR AND CONTRO OFTWARE FOR GROUND YTEM IN THE DEEP PACE NETWORK Pul Pechkm Network Control Tsk NAA/ Jet Propulsion bortory July 22,22 ABTRACT NAA s Deep pce Network (DN) is n interntionl network of

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

IFC3 India-Android Application Development

IFC3 India-Android Application Development IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students

More information

Scalable Strong Consistency for Web Applications

Scalable Strong Consistency for Web Applications Sclble Strong Consistency for Web Applictions Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit Amsterdm, The Netherlnds {swmi,gpierre,steen}@cs.vu.nl Abstrct

More information

The Semantics of Graph Programs

The Semantics of Graph Programs The Semntics of Grph Progrms Detlef Plump Deprtment of Computer Science The University of York, UK Sndr Steinert Deprtment of Computer Science The University of York, UK GP (for Grph Progrms) is rule-bsed,

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

In-circuit temporal monitors for runtime verification of reconfigurable designs

In-circuit temporal monitors for runtime verification of reconfigurable designs In-circuit temporl monitors for runtime verifiction of reconfigurble designs Tim Todmn Deprtment of Computing Imperil College London tephn tilkerich Airbus Group Innovtions Willy-Messerschmitt tr., Wyne

More information

Outline Y. Thierry-Mieg Octobre 2008 DDD, SDD and Applications Decision Diagrams for Model-checking: Data Decision Diagrams : Saturation

Outline Y. Thierry-Mieg Octobre 2008 DDD, SDD and Applications Decision Diagrams for Model-checking: Data Decision Diagrams : Saturation Dt Decision Digrms, Set Decision Digrms, And Applictions Ynn Thierry-Mieg 3 Oct 8 Presenttion in Nntes Outline Y. Thierry-Mieg Octobre 8 Decision Digrms for Model-checking: Dt Decision Digrms : A dynmic

More information

On decidability of LTL model checking for process rewrite systems

On decidability of LTL model checking for process rewrite systems Act Informtic (2009) 46:1 28 DOI 10.1007/s00236-008-0082-3 ORIGINAL ARTICLE On decidbility of LTL model checking for process rewrite systems Lur Bozzelli Mojmír Křetínský Vojtěch Řehák Jn Strejček Received:

More information

Gene Expression Programming: A New Adaptive Algorithm for Solving Problems

Gene Expression Programming: A New Adaptive Algorithm for Solving Problems Gene Expression Progrmming: A New Adptive Algorithm for Solving Prolems Cândid Ferreir Deprtmento de Ciêncis Agráris Universidde dos Açores 9701-851 Terr-Chã Angr do Heroísmo, Portugl Complex Systems,

More information

Learning to Search Better than Your Teacher

Learning to Search Better than Your Teacher Ki-Wei Chng University of Illinois t Urbn Chmpign, IL Akshy Krishnmurthy Crnegie Mellon University, Pittsburgh, PA Alekh Agrwl Microsoft Reserch, New York, NY Hl Dumé III University of Mrylnd, College

More information

Goals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing?

Goals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing? Gols of Routing Protocols 10: Inter nd intr AS, RIP, OSPF, GP, Router Architecture Lst Modified: 3/24/2003 2:39:16 PM Find the optiml route Rpid Convergence Robustness Configurble to respond to chnges

More information

ASG Techniques of Adaptivity

ASG Techniques of Adaptivity ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Multi-Scale Modeling of Nano Scale Phenomenon using CUDA based HPC Setup

Multi-Scale Modeling of Nano Scale Phenomenon using CUDA based HPC Setup Multi-Scle Modeling of Nno Scle Phenomenon using CUDA bsed HPC Setup Rohit Pthk nd Stydhr Joshi Acropolis Institute of Technology & Reserch, Indore, Mdhy Prdesh, Indi Shri Vishnv Institute of Technology

More information

License Manager Installation and Setup

License Manager Installation and Setup The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.

More information

Facilitating Rapid Analysis and Decision Making in the Analytical Lab.

Facilitating Rapid Analysis and Decision Making in the Analytical Lab. Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Applying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM)

Applying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM) Applying SDN/OpenFlow in Virtulized LTE to support Distriuted Moility Mngement (DMM) Mortez Krimzdeh, Luc Vltulin, Georgios Krginnis Deprtment of Computer Science nd the Electricl Engineering, University

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to

More information

A new generalized Jacobi Galerkin operational matrix of derivatives: two algorithms for solving fourth-order boundary value problems

A new generalized Jacobi Galerkin operational matrix of derivatives: two algorithms for solving fourth-order boundary value problems Abd-Elhmeed et l. Advnces in Difference Equtions (2016) 2016:22 DOI 10.1186/s13662-016-0753-2 R E S E A R C H Open Access A new generlized Jcobi Glerkin opertionl mtrix of derivtives: two lgorithms for

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Total Data Protection for Sensitive Data Wherever It May Flow

Total Data Protection for Sensitive Data Wherever It May Flow Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

FortiClient (Mac OS X) Release Notes VERSION 5.0.10

FortiClient (Mac OS X) Release Notes VERSION 5.0.10 FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

How To Improve Network Performance

How To Improve Network Performance Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network

More information

Allocation Strategies of Virtual Resources in Cloud-Computing Networks

Allocation Strategies of Virtual Resources in Cloud-Computing Networks RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

The usability study details initial testing of the GIMCF-AHP prototype in a practical MADM task or environment.

The usability study details initial testing of the GIMCF-AHP prototype in a practical MADM task or environment. Interctive Web-bsed Anlyticl Hierrchy Process Group Decision Support System Wddh H. Ftny, The School of Computer Science, the University of Mnchester Abstrct This study dels ith the usbility of ne eb bsed

More information

Modular Generic Verification of LTL Properties for Aspects

Modular Generic Verification of LTL Properties for Aspects Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte

More information

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology

More information

ProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors

ProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors ProfileMe: Hrdwre Support for Instruction-Level Profiling on Out-of-Order Processors Jeffrey Den Jmes E. Hicks Crl A. Wldspurger Willim E. Weihl George Chrysos Digitl Equipment Corportion Abstrct Profile

More information

Database-Backed Program Analysis for Scalable Error Propagation

Database-Backed Program Analysis for Scalable Error Propagation Dtbse-Bcked Progrm Anlysis for Sclble Error Propgtion Cthrin Weiss cthrin.weiss@gmil.com Cindy Rubio-González University of Cliforni, Dvis crubio@ucdvis.edu Ben Liblit University of Wisconsin Mdison liblit@cs.wisc.edu

More information

A Cloud-based Collaborative Video Story Authoring and Sharing Platform

A Cloud-based Collaborative Video Story Authoring and Sharing Platform Chen Wng, et. l. 8 : 69 A Cloud-bsed Collbortive Video Sry Authoring Shring Pltform Chen Wng 1, Rjiv Rnjn 1, Xingmin Zhou 1, Krn Mitr 1, Suhit Sh 1, Meng Meng 1, Dimitrios Georgkopoulos 1, Lizhe Wng 2

More information

Provable Possession and Replication of Data over Cloud Servers

Provable Possession and Replication of Data over Cloud Servers Provble Possession nd Repliction of Dt over Cloud Servers Ayd F.Brsoum nd M.Anwr Hsn Deprtment of Electricl nd Computer Engineering University of Wterloo, Ontrio, Cnd. fekry@engmil.uwterloo.c, hsn@sisr.uwterloo.c

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information

Traffic Rank Based QoS Routing in Wireless Mesh Network

Traffic Rank Based QoS Routing in Wireless Mesh Network Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment

More information

Tool Support for Feature-Oriented Software Development

Tool Support for Feature-Oriented Software Development Tool Support for Feture-Oriented Softwre Development FetureIDE: An Eclipse-Bsed Approch Thoms Leich leich@iti.cs.unimgdeurg.de Sven Apel pel@iti.cs.unimgdeurg.de Lur Mrnitz mrnitz@cs.unimgdeurg.de ABSTRACT

More information

Sigmoid Function Approximation for ANN Implementation in FPGA Devices

Sigmoid Function Approximation for ANN Implementation in FPGA Devices Sigmoid Function Approximtion for ANN Implementtion in FPGA Devices Djll Eddine KHODJA, Aiss KHELDOUN, nd Lrbi REFOUFI () Fculty of Engineering Sciences, University Muhmed Boudif of M sil B.P N 6 Ichebili

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Modeling POMDPs for Generating and Simulating Stock Investment Policies

Modeling POMDPs for Generating and Simulating Stock Investment Policies Modeling POMDPs for Generting nd Simulting Stock Investment Policies Augusto Cesr Espíndol Bff UNIRIO - Dep. Informátic Aplicd Av. Psteur, 458 - Térreo Rio de Jneiro - Brzil ugusto.bff@uniriotec.br Angelo

More information

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19 Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE

More information

COMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials

COMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials COMPUTER SECURITY CS 470 Ctlog Description PREREQUISITE: CS 350. Study of network security rchitectures nd models, cryptogrphy, uthentiction nd uthoriztion protocols, secure ppliction nd systems development,

More information

Orthogonally modeling video structuration and annotation: exploiting the concept of granularity

Orthogonally modeling video structuration and annotation: exploiting the concept of granularity From: I Technicl Report WS-00-08. Compiltion copyright 2000, I (www.i.org). ll rights reserved. Orthogonlly modeling video structurtion nd nnottion: exploiting the concept of grnulrity M. Dums, R. Lozno,M.-C.Fuvet,H.MrtinndP.-C.Scholl

More information

Innovative and applied research on big data platforms of smart heritage

Innovative and applied research on big data platforms of smart heritage Innovtive nd pplied reserch on big dt pltforms of smrt heritge J. Qiu, J. Li, H. Sun * qiujie@thid.cn lijijun@thid.cn sunhuijio@thid.cn KEY WORDS: Smrt heritge, Big dt, Explntion ABSTRACT: Big dt hs huge

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

2m + V ( ˆX) (1) 2. Consider a particle in one dimensions whose Hamiltonian is given by

2m + V ( ˆX) (1) 2. Consider a particle in one dimensions whose Hamiltonian is given by Teoretisk Fysik KTH Advnced QM SI2380), Exercise 8 12 1. 3 Consider prticle in one dimensions whose Hmiltonin is given by Ĥ = ˆP 2 2m + V ˆX) 1) with [ ˆP, ˆX] = i. By clculting [ ˆX, [ ˆX, Ĥ]] prove tht

More information

SEP sesam. Hybrid Backup. #1 for the Entire IT Infrastructure. Global Storage Management

SEP sesam. Hybrid Backup. #1 for the Entire IT Infrastructure. Global Storage Management SEP sesm Hybrid Bckup #1 for the Entire IT Infrstructure Globl Storge Mngement Globl Storge Mngement One Enterprise Bckup Solution SEP sesm is idel for every IT-environment. From smll businesses up to

More information

SCRIBE: A large-scale and decentralized application-level multicast infrastructure

SCRIBE: A large-scale and decentralized application-level multicast infrastructure !! IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 2, NO. 8, OCTOBER 22 1 SCRIBE: A lrge-scle nd decentrlized ppliction-level multicst infrstructure Miguel Cstro, Peter Druschel, Anne-Mrie Kermrrec

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

Regular Repair of Specifications

Regular Repair of Specifications Regulr Repir of Specifictions Michel Benedikt Oxford University michel.enedikt@coml.ox.c.uk Griele Puppis Oxford University griele.puppis@coml.ox.c.uk Cristin Riveros Oxford University cristin.riveros@coml.ox.c.uk

More information

Avoiding the Disk Bottleneck in the Data Domain Deduplication File System

Avoiding the Disk Bottleneck in the Data Domain Deduplication File System Avoiding Dk Bottleneck in Dt Domin Dedupliction File System Benjmin Zhu Dt Domin, Inc. Ki Li Dt Domin, Inc. Princen University Hugo Ptterson Dt Domin, Inc. Abstrct Dk-bsed dedupliction srge hs emerged

More information

Intellio Video System 25

Intellio Video System 25 Intellio Video System 3 Video mngement softwre Min fetures streming Developed for Intellio smrtcmers Multi-megpixel network video recording Amplitude sed udio recording Monitoring 2 30 cmers per worksttion

More information

Linear Programming in Database

Linear Programming in Database 9 Liner Progrmming in Dtse Akir Kwguchi nd Andrew Ngel Deprtment of Computer Science, The City College of New York. New York, New York United Sttes of Americ Keywords: liner progrmming, simple method,

More information

The LENA TM Language Environment Analysis System:

The LENA TM Language Environment Analysis System: FOUNDATION The LENA TM Lnguge Environment Anlysis System: Audio Specifictions of the DLP-0121 Michel Ford, Chrles T. Ber, Dongxin Xu, Umit Ypnel, Shrmi Gry LENA Foundtion, Boulder, CO LTR-03-2 September

More information

Advanced Baseline and Release Management. Ed Taekema

Advanced Baseline and Release Management. Ed Taekema Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Blackbaud The Raiser s Edge

Blackbaud The Raiser s Edge Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com

More information

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system

More information

Reputation management for distributed service-oriented architectures

Reputation management for distributed service-oriented architectures Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-234 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team Numercy cross the Curriculum in Key Stges 3 nd 4 Helpful dvice nd suggested resources from the Leicestershire Secondry Mthemtics Tem 1 Contents pge The development of whole school policy 3 A definition

More information

The CUBE. Thunderbolt and PCIe Expansion

The CUBE. Thunderbolt and PCIe Expansion Trnsform lptop in worksttion in The CUBE TM TM TM Thunderbolt PCIe Expnsion The CUBE mcube re trdemrks of One Stop Systems, Inc. All rights reserved. PCI Express PCIe re trdemrks of PCI-SIG. Thunderbolt

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-56 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Secure routing for structured peer-to-peer overlay networks

Secure routing for structured peer-to-peer overlay networks Secure routing for structured peer-to-peer overly networks Miguel Cstro 1, Peter Druschel 2, Aylvdi Gnesh 1, Antony Rowstron 1 nd Dn S. Wllch 2 1 Microsoft Reserch Ltd., 7 J J Thomson Avenue, Cmbridge,

More information

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management

Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment

More information

High-Speed CRM at SNCF

High-Speed CRM at SNCF High-Speed CRM t SNCF SNCF VFE - Voygeurs Frnce Europe : ril pssenger brnch 100 million journeys in 2005 3.6 billion in turnover (TGV (high speed trins)/coril (trditionl intercity trins)) in 2005 14 million

More information

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509 Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished

More information

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 -

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 - A Sn Mteo County ACCEL Adult-Eduction College nd Creer Eductionl Ledership AB 86 Adult Eduction Consortium Project Mngement Pln - Februry 24, 2014 - This project mngement pln presents ACCEL s process frmework

More information

UNLOCKING TECHNOLOGY IVECO

UNLOCKING TECHNOLOGY IVECO UNLOCKING TECHNOLOGY IVECO IVECO - CONTENTS PPLICTIONS PGE DS136 IVECO 3 DS177 IVECO CN 3 DIGNOSTIC SOCKETS LOCTIONS IVECO 4 GENERL OPERTION 5 6 TIPS & HINTS 15 2 Version: 2.3 July 2011 Copyright 2009

More information

Conference Paper Assignment techniques on Virtual Networks. Performance considerations on large multi-modal networks

Conference Paper Assignment techniques on Virtual Networks. Performance considerations on large multi-modal networks econstor www.econstor.eu Der Open-Access-Publiktionsserver der ZBW Leibniz-Informtionszentrum Wirtschft The Open Access Publiction Server of the ZBW Leibniz Informtion Centre for Economics Jourquin, Brt;

More information

J4.12 REGIONAL HYDROLOGICAL CYCLE AND WEATHER AND CLIMATE IN THE CONTIGUOUS UNITED STATES

J4.12 REGIONAL HYDROLOGICAL CYCLE AND WEATHER AND CLIMATE IN THE CONTIGUOUS UNITED STATES J4.12 REGIONAL HYDROLOGICAL CYCLE AND WEATHER AND CLIMATE IN THE CONTIGUOUS UNITED STATES 1. INTRODUCTION i Hu 1 nd Song Feng Climte nd Bio-Atmospheric Sciences rogrm School of Nturl Resource Sciences

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University

More information

Logical or physical organisation and data independence

Logical or physical organisation and data independence Four FILE STRUCTURES Introduction This chpter is minly concerned with the wy in which file structures re used in document retrievl. Most surveys of file structures ddress themselves to pplictions in dt

More information

. g .,, . . , Applicability of

More information

Visualization of Time-Varying Volumetric Data using Differential Time-Histogram Table

Visualization of Time-Varying Volumetric Data using Differential Time-Histogram Table Volume Grphics (5) E. Gröller, I. Fujishiro (Editors) Visuliztion of Time-Vrying Volumetric Dt using Differentil Time-Histogrm Tble Hmid Younesy, Torsten Möller, Hmish Crr Simon Frser University, Simon

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

Complexity Results in Epistemic Planning

Complexity Results in Epistemic Planning Proceedings of the Twenty-Fourth Interntionl Joint Conference on Artificil Intelligence (IJCAI 2015) Complexity Results in Epistemic Plnning Thoms Bolnder DTU Compute Tech. University of Denmrk Copenhgen,

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Network Architecture & Topology

Network Architecture & Topology Network Architecture & Topology Coleman Kane Coleman.Kane@ge.com August 25, 2014 Cyber Defense Overview Network Architecture & Topology 1 / 12 For the sake of this course, we will focus on switched (or

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Using CrowdSourcing for Data Analytics

Using CrowdSourcing for Data Analytics Using CrowdSouring for Dt Anlytis Hetor Gri-Molin (work with Steven Whng, Peter Lofgren, Adity Prmeswrn nd others) Stnford University 1 Big Dt Anlytis CrowdSouring 1 CrowdSouring 3 Rel World Exmples Ctegorizing

More information