Model Checking for Software Architectures
|
|
- Marybeth Davidson
- 8 years ago
- Views:
Transcription
1 Model Checking for Softwre Architectures position pper Rdu Mteescu INRIA Rhône-Alpes / VASY 655, venue de l Europe F Montbonnot Sint Mrtin 1
2 Outline Introduction Constructing stte spces Checking correctness requirements Hndling lrge systems Conclusion 2
3 Introduction Softwre Architectures (SA) [Shw-Grln-96] Gross orgniztion of system into elements Protocols for communiction nd dt ccess Functionlity of design elements Architecture Description Lnguges (ADLs) Specify SA formlly Anlyze its structure nd behviour Complex, industril-scle systems need computer-ssisted nlysis methodologies 3
4 Model checking methodology ADL description Correctness requirement Compiler (simultor) Model (stte spce) Model checker Verdict (Yes/No) + Dignostic 4
5 Model checking for ADLs (1/2) WRIGHT [Allen-97] CSP FDR (dedlock detection, refinement) Dynmic WRIGHT [Allen-Douence-Grln-98] Reconfigurtion + stedy-stte behviour Configuror process DARWIN [Mgee-Duly-Eisenbch-Krmer-95] π-clculus + FSP LTSA (LTL properties) 5
6 Model checking for ADLs (2/2) PADL [Abte-Bernrdo-02] Finite repliction + trnsprent routers TwoTowers (equivlence nd model checking) Publish-subscribe [Grln-Khersonsky-Kim-03] π-spce [Chudet-Oquendo-00] ArchWre ADL [Oquendo-Alloui- Cîmpn-Verjus-02] higher-order polydic π-clculus Dynmicity Mobility Evolution 6
7 Constructing stte spces Develop from scrtch n ADL simultor Accurte w.r.t. the opertionl semntics Complex to develop Trnslte the ADL into trget lnguge Esier to develop Reuse the existing tools Trget lnguges LOTOS [ISO-88] nd E-LOTOS [ISO-01] CADPtoolbox ( 7
8 Dynmic process cretion Finite-stte models bound the number of SA element replics!p P (1) P (2) P (10)... LOTOS: process Q := P Q endproc E-LOTOS: pr n:1..10 in P (n) endpr 8
9 Chnnel mobility (1/2) Dynmic topology (π-clculus) P Q R Q b b! P!c b R 9
10 Chnnel mobility (2/2) Sttic topology (LOTOS, E-LOTOS) P [G P,QR ] ( Q [G Q,R ] R ) Q b G Q,R!QtoR!b! G P,QR G Q,R P G P,QR b R G Q,R!RtoP!!c 10
11 Higher-order process hndling Evolvbility higher-order constructs P c!r Q Trnsltion from higher-order to first-order π-clculus [Sngiorgi-01] P c!refr Q R refr 11
12 Checking correctness requirements Temporl logics + mu-clculi Well-developed theory Robust model checkers Optimistion of model checking lgorithms Memory-efficient lgorithms (e.g., on trces) Improvement of user interfces Extension of TLs with higher-level constructs Identifiction of domin-specific properties Interprettion of dignostics w.r.t. ppliction 12
13 Hndling lrge systems Industril-scle systems Mny SA elements (prllel processes) Complex dt types Stte explosion problem Techniques to combt stte explosion On-the-fly verifiction Prtil order reduction Compositionl verifiction Sufficient loclity conditions 13
14 On-the-fly verifiction Incrementl construction of the stte spce initil stte dedlock stte unexplored stte spce OPEN/CAESAR environment [Grvel-98] Generic API for stte spce explortion Powerful librries for grph mnipultion 14
15 Prtil order reduction Independent (prllel) components redundnt interlevings of ctions unobservble ctions τ τ τ b τ b τ b τ reduction τ τ b Tu-confluence reduction [Groote-Pol-00] Preserves brnching equivlence 15
16 Compositionl verifiction Exploit the hierrchicl structure of the SA Construct the stte spces of SA elements Reduce them modulo suitble equivlence reltion Compose them to obtin the globl stte spce P Q SVL environment [Grvel-Lng-01] P Q R P Q R 16
17 Sufficient loclity conditions Prticulr requirements (e.g., no dedlock) Check requirements loclly on SA elements Ensure they hold on the whole SA P cyclic interconnection topology locl dedlock check Q S R Topology-relted sufficient conditions [Bernrdo-Cincrini-Dontiello-01] 17
18 Conclusion Importnt spects of model checking SA Constructing stte spces Checking requirements Hndling lrge systems combine different techniques Clim effective wy to proceed: reuse, enhnce, nd dpt the existing model checking technologies in the frmework of softwre rchitectures 18
Verifying Business Processes using SPIN
Verifying Business Proesses using SPIN Wil Jnssen Telemtis Institute (Enshede, The Netherlnds) Rdu Mteesu INRIA Rhône-Alpes / VASY (Montonnot, Frne) Sjouke Muw Eindhoven University of Tehnology (Eindhoven,
More informationHillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
More informationAssumption Generation for Software Component Verification
Assumption Genertion for Softwre Component Verifiction Dimitr Ginnkopoulou Corin S. Păsărenu RIACS/USRA Kestrel Technologies LLC NASA Ames Reserch Center Moffett Field, CA 94035-1000, USA {dimitr, pcorin}@emil.rc.ns.gov
More informationVirtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
More informationSyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k
SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce
More informationSource Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix
Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt
More informationGenerating In-Line Monitors For Rabin Automata
Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec
More informationOutline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)
Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationMONITOR AND CONTROL SOFTWARE FOR GROUND SYSTEMS IN THE DEEP SPACE NETWORK
MONITOR AND CONTRO OFTWARE FOR GROUND YTEM IN THE DEEP PACE NETWORK Pul Pechkm Network Control Tsk NAA/ Jet Propulsion bortory July 22,22 ABTRACT NAA s Deep pce Network (DN) is n interntionl network of
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More informationIFC3 India-Android Application Development
IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students
More informationScalable Strong Consistency for Web Applications
Sclble Strong Consistency for Web Applictions Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit Amsterdm, The Netherlnds {swmi,gpierre,steen}@cs.vu.nl Abstrct
More informationThe Semantics of Graph Programs
The Semntics of Grph Progrms Detlef Plump Deprtment of Computer Science The University of York, UK Sndr Steinert Deprtment of Computer Science The University of York, UK GP (for Grph Progrms) is rule-bsed,
More informationSoftware Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning
Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology
More informationIn-circuit temporal monitors for runtime verification of reconfigurable designs
In-circuit temporl monitors for runtime verifiction of reconfigurble designs Tim Todmn Deprtment of Computing Imperil College London tephn tilkerich Airbus Group Innovtions Willy-Messerschmitt tr., Wyne
More informationOutline Y. Thierry-Mieg Octobre 2008 DDD, SDD and Applications Decision Diagrams for Model-checking: Data Decision Diagrams : Saturation
Dt Decision Digrms, Set Decision Digrms, And Applictions Ynn Thierry-Mieg 3 Oct 8 Presenttion in Nntes Outline Y. Thierry-Mieg Octobre 8 Decision Digrms for Model-checking: Dt Decision Digrms : A dynmic
More informationOn decidability of LTL model checking for process rewrite systems
Act Informtic (2009) 46:1 28 DOI 10.1007/s00236-008-0082-3 ORIGINAL ARTICLE On decidbility of LTL model checking for process rewrite systems Lur Bozzelli Mojmír Křetínský Vojtěch Řehák Jn Strejček Received:
More informationGene Expression Programming: A New Adaptive Algorithm for Solving Problems
Gene Expression Progrmming: A New Adptive Algorithm for Solving Prolems Cândid Ferreir Deprtmento de Ciêncis Agráris Universidde dos Açores 9701-851 Terr-Chã Angr do Heroísmo, Portugl Complex Systems,
More informationLearning to Search Better than Your Teacher
Ki-Wei Chng University of Illinois t Urbn Chmpign, IL Akshy Krishnmurthy Crnegie Mellon University, Pittsburgh, PA Alekh Agrwl Microsoft Reserch, New York, NY Hl Dumé III University of Mrylnd, College
More informationGoals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing?
Gols of Routing Protocols 10: Inter nd intr AS, RIP, OSPF, GP, Router Architecture Lst Modified: 3/24/2003 2:39:16 PM Find the optiml route Rpid Convergence Robustness Configurble to respond to chnges
More informationASG Techniques of Adaptivity
ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationMulti-Scale Modeling of Nano Scale Phenomenon using CUDA based HPC Setup
Multi-Scle Modeling of Nno Scle Phenomenon using CUDA bsed HPC Setup Rohit Pthk nd Stydhr Joshi Acropolis Institute of Technology & Reserch, Indore, Mdhy Prdesh, Indi Shri Vishnv Institute of Technology
More informationLicense Manager Installation and Setup
The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.
More informationFacilitating Rapid Analysis and Decision Making in the Analytical Lab.
Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires
More informationWEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER
Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey
More informationTITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING
TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationApplying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM)
Applying SDN/OpenFlow in Virtulized LTE to support Distriuted Moility Mngement (DMM) Mortez Krimzdeh, Luc Vltulin, Georgios Krginnis Deprtment of Computer Science nd the Electricl Engineering, University
More informationWelch Allyn CardioPerfect Workstation Installation Guide
Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to
More informationA new generalized Jacobi Galerkin operational matrix of derivatives: two algorithms for solving fourth-order boundary value problems
Abd-Elhmeed et l. Advnces in Difference Equtions (2016) 2016:22 DOI 10.1186/s13662-016-0753-2 R E S E A R C H Open Access A new generlized Jcobi Glerkin opertionl mtrix of derivtives: two lgorithms for
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationTotal Data Protection for Sensitive Data Wherever It May Flow
Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationHow To Improve Network Performance
Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network
More informationAllocation Strategies of Virtual Resources in Cloud-Computing Networks
RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,
More informationDEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.
Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER
More informationThe usability study details initial testing of the GIMCF-AHP prototype in a practical MADM task or environment.
Interctive Web-bsed Anlyticl Hierrchy Process Group Decision Support System Wddh H. Ftny, The School of Computer Science, the University of Mnchester Abstrct This study dels ith the usbility of ne eb bsed
More informationModular Generic Verification of LTL Properties for Aspects
Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte
More informationAN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS
AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology
More informationProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors
ProfileMe: Hrdwre Support for Instruction-Level Profiling on Out-of-Order Processors Jeffrey Den Jmes E. Hicks Crl A. Wldspurger Willim E. Weihl George Chrysos Digitl Equipment Corportion Abstrct Profile
More informationDatabase-Backed Program Analysis for Scalable Error Propagation
Dtbse-Bcked Progrm Anlysis for Sclble Error Propgtion Cthrin Weiss cthrin.weiss@gmil.com Cindy Rubio-González University of Cliforni, Dvis crubio@ucdvis.edu Ben Liblit University of Wisconsin Mdison liblit@cs.wisc.edu
More informationA Cloud-based Collaborative Video Story Authoring and Sharing Platform
Chen Wng, et. l. 8 : 69 A Cloud-bsed Collbortive Video Sry Authoring Shring Pltform Chen Wng 1, Rjiv Rnjn 1, Xingmin Zhou 1, Krn Mitr 1, Suhit Sh 1, Meng Meng 1, Dimitrios Georgkopoulos 1, Lizhe Wng 2
More informationProvable Possession and Replication of Data over Cloud Servers
Provble Possession nd Repliction of Dt over Cloud Servers Ayd F.Brsoum nd M.Anwr Hsn Deprtment of Electricl nd Computer Engineering University of Wterloo, Ontrio, Cnd. fekry@engmil.uwterloo.c, hsn@sisr.uwterloo.c
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationConcept Formation Using Graph Grammars
Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015
More informationTraffic Rank Based QoS Routing in Wireless Mesh Network
Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment
More informationTool Support for Feature-Oriented Software Development
Tool Support for Feture-Oriented Softwre Development FetureIDE: An Eclipse-Bsed Approch Thoms Leich leich@iti.cs.unimgdeurg.de Sven Apel pel@iti.cs.unimgdeurg.de Lur Mrnitz mrnitz@cs.unimgdeurg.de ABSTRACT
More informationSigmoid Function Approximation for ANN Implementation in FPGA Devices
Sigmoid Function Approximtion for ANN Implementtion in FPGA Devices Djll Eddine KHODJA, Aiss KHELDOUN, nd Lrbi REFOUFI () Fculty of Engineering Sciences, University Muhmed Boudif of M sil B.P N 6 Ichebili
More informationNetwork Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More informationModeling POMDPs for Generating and Simulating Stock Investment Policies
Modeling POMDPs for Generting nd Simulting Stock Investment Policies Augusto Cesr Espíndol Bff UNIRIO - Dep. Informátic Aplicd Av. Psteur, 458 - Térreo Rio de Jneiro - Brzil ugusto.bff@uniriotec.br Angelo
More informationKofax Reporting. Administrator's Guide 2.0.0 2013-09-19
Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE
More informationCOMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials
COMPUTER SECURITY CS 470 Ctlog Description PREREQUISITE: CS 350. Study of network security rchitectures nd models, cryptogrphy, uthentiction nd uthoriztion protocols, secure ppliction nd systems development,
More informationOrthogonally modeling video structuration and annotation: exploiting the concept of granularity
From: I Technicl Report WS-00-08. Compiltion copyright 2000, I (www.i.org). ll rights reserved. Orthogonlly modeling video structurtion nd nnottion: exploiting the concept of grnulrity M. Dums, R. Lozno,M.-C.Fuvet,H.MrtinndP.-C.Scholl
More informationInnovative and applied research on big data platforms of smart heritage
Innovtive nd pplied reserch on big dt pltforms of smrt heritge J. Qiu, J. Li, H. Sun * qiujie@thid.cn lijijun@thid.cn sunhuijio@thid.cn KEY WORDS: Smrt heritge, Big dt, Explntion ABSTRACT: Big dt hs huge
More informationQoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification
C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More information2m + V ( ˆX) (1) 2. Consider a particle in one dimensions whose Hamiltonian is given by
Teoretisk Fysik KTH Advnced QM SI2380), Exercise 8 12 1. 3 Consider prticle in one dimensions whose Hmiltonin is given by Ĥ = ˆP 2 2m + V ˆX) 1) with [ ˆP, ˆX] = i. By clculting [ ˆX, [ ˆX, Ĥ]] prove tht
More informationSEP sesam. Hybrid Backup. #1 for the Entire IT Infrastructure. Global Storage Management
SEP sesm Hybrid Bckup #1 for the Entire IT Infrstructure Globl Storge Mngement Globl Storge Mngement One Enterprise Bckup Solution SEP sesm is idel for every IT-environment. From smll businesses up to
More informationSCRIBE: A large-scale and decentralized application-level multicast infrastructure
!! IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 2, NO. 8, OCTOBER 22 1 SCRIBE: A lrge-scle nd decentrlized ppliction-level multicst infrstructure Miguel Cstro, Peter Druschel, Anne-Mrie Kermrrec
More informationBasic Analysis of Autarky and Free Trade Models
Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently
More informationRegular Repair of Specifications
Regulr Repir of Specifictions Michel Benedikt Oxford University michel.enedikt@coml.ox.c.uk Griele Puppis Oxford University griele.puppis@coml.ox.c.uk Cristin Riveros Oxford University cristin.riveros@coml.ox.c.uk
More informationAvoiding the Disk Bottleneck in the Data Domain Deduplication File System
Avoiding Dk Bottleneck in Dt Domin Dedupliction File System Benjmin Zhu Dt Domin, Inc. Ki Li Dt Domin, Inc. Princen University Hugo Ptterson Dt Domin, Inc. Abstrct Dk-bsed dedupliction srge hs emerged
More informationIntellio Video System 25
Intellio Video System 3 Video mngement softwre Min fetures streming Developed for Intellio smrtcmers Multi-megpixel network video recording Amplitude sed udio recording Monitoring 2 30 cmers per worksttion
More informationLinear Programming in Database
9 Liner Progrmming in Dtse Akir Kwguchi nd Andrew Ngel Deprtment of Computer Science, The City College of New York. New York, New York United Sttes of Americ Keywords: liner progrmming, simple method,
More informationThe LENA TM Language Environment Analysis System:
FOUNDATION The LENA TM Lnguge Environment Anlysis System: Audio Specifictions of the DLP-0121 Michel Ford, Chrles T. Ber, Dongxin Xu, Umit Ypnel, Shrmi Gry LENA Foundtion, Boulder, CO LTR-03-2 September
More informationAdvanced Baseline and Release Management. Ed Taekema
Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationBlackbaud The Raiser s Edge
Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com
More informationTHE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION
KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system
More informationReputation management for distributed service-oriented architectures
Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-234 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationNumeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team
Numercy cross the Curriculum in Key Stges 3 nd 4 Helpful dvice nd suggested resources from the Leicestershire Secondry Mthemtics Tem 1 Contents pge The development of whole school policy 3 A definition
More informationThe CUBE. Thunderbolt and PCIe Expansion
Trnsform lptop in worksttion in The CUBE TM TM TM Thunderbolt PCIe Expnsion The CUBE mcube re trdemrks of One Stop Systems, Inc. All rights reserved. PCI Express PCIe re trdemrks of PCI-SIG. Thunderbolt
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-56 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationSecure routing for structured peer-to-peer overlay networks
Secure routing for structured peer-to-peer overly networks Miguel Cstro 1, Peter Druschel 2, Aylvdi Gnesh 1, Antony Rowstron 1 nd Dn S. Wllch 2 1 Microsoft Reserch Ltd., 7 J J Thomson Avenue, Cmbridge,
More informationValue Function Approximation using Multiple Aggregation for Multiattribute Resource Management
Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment
More informationHigh-Speed CRM at SNCF
High-Speed CRM t SNCF SNCF VFE - Voygeurs Frnce Europe : ril pssenger brnch 100 million journeys in 2005 3.6 billion in turnover (TGV (high speed trins)/coril (trditionl intercity trins)) in 2005 14 million
More informationRevisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509
Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished
More informationSan Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 -
A Sn Mteo County ACCEL Adult-Eduction College nd Creer Eductionl Ledership AB 86 Adult Eduction Consortium Project Mngement Pln - Februry 24, 2014 - This project mngement pln presents ACCEL s process frmework
More informationUNLOCKING TECHNOLOGY IVECO
UNLOCKING TECHNOLOGY IVECO IVECO - CONTENTS PPLICTIONS PGE DS136 IVECO 3 DS177 IVECO CN 3 DIGNOSTIC SOCKETS LOCTIONS IVECO 4 GENERL OPERTION 5 6 TIPS & HINTS 15 2 Version: 2.3 July 2011 Copyright 2009
More informationConference Paper Assignment techniques on Virtual Networks. Performance considerations on large multi-modal networks
econstor www.econstor.eu Der Open-Access-Publiktionsserver der ZBW Leibniz-Informtionszentrum Wirtschft The Open Access Publiction Server of the ZBW Leibniz Informtion Centre for Economics Jourquin, Brt;
More informationJ4.12 REGIONAL HYDROLOGICAL CYCLE AND WEATHER AND CLIMATE IN THE CONTIGUOUS UNITED STATES
J4.12 REGIONAL HYDROLOGICAL CYCLE AND WEATHER AND CLIMATE IN THE CONTIGUOUS UNITED STATES 1. INTRODUCTION i Hu 1 nd Song Feng Climte nd Bio-Atmospheric Sciences rogrm School of Nturl Resource Sciences
More informationBypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems
Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University
More informationLogical or physical organisation and data independence
Four FILE STRUCTURES Introduction This chpter is minly concerned with the wy in which file structures re used in document retrievl. Most surveys of file structures ddress themselves to pplictions in dt
More informationVisualization of Time-Varying Volumetric Data using Differential Time-Histogram Table
Volume Grphics (5) E. Gröller, I. Fujishiro (Editors) Visuliztion of Time-Vrying Volumetric Dt using Differentil Time-Histogrm Tble Hmid Younesy, Torsten Möller, Hmish Crr Simon Frser University, Simon
More informationDecision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
More informationComplexity Results in Epistemic Planning
Proceedings of the Twenty-Fourth Interntionl Joint Conference on Artificil Intelligence (IJCAI 2015) Complexity Results in Epistemic Plnning Thoms Bolnder DTU Compute Tech. University of Denmrk Copenhgen,
More informationCorporate Compliance vs. Enterprise-Wide Risk Management
Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationNetwork Architecture & Topology
Network Architecture & Topology Coleman Kane Coleman.Kane@ge.com August 25, 2014 Cyber Defense Overview Network Architecture & Topology 1 / 12 For the sake of this course, we will focus on switched (or
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationUsing CrowdSourcing for Data Analytics
Using CrowdSouring for Dt Anlytis Hetor Gri-Molin (work with Steven Whng, Peter Lofgren, Adity Prmeswrn nd others) Stnford University 1 Big Dt Anlytis CrowdSouring 1 CrowdSouring 3 Rel World Exmples Ctegorizing
More information