Modular Generic Verification of LTL Properties for Aspects

Size: px
Start display at page:

Download "Modular Generic Verification of LTL Properties for Aspects"

Transcription

1 Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ABSTRACT Aspects re seprte code modules tht cn e ound ( woven ) to se progrm t joinpoints to provide n ugmented progrm. A novel pproch is defined to verify tht n spect stte mchine will provide desired properties whenever it is woven over se stte mchine tht stisfies the ssumptions of the spect. A single stte mchine is constructed using the tleu of the liner temporl logic (LTL) description of the ssumptions, description of the joinpoints, nd the stte mchine of the spect code. A theorem is shown tht if the constructed mchine stisfies the desired properties, so will n ugmented stte mchine using ny se mchine tht stisfies the ssumptions. The theorem is stted nd shown for ssumptions nd properties given in LTL, for somewht restricted form of joinpoint description, nd for spect code tht ends in sttes lredy rechle in the se stte mchine. A lnguge-sed description of spects, s in AspectJ, cn e converted to stte mchine version using existing tools, thus providing generic modulr verifiction of code-level spects. 1. INTRODUCTION 1.1 Aspect-Oriented Progrmming The spect-oriented pproch to softwre development is one in which concerns tht cut cross mny prts of the system re encpsulted in seprte modules clled spects. For exmple, when security or logging re encpsulted in n spect, this spect contins oth the code ssocited with the concern, clled dvice, nd description of when this dvice should run, clled pointcut descriptor. The pointcut descriptor identifies those points in the execution of progrm t which the dvice should e invoked. The comintion of some se progrm with n spect (or in generl, collection of spects), is termed n ugmented progrm. 1.2 Forml Verifiction In this work we re concerned with generic forml verifiction of spects reltive to specifiction. The specifiction of n spect consists of ssumptions out ny se progrm to which the spect cn resonly e woven, nd desired properties intended to hold for the ugmented progrm. We view oth se progrms nd spect code s nondeterministic finite stte mchines, in which prticulr computtions re relized s infinite sequences of sttes within the mchine. For oth ssumptions nd desired properties to e verified we consider formuls written in liner temporl logic (LTL). An LTL formul consists of pth formul using temporl quntifiers nd logicl comintions of tomic propositions, prefixed y single (usully implicit) universl pth quntifier. The tomic propositions in formul refer to the lels of sttes in finite stte mchine; temporl quntifiers specify when these ssertions out sttes must e true. The universl pth quntifier requires tht, in order for some initil stte to stisfy n LTL ssertion, ll infinite pths from tht stte must stisfy the pth formul. In generl, stte mchine lso includes firness constrint, nd only fir pths re considered. 1.3 Modulr Aspectul Verifiction It is cler tht given se progrm, collection of spects with their pointcut descriptors nd dvice, nd system for weving together these components to produce stnd-lone ugmented progrm, we cn verify properties of this ugmented system using the usul model checking techniques. Such weving involves dding edges from joinpoint sttes of the se progrm to the initil sttes of the dvice, nd from the sttes fter n dvice segment to sttes where se progrm sttements re executed. It would e preferle, however, if we could employ modulr technique in which the spect cn e considered seprtely from the se progrm. This would llow us to: otin verifiction results tht hold for prticulr spect with ny se progrm from some clss of progrms, rther thn for only one se progrm in prticulr; use the results to reson out the ppliction of spects to se progrms with multiple evolving stte mchines descriing chnging configurtions during execution, or to other se systems not menle to model checking; nd void model checking ugmented systems, which my e significntly lrger thn their se systems, nd whose unknown ehvior my resist strction.

2 The second point ove reltes to generl oject-oriented progrms tht crete new instnces of clsses (ojects) with ssocited stte mchine components. Often, the ssumption of n spect out the key properties of those se stte mchines to which it my e woven cn indeed e shown to hold for every possile mchine tht corresponds to n oject configurtion of progrm. For exmple, it my involve so-clled clss invrint, provle y resoning directly on clss declrtions, s in [1]. This point nd more detils on the connections etween code-sed spects (s in AspectJ) nd the stte mchine versions seen here re discussed in Section 5. This prolem of creting single generic model tht cn represent ny possile ugmented progrm for n spect woven over some clss of se progrms is especilly difficult ecuse of the spect-oriented notion of oliviousness: se progrms re generlly unwre of spects dvising them, nd hve no control over when or how they re dvised. There re no explicit mrkers for the trnsfer of control from se to dvice code, nor re there gurntees out if or where dvice will return control to the se progrm. 1.4 Results In this pper we show how to verify once-nd-for-ll tht for ny se stte mchine stisfying the ssumptions of the spect, nd for weving tht dds the spect dvice s indicted in the joinpoint description, the resulting ugmented stte mchine is gurnteed to stisfy the desired properties given in the specifiction. A single generic stte mchine is constructed from the tleu of the ssumption, the pointcut descriptor, nd the dvice stte mchine, nd verified for the desired property. Then, when prticulr se progrm is to e woven with the spect, it is sufficient to estlish tht the se stte mchine stisfies the ssumption. Thus the entire ugmented progrm never hs to e model checked, chieving true modulrity nd genericity in the proof. This pproch is especilly pproprite for spects intended to e reused over mny se progrms, e.g., those in lirries or middlewre components. LTL model checking is sed on creting tleu stte mchine utomton tht ccepts exctly those computtions tht stisfy the property to e verified. Usully, the negtion of this mchine is then composed s cross-product with the model to e checked. A counter-exmple is produced when the composed system contins some infinite pth, nd the property is stisfied for the model when the cross-product hs no such pths. Here we use the tleu of the ssumption in unique wy, s the sis of the generic model to e checked for the desired property. It represents ny se mchine stisfying the ssumption, ecuse the execution sequences of the se progrm cn e strcted y sequences in the tleu. For the soundness theorem presented in Section 4, the spects treted re ssumed to e wekly invsive, s defined in [7]. This mens tht when dvice hs completed executing, the system continues from stte tht ws lredy rechle in the originl se progrm (perhps for different inputs or ctions of the environment). Mny spects fll into this ctegory, including specttive spects tht never modify the stte of the se system (logging is good exmple), nd regultive spects tht only restrict the rechle stte spce (for exmple, spects implementing security checks). Also wekly invsive would e n spect to enforce trnsctionl requirements, which might roll ck series of chnges so tht the system returns to the stte it ws in efore they were mde. Even discount policy spect tht reduces the price on certin items in retil system is wekly invsive, since the originl price given s input could hve een the discounted one. Additionlly, we ssume tht ny executions of n ugmented progrm tht infinitely often include sttes resulting from spect dvice will e fir (nd thus must e considered for correctness purposes). The version here does not tret multiple spects or joinpoints influenced y the introduction of dvice, lthough the pproch cn e expnded to tret such cses s well. In the following section, needed terms nd constructs re defined. Section 3 presents the lgorithm, nd Section 4 gives proof of soundness in the wekly invsive spect cse. This section lso gives n exmple. Section 5 detils works relted to the result here, nd is followed y the conclusion. 2. DEFINITIONS 2.1 LTL Tleux Intuitively, the tleu of n LTL foruml f is stte mchine whose fir infinite pths re exctly ll those pths which stisfy the formul f. This intuition will e relized formlly in Theorem 1 elow. In the context of performing model checking to verify stisfction of n LTL property, tleu is constructed for the negtion of tht property, in order to cpture ll possile computtions tht would cuse mchine not to stisfy the formul in question. It is importnt to stress tht here we use the tleu for the originl non-negted formul. Nevertheless, ecuse of the use of tleux y LTL model checking tools, modules to perform the construction of formul s tleu re ville. For explortory purposes, the uthors hve used the trnsltor module of NuSMV [10], which produces (tleu) finite stte mchine from given LTL formul. We define T f, the tleu for LTL pth formul f, s given in Model Checking [3] in the section on Symolic LTL Model Checking (6.7). In this construction, the originl formul is decomposed into the set of elementry formuls it contins, where ll other temporl opertors, such s from now on (G) nd eventully (F), re expressed in terms of next (X) nd strong until (U). Ech stte in the tleu is suset of these elementry formuls, nd the pth reltion etween these sttes is defined y mens of function st(g), which cptures the set of sttes in which suformul g of f is stisfied. We denote T f = (S T, S0 T, R T, L T, F T ), where S T is the set of sttes; S0 T is the set of initil sttes, R T is the trnsition reltion, L T is the leling function, nd F T is the set of fir stte sets. For ese of discussion, we clrify the definition s follows:

3 Define S T 0, where for χ = Af, we hve T f = χ: S T 0 = st(f) Define F T, where ny fir pth in T f must visit ech set in F T infinitely mny times: F T = {st(( (g U h)) h) g U h is suformul of f} This firness constrint gurntees tht oligtions of the form g U h re fulfilled, either y visiting stte in st(h) infinitely often, or y infinitely often visiting stte outside of st(g U h), which cn only e reched y going vi st(h) ccording to the construction of the pth reltion (not detiled here). Two notle properties of T f will e used elow. First, if AP f is the set of tomic propositions in f, then L T : S P(AP f ) tht is, the lels of the sttes in the tleu will include sets of the tomic propositions ppering in f. A stte in ny mchine is given prticulr lel if nd only if tht tomic proposition is true in tht stte. The second interesting feture is min theorem from the discussion in [3]: Definition 1. For pth π, let lel(π) e the sequence of lels (susets of AP ) of the sttes of π. For such sequence l = l 0, l 1,... nd set Q, let l Q = m 0, m 1,... where for ech i 0, m i = l i Q. Definition 2. Sret A is the set of return sttes of A, where Sret A S A nd for ny stte s Sret, A s hs no outgoing edges. 2.3 Pointcuts We do not give prescriptive definition for pointcut descriptors here; in prctice pointcut descriptions might tke numer of forms. However, we require tht descriptors operte in the following mnner: Definition 3. Given pointcut descriptor ρ over tomic propositions AP nd finite sequence l of lels (susets of AP ), we cn sk whether or not the end of l is mtched y ρ, written l ρ. A resonle choice for descriing pointcuts might e LTL pth formuls contining only pst temporl opertors. For exmple, the descriptor ρ 1 = Y Y Y would mtch sequences ending with stte where is true, preceded y, preceded y nother (opertor Y is the pst nlogue of X). Other lnguges could e imgined, for exmple regulr expressions, where ρ 2 = true might e equivlent to ρ 1. The use of regulr expressions over utomt is populr in industril specifiction lnguges nd hs een exmined in forml comintion with LTL for exmple in [2]. 2.4 Specifictions In ddition to its dvice, in the form of stte mchine A, nd pointcut, descried y ρ, n spect is considered to hve two pieces of forml specifiction: Theorem 1. Given T f, for ny Kripke structure M, for ll fir pths π in M, if M, π = f then there exists fir pth π in T f such tht π strts in S0 T nd lel(π ) APf = lel(π). Tht is, for ny possile computtion of M stisfying formul f, there is pth in the tleu of f which mtches the lels within AP f long the sttes of tht computtion. In the lgorithm of Section 3, we restrict the tleu to its rechle component. Such restriction does not ffect the result of this theorem, since ll rechle pths re preserved, ut is necessry in order to chieve useful results. This follows from the oservtion tht the tleu for the negtion of formul hs precisely the sme sttes nd trnsition reltion, ut the complementry set of initil sttes. Thus, ny unrechle portion of the tleu is lile to contin exctly those ehviors which violte the formul of interest. Finlly, for χ = Af, define T χ = T f s convenient nottion ( tleu cn only e constructed for pth formul). 2.2 Aspects An spect mchine A = (S A, S A 0, S A ret, R A, L A) over tomic propositions AP is defined s usul for mchine with no firness constrint, with the following ddition: Formul ψ expresses the ssumptions mde y the spect out ny se mchine to which it will e woven. This ψ is thus requirement to e met y ny such mchine. Formul φ expresses the desired result to e stisfied y ny ugmented mchine uilt y weving this spect with conforming se mchine. In other words, φ is the gurntee of the spect. 2.5 Weving Weving is the process of comining se mchine with some spect ccording to prticulr pointcut descriptor; the result is n ugmented mchine tht includes the dvice of the spect. The weving lgorithm hs the following inputs: spect mchine A = (S A, S A 0, S A ret, R A, L A) over AP, pointcut ρ over AP, nd se mchine B = (S B, S B 0, R B, L B, F B) over AP B AP. And it produces s output: ugmented mchine e B = (S eb, S e B 0, R eb, L eb, F eb ).

4 The weving is performed in two steps. First we construct from the se mchine B new stte mchine B ρ which is pointcut-redy for ρ, wherein ech stte either definitely is or is not mtched y ρ. Then we use B ρ nd A to uild the finl ugmented mchine e B. M M ρ This two-step division of the weving process mens tht the lgorithm cnnot hndle numer of prolemtic cses: when the pointcut descriptor mtches dvice sttes, nd thus dvice should e inserted on other dvice; when the ddition of dvice sttes cretes new mtching pointcut in the computtion, nd dvice should e inserted; nd when the ddition of dvice sttes cuses loction tht once mtched pointcut selector not to mtch it ny longer. Proper hndling of these scenrios is the suject of ongoing work Constructing Pointcut-Redy Mchine Pointcut-redy mchine B ρ = (S B ρ, S0 Bρ, R B ρ, L B ρ, F B ρ) is mchine in which unwinding of certin pths hs een performed, so tht we cn seprte pths which mtch pointcut descriptor ρ from those tht do not. The pointcut-redy mchine contins sttes with new lel, pointcut, tht indictes exctly those sttes where the descriptor hs een mtched. This mchine must meet the following requirements: S B ρ S B S Bρ 0 = S B 0 pointcut Figure 1: Constructing pointcut-redy mchine M ρ for the given M nd LTL pst formul pointcut descriptor ρ = Y Y Y. (s, t) R eb 8 (s, t) R B ρ s = pointcut if s, t S B ρ >< (s, t) R A if s, t S A s = pointcut t S0 A L B ρ(s) AP = L A(t) if s S B ρ, t S A >: s Sret A L A(s) = L B ρ(t) AP if s S A, t S B ρ Note tht this reltionship is if nd only if. In words, the pth reltion contins precisely ll the edges from the pointcut-redy se mchine B ρ nd from spect mchine A, except tht pointcut sttes in B ρ hve edges only to mtching strt sttes in A, nd spect return sttes hve edges to ll mtching se sttes. L B ρ is function from S B ρ to P (AP B {pointcut}) For ll finite-length pths π = s 0,..., s k in B ρ such tht s 0 S0 Bρ, lel(π) ρ s k = pointcut. j LB ρ(s) L eb (s) = L A(s) F eb = F B ρ S A if s S B ρ if s S A For ll infinite sequences of lels l = (P(AP B)) ω, there is fir pth π B ρ in B ρ where lel(π B ρ) APB = l if nd only if there is fir pth π B in B where lel(π B) = l. Note tht since B nd B ρ hve the sme pths (over AP, ignoring the dded pointcut lel), they must stisfy exctly the sme LTL formuls over AP. Figure 1 shows simple exmple of this construction. Note tht in stte digrms, the sence of n tomic proposition indictes tht the proposition does not hold, not tht the vlue is unknown or irrelevnt. This is in contrst to formul, where unmentioned propositions re not restricted Constructing n Augmented Mchine We construct the components of ugmented mchine e B = (S eb, S e B 0, R eb, L eb, F eb ) s follows: S eb = S B ρ S A S e B 0 = S Bρ 0 Tht is, F eb = {F i S A F i F B ρ}. A pth is fir if it either stisfies the firness constrint of the pointcut-redy mchine, or if it visits some spect stte infinitely mny times conservtively inclusive definition. A weving is considered successful if every rechle node in S eb hs successor ccording to R eb. 2.6 Wekly Invsive Aspects As mentioned ove, we show our result for the rod clss of spects which, when they return from dvice, do so to rechle stte in the se mchine. Without this restriction, the spect my return to unrechle prts of the se mchine whose ehvior is not ound y ssumption formul ψ. In this cse, the ugmented system contins portions with unknown ehvior, nd is difficult to reson out in modulr wy. Definition 4. An spect A nd pointcut ρ re sid to e wekly invsive for se mchine B if, for ll sttes in S B ρ tht re rechle y fir pth in e B, those sttes were rechle y fir pth in B ρ.

5 π sk Bse Mchine π t1 π tl π M pc s 0 s 1 s k 1 s k t 1 t l Aspect Mchine s k+1 Figure 2: Using fir pths in M (smll sttes long the top) to gurntee mtching pth in f T ψ. In prticulr, this mens tht ll sttes to which the spect returns re sttes rechle in the pointcut-redy se mchine. This could of course e checked directly, ut would require construction of the ugmented mchine precisely the opertion we would like to void. In mny cses, the spect cn e shown wekly invsive for ny se mchine stisfying its ssumption ψ, y using sttic nlysis, locl model checking, or dditionl informtion (our resoning in the discount price exmple from Section 1.4 uses such informtion). For further discussion, see [7]. 3. ALGORITHM The lgorithm uilds tleu from ψ nd weves A with this tleu ccording to ρ, then performs model checking to verify the result with respect to φ. In the following section we prove tht when this model check of the constructed ugmented tleu succeeds, then for ny se system stisfying requirement ψ, pplying spect A ccording to pointcut descriptor ρ will yield n ugmented system stisfying result φ. Given: set of tomic propositions AP ; ssumption ψ for se systems, n LTL formul over AP ; desired result φ for ugmented systems, n LTL formul over AP ; nd spect mchine A nd pointcut descriptor ρ over AP. Perform the following: 0. If it does not lredy, ugment ψ with cluses of the form ( ), such tht ψ contins every tomic proposition AP, without ltering its mening. 1. Construct T ψ, the tleu for ψ. Since ψ contins every AP, the result of Theorem 1 will hold when ll lels in AP re considered. 2. Restrict T ψ to only those sttes rechle vi fir pth. 3. Weve A into T ψ ccording to ρ, otining f T ψ. 4. Perform model checking in the usul wy to determine if f T ψ = φ. 4. CORRECTNESS Given the components defined ove, suppose tht: ft ψ = φ. Wht we hve shown, then, is tht the tleu for ssumption ψ woven with spect A ccording to ρ gives resulting mchine tht stisfies desired ugmented result φ. Our gol is to use the properties of f T ψ to show tht A nd ρ, when woven with ny possile se mchine M for which M = ψ, will lwys yield n ugmented f M such tht f M = φ. The proof elow gives this result for prticulr clss of spects. Theorem 2. Given AP, ψ, φ, A, nd ρ s defined, if ft ψ = φ, then for ny se progrm progrm M over superset of AP such tht A nd ρ re wekly invsive for M, if M = ψ then f M = φ. Proof. Since M nd T ψ contin exctly the sme fir pths s M ρ nd T ρ ψ, nd M = ψ, y Theorem 1, for ny fir pth π M in M ρ = ψ strting from S M ρ 0, there is fir pth π T in T ρ ψ with the sme lels (restricted to AP ). It suffices to show tht fter ugmenting oth of these pointcut-redy mchines, this correspondence still holds. Consider ny fir pth π M in M f strting from n initil stte. Unmodified pth Suppose no stte on π M is leled with pointcut. Then π M must e the sme s some fir pth π M in M ρ, which hs mtching fir pth π T in T ρ ψ. This pth π T contins no sttes leled with pointcut, since for every finite supth of π M, ρ ws not mtched, nd the lels on π T re the sme (restricted to AP ). Since π T hs no sttes leled with pointcut, y the construction of T f ψ, none of the edges long this pth

6 hve een removed during weving. Therefore π T is identicl to fir pth π T in T f ψ, nd we hve mtching pth for π M. Modified pth Pth π M must egin with sequence of k +1 sttes s 0, s 1,..., s k in M ρ, where k 0. Since s k must e rechle from fir pth π sk in M ρ, we cn consider the pth which egins s 0,..., s k nd continues long the reminder of π sk fter s k (see Figure 2). This pth must lso e fir, since it hs the sme infinite til s π sk itself, nd so must hve mtching pth in T ρ ψ ; we egin π T y following this pth. Suppose tht s k = pointcut, so s k+1 is in A. This stte s k cn e leled pointcut if nd only if we hve lel(s 0,..., s k ) ρ. In this cse, the mtching supth in T ρ ψ must lso mtch ρ, nd will hve pointcut on the stte mtching s k. From oth sttes, ll edges go to mchine A, so we cn continue π T long n identicl dvice pth; this includes the cse when the dvice never returns to the se mchine. If nd when π M follows n edge from n spect return stte to stte t 1 in M ρ, it does so to stte which is on fir pth π t1 in tht mchine. There must e mtching pth to π t1 in the tleu. Furthermore, if we continue long sequence of se mchine sttes t 1,..., t l, since t l is lso rechle from fir pth π tl, the pth which reches t 1 vi π t1, goes to t l, nd then continues long π tl from t l is lso fir in M ρ. In f T ψ, we hve n edge from the spect return stte to every stte whose lels mtch t 1; in prticulr, we must hve n edge to the stte corresponding to t 1 on the fir pth mtching our continution from t 1 constructed ove. We cn continue the mtch π T for π M long this pth. If this continution of se mchine sttes is infinite, then the mtching pth in the tleu must e fir, since we re following the mtch of fir pth in M ρ. If we never rech n infinite sequence of se sttes, ut lwys rech nother dvice, then there must e some dvice sttes which re visited infinitely mny times, nd gin the pth in the tleu is fir. Therefore, for every fir pth π M in M f we hve corresponding fir pth π T in T f ψ. This correspondence completes the proof tht M f = φ. 4.1 Exmple By wy of exmple, suppose we hve n spect with se system ssumption ψ = A G (( ) F ) tht is, ny stte stisfying is eventully followed y stte stisfying. We would like to prove tht the ppliction of our spect to ny se system stisfying ψ will give n ugmented system stisfying result φ = A G (( ) X F ) tht is, ny stte stisfying will eventully e followed y lter stte stisfying. While this exmple my not hve cler correltion to code-level prolem, it serves to illuminte the cpilities of our technique. Figure 3 shows the rechle portion of the tleu for the ssumption ψ. In the digrm, shded sttes re those contined in the only firness set. The nottion Xg, not ctully Xg Xg s 0 s 1 Xg Xg s 2 s 3 s 4 s 5 Figure 3: The rechle portion of tleu T ψ for ψ = A G (( ) F ). Xg Figure 4: A simple spect mchine A. Xg s 6 s 0 s 1 Xg Xg s 2 s 3 s 4 s 5 s 6 Figure 5: Augmented tleu f T ψ, stisfying φ = A G (( ) X F ).

7 prt of the stte lel, designtes sttes in the tleu which stisfy Xg for suformul g = F. For the exmple pointcut descriptor ρ = ( ), this tleu mchine is lso pointcutredy for ρ (since ρ references only the current stte), simply y dding pointcut to the lels of s 3 nd s 5. s 0 c Figure 4 shows the stte mchine A for the dvice of our spect. This dvice will e pplied t the sttes mtched y ρ, nd Figure 5 gives the weving of A with T ψ ccording to ρ. Model checking this ugmented tleu will indeed estlish tht it stisfies the desired property φ. This result follows neither from the spect nor se mchine ehvior directly, ut from their comined ehvior medited y ρ. And since T f ψ = φ, ny M = ψ will yield M f = φ. c s 1 c Resoning intuitively out A nd ρ without exmining the tleu supports this conclusion: the dvice is invoked t ll sttes of such n M tht mtch ( ), the dvice lwys leds to stte stisfying ( ), nd ψ gurntees tht from such stte we will lwys rech stte stisfying, which is exctly the ssertion of φ. Figure 6 depicts prticulr se mchine M stisfying ψ, s could e esily verified y model checking. Agin, the shded sttes re those in the only firness set. Although this M is smll, it does contin tomic proposition c not visile to the spect, nd it hs disconnected structure very much unlike the tleu. From Figure 7, one sees it is indeed the cse tht the ugmented mchine M f stisfies φ ut there is no need to prove this directly y model checking. This holds true even though the ddition of the spect hs mde numer of invsive chnges to M: stte s 1 is no longer rechle, ecuse its only incoming edge hs een replced y n dvice edge; new loop through s 0 hs een dded, when in M there ws no pth visiting s 0 more thn once; there is new pth connecting the previously seprted left-hnd component to the right-hnd; nd so forth. In more relistic exmples, the difference in size etween the ugmented tleu (involving only ψ, ρ, nd A) nd concrete ugmented system with dvice over full se mchine would e sustntil. 5. RELATED WORK The first work to seprtely model check the spect stte mchine segments tht correspond to dvice is [9], where the verifiction is modulr in the sense tht se nd spect mchines re considered seprtely. The verifiction method lso llows for joinpoints within dvice to e mtched y pointcut nd themselves dvised. However, the tretment there is for prticulr spect woven directly to prticulr se progrm. Additionlly, it shows only how to extend properties which hold for tht se progrm, proving tht the ugmented progrm stisfies them s well (properties re specified in rnching-time logic CTL). A key ssumption of their method is tht fter the spect mchine completes, the continution is lwys to the stte following the joinpoint in the originl se progrm. This requirement is much stronger thn the ssumption used here of wekly invsive spect. In [8], model checking tsks re utomticlly generted for the ugmented system tht results from ech weving of n spect. Tht pproch hs the disdvntge of hving to Figure 6: One prticulr se mchine M = ψ. c s 1 s 0 Figure 7: Augmenting M with A ccording to ρ gives result M f = φ. tret the ugmented system, ut t lest the needed nnottions nd set-up need only e prepred once. Tht work tkes dvntge of the Bnder [5] system tht genertes input to model checking tools directly from Jv code, nd cn e extended to, for exmple, the spect-oriented AspectJ lnguge. Bnder nd other systems like Jv Pthfinder [6] tht generte stte mchine representtions from code cn e used to connect common high-level spect lnguges to the stte mchines used in the results here. In [7] semntic model sed on stte mchines is given, nd the tretment of code-level spects nd joinpoints defined in terms of trnsitions, s in AspectJ, is descried. In prticulr, the vritions needed to express in stte mchine weving the mening of efore, fter, nd round with proceed re outlined, lthough work remins to fully cpture the intended semntics. In [4] nd [11], mong others, n ssume-gurntee structure for spect specifiction is suggested, similr to the specifictions here, ut model checking is not used. 6. CONCLUSION By reusing the notion of tleu which contins ll possile ehviors tht stisfy prticulr formul, we cn chieve modulr verifiction for spects y ugmenting the tleu with the dvice ccording to pointcut descriptor nd ex- c c

8 mining the result. In order to do so we must restrict our view to spects which re wekly invsive nd lwys return to sttes which were rechle in the originl se system, nd we tke lierl view of firness in which ny computtion tht infinitely often visits n spect stte is considered fir. A numer of directions for future work present themselves quite clerly. While the current technique only ddresses single spect nd pointcut descriptor, in principle it cn e extended to work for multiple spects, given proper definitions of the weving mechnics. Further development of how weving is formulted will lso llow tretment of cses where dvice introduction chnges the set of joinpoints. Furthermore, the entire discussion here is given in terms of sttes nd stte mchines, while, s noted erlier, the usul sic voculry of spect-oriented progrmming tlks out events. The lnguge-level spect terminology nd prolems of rel oject systems still must e fully expressed in the stte-sed model checking used here. Nevertheless, the generic method in this pper llows us for the first time to model check spects independently of concrete se progrm, nd is significnt step towrd the truly modulr verifiction of spects. [9] S. Krishnmurthi, K. Fisler, nd M. Greenerg. Verifying spect dvice modulrly. In Proc. SIGSOFT Conference on Foundtions of Softwre Engineering, FSE 04, pges ACM, [10] NuSMV. [11] H. Sipm. A forml model for cross-cutting modulr trnsition systems. In Proc. of Foundtions of Aspect Lnguges Workshop (FOAL03), REFERENCES [1] E. Arhm, F. de Boer, W.-P. de Roever, nd M. Steffen. An ssertion-sed proof system for multithreded jv. Theoreticl Computer Science, 331(2-3): , [2] D. Bustn, A. Flisher, O. Grumerg, O. Kupfermn, nd M. Y. Vrdi. Regulr vcuity. In D. Borrione nd W. Pul, editors, Proc. of Correct Hrdwre Design nd Verifiction Methods, CHARME 05, volume 3725 of LNCS, pges Springer, [3] E. M. Clrke, Jr., O. Grumerg, nd D. A. Peled. Model Checking. MIT Press, Cmridge, MA, [4] B. Devereux. Compositionl resoning out spects using lternting-time logic. In Proc. of Foundtions of Aspect Lnguges Workshop (FOAL03), [5] J. Htcliff nd M. Dwyer. Using the Bnder Tool Set to model-check properties of concurrent Jv softwre. In K. G. Lrsen nd M. Nielsen, editors, Proc. 12th Int. Conf. on Concurrency Theory, CONCUR 01, volume 2154 of LNCS, pges Springer-Verlg, [6] K. Hvelund nd T. Pressurger. Model checking Jv progrms using Jv PthFinder. Interntionl Journl on Softwre Tools for Technology Trnsfer (STTT), 2(4), Apr [7] S. Ktz. Aspect ctegories nd clsses of temporl properties. In Trnsctions on Aspect Oriented Softwre Development, Volume 1, LNCS 3880, pges , [8] S. Ktz nd M. Sihmn. Aspect vlidtion using model checking. In Proc. of Interntionl Symposium on Verifiction, LNCS 2772, pges , 2003.

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

Java CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:

Java CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser: Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code

More information

One Minute To Learn Programming: Finite Automata

One Minute To Learn Programming: Finite Automata Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge

More information

Generating In-Line Monitors For Rabin Automata

Generating In-Line Monitors For Rabin Automata Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324 A P P E N D I X A Vectors CONTENTS A.1 Scling vector................................................ 321 A.2 Unit or Direction vectors...................................... 321 A.3 Vector ddition.................................................

More information

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001 CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this

More information

Automated Grading of DFA Constructions

Automated Grading of DFA Constructions Automted Grding of DFA Constructions Rjeev Alur nd Loris D Antoni Sumit Gulwni Dileep Kini nd Mhesh Viswnthn Deprtment of Computer Science Microsoft Reserch Deprtment of Computer Science University of

More information

Assumption Generation for Software Component Verification

Assumption Generation for Software Component Verification Assumption Genertion for Softwre Component Verifiction Dimitr Ginnkopoulou Corin S. Păsărenu RIACS/USRA Kestrel Technologies LLC NASA Ames Reserch Center Moffett Field, CA 94035-1000, USA {dimitr, pcorin}@emil.rc.ns.gov

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

Regular Repair of Specifications

Regular Repair of Specifications Regulr Repir of Specifictions Michel Benedikt Oxford University michel.enedikt@coml.ox.c.uk Griele Puppis Oxford University griele.puppis@coml.ox.c.uk Cristin Riveros Oxford University cristin.riveros@coml.ox.c.uk

More information

New Internet Radio Feature

New Internet Radio Feature XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

Vector differentiation. Chapters 6, 7

Vector differentiation. Chapters 6, 7 Chpter 2 Vectors Courtesy NASA/JPL-Cltech Summry (see exmples in Hw 1, 2, 3) Circ 1900 A.D., J. Willird Gis invented useful comintion of mgnitude nd direction clled vectors nd their higher-dimensionl counterprts

More information

0.1 Basic Set Theory and Interval Notation

0.1 Basic Set Theory and Interval Notation 0.1 Bsic Set Theory nd Intervl Nottion 3 0.1 Bsic Set Theory nd Intervl Nottion 0.1.1 Some Bsic Set Theory Notions Like ll good Mth ooks, we egin with definition. Definition 0.1. A set is well-defined

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

Outline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)

Outline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4) Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

. At first sight a! b seems an unwieldy formula but use of the following mnemonic will possibly help. a 1 a 2 a 3 a 1 a 2

. At first sight a! b seems an unwieldy formula but use of the following mnemonic will possibly help. a 1 a 2 a 3 a 1 a 2 7 CHAPTER THREE. Cross Product Given two vectors = (,, nd = (,, in R, the cross product of nd written! is defined to e: " = (!,!,! Note! clled cross is VECTOR (unlike which is sclr. Exmple (,, " (4,5,6

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

In addition, the following elements form an integral part of the Agency strike prevention plan:

In addition, the following elements form an integral part of the Agency strike prevention plan: UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

1. Introduction. 1.1. Texts and their processing

1. Introduction. 1.1. Texts and their processing Chpter 1 3 21/7/97 1. Introduction 1.1. Texts nd their processing One of the simplest nd nturl types of informtion representtion is y mens of written texts. Dt to e processed often does not decompose into

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

flex Regular Expressions and Lexical Scanning Regular Expressions and flex Examples on Alphabet A = {a,b} (Standard) Regular Expressions on Alphabet A

flex Regular Expressions and Lexical Scanning Regular Expressions and flex Examples on Alphabet A = {a,b} (Standard) Regular Expressions on Alphabet A flex Regulr Expressions nd Lexicl Scnning Using flex to Build Scnner flex genertes lexicl scnners: progrms tht discover tokens. Tokens re the smllest meningful units of progrm (or other string). flex is

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

On decidability of LTL model checking for process rewrite systems

On decidability of LTL model checking for process rewrite systems Act Informtic (2009) 46:1 28 DOI 10.1007/s00236-008-0082-3 ORIGINAL ARTICLE On decidbility of LTL model checking for process rewrite systems Lur Bozzelli Mojmír Křetínský Vojtěch Řehák Jn Strejček Received:

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

Unambiguous Recognizable Two-dimensional Languages

Unambiguous Recognizable Two-dimensional Languages Unmbiguous Recognizble Two-dimensionl Lnguges Mrcell Anselmo, Dor Gimmrresi, Mri Mdoni, Antonio Restivo (Univ. of Slerno, Univ. Rom Tor Vergt, Univ. of Ctni, Univ. of Plermo) W2DL, My 26 REC fmily I REC

More information

Vectors and dyadics. Chapter 2. Summary. 2.1 Examples of scalars, vectors, and dyadics

Vectors and dyadics. Chapter 2. Summary. 2.1 Examples of scalars, vectors, and dyadics Chpter 2 Vectors nd dydics Summry Circ 1900 A.D., J. Willird Gis proposed the ide of vectors nd their higher-dimensionl counterprts dydics, tridics, ndpolydics. Vectors descrie three-dimensionl spce nd

More information

Vectors and dyadics. Chapter 2. Summary. 2.1 Examples of scalars, vectors, and dyadics

Vectors and dyadics. Chapter 2. Summary. 2.1 Examples of scalars, vectors, and dyadics Chpter 2 Vectors nd dydics Summry Circ 1900 A.D., J. Willird Gis proposed the ide of vectors nd their higher-dimensionl counterprts dydics, tridics, ndpolydics. Vectors descrie three-dimensionl spce nd

More information

Scalable Mining of Large Disk-based Graph Databases

Scalable Mining of Large Disk-based Graph Databases Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

Tool Support for Feature-Oriented Software Development

Tool Support for Feature-Oriented Software Development Tool Support for Feture-Oriented Softwre Development FetureIDE: An Eclipse-Bsed Approch Thoms Leich leich@iti.cs.unimgdeurg.de Sven Apel pel@iti.cs.unimgdeurg.de Lur Mrnitz mrnitz@cs.unimgdeurg.de ABSTRACT

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n)

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n) BRICS Bsic Reserch in Computer Science BRICS RS-02-13 Brodl et l.: Solving the String Sttistics Prolem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl Rune

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to

More information

Your duty, however, does not require disclosure of matter:

Your duty, however, does not require disclosure of matter: Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information

RTL Power Optimization with Gate-level Accuracy

RTL Power Optimization with Gate-level Accuracy RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 qwng@cdence.com

More information

FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES

FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES Introduction This compendium contins exercises out regulr lnguges for the course Forml Lnguges, Automt nd Theory of Computtion

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

In-circuit temporal monitors for runtime verification of reconfigurable designs

In-circuit temporal monitors for runtime verification of reconfigurable designs In-circuit temporl monitors for runtime verifiction of reconfigurble designs Tim Todmn Deprtment of Computing Imperil College London tephn tilkerich Airbus Group Innovtions Willy-Messerschmitt tr., Wyne

More information

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn 33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of

More information

Object Semantics. 6.170 Lecture 2

Object Semantics. 6.170 Lecture 2 Object Semntics 6.170 Lecture 2 The objectives of this lecture re to: to help you become fmilir with the bsic runtime mechnism common to ll object-oriented lnguges (but with prticulr focus on Jv): vribles,

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Solving the String Statistics Problem in Time O(n log n)

Solving the String Statistics Problem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl 1,,, Rune B. Lyngsø 3, Ann Östlin1,, nd Christin N. S. Pedersen 1,2, 1 BRICS, Deprtment of Computer Science, University of Arhus,

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

DAGmaps: Space Filling Visualization of Directed Acyclic Graphs

DAGmaps: Space Filling Visualization of Directed Acyclic Graphs Journl of Grph Algorithms nd Applictions http://jg.info/ vol. 13, no. 3, pp. 319 347 (2009) DAGmps: Spce Filling Visuliztion of Directed Acyclic Grphs Vssilis Tsirs 1,2 Sofi Trintfilou 1,2 Ionnis G. Tollis

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Linear Programming in Database

Linear Programming in Database 9 Liner Progrmming in Dtse Akir Kwguchi nd Andrew Ngel Deprtment of Computer Science, The City College of New York. New York, New York United Sttes of Americ Keywords: liner progrmming, simple method,

More information

How To Make A Network More Efficient

How To Make A Network More Efficient Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Gene Expression Programming: A New Adaptive Algorithm for Solving Problems

Gene Expression Programming: A New Adaptive Algorithm for Solving Problems Gene Expression Progrmming: A New Adptive Algorithm for Solving Prolems Cândid Ferreir Deprtmento de Ciêncis Agráris Universidde dos Açores 9701-851 Terr-Chã Angr do Heroísmo, Portugl Complex Systems,

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

Math 314, Homework Assignment 1. 1. Prove that two nonvertical lines are perpendicular if and only if the product of their slopes is 1.

Math 314, Homework Assignment 1. 1. Prove that two nonvertical lines are perpendicular if and only if the product of their slopes is 1. Mth 4, Homework Assignment. Prove tht two nonverticl lines re perpendiculr if nd only if the product of their slopes is. Proof. Let l nd l e nonverticl lines in R of slopes m nd m, respectively. Suppose

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509

Revisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509 Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Learning Workflow Petri Nets

Learning Workflow Petri Nets Lerning Workflow Petri Nets Jvier Esprz, Mrtin Leucker, nd Mximilin Schlund Technische Universität München, Boltzmnnstr. 3, 85748 Grching, Germny {esprz,leucker,schlund}@in.tum.de Abstrct. Workflow mining

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

On the Robustness of Most Probable Explanations

On the Robustness of Most Probable Explanations On the Robustness of Most Probble Explntions Hei Chn School of Electricl Engineering nd Computer Science Oregon Stte University Corvllis, OR 97330 chnhe@eecs.oregonstte.edu Adnn Drwiche Computer Science

More information

Unit 6: Exponents and Radicals

Unit 6: Exponents and Radicals Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -

More information