Formal Languages and Analysis of Contract-Oriented Software
|
|
|
- Silas Warren
- 10 years ago
- Views:
Transcription
1 Antonio Brogi, Roberto Bruni, Gerardo Schneider (Ed.) Formal Language and Analyi of Contract-Oriented Software 4th International Workhop, FLACOS 2010 Pia, Italy, September 17 18, 2010 Electronic Proceeding
2 Table of Content On the formal repreentation of norm and contract... 1 Marek Sergot Contract-baed Slicing... 3 Daniela da Cruz, Pedro Henrique and Jorge Soua Pinto A Calculu of Contracting Procee Maimo Bartoletti and Roberto Zunino Contract-baed Reaoning about Progre: Application to Reource Sharing in a Network Imene Ben-Hafaiedh, Suanne Graf and Sophie Quinton Contract-Baed Dicovery and Adaptation of Web Service Luca Padovani A Survey of Formal Language for Contract Tom Hvitved On the Formal Specification of Buine Contract and Regulatory Compliance Amal Elgammal, Oktay Turetken, Willem-Jan van den Heuvel and Mike Papazoglou Formal Model for Buine-aware Tranaction Management Francoi Hantry, Mohand-Said Hacid and Mike Papazoglou Autonomou and yet Secure Evolution for Smart Card Application uing Self-Certification Olga Gadyatkaya and Fabio Maacci Synthei and Analyi of Adaptor through Security Contract Joé Antonio Martín and Erneto Pimentel Viual Specification of Formal e-contract Enrique Martínez, Gregorio Díaz and M. Emilia Cambronero A Trace-baed Model for Multi-party Contract Tom Hvitved Viual Behavioural Modelling with Contract Nuno Amálio and Pierre Kelen Controllability and Abtraction in Buine Procee Maria Grazia Bucemi and Hernán Melgratti Leveraging a Contract-baed Synchronization Framework for Deign and Analyi of Service Laura K. Dillon, Yi Huang and R.E.K. Stirewalt
3 ViualSpecificationofFormale-Contract Enrique Martínez Gregorio Díaz M. Emilia Cambronero Department of Computer Science Univerity of Catilla-La Mancha, Spain In thi work we preent a viual model called C-O Diagram for the pecification of e-contract. Thi model include pecification of obligation, permiion, prohibition, reparation and retriction ucharealtimecontraint.wealodefineaformalemanticoftheviualmodelintendedforthe analyi and verification of the modeled contract. 1 Introduction We conider e-contract a a et of claue that mut be atified by everal partie participating in a ytem. Thee claue regulate how participant hould behave, what are the penaltie in cae of mibehavior, and under which condition uch claue mut be enacted. We alo have that when a claue i violated, if the claue define a reparation (econdary claue that come into force when the main claue i not atified), and thi reparation i fulfilled, then the claue i eventually fulfilled. Recently ome work about pecifying e-contract in a formal manner have been releaed[2, 3, 10], but thee approache conit of formal language which are hard to tudy and manipulate by untrained final uer of thi technology, a buine proce developer. Thegoalofthiworkitointroduceanewapproachforthepecificationofe-contractinauer friendly way. E-contract may be complex, coniting of compoite claue making reference to other claue in the ame or in another contract. Furthermore, we conider contract with timed retriction and condition under which the contract claue mut be applied. Hence, our approach i baed on a viual model that we call Contract-Oriented Diagram or C-O Diagram for hort, ince it i wellknownthattheueofviual modelmakeeaiertheperception ofknowledge, andinthiway, the intuitive undertanding, reading and maintenance of complex problem[6]. Thi approach can be ueful in ervice-oriented architecture, component-baed ytem, requirement acquiition, oftware product line, etc. In the following ection we firt informally define the element and tructure of our viual model,nextweformallydefinetheyntaxofthediagram,andfinallywepreentafirtverionofthe formal emantic of thee diagram, baed on timed automaton. 2 Viual Model Inourviualmodelwedefineahierarchicaltreediagramuedtopecifythecontractclauethatwecall C-ODiagram. InFigure1wehowthebaicelement. Itcorrepondtoacontractclaueandwecall itbox. Thiboxconitoffourfield,allowingutopecifynormativeapectorimplenorm(P), reparation(r),condition(g)andtimeretriction(tr).eachboxhaanameandanagent.thenamei uefulbothtodecribetheclaueandtoreferencetheboxfromotherclaue,oitmutbeunique.the PartiallyupportedbytheSpanihgovernment(cofinancedbyFEDERfound)withtheprojectTIN C02-02 and the JCCLM regional project PEII The firt author i upported by the European Social Fund and the JCCLM. Preliminary Report. Final verion to appear in: FLACOS
4 agent name Figure 1: Box tructure Claue Claue Claue Seq-refinement SubClaue1 SubClaue2 SubClaue1 SubClaue2 SubClaue1 SubClaue2 Figure 2: AND/OR/SEQ refinement agentindicatewhoitheperformeroftheaction(whichcanbeaervice,acomponentoromething ele, depending on the field where we are applying C-O Diagram). Ontheleft-handideoftheboxwepecifytheconditionandretriction.Theguardgpecifiethe condition under which the contract claue mut be taken into account. The time retriction tr pecifie the time frame in which the contract claue mut be atified. Thepropoitional content P,onthecenter, ithemainfieldofthebox,anditiuedtopecify normative apect(obligation, permiion and prohibition) that are applied over action, and/or the action themelve. The lat field of thee boxe, on the right-hand ide, i the reparation R. Thi reparation, if pecified bythecontractclaue,ianothercontractthatmutbeatifiedincaethemainnorminotatified, conidering the claue eventually atified if thi reparation i atified. Thee baic element of a C-O Diagram can be refined by uing AND/OR/SEQ refinement, a hown in Figure 2. The aim of thee refinement i to capture the hierarchical claue tructure followed by mot contract. An AND-refinement mean that all the ubclaue mut be atified in order to atify the parent claue. An OR-refinement mean that it i only neceary to atify one of the ubclaue in order to atify the parent claue. A SEQ-refinement mean that the norm pecified in the target box (SubClaue2 in Figure 2) mut be fulfilled after atifying the norm pecified in the ource box (SubClaue1inFigure2). Inthiway,wecanbuildahierarchicaltreewiththeclauedefinedbythe contract, where the leaf claue correpond to the atomic claue, that i, to the claue that cannot be divided into ubclaue. There i another tructure that can be ued to model repetition. Thi tructure irepreentedaanarrowgoingfromaubclauetooneofitancetorclaue(ortoitelf),meaning the repetitive application of all the ubclaue of the target claue after atifying the ource ubclaue. In thi work, we follow an ought-to-do approach, i.e., the normative apect of obligation, permiion and prohibition, a defined in deontic logic[9], are applied over action performed by the participantinthecontract. WeonlyallowthepecificationofatomicactioninthePfieldoftheleaf claueofourdiagram.theeactionaredenotedbylowercaelatinletter( a, b, c,...).weue adah( - )todenotethatthereinoactionpecifiedinthenoleafclaue.thecompoitionofaction canbeachievedbymeanofthedifferentkindofrefinement. Inthiway,anAND-refinementcanbe uedtomodelconcurrency & betweenaction,anor-refinementcanbeuedtomodelachoice + betweenaction,andaseq-refinementcanbeuedtomodelequence ; ofaction. InFigure3we can ee an example about how to model thee compound action through refinement, given two atomic actionaandb. 56
5 - - - Seq-refinement a a + b b a b a b a & b a ; b Figure 3: Compoition of action in C-O Diagram Seq-refinement O a O b O a O b O a O b O(a) O(b) O(a) O(b) O(a) ; O(b) Figure 4: Compoition of deontic norm in C-O Diagram The deontic norm(obligation, permiion and prohibition) that are applied over thee action canbepecifiedinanyclaueofourc-odiagram,affectingalltheactionintheleafclauethatare ubclaueofthiclaue,butatleatoneandonlyonedeonticnormmutbepecifiedineachoneof thebrancheofourdiagram.ifitithecaethattheclauewherewepecifythedeonticnormialeaf claue,thenormonlyaffecttheatomicactionwehaveinthiclaue.weueanuppercae O todenote anobligation,anuppercae P todenoteapermiion,andanuppercae F todenoteaprohibition (forbidden).theeletterarewritteninthetopleftcorneroffieldp.thecompoitionofdeonticnormi alo achieved by mean of the different refinement we have in C-O Diagram. Thu, an AND-refinement correpond to the conjunction operator between norm, an OR-refinement correpond to the choice operator + between norm, and a SEQ-refinement correpond to the equence operator ; between norm. For example, we can imagine having a leaf claue pecifying the obligation of performing an action a, written a O(a), and another leaf claue pecifying the obligation of performing an action b, written a O(b). Thee two norm can be combined in the three different way mentioned before through the different kind of refinement(figure 4). ThefieldRionlyallowedintheboxeofourdiagramwherewepecifyadeonticnormofobligationorprohibitioninfieldP,beingalwayemptyintheotherboxe. Thireparationianewcontract thatcanbejutanobligationoveranatomicaction,butitcanalobeamorecomplexdiagram,including theirownreparation. Inthiway,weareabletopecifynetedreparationinourC-ODiagram. Let uconideraimplecontractctatingthatwehavetheobligationofperforminganatomicactionaand the prohibition of performing an atomic action b. However, if we do not perform the obligatory action a, wecancompenateitbyfulfillinganothercontract(modeledbyanotherdiagram)calledc 1,coniting ofperforminganactioncoranactiond,andifweperformtheforbiddenactionb,wecancompenateit jutbyperforminganactione.thiituationcanbemodeledinourdiagramahowninfigure5. Whenwepecifyaguardgand/oratimeretriction trinaclauethatinotaleafclaue, they affect all the ubclaue, i.e., all the ubclaue neceary to atify the parent claue mut fulfilled the condition and time retriction pecified in thi parent claue. Otherwie, the parent claue i unfulfilled. 1 1 AmoredetaildecriptionofC-ODiagramcanbefoundin[8],includingacaetudyhowinghowtopecifyaconcrete e-contract and a evaluation of the model. 57
6 AND OR Figure 5: Reparation in C-O Diagram 3 Formal Grammar InthiectionweformallydefinetheyntaxofC-ODiagraminordertomakethemuceptible to formal analyi. Definition 1 (C-O Diagram Syntax) We conider a finite et of real-valued variable C tanding for clock, a finite et of non-negative integer-valued variable V, a finite alphabet Σ for atomic action, a finite et of identifier A for agent, andafiniteetofidentifier N forname.thegreekletter εmeanthatanexpreioniempty. WeueCtodenotethecontractmodeledbyaC-ODiagram.Thediagramyntaxidefinedbythe following EBNF grammar: C := (agent,name,g,tr,o(c 2 ),R) (agent,name,g,tr,p(c 2 ),ε) (agent,name,g,tr,f(c 2 ),R) (ε,name,g,tr,c 1,ε) C 1 := C(AndC) + C(OrC) + C(SeqC) + C 2 := a C 3 (AndC 3 ) + C 3 (OrC 3 ) + C 3 (SeqC 3 ) + C 3 := (ε,name,g,tr,c 2,ε) R := C ε wherea Σ,agent A andname N.Guardgi εoraconjunctiveformulaofatomiccontraintof theform: v norv w n,forv,w V, {,<,=,>, }andn IN,whereatimedretriction tr i ε oraconjunctive formulaofatomiccontraint oftheform: x norx y n, forx,y C, {,<,=,>, }andn IN. O, PandF arethedeontic operator correponding toobligation, permiion andprohibition, repectively, whereo(c 2 )tate theobligation ofperformingc 2, F(C 2 ) tateprohibition ofperformingc 2,andP(C 2 )tatethepermiionofperformingc 2. And,Orand Seq are the operator correponding to the refinement we have in C-O Diagram, AND-refinement, OR-refinement and SEQ-refinement, repectively. ThemotimplecontractwecanhaveinC-ODiagramithatcompoedofonlyoneboxincluding theelementagent andname. Optionally,wecanpecifyaguardgandatimeretrictiontr. Wealo have adeontic operator (O, PorF)applied overan atomicaction a, and inthecae ofobligation and prohibition it i poible to pecify another general contract C a a reparation. For example, C:= (Buyer,Example1,ε,ε,O(pay),C )iavery implecontract pecifying forabuyer the obligation of paying,otherwiecontractc comeintoeffect. WeueC 1 todefineamorecomplexcontractwherewecombinedifferentdeonticnormbymean ofanyofthedifferentrefinementwehaveinc-odiagram.intheboxwherewehavetherefinement 58
7 intoc 1 wecannotpecifyanagentnorareparationbecauetheeelementarealwayrelatedtoaingle deonticnorm,butwetillcanpecifyaguardgandatimeretrictiontrthataffectallthedeonticnorm wecombine. Forintance,C:= (ε,example2,ε,x <5,C OrC,ε)iacompoedcontractpecifying thatcontractc orcontractc mutbeatifiedinordertoatifycbeforeclockxreachthevalue5. Once wewrite adeontic operator in abox ofour diagram, wehave twopoibilitie awecan eeinthepecification ofc 2 : wecanjutwriteaimpleactionainthebox, beingthedeontic operator applied only over it, or we can refine thi box in order to apply the deontic operator over a compound action. Inthicaewehavethattheubboxe (C 3 )cannotdefineanewdeontic operator a it ha already been defined in the parent box (affecting all the ubboxe). Then, thee ubboxe cannotpecifyanagentnorareparation, butitipoibletopecifyaguardgandatimeretriction tr affecting only the action in the ubbox or the action compoed in it refinement. For example, C:= (Buyer,Example3,ε,ε,O(C OrC ),ε), where wehave thatc := (ε,option1,ε,ε,paycah,ε) andc :=(ε,option2,ε,ε,paycard,ε),iacontractpecifyingforabuyertheobligationofpayingby cahorbycreditcard. 4 Formal Semantic The C-O Diagram formal emantic i given by mean of a atifaction function. To define thi atifaction function we follow the C-O Diagram yntax given in Definition 1. The atifiability of a contract i defined baed on the tate of a timed labelled tranition ytem aociated to a timed automaton. Baically,atimedautomaton(TA)[1]iatuple (N,n 0,E,I),whereNiafiniteetoflocation(node), n 0 Nitheinitiallocation,Eitheetofedge,andIiafunctionthataigninvariantcondition (whichcouldbeempty)tolocation. Wewriten g,a,r n todenote (n,g,a,,r,n ) E,wheren,n N, giaguard,aianaction,riaetofclockwewanttoreet,andiaetofvariableaignment. Theemanticofatimedautomatonidefinedaatimedlabelledtranitionytem (Q,q 0, ),whereq iaetoftate,q 0 Qitheinitialtate,and itheetoftranition.duetothelackofpace,refer to[4] for a complete definition of timed automaton and it emantic. Definition 2 (C-O Diagram Semantic) Let A = (N,n 0,E,I)beatimedautomaton, withtheaociated timedlabelled tranition ytem (Q,q 0, )and q Q. GivenaC-ODiagramC, one can define (A,q) =C (A in tate qatifie contract C) a follow: (1) (A,q) =(agent,name,g,tr,o(a),r)iff q 1 q 2... q j forq=q1 : a Themainclauehold,thati, i [1,j 1]uchthatq i q i+1 with n i g,a,r n i+1 where (g tr) g andagent(a) Themainclauedoenotholdbutreparationhold,thati,R εand (A,q i+1 ) =Rfor thefirti [1,j 1]uchthatq i d q i+1 with d (n i,u) (n i,u+d)and (u+d) tr (2) (A,q) =(agent,name,g,tr,p(a),ε)iff q 1 q 2... q j forq=q1 wherethemain a g,a,r clauehold,thati, i [1,j 1]uchthatq i q i+1 withn i n i+1 where (g tr) g and agent(a) 59
8 (3) (A,q) =(agent,name,g,tr,f(a),r)iff q 1 q 2... q j forq=q1 : Themainclauehold,thati, i [1,j 1]uchthatq i a q i+1 with g,a,r n i n i+1 where (g tr) g andagent(a), Themainclauedoenotholdbutreparationhold,thati,R εand (A,q i+1 ) =Rfor a g,a,r thefirti [1,j 1]uchthatq i q i+1 withn i n i+1 where(g tr) g andagent(a) (4) (A,q) =(agent,name,g,tr,d((ε,name 1,g 1,tr 1,C 1,ε)RE (ε,name 2,g 2,tr 2,C 2,ε)RE...RE (ε,name k,g k,tr k,c k,ε)),r)iff (A,q) =(ε,name,g,tr,(agent,name 1,g 1,tr 1,D(C 1 ),R)RE (agent,name 2,g 2,tr 2,D(C 2 ),R)RE...RE (agent,name k,g k,tr k,d(c k ),R),ε) (5) (A,q) =(ε,name,g,tr,(agent 1,name 1,g 1,tr 1,C 1,R 1 )RE (agent 2,name 2,g 2,tr 2,C 2,R 2 )RE...RE (agent k,name k,g k,tr k,c k,r k ),ε)iff (A,q) =(agent 1,name 1,g g 1,tr tr 1,C 1,R 1 ) (A,q) =(agent 2,name 2,g g 2,tr tr 2,C 2,R 2 )... (A,q) =(agent k,name k,g g k,tr tr k,c k,r k ) Line(1) (3) correpond to the emantic of applying an obligation, a permiion or a prohibition overanatomicactiona. Inthecaeofobligation,forallthepoiblepathinourautomatonwemut have the performance of a by the pecified agent(denoted by agent(a)) and fulfilling alo any condition ortimeretrictionwehavepecified(denotedby (g tr) g ).Iftheobligedactioninotperformedin the expected time frame, we have the alternative poibility of atifying reparation R from the moment at whichtimedretrictioninotfulfilledanymore(denotedby(u+d) tr).inpermiionweconiderthat the performance of a i only neceary in one of the path. Thi interpretation of permiion i becaue we think that an automaton atifying a contract mut offer the poibility of performing a permitted actioninatleatoneofitpath. Prohibitionitheoppoiteofpermiion,owecannothaveapath whereweperformtheforbiddenactiona,butincaeweperformtheactionwetillhavethepoibility of atifying reparation R after that. Inline(4) (5)wehavethat D {O,P,F}, RE {And,Or}and {, }.Line(4)correpond to the emantic of applying a deontic norm over an AND-refinement or an OR-refinement. For all the deontic operator we jut propagate them into each one of the ubcontract, a well a reparation R and agent, and the atifaction of the main contract conit of the atifaction of the refinement RE of thee new ubcontract. Line(5) correpond to the emantic of thee refinement when no deontic operator i applied over them(they will be pecified in the ubcontract). In thee cae, the atifaction of the main contract conit of the conjunction( for AND-refinement) or dijunction( for OR-refinement) of the atifaction of each one of the ubcontract, propagating any condition or time retriction in the maincontractintotheeubcontract(denotedbyg g k andtr tr k ). In thi C-O Diagram emantic we deliberately omit SEQ-refinement. The emantic of thi refinementimorecomplexbecauewehavetoguaranteethattheubcontractnotonlyarefulfilledbutthey arealofulfilledinthecorrectorder. Forthatpurpoewearenowworkingonnewemanticruleto apply ditributivity of SEQ-refinement over the other refinement, o we can finally have equence of deonticnormappliedoveratomicaction. Inthiway,wecandetermineifinthelocationwereach after atifying the firt element of the equence the remaining equence i fulfilled. 60
9 5 Concluion and Future Work In thi paper we have preented C-O Diagram, a new viual formalim for electronic contract. To thebetofourknowledge, thereinotanyotherviualmodelpecially createdforthedefinitionof e-contract. There are everal work in the literature that define a meta-model for the pecification of e-contract baed on ome already exiting viual pecification like UML or entity-relationhip diagram [5,7],buttheyalllackofomeofthecapabilitie wehaveinc-odiagram(realtimecontraint, reparation,...). A future work, apart from complete C-O Diagram emantic, we are planning to apply thi model to different cae tudie in order to evaluate it uefulne in different field. We alo enviage the poibility of pecifying a different C-O Diagram for each one of the partie involved in an e-contract intead of having a global C-O Diagram with multiple agent. Thi compoitional approach can be ueful if we define a compoition operator, pecifying when two of thee new C-O Diagram can be compoed and the reult of the compoition. Reference [1] R. Alur& D.L. Dill(1990): Automata For Modeling Real-Time Sytem. Proceeding of 17th International Colloquium on Automata, Language, and Programming, pp [2] M. Bravetti& G. Zavattaro(2007): Toward a unifying theory for choreography conformance and contract compliance. Proceeding of the Sixth International Sympoium on Software Compoition, pp [3] M.G. Bucemi& U. Montanari(2008): Cc-Pi: A Contraint-Baed Language for Contract with Service Level Agreement. Proceeding of Second International Workhop on Formal Language and Analyi of Contract-Oriented Software, pp [4] M.E. Cambronero, G. Díaz, V. Valero& E. Martínez(2010): Validation and Verification of Web Service Choreographie by Uing Timed Automata. Article in Pre, Corrected Proof. [5] D. Cambronero, S. Cheung& S. Till(2003): A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment. Proceeding of the 36th Hawaii International Conference on Sytem Science (HICSS-36), pp [6] D. Harel(1988): On Viual Formalim. Communication of the ACM 31(5), pp [7] P.R. Krihna, K. Karlapalem& A.R. Dani(2005): From Contract to E-Contract: Modeling and Enactment. Information Technology and Management 6(4), pp [8] E. Martínez, G. Díaz, M.E. Cambronero& G. Schneider(2010): A Formal Model for Viual Specification of e-contract. The 7th IEEE 2010 International Conference on Service Computing(SCC 2010). To appear. Available at [9] P. McNamara(2006): Deontic Logic. Gabbay, D.M., Wood, J., ed.: Handbook of the Hitory of Logic 7, pp North-Holland Publihing. [10] C. Priacariu& G. Schneider(2007): A formal language for electronic contract. Proceeding of 9th IFIP International Conference on Formal Method for Open Object-Baed Ditributed Sytem, pp
A Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
Software Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: [email protected] Itituto
Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
A Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: [email protected]
CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
Bidding for Representative Allocations for Display Advertising
Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay
A note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.
HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human
Thank you for attending the MDM for the Enterprise Seminar Series!
Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional
A technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
A Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
Availability of WDM Multi Ring Networks
Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity
Scheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 [email protected] Zhi-Long Chen** Department
Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools
Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review
Project Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
CASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.
Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate
Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation
Benchmarking Bottom-Up and Top-Down Strategie for SPARQL-to-SQL Query Tranlation Kahlev a, Chebotko b,c, John Abraham b, Pearl Brazier b, and Shiyong Lu a a Department of Computer Science, Wayne State
Bi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
Algorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
Mixed Method of Model Reduction for Uncertain Systems
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced
SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S
SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S Chinatu Aone, Doug McKee, Sandy Shinn, Hatte Bleje r Sytem Reearch and Application (SRA ) 2000 15th Street North Arlington, VA 2220 1 [email protected] INTRODUCTION
Return on Investment and Effort Expenditure in the Software Development Environment
International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar
Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS
Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning
Control Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
License & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service [email protected] www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring
Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June
Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland
X SEPOPE 2 a 25 de maio de 26 May 2 rt to 25 th 26 FLORIANÓPOLIS (SC) BRASIL X SIMPÓSIO DE ESPECIALISTAS EM PLANEJAMENTO DA OPERAÇÃO E EXPANSÃO ELÉTRICA X SYMPOSIUM OF SPECIALISTS IN ELECTRIC OPERATIONAL
Proofs for Traffic Safety
Carl von Oietzky Univerität Oldenburg Fakultät II Informatik, Wirtchaft- und Rechtwienchaften Department für Informatik Proof for Traffic Safety Combining Diagram and Logic Diertation zur Erlangung de
Linear Momentum and Collisions
Chapter 7 Linear Momentum and Colliion 7.1 The Important Stuff 7.1.1 Linear Momentum The linear momentum of a particle with ma m moving with velocity v i defined a p = mv (7.1) Linear momentum i a vector.
TRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION
A Novel Web-Based Student Academic Records Information System
A Novel Web-Baed Student Record Information Sytem Nmaju Obai, E. O. Nwachukwu, and C. Ugwu Department of Computer Science, Univerity of Port Harcourt, Port Harcourt, River State, Nigeria [email protected],
1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
The Cash Flow Statement: Problems with the Current Rules
A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention
Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
Graph Analyi I Network Meaure of the Networked Adaptive Agents
Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom [email protected] ABSTRACT Experimental analyi of
Socially Optimal Pricing of Cloud Computing Resources
Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 [email protected] Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett
Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
Differences and Common Aspects of POG and EMR Energy-Based Graphical Techniques
Difference and Common Apect of POG and EMR -Baed Graphical echnique Roerto Zanai Dement of Information Engineering Univerity of Modena and Reggio Emilia Modena, Italy Email: [email protected] Federica
Performance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding
Utility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
Improving the Performance of Web Service Recommenders Using Semantic Similarity
Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica
Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System
Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
DUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
SHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
AN OVERVIEW ON CLUSTERING METHODS
IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,
CASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK ABSTRACT KEYWORDS
THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK BY ANGUS MACDONALD, DELME PRITCHARD AND PRADIP TAPADAR ABSTRACT The UK Biobank project
TRID Technology Implementation
TRID Technology Implementation Jaime Koofky, Managing Attorney, Brady & Koofky PA Cecelia Raine, Co-Chair, Cloing Inight Adviory Board, RealEC Technologie Richard Triplett, CMB, Vice Preident, Director
Linking Example-Based and Rule-Based Machine Translation. Michael Carl, Catherine Pease and Oliver Streiter
Linking Example-Baed and Rule-Baed Machine Tranlation Michael Carl, Catherine Peae and Oliver Streiter Intitut fur Angewandte Informationforchung, Martin-Luther Str. 14 (carl,cath,oliver)@iai.uni-b.de
Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
RISK MANAGEMENT POLICY
RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation
Development Progress
H T U SO CA'S I R F A : Y R STO ial c o ca i r f A South ytem: e g ity ecur ing covera ing d it Expan t and lim lity a n u a r q g e f n o ni i e n increa orga ny M nke n-za e g a eth ca H Jei harle M
Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique
International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra
Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.
Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity
Forest Lake Local Plan
1 Introduction Thi Local Plan contain pecific additional local planning requirement. Where it conflict with the requirement of the City Plan, thi Local Plan prevail. In uing thi Local Plan, reference hould
SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :
S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,
Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing
1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing
6. Friction, Experiment and Theory
6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal
