Filters








1,266,800 Hits in 4.8 sec

Central Limit Model Checking [article]

Luca Bortolussi, Luca Cardelli, Marta Kwiatkowska, Luca Laurenti
2018 arXiv   pre-print
Classical numerical algorithms for CSL model checking based on uniformisation are limited to finite CTMCs and suffer from the state sapce explosion problem.  ...  In this paper we employ a continuous-space approximation of the CTMC in terms of a Gaussian process based on the Central Limit Approximation (CLA), also known as the Linear Noise Approximation (LNA), whose  ...  Central Limit theorem [50,28].  ... 
arXiv:1804.08744v1 fatcat:vl2f23usa5bkfdargq2l3ujlmu

Central Limit Model Checking

Luca Bortolussi, Luca Cardelli, Marta Kwiatkowska, Luca Laurenti
2019 ACM Transactions on Computational Logic  
Central Limit Model Checking • :3 We show the effectiveness of our approach on a set of case studies taken from the biological literature, also in cases where existing numerical model checking techniques  ...  Classical numerical algorithms for CSL model checking based on uniformisation are limited to finite CTMCs and suffer from exponential growth of the state space with respect to the number of species.  ...  on the Central Limit theorem [29, 54] .  ... 
doi:10.1145/3331452 fatcat:oyoowhiekbaxdnxrv4373cyyoe

Model Checking of Non-Centralized Automaton Web Service with AMT Bounded Constraint

Zhang Rui-Min, Li Xiao-Bin
2016 International Journal of Multimedia and Ubiquitous Engineering  
A web service model diction algorithm of non-centralized automaton based on satisfiability modulo theories (SMT) is proposed.  ...  First, SMT is used for bounded model checking of time automaton, and the time automaton model is directly converted into logical formula that can be identified by SMT, to make solution; secondly, the proposed  ...  SMT Time Automaton SMT Bounded Model Checking Given the limited model M and the nature of the model f , the model checking problem can be formulated as the model M to satisfy the model property f .  ... 
doi:10.14257/ijmue.2016.11.3.06 fatcat:34pusznltfbyjokcxyrwepvyru

Intelligent Models of Long-Term Security Correction in Energy Conversion Dispatching

Chaochun Luo, Dunnan Liu, Qingqi Chen, Xinming Liu
2013 Energy and Power Engineering  
At last, the practical example of the Hunan Province power grid is introduced to explain the models.  ...  This paper brings forward the purpose and contents of security dispatching and introduces the working procedure and mathematic models.  ...  To present processes and algorithms of middle-long tern security checking under energy generation scheduling model to verify the actual network data.  ... 
doi:10.4236/epe.2013.54b1120 fatcat:6aoipdqlqng2jiunexhauf745e

Architecture-aware Partial Order Reduction to Accelerate Model Checking of Networked Programs

Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe
2008 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing  
Centralization wraps several processes in a single process. Using a TCP/IP model library, networked applications can then be model checked [1] .  ...  -Most software model checkers [4] cannot handle multiple processes. To model check multiple processes in a single-process model checker, centralization has been proposed [3] .  ... 
doi:10.1109/snpd.2008.50 dblp:conf/snpd/ArthoLHT08 fatcat:666g6bxhbfhcxjaxlylgignt5y

Efficient Model Checking of Networked Applications [chapter]

Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe
2008 Lecture Notes in Business Information Processing  
When model checking such a networked application, a simple state space exploration scheme is not applicable, as the process being model checked would repeat communication operations when revisiting a given  ...  The non-determinism in the thread and communication schedules makes it desirable to model check such applications.  ...  Summary Our experiments in Table 2 show that model checking with our I/O caching approach is orders of magnitudes faster than model checking using centralization.  ... 
doi:10.1007/978-3-540-69824-1_3 fatcat:5l4gpey2vzdblos5hwt3dc5sce

Stochastic Approximation of Global Reachability Probabilities of Markov Population Models [chapter]

Luca Bortolussi, Roberta Lanciani
2014 Lecture Notes in Computer Science  
In this paper we present some results in estimating these probabilities using ideas borrowed from Fluid and Central Limit approximations.  ...  However, large population models suffer severely from state space explosion, hence a direct computation of these probabilities is often unfeasible.  ...  Central Limit Approximation of the Hitting Time Distribution To compute the cumulative probability distribution associated with the reachability problem (7) , the model checking procedure that we are  ... 
doi:10.1007/978-3-319-10885-8_16 fatcat:3gv2dmgkubho5jzj3oxlmspuwi

Tools and Techniques for Model Checking Networked Programs

Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe
2008 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing  
Model checking, however, can cover all possible thread interleavings.  ...  This shortcoming can be addressed by a special model checker designed for multiple processes, or by different kinds of extensions and preprocessors for existing model checkers.  ...  As centralization processes the program before it is model checked, any software model checker supporting the given platform can be used.  ... 
doi:10.1109/snpd.2008.36 dblp:conf/snpd/ArthoLHT08a fatcat:74g7bnjfr5erlefh3xahdfmhvm

Towards Multi-party Targeted Model Poisoning Attacks against Federated Learning Systems

Zheyi Chen, Pu Tian, Weixian Liao, Wei Yu
2021 High-Confidence Computing  
The federated learning framework builds a deep learning model collaboratively by a group of connected devices via only sharing local parameter updates to the central parameter server.  ...  Specifically, the compromised devices jointly minimize the loss function of model training in different scenarios.  ...  comparison for limited knowledge with accuracy checking process.  ... 
doi:10.1016/j.hcc.2021.100002 fatcat:kekucblfnvhknbmd2vprvk57xu

Page 11 of Biometrics Vol. 58, Issue 1 [page]

2002 Biometrics  
Thus, the functional central limit theorem (Pollard, 1990. p. 53) entails that this term is tight.  ...  Checking the margin¬ al Cox model for correlated failure time data. Biometrika 83, 143-156. Stute, W. (1997). Nonpararnetric model checks for regression. The Annals of Statistics 25, 613-641. Su, .1.  ... 

CONNECTING INSIDE AND OUTSIDE THROUGH 360° IMAGERY FOR CLOSE-RANGE PHOTOGRAMMETRY

L. Barazzetti, M. Previtali, F. Roncoroni, R. Valente
2019 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
In the case of a photogrammetric project with several images acquired with a central perspective camera, the lack of total station measurements (i.e., control and check points) could result in a weak orientation  ...  for the limited overlap between images acquired through doors and windows.  ...  Probably, as the target has a limited size, the local distortion due to a different camera model is not significant and does not prevent correlation algorithms to match specific features.  ... 
doi:10.5194/isprs-archives-xlii-2-w9-87-2019 fatcat:nkbjtuvoejfnre3l56znecm4zq

Developing once, deploying everywhere: A case study using JIL

Carlos Duarte, Ana Paula Afonso
2011 Procedia Computer Science  
In this paper, we explore one of these frameworks, and report on the impact of its limitations on the development of a cooperative geo-referencing mobile application.  ...  However, these frameworks still possesses serious limitations, like the small number of features they make available when compared with native application development.  ...  The major limitation detracting from the user experience that we had to face, is related to limitations imposed by Android's sandbox model, which prevented access to the file system.  ... 
doi:10.1016/j.procs.2011.07.083 fatcat:gtbo7imhlbewtop3ejskhddiqe

The Application of New Automatic Weather Station in Power System

Jinhua Liu, Feilong Huang
2013 TELKOMNIKA Indonesian Journal of Electrical Engineering  
It can provide data self-checking function and improve reliability of data from unattended AWS. Finally, application models of monitoring data are introduced.  ...  Three-stage automatic self-checking for node state is included, which can make failure diagnosis efficient. Data quality checking node is created in new AWS.  ...  The node saves data from other distributed nodes and checks data according to three databases which are Limitation Database, Trends Regulation Database and Correlation Models Database.  ... 
doi:10.11591/telkomnika.v11i2.1990 fatcat:6ti5guracfd63lzgx7urb52mfa

The centralized originality check of the doctoral dissertations at the University of Belgrade: a model of a controlled and transparent procedure

Dragana Stolic, Vladimir Markovic
2022 Zenodo  
The procedure of originality check of the doctoral dissertations at the University in Belgrade, established in 2018 is presented in this paper.  ...  Since that year, at the University of Belgrade, the service Ithenticate (Turnitin) is used systematically for originality checks for all Ph.D. thesis that are in the process of evaluation.  ...  For this process of originality check, the Central Library of the University, University Library "Svetozar Marković", is taking charge.  ... 
doi:10.5281/zenodo.7040105 fatcat:jx7eloignrhlxoj7a6ja5rw3je

Model discovery, and replay fitness validation using inductive mining techniques in medical training of CVC surgery

Gopi Battineni, Nalini Chintalapudi, Francesco Amenta
2020 Applied Computing and Informatics  
As of this, we propose a methodology to discover a process model for identifying the sequence of medical training activities that had implemented in the installation of a Central Venous Catheter (CVC)  ...  A combination of parallel and sequential events of the process model was developed.  ...  The main limitation of this study was not to disclose the primary activity involvement and their contribution to the conformance check.  ... 
doi:10.1016/j.aci.2020.01.001 fatcat:bvyu5jdxibd2fk3ldmdifj5r2i
« Previous Showing results 1 — 15 out of 1,266,800 results