Filters








25,941 Hits in 2.3 sec

Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques

Jicheng Fu, Farokh B. Bastani, I-Ling Yen
2008 2008 11th IEEE High Assurance Systems Engineering Symposium  
The correctness can be independently verified via standard loop invariant proof steps, including initialization, maintenance, and termination.  ...  The discovery of loop invariants is a great challenge for the independent verification of automatically synthesized programs.  ...  As defined in [3] , strong solutions are guaranteed to achieve the specified goal, while strong cyclic solutions have a chance to terminate and they are guaranteed to achieve the goal state if they terminate  ... 
doi:10.1109/hase.2008.36 dblp:conf/hase/FuBY08 fatcat:2catbjt43vbyzgylc44q32yvky

The Design and Implementation of Multiterminal Based Proactive Information Delivery System

Shixiong Xia, Guan Yuan, Yanmei Zhang
2013 Mathematical Problems in Engineering  
To solve this problem, a multiterminal based proactive information delivery system (MPIDS) is designed and implemented in this paper.  ...  Currently, the development of various communication terminal devices has greatly promoted people's daily life, while information using efficiency with these devices decreases rapidly due to the information  ...  There are analysis of users interest, discovery of terminal capabilities, and guarantee of MPDIS operation. Analyzing of Users' Interests.  ... 
doi:10.1155/2013/379207 fatcat:zudvtgwpu5e2locdlbs3ti5sgi

Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability [chapter]

Malika Boulkenafed, Valérie Issarny
2003 Lecture Notes in Computer Science  
Our service enhances, in particular, data availability within mobile ad hoc collaborative groups, and integrates a new adaptive data replication protocol for mobile terminals, combining both optimistic  ...  In this paper, we present a middleware service that allows collaborative data sharing among ad hoc groups that are dynamically formed according to the connectivity achieved by the ad hoc WLAN.  ...  Acknowledgments The authors would like to acknowledge the work carried out by Raghav Bhaskar and Daniel Augot regarding security management in mobile ad hoc networks and their proposition to adapt group  ... 
doi:10.1007/3-540-44892-6_25 fatcat:sngf2nhednacbptpjxbf3b33qq

Software Architecture for Mobile Computing [chapter]

Amy L. Murphy, Gian Pietro Picco, Gruia-Catalin Roman
2003 Lecture Notes in Computer Science  
provision ♦ Providing service discovery in MANET ♦ Service repository is a tuple space ♦ Lookup is a query ♦ Secure tuple space sharing ♦ Protect tuple spaces with passwords ♦ Provide password protection  ...  terminals are extremely different ♦ e.g., GUI concerns, e.g., display size, resolution, colors, modes of interaction ♦ Research focused on providing some sort of terminal adaptation, defining languages  ...  ♦ Degree of atomicity ♦ Strikes in when determining the semantics of operations, and their relationship to sharing ♦ Determines the extent to which one can treat the GVDS as a "local" data structure ♦  ... 
doi:10.1007/978-3-540-39800-4_9 fatcat:g7uiakrkofetxbjzilds54jiey

Challenges in the migration to 4G mobile systems

Suk Yu Hui, Kai Hau Yeung
2003 IEEE Communications Magazine  
Wireless System Discovery -To use 4G services, multimode user terminals should be able to select the target wireless systems.  ...  SYSTEM Terminal Mobility -In order to provide wireless services at any time and anywhere, terminal mobility is a must in 4G infrastructure.  ... 
doi:10.1109/mcom.2003.1252799 fatcat:kjkuxp5mwrf2nk526og7zcii4u

A Comparative Analysis Of Performance And Qos Issues In Manets

Javed Parvez, Mushtaq Ahmad Peer
2010 Zenodo  
This paper focuses on key challenges in provisioning predetermined levels of such Quality of Service (QoS). It also identifies functional areas where QoS models are currently defined and used.  ...  All of the above applications of MANETs require guaranteed levels of performance as experienced by the end-user.  ...  In case of false source-based admission control or The weak side of SWAN approach is that it can only provide weak service guarantees and, although it is claimed to be stateless, intermediate nodes may  ... 
doi:10.5281/zenodo.1057121 fatcat:5cc54y7a5jgyvahi4rw7qj4jyi

Automatic consistency assessment for query results in dynamic environments

Jamie Payton, Christine Julien, Gruia-Catalin Roman
2007 Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering - ESEC-FSE '07  
Queries are convenient abstractions for the discovery of information and services, as they offer content-based information access.  ...  The protocol attaches an assessment of the achieved guarantee to returned query results, allowing precise reasoning about a query with a range of possible semantics.  ...  Acknowledgments This research was supported in part by ONR-MURI research contract N00014-02-1-0715. C.  ... 
doi:10.1145/1287624.1287659 dblp:conf/sigsoft/PaytonJR07 fatcat:2hmlbqhflrabvbgxwildxwaxdq

VIP (VHE in Mobile IP Networks) Architecture

Octavio Ramírez Rojas, Jalel Ben Othman, Safouane Sfar, Lynda Mokdad
2006 Journal of Communications  
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management.  ...  VHE gives a set of recommendations for providing users their home environment in foreign networks.  ...  Service Discovery proves that it is essential to design an effective mechanism for personalized discovery services for mobile users. 4) Adaptability: we define "adaptation" or "adaptability" of a system  ... 
doi:10.4304/jcm.1.5.28-38 fatcat:gi7wjhyyd5clhctbzcbeor33cu

Service Discovery from Observed Behavior while Guaranteeing Deadlock Freedom in Collaborations [chapter]

Richard Müller, Christian Stahl, Wil M. P. van der Aalst, Michael Westergaard
2013 Lecture Notes in Computer Science  
In this paper, we investigate the discovery of processes that are specified as services. Given a service S and observed behavior of a service P interacting with S, we discover a service model of P .  ...  The service discovery technique has been implemented in ProM and experiments using service models of industrial size demonstrate the scalability or our approach.  ...  We also plan to extend our approach to stronger correctness criteria than deadlock freedom, e.g., weak termination (i.e., the possibility to always terminate in a service composition).  ... 
doi:10.1007/978-3-642-45005-1_25 fatcat:jylvbcvlibctpaysfegmle2hr4

Agent spaces

Paul Tarau, Arun Majumdar, Paulo Moura
2012 Proceedings of the 2012 ACM Research in Applied Computation Symposium on - RACS '12  
the agent's code space communication between agents, including avatar updates, is supported by a remote predicate call mechanism between agent spaces, designed in a way that each call is atomic and guaranteed  ...  to terminate RLI calls an agent is also able to unvisit a given space -in which case the code of the avatar is completely removed and broadcasts of updates to the unvisited space are disabled Figure  ... 
doi:10.1145/2401603.2401662 dblp:conf/racs/TarauMM12 fatcat:thrdzcawdrfb5nljelqsviitfi

Secure Service Provision in Ad Hoc Networks [chapter]

Radu Handorean, Gruia-Catalin Roman
2003 Lecture Notes in Computer Science  
This paper describes a service provision model designed specifically for use in ad hoc settings.  ...  Service provision refers to the process by which devices advertise their willingness to offer specific services and discover other services.  ...  Blocking operations are not allowed in s, as they could prevent the program from ever terminating. In Lime, reactions come in two forms: strong reactions and weak reactions.  ... 
doi:10.1007/978-3-540-24593-3_25 fatcat:nrwqhovuhfad7ef52jvtwel3pm

A Grid Enabled Framework for Ubiquitous Healthcare Service Provisioning [chapter]

Oludayo, O., Olugbara, Sunday, O. Ojo, Mathew O.
2011 Advances in Grid Computing  
These metrics can guarantee that services are of high quality when the infrastructure supporting healthcare services can enable secure and ubiquitous discovery of personalized services, thereby satisfying  ...  In a recent development, Naseer & Stergioulas (2010) proposed a new novel WS based service discovery model for service discovery in Healthgrid based on WS and WS technologies to transform virtual healthcare  ...  A Grid Enabled Framework for Ubiquitous Healthcare Service Provisioning, Advances in Grid Computing, Dr.  ... 
doi:10.5772/15086 fatcat:mkbslu4egjb6blysqx7amiobhm

Soundness and Equivalence of Petri Nets and annotated Finite State Automate: A Comparison in the SOA context

Andreas Wombacher, Axel Martens
2007 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference  
The aim of this paper is to compare the equivalence and soundness relations of the Petri Net and annotated Finite State Automaton models in the context of Service Oriented Architectures.  ...  Business Process Modeling, Software and Service Engineering.  ...  Applying the weak soundness definition to the service discovery scenario means that if two interacting services are sound then there is a guarantee that the interaction can be terminated successfully,  ... 
doi:10.1109/dest.2007.371980 fatcat:3zcuwfojvjf2hl67m5npkghtsq

Scalable peer-to-peer process management - the OSIRIS approach

C. Schuler, R. Weber, H. Schuldt, H.-J. Schek
2004 Proceedings. IEEE International Conference on Web Services, 2004.  
General concepts and standards like SOAP, WSDL, and UDDI support the discovery and invocation of single web services.  ...  The functionality of applications is increasingly being made available by services.  ...  Retriable activities are guaranteed to terminate correctly, even if they have to be invoked repeatedly.  ... 
doi:10.1109/icws.2004.1314720 dblp:conf/icws/SchulerWSS04 fatcat:m3t66v464fcxhmwui4vxz3xtym

Contract-based discovery of Web services modulo simple orchestrators

Luca Padovani
2010 Theoretical Computer Science  
The availability of repositories of Web service descriptions enables interesting forms of dynamic Web service discovery, such as searching for Web services having a specified contract.  ...  This calls for a formal notion of contract equivalence satisfying two contrasting goals: being as coarse as possible so as to favor Web services reuse, and guaranteeing successful client/service interaction  ...  The context Γ memoizes triples (B, σ , τ ) so as to guarantee termination.  ... 
doi:10.1016/j.tcs.2010.05.002 fatcat:asked6ckuva7tat5mafxmir2oy
« Previous Showing results 1 — 15 out of 25,941 results