A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques
2008
2008 11th IEEE High Assurance Systems Engineering Symposium
The correctness can be independently verified via standard loop invariant proof steps, including initialization, maintenance, and termination. ...
The discovery of loop invariants is a great challenge for the independent verification of automatically synthesized programs. ...
As defined in [3] , strong solutions are guaranteed to achieve the specified goal, while strong cyclic solutions have a chance to terminate and they are guaranteed to achieve the goal state if they terminate ...
doi:10.1109/hase.2008.36
dblp:conf/hase/FuBY08
fatcat:2catbjt43vbyzgylc44q32yvky
The Design and Implementation of Multiterminal Based Proactive Information Delivery System
2013
Mathematical Problems in Engineering
To solve this problem, a multiterminal based proactive information delivery system (MPIDS) is designed and implemented in this paper. ...
Currently, the development of various communication terminal devices has greatly promoted people's daily life, while information using efficiency with these devices decreases rapidly due to the information ...
There are analysis of users interest, discovery of terminal capabilities, and guarantee of MPDIS operation.
Analyzing of Users' Interests. ...
doi:10.1155/2013/379207
fatcat:zudvtgwpu5e2locdlbs3ti5sgi
Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability
[chapter]
2003
Lecture Notes in Computer Science
Our service enhances, in particular, data availability within mobile ad hoc collaborative groups, and integrates a new adaptive data replication protocol for mobile terminals, combining both optimistic ...
In this paper, we present a middleware service that allows collaborative data sharing among ad hoc groups that are dynamically formed according to the connectivity achieved by the ad hoc WLAN. ...
Acknowledgments The authors would like to acknowledge the work carried out by Raghav Bhaskar and Daniel Augot regarding security management in mobile ad hoc networks and their proposition to adapt group ...
doi:10.1007/3-540-44892-6_25
fatcat:sngf2nhednacbptpjxbf3b33qq
Software Architecture for Mobile Computing
[chapter]
2003
Lecture Notes in Computer Science
provision ♦ Providing service discovery in MANET ♦ Service repository is a tuple space ♦ Lookup is a query ♦ Secure tuple space sharing ♦ Protect tuple spaces with passwords ♦ Provide password protection ...
terminals are extremely different ♦ e.g., GUI concerns, e.g., display size, resolution, colors, modes of interaction ♦ Research focused on providing some sort of terminal adaptation, defining languages ...
♦ Degree of atomicity ♦ Strikes in when determining the semantics of operations, and their relationship to sharing ♦ Determines the extent to which one can treat the GVDS as a "local" data structure ♦ ...
doi:10.1007/978-3-540-39800-4_9
fatcat:g7uiakrkofetxbjzilds54jiey
Challenges in the migration to 4G mobile systems
2003
IEEE Communications Magazine
Wireless System Discovery -To use 4G services, multimode user terminals should be able to select the target wireless systems. ...
SYSTEM Terminal Mobility -In order to provide wireless services at any time and anywhere, terminal mobility is a must in 4G infrastructure. ...
doi:10.1109/mcom.2003.1252799
fatcat:kjkuxp5mwrf2nk526og7zcii4u
A Comparative Analysis Of Performance And Qos Issues In Manets
2010
Zenodo
This paper focuses on key challenges in provisioning predetermined levels of such Quality of Service (QoS). It also identifies functional areas where QoS models are currently defined and used. ...
All of the above applications of MANETs require guaranteed levels of performance as experienced by the end-user. ...
In case of false source-based admission control or The weak side of SWAN approach is that it can only provide weak service guarantees and, although it is claimed to be stateless, intermediate nodes may ...
doi:10.5281/zenodo.1057121
fatcat:5cc54y7a5jgyvahi4rw7qj4jyi
Automatic consistency assessment for query results in dynamic environments
2007
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering - ESEC-FSE '07
Queries are convenient abstractions for the discovery of information and services, as they offer content-based information access. ...
The protocol attaches an assessment of the achieved guarantee to returned query results, allowing precise reasoning about a query with a range of possible semantics. ...
Acknowledgments This research was supported in part by ONR-MURI research contract N00014-02-1-0715. C. ...
doi:10.1145/1287624.1287659
dblp:conf/sigsoft/PaytonJR07
fatcat:2hmlbqhflrabvbgxwildxwaxdq
VIP (VHE in Mobile IP Networks) Architecture
2006
Journal of Communications
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management. ...
VHE gives a set of recommendations for providing users their home environment in foreign networks. ...
Service Discovery proves that it is essential to design an effective mechanism for personalized discovery services for mobile users. 4) Adaptability: we define "adaptation" or "adaptability" of a system ...
doi:10.4304/jcm.1.5.28-38
fatcat:gi7wjhyyd5clhctbzcbeor33cu
Service Discovery from Observed Behavior while Guaranteeing Deadlock Freedom in Collaborations
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we investigate the discovery of processes that are specified as services. Given a service S and observed behavior of a service P interacting with S, we discover a service model of P . ...
The service discovery technique has been implemented in ProM and experiments using service models of industrial size demonstrate the scalability or our approach. ...
We also plan to extend our approach to stronger correctness criteria than deadlock freedom, e.g., weak termination (i.e., the possibility to always terminate in a service composition). ...
doi:10.1007/978-3-642-45005-1_25
fatcat:jylvbcvlibctpaysfegmle2hr4
Agent spaces
2012
Proceedings of the 2012 ACM Research in Applied Computation Symposium on - RACS '12
the agent's code space communication between agents, including avatar updates, is supported by a remote predicate call mechanism between agent spaces, designed in a way that each call is atomic and guaranteed ...
to terminate RLI calls an agent is also able to unvisit a given space -in which case the code of the avatar is completely removed and broadcasts of updates to the unvisited space are disabled Figure ...
doi:10.1145/2401603.2401662
dblp:conf/racs/TarauMM12
fatcat:thrdzcawdrfb5nljelqsviitfi
Secure Service Provision in Ad Hoc Networks
[chapter]
2003
Lecture Notes in Computer Science
This paper describes a service provision model designed specifically for use in ad hoc settings. ...
Service provision refers to the process by which devices advertise their willingness to offer specific services and discover other services. ...
Blocking operations are not allowed in s, as they could prevent the program from ever terminating. In Lime, reactions come in two forms: strong reactions and weak reactions. ...
doi:10.1007/978-3-540-24593-3_25
fatcat:nrwqhovuhfad7ef52jvtwel3pm
A Grid Enabled Framework for Ubiquitous Healthcare Service Provisioning
[chapter]
2011
Advances in Grid Computing
These metrics can guarantee that services are of high quality when the infrastructure supporting healthcare services can enable secure and ubiquitous discovery of personalized services, thereby satisfying ...
In a recent development, Naseer & Stergioulas (2010) proposed a new novel WS based service discovery model for service discovery in Healthgrid based on WS and WS technologies to transform virtual healthcare ...
A Grid Enabled Framework for Ubiquitous Healthcare Service Provisioning, Advances in Grid Computing, Dr. ...
doi:10.5772/15086
fatcat:mkbslu4egjb6blysqx7amiobhm
Soundness and Equivalence of Petri Nets and annotated Finite State Automate: A Comparison in the SOA context
2007
2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference
The aim of this paper is to compare the equivalence and soundness relations of the Petri Net and annotated Finite State Automaton models in the context of Service Oriented Architectures. ...
Business Process Modeling, Software and Service Engineering. ...
Applying the weak soundness definition to the service discovery scenario means that if two interacting services are sound then there is a guarantee that the interaction can be terminated successfully, ...
doi:10.1109/dest.2007.371980
fatcat:3zcuwfojvjf2hl67m5npkghtsq
Scalable peer-to-peer process management - the OSIRIS approach
2004
Proceedings. IEEE International Conference on Web Services, 2004.
General concepts and standards like SOAP, WSDL, and UDDI support the discovery and invocation of single web services. ...
The functionality of applications is increasingly being made available by services. ...
Retriable activities are guaranteed to terminate correctly, even if they have to be invoked repeatedly. ...
doi:10.1109/icws.2004.1314720
dblp:conf/icws/SchulerWSS04
fatcat:m3t66v464fcxhmwui4vxz3xtym
Contract-based discovery of Web services modulo simple orchestrators
2010
Theoretical Computer Science
The availability of repositories of Web service descriptions enables interesting forms of dynamic Web service discovery, such as searching for Web services having a specified contract. ...
This calls for a formal notion of contract equivalence satisfying two contrasting goals: being as coarse as possible so as to favor Web services reuse, and guaranteeing successful client/service interaction ...
The context Γ memoizes triples (B, σ , τ ) so as to guarantee termination. ...
doi:10.1016/j.tcs.2010.05.002
fatcat:asked6ckuva7tat5mafxmir2oy
« Previous
Showing results 1 — 15 out of 25,941 results