Filters








41,637 Hits in 3.4 sec

Liveness by Invisible Invariants [chapter]

Yi Fang, Kenneth L. McMillan, Amir Pnueli, Lenore D. Zuck
2006 Lecture Notes in Computer Science  
It is often the case that the inductive invariants for systems with "liveness monitors" contain assertions of a certain form that the original method of invisible invariant is not able to generate, nor  ...  In this paper, we apply the method of invisible invariant to "bounded response" properties, i.e., liveness properties of the type p =⇒ ½ q that are bounded -once a p-state is reached, it takes a bounded  ...  In Section 4, we describe how to construct liveness monitors. In some cases, the inductive invariant requires ∃∀-components, to which the invisible invariant method no longer applies.  ... 
doi:10.1007/11888116_26 fatcat:mr5ph4prsvgl3gm6zmxhufhtvm

Liveness with Invisible Ranking [chapter]

Yi Fang, Nir Piterman, Amir Pnueli, Lenore Zuck
2004 Lecture Notes in Computer Science  
The method of Invisible Invariants was developed originally in order to verify safety properties of parameterized systems fully automatically.  ...  In this paper we develop novel proof rules for liveness properties, all of whose proof obligations are of the correct form to be handled by the small model theorem.  ...  Because the user never gets to see the auxiliary invariant, we refer to this method as the method of invisible invariants.  ... 
doi:10.1007/978-3-540-24622-0_19 fatcat:4mdxlyk63jbivl6pclhweysk2m

Liveness with invisible ranking

Yi Fang, Nir Piterman, Amir Pnueli, Lenore Zuck
2006 International Journal on Software Tools for Technology Transfer (STTT)  
The method of Invisible Invariants was developed originally in order to verify safety properties of parameterized systems fully automatically.  ...  In this paper we develop novel proof rules for liveness properties, all of whose proof obligations are of the correct form to be handled by the small model theorem.  ...  Because the user never gets to see the auxiliary invariant, we refer to this method as the method of invisible invariants.  ... 
doi:10.1007/s10009-005-0193-x fatcat:nvbskez7vfdwxdf5jpwfd2ik3y

IIV: An Invisible Invariant Verifier [chapter]

Ittai Balaban, Yi Fang, Amir Pnueli, Lenore D. Zuck
2005 Lecture Notes in Computer Science  
Introduction This paper describes the Invisible Invariant Verifier (IIV)-an automatic tool for the generation of inductive invariants, based on the work in [4, 1, 2, 6] .  ...  Invisible Invariants. Uniform verification of parameterized systems is one of the most challenging problems in verification.  ... 
doi:10.1007/11513988_39 fatcat:khhmdzkotnfpnp5fpdbw6ssh5y

Counting dark matter particles in LHC events

Gian Francesco Giudice, Ben Gripaios, Rakhi Mahbubani
2012 Physical Review D  
We propose a method to count invisible particles, based on fitting the shapes of certain transverse- or invariant-mass distributions, discuss various effects that may affect the measurement, and simulate  ...  We suggest trying to count the number of invisible particles produced in missing energy events at the LHC, arguing that multiple production of such particles provides evidence that they constitute stable  ...  For example, an invisible particle produced at the LHC need only live long enough to escape the detectors, while the DM in the cosmos has been around for billions of years.  ... 
doi:10.1103/physrevd.85.075019 fatcat:kghhy5d2tbhf5evzlzpxgchsuu

Page 139 of Forum and Century Vol. 52, Issue [page]

1914 Forum and Century  
Moreau is destroyed by the beasts he is attempting to vivisect into the semblance of men, the Invisible Man is battered to death with a spade, the Visiting Angel burns to death in attempting to carry out  ...  Invariably these experiments in human possibility, placed in a world where charity is not so strong as fear, die quite hor- ribly. Dr.  ... 

Determining the lifetime of long-lived particles at the LHC [article]

Shankha Banerjee, Biplob Bhattacherjee, Andreas Goudelis, Björn Herrmann, Dipan Sengupta, Rhitaja Sengupta
2020 arXiv   pre-print
We employ model-dependent and model-independent methods in order to reconstruct the proper lifetime of neutral long-lived particles decaying into displaced leptons or jets, potentially accompanied by missing  ...  energy, as well as charged long-lived particles decaying into leptons and missing energy.  ...  One possibility is to employ the dilepton invariant mass edge, which is determined by the difference between the mass of the LLP and that of the invisible particle M edge = m X − m Y = ∆ (3.3) and to  ... 
arXiv:1912.06669v2 fatcat:d3zsphav25dmlflafn245w7rle

Page 320 of The New Universal Magazine, or Miscellany of Historical, Philosophical, Political and Polite Literature Vol. 11, Issue 65 [page]

1809 The New Universal Magazine, or Miscellany of Historical, Philosophical, Political and Polite Literature  
We have lived, Mr. Editor, to see prostitutes. pensionec, and the friends of prostitutes supported by subscription.  ...  ‘he invisible fence in this simple form of the height of three feet six inches, has, in the Royal Pleasure Grounds at Frogmore, and in various rks of the nobility and gentry, een invariably found adequate  ... 

Searching for an invisibleA′vector boson with DarkLight

Yonatan Kahn, Jesse Thaler
2012 Physical Review D  
invariant mass-squared to mitigate pileup.  ...  In this paper, we demonstrate that DarkLight is also sensitive to an A' decaying to invisible final states.  ...  YK is supported by an NSF Graduate Fellowship, and JT is supported by the DOE Early Career research program DE-FG02-11ER-41741.  ... 
doi:10.1103/physrevd.86.115012 fatcat:qmtzv3ewcfc3xefokzhnok4kea

Page 755 of New Englander and Yale Review Vol. 42, Issue 177 [page]

1883 New Englander and Yale Review  
He cannot be perceived by the senses. His form we cannot see; his voice we cannot hear. No mortal eye hath seen him, or can see him and live.  ...  Bushnell, Sermons on Living Subjects. Ser. v1.  ... 

Invisible Safety of Distributed Protocols [chapter]

Ittai Balaban, Amir Pnueli, Lenore D. Zuck
2006 Lecture Notes in Computer Science  
that are amenable to Invisible Invariants, where "reachable" is replaced by "colored."  ...  The method of "Invisible Invariants" has been applied successfully to protocols that assume a "symmetric" underlying topology, be it cliques, stars, or rings.  ...  cannot be handled by the method of Invisible Invariants.  ... 
doi:10.1007/11787006_45 fatcat:dn6srvixnfcjxj6b5kyjt7rkdq

Parameterized Verification with Automatically Computed Inductive Assertions? [chapter]

Tamarah Arons, Amir Pnueli, Sitvanit Ruah, Ying Xu, Lenore Zuck
2001 Lecture Notes in Computer Science  
The paper presents a method, called the method of verification by invisible invariants, for the automatic verification of a large class of parameterized systems.  ...  The generated invariants can be transferred to the VC-validation phase without ever been examined by the user, which explains why we refer to them as "invisible".  ...  This research was supported in part by the Minerva Center for Verification of Reactive Systems, a gift from Intel, a grant from the German -Israel Foundation for Scientific Research and Development, and  ... 
doi:10.1007/3-540-44585-4_19 fatcat:bgg3ih6edrgqthvp73khlut52m

Revisiting monotop production at the LHC

Idir Boucheneb, Giacomo Cacciapaglia, Aldo Deandrea, Benjamin Fuks
2015 Journal of High Energy Physics  
We revisit the originally proposed monotop setup by embedding the effective couplings of the top quark in an SU(2)L invariant formalism.  ...  We show that minimality selects one model for each of the possible production mechanisms: a scalar field coupling to a right-handed top quark and an invisible fermion when the monotop system is resonantly  ...  We acknowledge support by the Theory-LHC France initiative of CNRS/IN2P3.  ... 
doi:10.1007/jhep01(2015)017 fatcat:r3yx6u52ejbvxee7dfxadlq55y

Liveness with Incomprehensible Ranking [chapter]

Yi Fang, Nir Piterman, Amir Pnueli, Lenore Zuck
2004 Lecture Notes in Computer Science  
The methods of Invisible Invariants and Invisible Ranking were developed originally in order to verify temporal properties of parameterized systems in a fully automatic manner.  ...  This enables us to apply the Invisible Ranking method to parameterized systems with ring topologies.  ...  In [10] we extended the method of invisible invariants to invisible ranking, by applying the method for automatic generation of auxiliary assertions to general assertions (not necessarily invariant),  ... 
doi:10.1007/978-3-540-24730-2_36 fatcat:jg6h4dnkczgrtgydd6yqvr5zme

Page 264 of California University Chronicle Vol. 4, Issue 4 [page]

1901 California University Chronicle  
may I join the choir invisible Of those immortal dead who live again In minds made better by their presence; live In pulses stirred to generosity, In deeds of daring rectitude, in scorn For miserable aims  ...  A beautiful tribute to his relation toward the student body is that his birthday was each year invariably remem- bered by some gift and some expression of their love from his pupils.  ... 
« Previous Showing results 1 — 15 out of 41,637 results