Filters








3,178 Hits in 5.1 sec

STATIC TOOL ENVIRONMENT FOR RULE TERMINATION ANALYSIS BY REFINED EVOLUTION GRAPHS

Hany Harb, Hamdy Kelash, Ahmed Shehata
2007 JES. Journal of Engineering Sciences  
This algorithm uses evolution graphs which simulating rule processing statically and considering both rule activation and deactivation.  ...  A new algorithm for static rule termination analysis within active databases is introduced.  ...  We represent the fact that a rule may deactivate other rules by considering it in conjunction with rules triggering and activation through a new graph: the evolution graph (EG).  ... 
doi:10.21608/jesaun.2007.111412 fatcat:6n2yw2h6lfegpjmavdrdms64lu

Termination Analysis of Active Rules with Priorities [chapter]

Alain Couchot
2003 Lecture Notes in Computer Science  
This paper presents an algorithm for termination static analysis of active rules with priorities. Active rules termination is an undecidable problem.  ...  Several recent works have suggested proving termination by using the concept of triggering graph. We propose here a refinement of these works, exploiting the priorities defined between rules.  ...  Let us study the termination of the set of rules of our motivating example. {R 3 , R 4 }) is a destabilizing set of the path (R 2 →R 1 ) (see section 5.1).  ... 
doi:10.1007/978-3-540-45227-0_82 fatcat:72cqim7owjbita6mwdffizrc6i

Sufficient Conditions for Well-Behaved Adaptive Hypermedia Systems [chapter]

Hongjing Wu, Paul De Bra
2001 Lecture Notes in Computer Science  
Unfortunately termination and confluence are undecidable in general. In this paper we discuss sufficient conditions to help authors to write adaptation rules that satisfy termination and confluence.  ...  We focus on well-behaved Adaptive Hypermedia Systems, which means the adaptation engine that executes adaptation rules always terminates and produces predictable (confluent) adaptation results.  ...  i may deactivate R j if the execution of action A i can change the database from a state in which C j is true to a state in which C j is false.Definition 2: A rule set terminates if the rules cannot activate  ... 
doi:10.1007/3-540-45490-x_17 fatcat:zmlgipsl4nawda34ugww2letpy

Design issues for general-purpose adaptive hypermedia systems

Hongjing Wu, Erik de Kort, Paul De Bra
2001 Proceedings of the twelfth ACM conference on Hypertext and Hypermedia - HYPERTEXT '01  
We draw parallels with static rule analysis in active database systems [1,2].  ...  By using common properties of AHS we are able to obtain more precise (less conservative) results for AHS than for active databases in general, especially for the problem of termination.  ...  The effect of A i can be the activation of r j as well as the deactivation of r j . AG as obtained through the basic PA is thus an Activation Graph as well as a Deactivation Graph (say DG).  ... 
doi:10.1145/504216.504256 dblp:conf/ht/WuKB01 fatcat:uuhlgetqqben3bgtvetw3myvci

Design issues for general-purpose adaptive hypermedia systems

Hongjing Wu, Erik de Kort, Paul De Bra
2001 Proceedings of the twelfth ACM conference on Hypertext and Hypermedia - HYPERTEXT '01  
We draw parallels with static rule analysis in active database systems [1,2].  ...  By using common properties of AHS we are able to obtain more precise (less conservative) results for AHS than for active databases in general, especially for the problem of termination.  ...  The effect of A i can be the activation of r j as well as the deactivation of r j . AG as obtained through the basic PA is thus an Activation Graph as well as a Deactivation Graph (say DG).  ... 
doi:10.1145/504255.504256 fatcat:mhnvwsxmcjdz5hudzpma4vrzlu

An Algebraic Approach to Rule Analysis in Expert Database Systems

Elena Baralis, Jennifer Widom
1994 Very Large Data Bases Conference  
Our methods are based on previous methods for analyzing rules in active database systems.  ...  While Condition-Action rules in database systems are very powerful, they also can be very diicult to program, due to the unstructured and unpredictable nature of rule processing.  ...  Acknowledgements Thanks to the members of the Stanford Database Group, especially Ashish Gupta and Jeff Ullman, for lively and useful discussions, and to Stefano Ceri for providing the technical impetus  ... 
dblp:conf/vldb/BaralisW94 fatcat:vvhwfxsudbbcxgvfxsx3nbw6be

An Active Temporal Model for Network Management Databases [chapter]

Masum Z. Hasan
1995 Integrated Network Management IV  
We propose a model of a database that combines and extends the features of active and temporal databases as a model for a network management database.  ...  This is precisely our purpose in this paper to show that by viewing the network as a conceptual global database the six management functionalities can be performed in a declarative. fashion through specification  ...  Active behavior in an ADBMS is achieved through Event-Condition-Action (ECA) [MD89] rules. The rules state that when the specified event(s) occurs and the condition holds, perform the action.  ... 
doi:10.1007/978-0-387-34890-2_45 fatcat:ysxufeasgrfnlcdx3ttq6win4i

SimSG: Rule-based Simulation using Stochastic Graph Transformation

Sebastian Ehmes, Lars Fritsche, Andy Schürr
2019 Journal of Object Technology  
using graph transformation rules, whose application depends on the current state and their application probabilities.  ...  To the best of our knowledge, there is currently no general-purpose simulation tool available anymore that performs rule-based simulations using stochastic graph transformation.  ...  This includes: pattern matching, stochastic model graph transformation through rule application, checking for termination conditions and recording simulation statistics.  ... 
doi:10.5381/jot.2019.18.3.a1 fatcat:2qtjwoh6arffxh3fn4cwoea7gm

Risk-Aware Framework for Activating and Deactivating Policy-Based Response

Wael Kanoun, Nora Cuppens-Boulahia, Frederic Cuppens, Samuel Dubus
2010 2010 Fourth International Conference on Network and System Security  
Second, a risk-aware framework is proposed to activate and deactivate response policies.  ...  In particular, the deactivation issue is not yet tackled. In this paper, we first present how to specify response policies.  ...  Usually, attack objectives are the terminal nodes in an attack graph, and they violate the security and operational policy of the monitored system.  ... 
doi:10.1109/nss.2010.80 dblp:conf/nss/KanounCCD10 fatcat:nphpgzklkzcb3huotclq3y5ltu

Architecture and Implementation of an Interactive Tool for the Design and Visualization of Active Capability [chapter]

Sharma Chakravarthy, Seokwon Yang
2002 Visual and Multimedia Information Management  
Event -Condition -Action (or ECA) rules are used to support active capability in a system.  ...  Active capability has been proposed as a paradigm to meet the demands of many database and other applications that require a timely response to situations.  ...  In contrast, in active database systems, we have schema design as well as rule design for an application that uses active capability.  ... 
doi:10.1007/978-0-387-35592-4_9 fatcat:g2g6nlxrabab7o6gpiy2jwwivq

Active database systems

Norman W. Paton, Oscar Díaz
1999 ACM Computing Surveys  
Active database systems support mechanisms that enable them to respond automatically to events that are taking place either inside or outside the database system itself.  ...  This high level of activity has not yielded a single agreed-upon standard approach to the integration of active functionality with conventional database systems, but has led to improved understanding of  ...  ACKNOWLEDGMENTS We are grateful to our colleagues for useful discussions on active database systems, including Alex Buchmann, Andrew Dinn, Alvaro Fernandes, Ray Fernandez, Peter Gray, Jon Iturrioz, Arturo  ... 
doi:10.1145/311531.311623 fatcat:oye4mjjz2femjcnmjaa4fagxdm

Petri net Modelling of the Automatic Test System for Mobile Phone Battery

João Paulo Apoliano Oliveira, Jandecy Cabral Leite, Luiz Henrique Carneiro Valda, Rivanildo Duarte Almeida
2019 International Journal of Advanced Engineering Research and Science  
resistance, anode and cathode battery terminal cut, visual inspection of these and battery thickness selection in a mobile phone battery production line of a company in the Industrial Pole of Manaus (  ...  It was also possible to verify that using this tool it is possible to obtain a high level of understanding of real progress and evolution of the system through the dynamic visualization of graphs related  ...  M1- DEACTIVATED Turntable motor C4- DEACTIVATED battery terminal cutter cylinder M2 ACTIVATED input conveyor motor C5 ACTIVATED terminal cutting inspection cylinder M2- DEACTIVATED input conveyor motor  ... 
doi:10.22161/ijaers.6744 fatcat:dcxjbhpvcjhatpvw4mwwtda5xa

A model of OASIS role-based access control and its support for active security

Walt Yao, Ken Moody, Jean Bacon
2001 Proceedings of the sixth ACM symposium on Access control models and technologies - SACMAT '01  
Roles are activated for the duration of a session only. In addition, a role is deactivated immediately if any of the conditions of the membership rule associated with its activation becomes false.  ...  Services define roles and implement formally specified policy for role activation and service use; users must present the required credentials, in the specified context, in order to activate a role or  ...  If a user is active in the role r through the activating rule γ ∈ Γ for r, r shall be immediately deactivated if the associated membership rule (x1, x2, ..., xm r) can no longer be satisfied.  ... 
doi:10.1145/373256.373294 dblp:conf/sacmat/YaoMB01 fatcat:ltxlfigwmjborn52geyhrm3nly

A model of OASIS role-based access control and its support for active security

Jean Bacon, Ken Moody, Walt Yao
2002 ACM Transactions on Privacy and Security  
Roles are activated for the duration of a session only. In addition, a role is deactivated immediately if any of the conditions of the membership rule associated with its activation becomes false.  ...  Services define roles and implement formally specified policy for role activation and service use; users must present the required credentials, in the specified context, in order to activate a role or  ...  If a user is active in the role r through the activating rule γ ∈ Γ for r, r shall be immediately deactivated if the associated membership rule (x1, x2, ..., xm r) can no longer be satisfied.  ... 
doi:10.1145/581271.581276 fatcat:xvsa4k7pqvcsjdh5w3keto7ehe

Graph Management Systems: A Qualitative Survey

Maurizio Nolé, Carlo Sartiani
2020 APTIKOM Journal on Computer Science and Information Technologies  
In this paper we provide an overview of several graph database systems and graph processing systems, with the aim of assisting the reader in identifying the best-suited solution for her application scenario  ...  These systems could be divided into specialized graph database systems and large-scale graph analytics systems.  ...  Algorithm termination is based on every vertex voting to halt. In superstep 0, every vertex is in active state; all active vertices participate in the computation of any given superstep.  ... 
doi:10.34306/csit.v5i1.132 fatcat:wttmyaeuzvadpnrfrnawjvq46y
« Previous Showing results 1 — 15 out of 3,178 results