Filters








274 Hits in 3.6 sec

Timed Multiset Rewriting and the Verification of Time-Sensitive Distributed Systems [article]

Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott
2021 arXiv   pre-print
Finally, we demonstrate that the rewriting logic system Maude can be used to automate time bounded verification of PTS.  ...  This paper proposes a Multiset Rewriting language with explicit time for specifying and analysing TSDSes.  ...  Kanovich's and Scedrov's work on this paper was partially carried out within the framework of the Basic Research Program at the National Research University Higher School of Economics (HSE) and partially  ... 
arXiv:1606.07886v2 fatcat:auwop2u7yra63hbnjxqtzesjwi

Relating State-Based and Process-Based Concurrency through Linear Logic

Iliano Cervesato, Andre Scedrov
2006 Electronical Notes in Theoretical Computer Science  
Concurrent and distributed systems are notoriously hard to get right.  ...  This interpretation drops the distinction between multiset elements and rewrite rules, and considerably enriches the expressive power of standard multiset rewriting with embedded rules, choice, replication  ...  Acknowledgments We are grateful to Frank Pfenning, Dale Miller, Mark-Oliver Stehr, Valeria de Paiva, Gerald Allwein, Steve Zdancevic and Vijay Saraswat for their comments on various aspects of this work  ... 
doi:10.1016/j.entcs.2006.05.043 fatcat:eavrmrbudjbvbhnu2zlxecsd2e

Twenty years of rewriting logic

José Meseguer
2012 The Journal of Logic and Algebraic Programming  
and verification, security, real-time and cyber-physical systems, probabilistic systems, bioinformatics and chemical systems.  ...  This paper provides a gentle, intuitive introduction to its main ideas, as well as a survey of the work that many researchers have carried out over the last twenty years in advancing: (i) its foundations  ...  I thank the organizers of WRLA 2010 for giving me the opportunity and the stimulus to do some reflecting, surveying, and guessing about rewriting logic at this point, when twenty years have passed since  ... 
doi:10.1016/j.jlap.2012.06.003 fatcat:5tx4a5uxlvapfpf5fajozkbboi

Twenty Years of Rewriting Logic [chapter]

José Meseguer
2010 Lecture Notes in Computer Science  
and verification, security, real-time and cyber-physical systems, probabilistic systems, bioinformatics and chemical systems.  ...  This paper provides a gentle, intuitive introduction to its main ideas, as well as a survey of the work that many researchers have carried out over the last twenty years in advancing: (i) its foundations  ...  I thank the organizers of WRLA 2010 for giving me the opportunity and the stimulus to do some reflecting, surveying, and guessing about rewriting logic at this point, when twenty years have passed since  ... 
doi:10.1007/978-3-642-16310-4_2 fatcat:ho7s76r67nc63bndpoptbh5k4e

Logical Foundations of Secure Resource Management in Protocol Implementations [chapter]

Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei
2013 Lecture Notes in Computer Science  
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques to develop powerful type systems for the verification of a wide range of security properties on application  ...  We further devise a sound and complete type checking algorithm. We discuss the effectiveness of our approach on a case study from the world of e-commerce protocols.  ...  In a previous work [13] , we made initial steps towards the design of a sound system for resource-sensitive authorization, drawing on techniques from type systems for authentication and an affine extension  ... 
doi:10.1007/978-3-642-36830-1_6 fatcat:afrsiefbhndkhpebfw7poq5csa

On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report [article]

Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott
2021 arXiv   pre-print
This paper develops a Multiset Rewriting language with explicit time for the specification and analysis of Time-Sensitive Distributed Systems (TSDS).  ...  We prove that for this class of systems the properties of recoverability and reliability coincide and are PSPACE-complete.  ...  Introduction In our previous work [16] , we considered the verification of Time-Sensitive Distributed Systems (TSDS) motivated by applications with autonomous drones performing surveillance of an area  ... 
arXiv:2105.03531v4 fatcat:wmab2iwjn5flnjit2sf4waqhny

V-SMART-Join: A Scalable MapReduce Framework for All-Pair Similarity Joins of Multisets and Vectors [article]

Ahmed Metwally, Christos Faloutsos
2012 arXiv   pre-print
V-SMART-Join is motivated by the observed skew in the underlying distributions of Internet traffic, and is a family of 2-stage algorithms, where the first stage computes and joins the partial results,  ...  They were up to 30 times faster than the state of the art algorithm, VCL, when compared on a real dataset of a small size.  ...  Acknowledgments We would like to thank Matt Paduano for his valuable discussions, Amr Ebaid for implementing the Lookup algorithm, Adrian Isles and the anonymous reviewers for the rigorous revision of  ... 
arXiv:1204.6077v1 fatcat:y7uzhtcxefe25funzdaiwk3lum

V-SMART-join

Ahmed Metwally, Christos Faloutsos
2012 Proceedings of the VLDB Endowment  
V-SMART-Join is motivated by the observed skew in the underlying distributions of Internet traffic, and is a family of 2-stage algorithms, where the first stage computes and joins the partial results,  ...  They were up to 30 times faster than the state of the art algorithm, VCL, when compared on a real dataset of a small size.  ...  Acknowledgments We would like to thank Matt Paduano for his valuable discussions, Amr Ebaid for implementing the Lookup algorithm, Adrian Isles and the anonymous reviewers for the rigorous revision of  ... 
doi:10.14778/2212351.2212353 fatcat:b5zuj2j6szewzpsgrhxnmk33h4

LicenseScript: a logical language for digital rights management

Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter Hartel, Yee Wei Law, Andrew Tokmakoff
2006 Annales des télécommunications  
We propose LicenseScript, a language for digital rights management (DRM) based on multiset rewriting and logic programming.  ...  Components and relations support a wide variety of models of the rights management systems. We elaborate on the models in section 11.3.  ...  Licen-seScript is strictly more powerful than existing languages such as ORDL and XrML because LicenseScript supports both the static aspects of rights control and the dynamic aspects of rights evolution  ... 
doi:10.1007/bf03219910 fatcat:wsktfxbmg5dirjfcozo67xtjrm

xTune

Minyoung Kim, Mark-Oliver Stehr, Carolyn Talcott, Nikil Dutt, Nalini Venkatasubramanian
2012 ACM Transactions on Embedded Computing Systems  
We demonstrate the applicability of this approach to the adaptive provisioning of resource-limited distributed real-time systems using a mobile multimedia case study.  ...  One objective of this approach is to enable trade-off analysis across multiple layers (e.g., application, middleware, OS) and predict the possible property violations as the system evolves dynamically  ...  In Maude syntax, the system state (configuration) is represented as a multiset of objects and messages.  ... 
doi:10.1145/2362336.2362340 fatcat:22rpg3r3i5cp5g5gznxy5vx53m

Software architecture styles as graph grammars

Daniel Le Métayer
1996 Software engineering notes  
We present a formalism for the definition of software architectures in terms of graphs. Nodes represent the individual agents and edges define their interconnection.  ...  The rules of the coordinator are statically checked to ensure that they preserve the constraints imposed by the architecture style.  ...  Jean-Pierre Ban£tre, Alexandra Holzbacher and Val~rie Issarny provided valuable feedback on an earlier version of this paper.  ... 
doi:10.1145/250707.239105 fatcat:g77eakvb7vhxtf25fymo6ccmcq

Implementing Mitogen Activated Protein Kinases Cascade on Membrane Computing Using P-Lingua

Bareq Shaalan, Ravie Chandren Muniyandi
2015 Journal of Computer Science  
This approach deals with parallel, distributed and non-deterministic computing models.  ...  The Mitogen Activated Protein Kinases (MAPK) cascade has been used as a case study for different computational software tools in both modelling and simulation of real-life problems.  ...  Acknowledgment This study has been supported in part by a grant of grant code FRGS/1/2012/SGOS/UKM/02/3 of the University Kebangsaan Malaysia (National University of Malaysia).  ... 
doi:10.3844/jcssp.2015.178.187 fatcat:ayuxeev2frakbacge5exeu3i7y

Automated Backward Analysis of PKCS#11 v2.20 [chapter]

Robert Künnemann
2015 Lecture Notes in Computer Science  
Formal verification of PKCS#11 configurations requires the analysis of a system that contains mutable state, a problem that existing methods solved by either artificially restricting the number of keys  ...  This configuration supports the creation of so-called wrapping keys for import and export of sensitive keys (e. g., for backup or transfer), and it permits the co-existence of sensitive keys and non-sensitive  ...  This work was supported by the German Federal Ministry of Education and Research (BMBF) within EC SPRIDE.  ... 
doi:10.1007/978-3-662-46666-7_12 fatcat:5b3udh2ij5ewdg7yl6q4gc7ry4

Validating Behavioral Component Interfaces in Rewriting Logic

Einar Broch Johnsen, Olaf Owe, Arild B. Torjusen
2006 Electronical Notes in Theoretical Computer Science  
Acknowledgement We thank Andreas Grüner for giving insight to the field of testing of (concurrent) object-oriented languages, the members of the PMA group for valuable feedback and the anonymous referees  ...  Axelsen for contributing to the implementation of these ideas and to the anonymous referees for helpful comments.  ...  Verification and testing of open distributed systems The primary goal of this dissertation is verification and testing of open distributed systems.  ... 
doi:10.1016/j.entcs.2005.12.069 fatcat:chb5rxirp5afld7emzxe6pdlim

Time, computational complexity, and probability in the analysis of distance-bounding protocols

Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott
2017 Journal of Computer Security  
As a formal model for representing and analyzing Cyber-Physical properties, we propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols.  ...  Time plays a key role in design and analysis of many of these protocols.  ...  This article was prepared within the framework of the Basic Research Program at the National Research University Higher School of Economics (HSE) and supported within the framework of a subsidy by the  ... 
doi:10.3233/jcs-0560 fatcat:yquvrtuxnja4dl5tkt6bt6u43q
« Previous Showing results 1 — 15 out of 274 results