44,448 Hits in 5.2 sec

Protocol Design and Implementation Using Formal Methods

M. van Sinderen, L. F. Pires, C. A. Vissers
1992 Computer journal  
The paper concludes with some suggestions for relating design methods to milestones in the protocol design and implementation processes.  ...  This paper reports on a number of formal methods that support correct protocol design and implementation.  ...  The decomposition process starts from an (N)-service specification and produces an (N)-protocol specification that is structured in terms of (N)-protocol entities and an underlying (N-1)-service.  ... 
doi:10.1093/comjnl/35.5.478 fatcat:ycfa2jsn5vewdfxykbxseuhpg4

Measuring Identification and Quantification Errors in Spectral CT Material Decomposition

Aamir Raja, Mahdieh Moghiseh, Christopher Bateman, Niels de Ruiter, Benjamin Schon, Nanette Schleich, Tim Woodfield, Anthony Butler, Nigel Anderson
2018 Applied Sciences  
At 1 mg/mL, gadolinium was misidentified in 38% of voxels for the filtered protocol and 58% of voxels for the unfiltered protocol.  ...  The potential to use spectral information for decomposing the linear attenuation coefficient into two or more basis for material discrimination (also called material decomposition MD) was proposed by Alvarez  ...  Acknowledgments: We are grateful to Medipix2 and Medipix3 collaborations at CERN, to X-ray Imaging Europe GmbH for the CdTe bonding, and to the MARS and Create Research teams in Christchurch, New Zealand  ... 
doi:10.3390/app8030467 fatcat:xfnwpj4r3ne53bm5e7hmds7mbq

Fault-tolerant, high-level quantum circuits: form, compilation and description

Alexandru Paler, Ilia Polian, Kae Nemoto, Simon J Devitt
2017 Quantum Science and Technology  
We introduce a package that converts high level quantum circuits consisting of commonly used gates into a form employing all decompositions and ancillary protocols needed for fault-tolerant error correction  ...  and a series of time ordered X- or Z-basis measurements.  ...  This fact shows that, once a circuit is ICM transformed, it can be easily stored into the database for future transformations to use it as a sub circuit (e.g. modular adders used in modular multiplications  ... 
doi:10.1088/2058-9565/aa66eb fatcat:mlqzapmtqzerno47puhhat57a4

ABBA: an architecture for deploying business-to-business electronic commerce applications

Youcef Baghdadi
2004 Electronic Commerce Research and Applications  
In the light of this analysis and a specification of B2B EC requirements, we propose ABBA, a comprehensive architecture, and a corresponding design process.  ...  ABBA is a layered architecture with four interfaced abstraction levels: business model and business process, business process decomposition and distribution, supporting services, and integration technology  ...  This requires a common representation (or modeling), and a managing responsibility of the business process regardless of the technology. • Guidelines for a design process (towards a methodology) to deploy  ... 
doi:10.1016/j.elerap.2003.09.006 fatcat:eahyypqofbaftl3f7wgipj5bsa


Antonie Van Rensburg
2012 South African Journal of Industrial Engineering  
This article introduces and discusses a proposed methodology for analysing real world problems in order to construct valid simulation models.  ...  To manage problems , is to try and cope with a flux of interacting events and ideas which unrolls through time -with the manager trying to improve situations seen as problematical, or at least as less  ...  In the search for a methodology that can be used to define specifications for simulation models, experiments with current methodologies and techniques (such as process flows, entity relationship diagrams  ... 
doi:10.7166/8-2-393 fatcat:zon5gslpmbcbzn7zkla5xmisn4

Formal Methods in Communication Protocol Design

G. Bochmann, C. Sunshine
1980 IRE Transactions on Communications Systems  
This specification was the basis for the different protocol implementations in different host computers.  ...  (Other techniques for managing the complexity of protocols are discussed in Section As noted above, one major goal of protocol specification is to provide a basis for implementation.  ... 
doi:10.1109/tcom.1980.1094685 fatcat:jrxd6je3hjgmraifmvyxxcbfke

Web of Things as a Framework for Ubiquitous Intelligence and Computing [chapter]

Tharam S. Dillon, Alex Talevski, Vidyasagar Potdar, Elizabeth Chang
2009 Lecture Notes in Computer Science  
In this paper, we propose a conceptual framework and reference architecture for embedding the notions of Ubiquitous Intelligence and Computing within the "Web of Things" and empowering their use in a broader  ...  In the last few years the web has evolved from just being a source of information to a platform for business applications.  ...  Here we will need a decomposition technique which will allow for the decomposition of complex functionality that is required into lower level resources which can then be met by specific UCDs or Events.  ... 
doi:10.1007/978-3-642-02830-4_2 fatcat:zkuaam724jhxbhbzfuxch5uxp4

Compendious Study of Interaction Protocols in Multiagent Systems

Dimple Juneja, Chetali Dhiman, Savneet Monga, Ashutosh Kumar Singh
2018 International Journal of Engineering & Technology  
The premise of the paper is to present a compendious study of interaction protocols pertaining to multiagent systems.  ...  The paper focuses on sharing understanding about various agent interaction protocols and it also discusses the promises and challenges each protocol offers to MAS research community.  ...  (b): Functional Decomposition on the basis of Expertise Decomposition of Tasks Fig 7 : 7 Contract Net Protocol Fig 8 : 8 Responsibilities of Manager and Contractors Fig 9 : 9 Architecture of a Blackboard  ... 
doi:10.14419/ijet.v7i3.8.15208 fatcat:eoyxnqe74jc4rj4ycj2heghnqy

Synthesis of size-controlled UO2 microspheres from the hydrothermal conversion of U(iv) aspartate

V. Trillaud, J. Maynadié, J. Manaud, J. Hidalgo, D. Meyer, R. Podor, N. Dacheux, N. Clavier
2018 CrysteEngComm  
A wet chemistry route towards UO2 spherical particles was designed through the hydrothermal conversion of uranium(iv) aspartate.  ...  A multi-parametric study led us to point out the conditions leading to monodisperse and size-controlled particles in the 400–2500 nm range.  ...  Ibrahim Osmane and S. Parrès-Maynadié for their help during the preparation of the samples and the acquisition of NMR spectra, respectively.  ... 
doi:10.1039/c8ce01352g fatcat:ajsr4lgczfdhxhvdxy4ywyygcy

A distributed system simulation modelling approach

M. Nikolaidou, D. Anagnostopoulos
2003 Simulation modelling practice and theory  
It also provides the capability to either support specific layers or not and to model protocols corresponding to more than one layer (protocol suites) or more than one protocol corresponding to a single  ...  The protocols of the peer communication element have to be common for all processes of the same distributed application.  ...  Processes, actions and communication protocols are the most common entities for which new model components need to be provided.  ... 
doi:10.1016/s1569-190x(03)00050-9 fatcat:kvnubariqngmld5qeshaq3uhfu

Towards flexible teamwork in behavior-based robots

Gal A. Kaminka, Inna Frenkel
2005 Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05  
Full details are available in [2] BITE: STRUCTURES AND CONTROL Given the popularity of behavior-based control in existing robotics work, BITE uses a hierarchical task behavior-graph as the basis for  ...  However, in addition, BITE maintains a novel third structure, a set of hierarchically linked social interaction behaviors implementing interaction protocols for synchronization and task allocation.  ... 
doi:10.1145/1082473.1082770 dblp:conf/atal/KaminkaF05 fatcat:jbdaiq7zafdsbe7fk5dwsvnbbi

STEP AP233 + standard PDM = systems engineering PDM?

Roland Eckert, Wolfgang Mansel, Gunther Specht
2005 2005 IEEE International Technology Management Conference (ICE)  
, processes, business systems, and information.  ...  A framework for a systems engineering PDM system is proposed and data exchange aspects discussed.  ...  of a domain specific STEP ISO 10303 Application Protocol AP233 (AP233) for Systems Engineering data representation and exchange.  ... 
doi:10.1109/itmc.2005.7461298 fatcat:xintbgy2jrdj5lzqbq2pcmi2m4

DDTK Project: Analysis, Design and Implementation of an ODP Application [chapter]

Spiros Arsenis, Noëmie Simoni, Philippe Virieux
1995 Open Distributed Processing  
We have used the ODP concepts and design rules as the basis of our development.  ...  The analysis, design and implementation steps of this project follow closely the Open Distributed Processing reference model (RM-ODP).  ...  The system designer considers DDTK as a brick of his system and looks for the properties that will guide his system toward openness and integration and/or any other specific policy meeting the information  ... 
doi:10.1007/978-0-387-34882-7_22 fatcat:6wlgkxncsfbkvauiuzfe43bnui

On systematic cross-layer design for ad hoc networks

Jason H. Li, Wilbur Peng, Renato Levy, Aristides Staikos, Mung Chiang
2008 MILCOM 2008 - 2008 IEEE Military Communications Conference  
To this end, we argue that cross-layer design in such networks should follow some systematic approach, in order to provide a common ground for alternative comparison and integration.  ...  First, a rigorous mathematical framework is needed to provide the unifying approach for cross-layering, and in this work we choose the well-recognized Generalized Network Utility Maximization (GNUM) approach  ...  ad hoc, process of designing layered protocol stack for wired and wireless networks.  ... 
doi:10.1109/milcom.2008.4753392 fatcat:2qrpqvebqvgf5er4rzj35wtjbi

PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols [article]

Alexander Senier and Martin Beck and Thorsten Strufe
2017 arXiv   pre-print
Compared to a monolithic implementation, only 29% of the partitioned protocol requires confidentiality guarantees with a process overhead comparable to common sandboxing techniques.  ...  Furthermore, by applying our approach to the secure messaging protocol OTR, we demonstrate its applicability and achieve a significant reduction of the trusted computing base.  ...  We conclude that a methodology for automatically partitioning cryptographic protocols into component-based systems is an important step towards trustworthy systems.  ... 
arXiv:1706.04759v1 fatcat:376zkg6jobhepizepbnrpybr2q
« Previous Showing results 1 — 15 out of 44,448 results