A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Protocol Design and Implementation Using Formal Methods
1992
Computer journal
The paper concludes with some suggestions for relating design methods to milestones in the protocol design and implementation processes. ...
This paper reports on a number of formal methods that support correct protocol design and implementation. ...
The decomposition process starts from an (N)-service specification and produces an (N)-protocol specification that is structured in terms of (N)-protocol entities and an underlying (N-1)-service. ...
doi:10.1093/comjnl/35.5.478
fatcat:ycfa2jsn5vewdfxykbxseuhpg4
Measuring Identification and Quantification Errors in Spectral CT Material Decomposition
2018
Applied Sciences
At 1 mg/mL, gadolinium was misidentified in 38% of voxels for the filtered protocol and 58% of voxels for the unfiltered protocol. ...
The potential to use spectral information for decomposing the linear attenuation coefficient into two or more basis for material discrimination (also called material decomposition MD) was proposed by Alvarez ...
Acknowledgments: We are grateful to Medipix2 and Medipix3 collaborations at CERN, to X-ray Imaging Europe GmbH for the CdTe bonding, and to the MARS and Create Research teams in Christchurch, New Zealand ...
doi:10.3390/app8030467
fatcat:xfnwpj4r3ne53bm5e7hmds7mbq
Fault-tolerant, high-level quantum circuits: form, compilation and description
2017
Quantum Science and Technology
We introduce a package that converts high level quantum circuits consisting of commonly used gates into a form employing all decompositions and ancillary protocols needed for fault-tolerant error correction ...
and a series of time ordered X- or Z-basis measurements. ...
This fact shows that, once a circuit is ICM transformed, it can be easily stored into the database for future transformations to use it as a sub circuit (e.g. modular adders used in modular multiplications ...
doi:10.1088/2058-9565/aa66eb
fatcat:mlqzapmtqzerno47puhhat57a4
ABBA: an architecture for deploying business-to-business electronic commerce applications
2004
Electronic Commerce Research and Applications
In the light of this analysis and a specification of B2B EC requirements, we propose ABBA, a comprehensive architecture, and a corresponding design process. ...
ABBA is a layered architecture with four interfaced abstraction levels: business model and business process, business process decomposition and distribution, supporting services, and integration technology ...
This requires a common representation (or modeling), and a managing responsibility of the business process regardless of the technology. • Guidelines for a design process (towards a methodology) to deploy ...
doi:10.1016/j.elerap.2003.09.006
fatcat:eahyypqofbaftl3f7wgipj5bsa
AN OBJECT ORIENTED APPROACH TOWARDS THE SPECIFICATION OF SIMULATION MODELS
2012
South African Journal of Industrial Engineering
This article introduces and discusses a proposed methodology for analysing real world problems in order to construct valid simulation models. ...
To manage problems , is to try and cope with a flux of interacting events and ideas which unrolls through time -with the manager trying to improve situations seen as problematical, or at least as less ...
In the search for a methodology that can be used to define specifications for simulation models, experiments with current methodologies and techniques (such as process flows, entity relationship diagrams ...
doi:10.7166/8-2-393
fatcat:zon5gslpmbcbzn7zkla5xmisn4
Formal Methods in Communication Protocol Design
1980
IRE Transactions on Communications Systems
This specification was the basis for the different protocol implementations in different host computers. ...
(Other techniques for managing the complexity of protocols are discussed in Section As noted above, one major goal of protocol specification is to provide a basis for implementation. ...
doi:10.1109/tcom.1980.1094685
fatcat:jrxd6je3hjgmraifmvyxxcbfke
Web of Things as a Framework for Ubiquitous Intelligence and Computing
[chapter]
2009
Lecture Notes in Computer Science
In this paper, we propose a conceptual framework and reference architecture for embedding the notions of Ubiquitous Intelligence and Computing within the "Web of Things" and empowering their use in a broader ...
In the last few years the web has evolved from just being a source of information to a platform for business applications. ...
Here we will need a decomposition technique which will allow for the decomposition of complex functionality that is required into lower level resources which can then be met by specific UCDs or Events. ...
doi:10.1007/978-3-642-02830-4_2
fatcat:zkuaam724jhxbhbzfuxch5uxp4
Compendious Study of Interaction Protocols in Multiagent Systems
2018
International Journal of Engineering & Technology
The premise of the paper is to present a compendious study of interaction protocols pertaining to multiagent systems. ...
The paper focuses on sharing understanding about various agent interaction protocols and it also discusses the promises and challenges each protocol offers to MAS research community. ...
(b): Functional Decomposition on the basis of Expertise Decomposition of Tasks
Fig 7 : 7 Contract Net Protocol
Fig 8 : 8 Responsibilities of Manager and Contractors
Fig 9 : 9 Architecture of a Blackboard ...
doi:10.14419/ijet.v7i3.8.15208
fatcat:eoyxnqe74jc4rj4ycj2heghnqy
Synthesis of size-controlled UO2 microspheres from the hydrothermal conversion of U(iv) aspartate
2018
CrysteEngComm
A wet chemistry route towards UO2 spherical particles was designed through the hydrothermal conversion of uranium(iv) aspartate. ...
A multi-parametric study led us to point out the conditions leading to monodisperse and size-controlled particles in the 400–2500 nm range. ...
Ibrahim Osmane and S. Parrès-Maynadié for their help during the preparation of the samples and the acquisition of NMR spectra, respectively. ...
doi:10.1039/c8ce01352g
fatcat:ajsr4lgczfdhxhvdxy4ywyygcy
A distributed system simulation modelling approach
2003
Simulation modelling practice and theory
It also provides the capability to either support specific layers or not and to model protocols corresponding to more than one layer (protocol suites) or more than one protocol corresponding to a single ...
The protocols of the peer communication element have to be common for all processes of the same distributed application. ...
Processes, actions and communication protocols are the most common entities for which new model components need to be provided. ...
doi:10.1016/s1569-190x(03)00050-9
fatcat:kvnubariqngmld5qeshaq3uhfu
Towards flexible teamwork in behavior-based robots
2005
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05
Full details are available in [2]
BITE: STRUCTURES AND CONTROL Given the popularity of behavior-based control in existing robotics work, BITE uses a hierarchical task behavior-graph as the basis for ...
However, in addition, BITE maintains a novel third structure, a set of hierarchically linked social interaction behaviors implementing interaction protocols for synchronization and task allocation. ...
doi:10.1145/1082473.1082770
dblp:conf/atal/KaminkaF05
fatcat:jbdaiq7zafdsbe7fk5dwsvnbbi
STEP AP233 + standard PDM = systems engineering PDM?
2005
2005 IEEE International Technology Management Conference (ICE)
, processes, business systems, and information. ...
A framework for a systems engineering PDM system is proposed and data exchange aspects discussed. ...
of a domain specific STEP ISO 10303 Application Protocol AP233 (AP233) for Systems Engineering data representation and exchange. ...
doi:10.1109/itmc.2005.7461298
fatcat:xintbgy2jrdj5lzqbq2pcmi2m4
DDTK Project: Analysis, Design and Implementation of an ODP Application
[chapter]
1995
Open Distributed Processing
We have used the ODP concepts and design rules as the basis of our development. ...
The analysis, design and implementation steps of this project follow closely the Open Distributed Processing reference model (RM-ODP). ...
The system designer considers DDTK as a brick of his system and looks for the properties that will guide his system toward openness and integration and/or any other specific policy meeting the information ...
doi:10.1007/978-0-387-34882-7_22
fatcat:6wlgkxncsfbkvauiuzfe43bnui
On systematic cross-layer design for ad hoc networks
2008
MILCOM 2008 - 2008 IEEE Military Communications Conference
To this end, we argue that cross-layer design in such networks should follow some systematic approach, in order to provide a common ground for alternative comparison and integration. ...
First, a rigorous mathematical framework is needed to provide the unifying approach for cross-layering, and in this work we choose the well-recognized Generalized Network Utility Maximization (GNUM) approach ...
ad hoc, process of designing layered protocol stack for wired and wireless networks. ...
doi:10.1109/milcom.2008.4753392
fatcat:2qrpqvebqvgf5er4rzj35wtjbi
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols
[article]
2017
arXiv
pre-print
Compared to a monolithic implementation, only 29% of the partitioned protocol requires confidentiality guarantees with a process overhead comparable to common sandboxing techniques. ...
Furthermore, by applying our approach to the secure messaging protocol OTR, we demonstrate its applicability and achieve a significant reduction of the trusted computing base. ...
We conclude that a methodology for automatically partitioning cryptographic protocols into component-based systems is an important step towards trustworthy systems. ...
arXiv:1706.04759v1
fatcat:376zkg6jobhepizepbnrpybr2q
« Previous
Showing results 1 — 15 out of 44,448 results