Filters








52,167 Hits in 6.3 sec

Towards Efficient Verification of Systems with Dynamic Process Creation [chapter]

Hanna Klaudel, Maciej Koutny, Elisabeth Pelz, Franck Pommereau
Lecture Notes in Computer Science  
We first introduce a general class of coloured Petri nets-not tied to any particular syntax or approach-allowing one to capture systems with dynamic (and concurrent) process creation as well as capable  ...  Our aim in this paper is to develop a technical device for coping with one such obstacle, namely that caused by dynamic process creation.  ...  We would like to thank Alexis Bes, Patrick Cegielski, Christian Laforest and Victor Khomenko for their comments on the earlier versions of this paper.  ... 
doi:10.1007/978-3-540-85762-4_13 fatcat:fiwpejbbtbdyhgshxgc3qsmtsy

Advances in Fluid Dynamics of Turbomachinery

Jingyin Li, Philipp Epple, Heuy-Dong Kim, Lei Tan
2018 International Journal of Rotating Machinery  
The internal cooling manner for high-pressure turbine blade is crucial for the gas turbine engine service life, and the creation of blade with effective cooling system is a complicated process. I.  ...  This special issue focuses on the advances in fluid dynamics of turbomachinery.  ...  The internal cooling manner for high-pressure turbine blade is crucial for the gas turbine engine service life, and the creation of blade with effective cooling system is a Performance optimization has  ... 
doi:10.1155/2018/5747034 fatcat:3qndgppcnvdmboloa6osalmgam

Factors in software quality for knowledge-based systems

RT Plant
1991 Information and Software Technology  
It then eonsith'rs the aspects that ,go towards the creation o/a quality kmnrh, dge-hased system: the ,spee(lieation, the development metho~hdog.r, and the validation and ver(/ication proeesses that cheek  ...  The paper defines quality in terms ola manr{l~wturing process and then relates the creation qlsO[?u'are to manulae-turi#rg.  ...  While dynamic testing tends towards addressing the problems associated with validation, the static testing mechanisms focus on the problem of verification, with the aim of placing the system under review  ... 
doi:10.1016/0950-5849(91)90097-u fatcat:bqdc62qhqzc3reloevfg3dp7uu

Analog Circuit Verification: a State of an Art

Oded Maler
2006 Electronical Notes in Theoretical Computer Science  
To put this challenge in context we sketch some of the history of digital circuit verification as well as more recent attempts to adapt it to continnuous and hybrid systems.  ...  Extending formal verification methodology toward analog circuits is a very challenging task that will occupy researchers for some time.  ...  Introduction We start by situating the role of formal verification in the design process of circuits.  ... 
doi:10.1016/j.entcs.2006.02.020 fatcat:ohgm6q37bnbqtlc37nexut5mxy

Becoming a Learning Organization Through Dynamic Business Process Management

Marek Szelągowski
2014 Journal of Entrepreneurship, Management and Innovation  
This article provides examples of how dynamic BPM facilitates the constant creation and verification of practical knowledge, with the aim of improving and adapting processes to maintain the competitive  ...  The article returns to the somewhat forgotten concept of the learning organization and explores how its principles can be applied with the use of dynamic business process management (dynamic BPM).  ...  Below is an overview of the process of knowledge management and the broad creation of accessible and available knowledge in a learning organization managed with the use of dynamic business processes.  ... 
doi:10.7341/20141016 fatcat:2gopgvgqgjbzrdgfsiz2qs5efq

Toward automatic generation of promela models from SDL specification

B. Vlaovic, A. Vreze, Z. Brezocnik, T. Kapus
2005 Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.  
We use formal verification tool Spin (Simple Promela Interpreter) and Promela (Process Meta-Language) language for the description of the model.  ...  The process is prone to the incorrect modelling of the system's properties. In this paper we present the most critical parts of mechanical creation of the models in Promela.  ...  ACKNOWLEDGMENT This work was partly funded by the EU under the Information and Communication Technologies Centre of Excellence R&D project Correctness Verification of Communication System Functioning.  ... 
doi:10.1109/contel.2005.185973 fatcat:3ssceidfzbgdjhvtgraszebpyy

An Efficient Model for Securing Identity Access in Scalable System

Sunil Singh, Manish Kumar, Shantanu Das
2013 International Journal of Computer Applications  
This paper proposes an identity management system model which will ensure secure storage and retrieval of the IDs information in the scalable identity database.  ...  The proposed model uses the distributed database technology for information storage and retrieval to make the system more reliable.  ...  These types of systems are not efficient because they are prone to single point of failure and the whole ID integration and verification process fails.  ... 
doi:10.5120/11959-7793 fatcat:cgyc5fo5xfh3dmr6wuarif3pki

A Preliminary Formal Specification of Virtual Organization Creation with RAISE Specification Language

Mohammad Reza Nami, Mohsen Sharifi, Abbas Malekpour
2007 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)  
Then, a primary formal model is presented using RAISE method and its language (RSL) formula for the improvement of VO creation process. Formal model presented in this paper is provable to implement.  ...  The purpose of this paper is to describe Virtual Organization and Domain engineering with introducing formal methods especially RAISE as a formal method that has been used successfully on diverse applications  ...  Due to the importance of efficient creation of dynamic VOs and lack of method, we present a formal model for developing provable, reliable, and reusable software.  ... 
doi:10.1109/sera.2007.25 dblp:conf/sera/NamiSM07 fatcat:lbry3tymgbdarl45ibnolxwkcm

Efficient User Revocation for Shared Data in the Public Cloud

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Traditional way to re-sign this is to down load part of data and re-sign it at the time of revocation of user. But this approach is not efficient for large amount of data being shared.  ...  It uses the concept of proxy re-signature to avoid the downloading of re-signed block by existing user.  ...  They first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme  ... 
doi:10.35940/ijitee.i7899.0881019 fatcat:jykjj24ofnakzaarusw5o6is5m

Comparative Analysis and Design of Wired and Wireless Integrated Networks for Wireless Sensor Networks

Meong-hun Lee, Hyun Yoe
2007 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)  
Then, a primary formal model is presented using RAISE method and its language (RSL) formula for the improvement of VO creation process. Formal model presented in this paper is provable to implement.  ...  The purpose of this paper is to describe Virtual Organization and Domain engineering with introducing formal methods especially RAISE as a formal method that has been used successfully on diverse applications  ...  Due to the importance of efficient creation of dynamic VOs and lack of method, we present a formal model for developing provable, reliable, and reusable software.  ... 
doi:10.1109/sera.2007.65 dblp:conf/sera/LeeY07a fatcat:j2fuis23mvfvtmyqpjirntetmm

CloudVaults: Integrating Trust Extensions into System Integrity Verification for Cloud-based Environments

B. Larsen, D. Bergsson, T. Giannetsos
2020 Zenodo  
in supporting container trust decisions, thus, allowing for a much more e active verification towards building a global picture of the entire service graph integrity.  ...  In this paper, we present CloudVaults for coping with these challenges: a multi-level security verification framework that supports trust aware service graph chains with variable evidence on the integrity  ...  ., extending PCR slot i with measurement m, the TPM accumulates: P CR i = hash(P CR i ||m). This is an indispensable property towards the creation of strong and transitive CoT.  ... 
doi:10.5281/zenodo.4279028 fatcat:vjdlie44wvethckx6kltge6ex4

Protecting Mobile Agent using Enhanced Reference Monitor based Security Framework

Oladeji P., Attah H.
2017 International Journal of Computer Applications  
This approach ensures that resource consumption by the verification mechanism of the reference monitor agent on the hosts is largely reduced, thus performing more efficiently than the existing system  ...  One critical issue with mobile agent technology is the security of its data and code against malicious hosts.  ...  The system provides methodology that spans a number of phases in agent's lifetime: it starts from agent creation and ends with agent's execution.  ... 
doi:10.5120/ijca2017913245 fatcat:2y7dd5holvglxg4w36mjupkjnm

Improve Speed Efficiency and Maintain Data Integrity of Dynamic Big Data by using Map Reduce

Sapna R., B.M. Patil, V.M. Chandode
2016 International Journal of Computer Applications  
with the full support of dynamic updates.  ...  to verification of data integrity of certain file so that appropriate authentication process will going to miss between cloud service provider and third party auditor(TPA).  ...  = Total number of records in log file Number of Blocks * 10 3 From Table 2 only shows the tested values for efficiency of processing speed represent dynamic verifiable updates for the file as per  ... 
doi:10.5120/ijca2016908687 fatcat:s2r4du4mafh63ozk64muet67oq

Smart technologies for effective reconfiguration: The FASTER approach

M. D. Santambrogio, D. Pnevmatikatos, K. Papadimitriou, C. Pilato, G. Gaydadjiev, D. Stroobandt, T. Davidson, T. Becker, T. Todman, W. Luk, A. Bonetto, A. Cazzaniga (+2 others)
2012 7th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)  
Many contemporary products along with the software part incorporate hardware accelerators for reasons of performance and power efficiency.  ...  at run time, the capabilities of partial dynamic reconfiguration.  ...  reconfigurable) hardware components, • Providing a framework for analysis, synthesis and verification of a reconfigurable system, • Providing efficient and transparent runtime support for partial and dynamic  ... 
doi:10.1109/recosoc.2012.6322881 dblp:conf/recosoc/SantambrogioPPPGSDBTLBCDS12 fatcat:eplvqvzqmfdirggcfr4qb53neq

Service provider DevOps for large scale modern network services

Juhoon Kim, Catalin Meirosu, Ioanna Papafili, Rebecca Steinert, Sachin Sharma, Fritz-Joachim Westphal, Mario Kind, Apoorv Shukla, Felician Nemeth, Antonio Manzalini
2015 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)  
Network service providers are facing challenges for deploying new services mainly due to the growing complexity of software architecture and development process.  ...  Although the goals of DevOps in data centers are well-suited for the demands of agile service creation, additional requirements specific to the virtualized and software-defined network environment are  ...  An increased degree of automation is in line with DevOps principles and enables more efficient use of resources.  ... 
doi:10.1109/inm.2015.7140502 dblp:conf/im/KimMPSSWKSNM15 fatcat:kxdrl3x2gfg3vey5h26rk7yh64
« Previous Showing results 1 — 15 out of 52,167 results