8,788 Hits in 4.4 sec

Soc Communication Architecture Modeling

Ziaddin Daie Koozekanani, Mina Zolfy Lighvan
2012 Zenodo  
The next step, will be introducing a modeling and representation method for being used in automatically synthesis process of on chip communication architecture.  ...  In this paper some of the mostly used methodologies for modeling and representation of on chip communication are investigated.  ...  These processes interconnection is synchronized with Message passing communication events. CSP is used in the kernel of several ESL tools such as FDR and FOSSY [14] .  ... 
doi:10.5281/zenodo.1077354 fatcat:tinbd7fcejaa5kfiznhvzy3raq

A UML 2.0 Activity Diagrams/CSP Integrated Approach for Modeling and Verification of Software Systems

Raida Elmansouri, Said Meghzili, Allaoua Chaoui
2021 Computer Science  
This paper proposes an approach integrating UML 2.0 Activity Diagrams (UML2-AD) and Communicating Sequential Process (CSP) for modeling and verication of software systems.  ...  A UML2-AD is used for modeling a software system while CSP is used for verication purposes.  ...  The main objective of this transformation is the verification of dynamic behavior of systems such as safety and vivacity properties by using CSP techniques and tools.  ... 
doi:10.7494/csci.2021.22.2.3478 fatcat:lpnnr2a36ffu5ibim62tp6dyjy

Achieving dependability in sensor networks through automated requirements-based programming

Michael G. Hinchey, James L. Rash, Christopher A. Rouff, Denis Gračanin
2006 Computer Communications  
The "gap" that current tools and methods leave unfilled is that their formal models cannot be proven to be equivalent to the system requirements as originated by the customer.  ...  Such a method represents a necessary step toward high-dependability system engineering for numerous possible application domains, including sensor networks and autonomous systems.  ...  John Erickson (University of Texas at Austin) worked with us on the intermediate approach described in Section 3.2, and undertook the implementation of the prototype described in that section.  ... 
doi:10.1016/j.comcom.2005.05.020 fatcat:x36ry5f4nne37f3y34rlst7v7i

A constraint-based approach for optimizing the design of overhead lines

Paolo Cicconi, Steve Manieri, Miriam Nardelli, Nicola Bergantino, Roberto Raffaeli, Michele Germani
2020 International Journal on Interactive Design and Manufacturing  
The use of computational methods in engineering design is a long-standing issue.  ...  The parameters to be considered as variables are defined by the designer at the beginning of the optimization process.  ...  Raffaele Fava and NeXT S.r.l. that provided insight and expertise that greatly assisted the research related to the proposed case study focused on overhead lines.  ... 
doi:10.1007/s12008-020-00680-x fatcat:seertoxt6fhxpbcj2gg2qrasym

Maintaining constraint-based applications

Tomas Eric Nordlander, Eugene C. Freuder, Richard J. Wallace
2007 Proceedings of the 4th international conference on Knowledge capture - K-CAP '07  
In this paper we present iCAM, a constraintbased knowledge maintenance system that operates in a hospital's material management domain. iCAM uses consistency algorithms to assist users in placing orders  ...  and making order corrections, and to ensure that maintenance activities are consistent with the department's ordering environment.  ...  While Open CSP and Interactive CSP concern the acquisition process, the Dynamic CSP focuses more on the maintenance issue.  ... 
doi:10.1145/1298406.1298422 dblp:conf/kcap/NordlanderFW07 fatcat:vnacwjgjsbhfzdc7ylxygvzpdu

Bridging CSP and C++ with selective formalism and executable specifications

W.B. Gardner
2003 First ACM and IEEE International Conference on Formal Methods and Models for Co-Design, 2003. MEMOCODE '03. Proceedings.  
CSP (Communicating Sequential Processes) is a useful algebraic notation for creating a hierarchical behavioural specification for concurrent systems, due to its formal interprocess synchronization and  ...  CSP specifications are amenable to simulation and formal verification by model-checking tools.  ...  CSP++ System Model and Design Flow Using the CSP++ approach, a target software system can be constructed in layers, as shown in Figure 1 .  ... 
doi:10.1109/memcod.2003.1210108 dblp:conf/memocode/Gardner03 fatcat:vdoqljk22neo5pughay3mue5qy

Maintaining Goals of Business Processes during Runtime Reconfigurations

Budoor Allehyani, Stephan Reiff-Marganiec
2016 Central-European Workshop on Services and their Composition  
Business processes have been used extensively to describe how a business achieves its goals; more recently they have also been used embedded into workflow or business process engines to drive the processes  ...  However, business procedures and demands change and consequently the processes need to be adapted.  ...  Petri nets [6] or process algebras such as CSP (Communicating Sequential Process) [20] which allow verification of semantic correctness. We use CSP and its associated tools.  ... 
dblp:conf/zeus/AllehyaniR16 fatcat:63p37kpgwvgulkmucu42q6fsn4

Dynamic Simulation of Concentrating Solar Plants

P. Vitte, F. Manenti, S. Pierucci, X. Joulia, G. Buzzi-Ferraris
2012 Chemical Engineering Transactions  
dynamics of these systems.  ...  The discontinuous nature of the solar power forces to study the dynamic behavior of solar plants to characterize their operations, to deepen their process understanding and to improve the performance and  ...  from process system point of view is to pass through the dynamic simulation especially for the systems involving strong dynamics like the concentrating solar plants.  ... 
doi:10.3303/cet1229040 doaj:a3261d92218e4c86886f66f3290b40ca fatcat:wzibpllncbhhppkgeyrvjnesyy

Generating Diagnostic Tools for Network Fault Management [chapter]

Mihaela Sabin, Robert D. Russell, Eugene C. Freuder
1997 Integrated Network Management V  
Today's network management applications mainly collect and display information, while providing limited information processing and problem-solving capabilities.  ...  In this paper we investigate the role of constraints in manipulating management data, and give an example of the use of the constraint satisfaction framework in diagnosing problems arising with Internet  ...  IRI-9504316, and by Digital Equipment Corporation, for which we would like to especially acknowledge the contributions of Neil Pundit and Ed Valcarce.  ... 
doi:10.1007/978-0-387-35180-3_52 fatcat:eutnoki2pvbtxoje4vfaeh2wtm

Using a constraint satisfaction formulation and solution techniques for random test program generation

E. Bin, R. Emek, G. Shurek, A. Ziv
2002 IBM Systems Journal  
A constraint satisfaction problem consists of a finite set of variables and a set of constraints. Each variable is associated with a set of possible values, known  ...  When using the CSP for random test program generation, the first step is formulating the system and the test requirements as a CSP.  ...  Another possible direction to improve the search algorithm is the use of constraint logic programming (CLP) engines, such as CHIP, 39 as search engines, either for the whole CSP or for specific subproblems  ... 
doi:10.1147/sj.413.0386 fatcat:kabz7p7x4jc5rnym3i25drrw2q

Linking CSP-OZ with UML and Java: A Case Study [chapter]

Michael Möller, Ernst-Rüdiger Olderog, Holger Rasch, Heike Wehrheim
2004 Lecture Notes in Computer Science  
We explain this approach using the case study of a "holonic manufacturing system" in which coordination of transportation and processing is distributed among stores, machine tools and agents without central  ...  We describe how CSP-OZ, an integrated formal method combining the process algebra CSP with the specification language Object-Z, can be linked to standard software engineering languages, viz.  ...  the final implementation (using one tool for runtime checking of static and another for dynamic behaviour).  ... 
doi:10.1007/978-3-540-24756-2_15 fatcat:rg7cr3vl7zftplzk2cyw2357ty

Multi-View Methodology for the Design of Embedded Mechatronic Control Systems

Marcel Groothuis, Jan Broenink
2006 2006 IEEE Conference on Computer-Aided Control Systems Design  
These systems consist of heterogeneous components developed by different disciplines (control engineering, electrical engineering, software engineering and often many more).  ...  The design of embedded control systems for monitoring and control of mechatronic systems has a multidisciplinary development trajectory.  ...  In this example, the modeling and simulation package 20sim (tool 1) is used in combination with the graphical CSP tool (tool 2). 20-sim is used to model the plant dynamics, quantization effects of the  ... 
doi:10.1109/cacsd.2006.285467 fatcat:za5q46nakjfwtdxurtv3n6qhp4

Multi-view methodology for the design of embedded mechatronic control systems

Marcel A. Groothuis, Jan F. Broenink
2006 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control  
These systems consist of heterogeneous components developed by different disciplines (control engineering, electrical engineering, software engineering and often many more).  ...  The design of embedded control systems for monitoring and control of mechatronic systems has a multidisciplinary development trajectory.  ...  In this example, the modeling and simulation package 20sim (tool 1) is used in combination with the graphical CSP tool (tool 2). 20-sim is used to model the plant dynamics, quantization effects of the  ... 
doi:10.1109/cacsd-cca-isic.2006.4776682 fatcat:d3o2fjamp5hfnd7mbqy37jw5dy

A survey of exploitation and detection methods of XSS vulnerabilities

Miao Liu, Boyu Zhang, Wenbin Chen, Xunlai Zhang
2019 IEEE Access  
The three categories are static analysis methods, dynamic analysis methods and hybrid analysis methods.  ...  As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.  ...  For web pages using unsafe-inline JS codes, the system removes them and they will be substituted for the script hashes existed in the CSP database.  ... 
doi:10.1109/access.2019.2960449 fatcat:cg7fom4ed5gebbrf56aprtkt2q

Specification and Validation of Behavioural Protocols in the rCOS Modeler [chapter]

Zhenbang Chen, Charles Morisset, Volker Stolz
2010 Lecture Notes in Computer Science  
As an aid to the software engineer, the modeler helps to separate the different concerns by creating different artifacts in the UML model: use cases define a scenario through a sequence diagram, and methods  ...  The modeler checks the consistency of those artifacts through the process algebra CSP and the model checker FDR2: a scenario must follow a contract, and an implementation must not deadlock when following  ...  The tool supports static checking of the dynamic consistency of the model through semi-automated translation into the process algebra CSP and the model checker FDR2 [19, 6] .  ... 
doi:10.1007/978-3-642-11623-0_23 fatcat:aj4h2znifnhqrjav53tn3ves3e
« Previous Showing results 1 — 15 out of 8,788 results