Modeling and Analysis of Workflow Based on TLA

Size: px
Start display at page:

Download "Modeling and Analysis of Workflow Based on TLA"

Transcription

1 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY Modeling and Analysis o Worklow Based on TLA CHEN Shu Wu Han University Computer Science Department, Wu Han China Chenshu181@yahoo.com.cn WU Guo Qing Wu Han University Computer Science Department, Wu Han China wgq@whu.edu.cn Abstract We proposed an approach in modeling and analysis o worklow based on temporal logic o action. A worklow model is divided in to two parts: the description o scheduler as well as database updating and the description o properties, each part is expressed in a TLA ormula. The analysis o properties is composed by scheduling analysis and database properties analysis and their proo process is equivalence to the veriication o the implementation relationship between the model ormula and the ormula o its properties. Thus, established an uniied ramework or modeling and property analysis o worklow in deerent levels. Index Terms worklow, TLA, modeling, property analysis Figure 1. Control Graph or Worklow. I. INTRODUCTION A worklow is a collection o activities that designed or the purpose o carrying out a target process, while a worklow model is a ormalized description or the abstract process as well as their dependencies[1]. Worklow technology is widely used to manage services composition, business-to-business e-commerce process integration and e-science application. A worklow model consists o several components, including activities, controllers, database, roles etc. Thus a worklow model stands on the base o its running. Besides, the property analysis o a worklow model is becoming a critical step. However, the worklow property analysis needs the worklow be modeled in a ormalized way and with a well-deined semantics. The modeling o a worklow would concern two layers, control layer and database layer. Control layer ocuses on the scheduling o the worklow activities, while the underlying database layer relects the update o the data states. An intact ramework o a worklow consists o a control graph, triggers and properties. Control graph as showed in Figure 1 provides a global view or the dependencies o the activities. A typical control graph consists o a initial state, a set o termination states, a set o activity states, and a set o directed edges that connect these state nodes. Figure 1 shows a super control graph that eliminates the pseudo nodes. The edges that connect the nodes could be Figure 2. Trigger or Worklow. considered as a conditional transition. As part o the control graph, triggers are interpreted by ECA rules, that is event, condition and action. As showed in Figure 2, when event happen and condition holds, then the corresponding action would be activated. Events could also be considered as special activities and incorporate them directly into the control graph in appropriate spots. Under the control layer lays the database layer, which relects the update o the data states by the operations o users. Properties o worklow are divided into control properties and data properties, in which control properties deines the scheduling constraints such as sequence or dependencies o the running activities, while data properties describes the data constraints during the worklow execution lie cycle. Common approaches or the modeling o worklow are Petri-net[2, 3], UML activities graph[4, 5], process algebra[6] etc. However, these approaches did not provide an uniied ramework or the modeling o control and data as well as property analysis. The most popular approach is to use Petri-net to model worklow, however, This paper is supported by 863 National High-Tech Research and Development Plan, China, (2007AA01Z185)

2 28 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY 2009 has ignored deects in the interpreting o data states. UML activity graph is also used in modeling worklow, but have diiculties in reasoning and veriication o properties because o its semi- ormalized semantics. Process algebra such as CCS, CSP, LOTOS modeling worklow by making every activity as a process, and executed in the system transition. Properties are described in temporal logic, and veriied by model checker, however, can not avoid the state space explosion. And more over, this approach still has problems in interpreting data states. Logic could provide a precise description or the worklow model, and comprehensive mechanism or reasoning and veriication o properties. Davulcu[7] used concurrent transaction logic(ctr) to model worklow, however, limited in control layer, thus can not provide the reasoning and veriication in data properties. For the problems that existed, we proposed an approach to model and analysis worklow based on temporal logic o actions (TLA), not only supplies the modeling o control and data, but also provides reasoning and veriication or their properties. The paper is organized as ollowing: section shows an over view o temporal logic o actions, and section discuss about the modeling o worklow using TLA, as well as the property analysis. Besides, a case or our approach is also given in section to demonstrate its using. Finally, we give conclusion and urther works in section. II. OVER VIEW OF TLA Temporal logic o actions as an extension o traditional temporal logic, is used or developing, describing and reasoning about concurrent and reactive systems [8, 9]. The semantic o TLA is based on behaviors, which is a inite or ininite sequence o states. A state is a mapping rom the variable to its value. Let s be a state, x as a variable, then the value o x is s(x). We then give the ollowing deinition that may appear in TLA: (1) A state unction is a non-boolean expression built rom variables and constant symbols, such as x 2 +y+3, and always written as. The semantic o a state unction is expressed as [], which means the value o that unction under a given state s. Formally described as: s[ ] ( ' v': s[ v]/ v). (2) A state predicate, called a predicate or short, is a boolean expression built rom unprimed variables and constant symbols, always write as P. like state unction, semantic o predicate is expressed as s[p], which means the boolean value o that predicate under a given state s. Formally described as : s[ P] P( ' v': s[ v]/ v). (3)An action is a boolean-valued expression ormed by unprimed variables, primed variables, and constant symbols. always write as A. Primed variables are labeled by, which means the ater-value o a variable ater an action was executed. Semantic o action is expressed as s[a]t, thus an action is considered as a beore and ater predicate, and speciies a possible step in a behavior o a system, in which unprimed variables reer to the irst state o a step and primed variables reer to its second state. Besides, a predicate could be considered as an action with out primed variables. Formally described as: s[ At ] A( ' v': sv [ ]/ vtv, [ ]/ v). The pair o states s, t is called an A step i and only i s[a]t equals true. I action A represents an atomic operation o a system, then s, t is an A step i and only i executing the operation in an old state s o the system can produce a new state t. A typical raw TLA ormula called RTLA or is a composition o state unctions, predicates and actions that introduced above. Its syntax could be described in BNF ormat as: or p or or or or. A TLA ormula is on the base o RTLA by adding initial condition, and airness property. In order to make it clearer to describe, we call them as T-TLA, short or Traditional-TLA. Thus, a T-TLA ormula is consist o three parts such as : Init [ N] F, and we give descriptions or each part as ollowing: Init: a predicate that speciying the initial values o variables. N: donates the next-state relation which represent the executions o individual atomic perormances. : donates all the lexible variables in a n-tuple. F: represents the conjunction o ormulas o the orm o WF ( A ) or SF ( A) which donates the weak or strong airness o a system, and symbol A donates an atomic action in the ormula. T-TLA ormulas that added process algebra are called P-TLA[10]. P-TLA diered with T-TLA in adding concurrent operators on them, to express the dependencies o the TLA actions. Let A and B be dierent TLA actions, we then have the ollowing P-TLA operator deinitions: AB ; : a sequential execution, which means execute A and then B. A B : an indeterminate execution, which means execute A or B, can be used to express or relation in control graph o a worklow. A B : a concurrent execution, which means interleave execute A and B, can be used to express and relation in control graph o a worklow. ( A )*: a loop execution, which means keep doing A orever. A : an interrupt o a loop, which means execute A, then exit rom the innermost containing ( )*.

3 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY Each action or called P-TLA sub-expression that connected by the operators showed above could be considered as an RTLA ormula, however, extended with a label, such as l: A. A label can be attached to any sub-expression o a P-TLA ormula, and should be unique within the corresponding P-TLA ormula. Then the ollowing actions and predicates are deined:,,,,,, l pc v v v : A TLA action. A step o this action 1 2 n consists o perorming a step o one o the sub actions o A. AT l pc, v1, v2,,, v n, : This predicate asserting that control is at the beginning o the sub-expression. IN l pc, v1, v2,,, v n, : This predicate asserting that control is at the beginning or somewhere inside the subexpression. AFTER l pc, v1, v2,,, vn, : This predicate asserting that control is immediately ater the sub-expression. Assume a control variable pc, distinct rom all variables that appear in primitive actions. We could have the semantics or P-TLA ormulas by deining, or each P- TLA p: A collection o constants Lp called labels, with a distinguished element AT(p) called the AT label. Collection o actions Ap o the orm ( pc l) ( pc ' k) A, where A is an P-TLA subexpression action in which pc does not occur, l LP, and k is either a label in Lp or one o the special constants Done or Exit, which means the termination o P- TLA actions. Hiding is expressed with the ordinary TLA quantiier. The ormula x : F is true o a behavior i and only i there exists some sequence o values, one in each state o the behavior that can be assigned to the variable x that will make ormula F true. With the introduction or TLA given above, we could start using TLA or the modeling and analysis o worklow.. MODELING AND ANALYSE OF WORKFLOW A. Modeling worklow Control graph o a worklow is a directed graph, and could be deined by a our group: <ATINIFIN>, in which A is a set o activity nodes, T is a set o edges that connect those activity nodes. INI is the initial node, while FIN is a set o terminated nodes. Just like we stated above, the model o a worklow is divided into two parts, the part that describe the control graph with the underlying database, and the part that describe properties. A control graph is described in a P-TLA ormula, updates o data base state are represented as P-TLA sub-expressions that relects to each activity. Properties are deined in a T- TLA ormula in which contains an initial predicate, a next state relation and a airness. The ollowing TLA ormulas describes the model showed in Figure 1. low( pc) ( con1; d; ) a ; b; ; g; con4 e ( con3; h) c ; ; j ; lk : k i; con2) Spec pc, hidden : initial( hidden) AT ( low( pc)) constrs [ lowpc ( )] SF ( lowpc ( )) pc, hidden, state pc Formula low(pc) demonstrate how the control graph o a worklow could be transormed into a P-TLA ormula. Activities in the control graph are labeled by a b, and single activity appears in the orm o (pcaction), which describes the beore-and-ater data state o the execution o that activity. For example, activity a in this model could be deined as: a( pc) l : acta( x, x.. x ) x x x. a 1 2 n state { 1, 2.. n } in which la is the value o parameter pc that used to label an activity. TLA action act_a(..) describes the nextrelation o that execution. State unction state shows the current data state. By the deinition o TLA action, a TLA action is a binary relation over a pair o states such as s1, s2, thus a TLA action could be considered as an update o a global date state state. In the example above, the execution o activity a(pc) update the value x1,x2 xn in state and leaves other values unchanged, this was expressed by adding an stuttering step: state x1 x2 x n {,,,, }. Symbols con1..con4 are predicates, deines the transition condition in the control graph. As predicate is s special TLA action, thus predicates could be treated as a special query activity in TLA worklow model without updating data state. T-TLA ormula Spec deines the basic properties o the worklow, and consisted by our parts: Initial condition, control properties, next relation and airness constraints. In the example above, initial condition AT(low(pc)) asserts that the worklow should start rom the initial activity. Control properties constrs deines the scheduling constraints. TLA action [low(pc)] shows that the worklow should keep on working. Strong airness asserts that either the activities in worklow is eventually executed, or its execution is not ininitely oten possible. B. Analyse o worklow According to the modeling approach that we have introduced previously, a worklow model is divided into P-TLA part that deines the global dependencies o the activities with data update, and the T-TLA part that deines the properties. The properties made restrictions on the scheduling as well as database. However, the initial condition, next-step relation and airness are all

4 30 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY 2009 generic constraints, thus speciic constraints should be established or every certain worklows to meet the requirements. In TLA, properties could be simply divided into invariance properties and eventuality properties. An invariance property is always expressed by a TLA ormula P, where P is a predicate, and an eventuality property is always expressed by P or P~>Q. Based on these two kinds o properties, we would extend them in control properties and data properties. For example, TLA ormula (T<100) describes a data based invariance property, which has the meaning o system temperature should not beyond 100 degree, and TLA ormula: l b ~>l g describes a control based eventuality property, and has the meaning o i activity b is executed, then activity g should be executed eventually. In the modeling approach that introduced in in section part A, predicate constrs describes a control property that a worklow should hold. predicate constrs is a conjunction o a set o sub predicates, in the way o: constrs c c2 c n and determined by requirements. So let low be a P-TLA worklow model, then we would have the relation as: low' low constrs. in which low donates the P-TLA worklow model low that iltered by constraints constrs. The relation between low and low are represented by a special operator spec deined as : low' spec( constrs, low). The meaning o spec is that applying constraints constrs on model low and get a model low that satisies constrs. By the use o spec, the example showed in section part A should be modiied as: Spec pc, hidden : initial( hidden) AT ( spec( constrs, low( pc) )) [ spec( constrs, low( pc))] pc, hidden, state SF ( spec( constrs, low( pc))) pc and equivalence to the ollowing ormula: Spec init low' [ low'] state SFpc ( low'). We irst discuss about control properties. Based on the operator spec, we give the ollowing axioms: spec( a, a) a (1) spec( a, b) nulli a b (2) spec( a, a) null (3) spec( a, b) b (4) spec( a, a b) a (5) spec( a, a b) a b (6) Let T and K be two dierent T-TLA ormula, we then have the ollowing deduction Inerences rom the axioms above: spec( a, T; K) (7) spec( a, T); K T; spec( a, K) spec( a, T K) spec( a, T ) spec( a, K) (8) spec( a, T K) (9) spec( a, T ) K spec( a, K) T i G T K and have spec( a, T ) T, spec( b, K ) K, then we have spec( a, G) spec( b, G) (10) i G T K and have spec( a, T ) T, spec( b, K ) K, then we have G spec( a, G) spec( b, G) (11) Examples o how to use spec to describe properties are given as ollowing: Let G a P-TLA model o a worklow, property a b, which means in model G, i a is executed, then b would eventually be executed, is represented as : spec(, G) and spec(, G) spec( b, spec( ag)) spec( ag) Property work low would terminate normally could be represented as: spec(, G) FIN in which FIN is the set o terminated activities. Now we come to data properties. Invariance properties are always expressed in the orm o P, in which P is a predicate, such as (T<100), (x>y). Eventually properties are always represented in the way o P, P~>Q, where P and Q are both predicates. Let c be a data property, then the proo o c is equivalence to the proo o Spec=>c, where Spec is the basic constraint deined in model. Proo o invariance properties could be reasoned by the ollowing common rules(details o proo rules are showed in Leslie Lamport[8]): ( P ( ' ) ( P P[ P P '] )) I ( [ N] [ N I I'] ) ( I [ N] I') (( I [ N] ) I) (12) (13) (14) To the rules above, P is a predicate, I is an invariant, N is a TLA action, is a state unction. According to the expression Spec init '), the low' [ low'] state SFpc ( low goal is to proo the implementation relation Spec=>P, and the main idea is to ind out an invariant I to satisy the ollowing: Init I (15) I P (16)

5 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY I [ low] I ' (17) state P[ low] state P' (18) I premise (15) ~ (17) hold, then solution (18) holds. According to the deinition o Spec and ormula (1), we have the implementation relation: Spec init [ low] state and then have Spec I [ low] state, by the ormulas (18) and (14), we could have the result. The key Spec P. idea o this prooing is to ind out the invariant I. A state predicate I is an invariant o a speciication S, i S implies However, sometimes predicate P could be treated as I. Dierent with the proo o invariance properties, the proo o eventuality properties relies on the airness predicates. Common rules or its proo are listed as ollowing: P [ N] ( P' Q') PN A Q' (20) P EnableA (19) (21) N SF A P Q (22) [ ] ( ) ( ~ ) I premise ormula (19) ~ (21) hold, then ormula (22) holds. According to the rules above, let P and Q be two dierent predicates, the key idea o prooing Spec ( P ~ Q) is to ind out a sub control low low which is enabled by predicate P and the execution o low make predicate Q holds, then let action A be substituted with low, action N be substituted with low, then we would have the ormula: ( Spec ' [ low] ) holds. As we have SF ( low')) ( P ~ Q Spec Spec ', then we would have the implementation relation: Spec=>(P~>Q). We have discussed about control properties and data properties above and separately. However, when in practice, data properties are always associate with control constraints, which means a data properties should only necessary to be hold at the assumption o some certain selected control path. A simple example would demonstrate this: only when a customer chooses to buy a Book-A, would its stock amount decreases. This simple property contains two elements: one is o a control assumption that, a customer chooses to buy a Book-A, the other is o a data property that the stock amount o Book- A should decrease. However, this data property only needs to be hold under the assumption o the control selection, otherwise, need not to be hold. Thus a uniied ramework or speciying both control and database state o worklow would take the advantage in reasoning the properties o such condition. C. Case Study The ollowing case shows a worklow or a trip planning. We irst give a short description or this case, and then we demonstrate how to model the worklow and how the properties are veriied. As we could see in Figure 3 which shows the control graph o this case, the control starts rom a start activity and demand or customer s eedback. When customer agree with the trip scheduling, they could choose to purchase trip canceling insurance, accident insurance or purchase nothing. When decision was made, they wait or the traveling day to come. This may come to a contretemps that the trip may be canceled, or had accident during the trip or ortunately, started and inished normally. I the customer had purchased cancel insurance or accident insurance, they would have the corresponding compensation. As we could see in this example, the low is consisted o a set o activities as well as its guard and several predicates. Under the control low, lays the un-observational data base and when activities are executed during a running lie cycle, data base state might be changed each. Time related events may be concerned in the way that, when time arrivals the corresponding activity should be executed. Table I demonstrates the description o every activities and predicates that appear in the control graph. By the descriptions, we irst give the P-TLA model as ollowing: low( pc) Start; Soleedback; con1; Travelreg; ( con2; Pur c ins) ( con3; Purains) ; 4 con Pretravel; con5; Starttravel; con6; Accoccur;(( con8; Compcus) 9) ; con End 7 con con10; Canceltravel;(( con11; Compcus) ; con12) End According to requirement, our properties could be described as i customer has purchased accident insurance, then i accident occurs, the customer would eventually be compensated. According to this properties, we could see that it has a control property accident occurs, and under this control constraint, a data constraint should hold. Let pconstrs be control constraint, and sconstrs be data constraint, the T-TLA ormula and proo goal could be represented as: Spec pc, hidden : initial( hidden) AT ( spec( pconstrs, low( pc))) [ spec( pconstrs, low( pc))] pc, hidden, state SF ( spec( pconstrs, low( pc))) pc

6 32 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY 2009 Figure 3. Control Graph or Worklow. TABLE I. DESCRIPTIONS OF ACTIVITIES AND PREDICATES Start Start to execute the low Sol_eedback Soliciting customer s eedback Travel_reg Registering traveling Pur_c_ins Purchase cancel insurance Pur_a_ins Purchase accident insurance Pre_travel Prepare or traveling Start_travel Start traveling Cancel_travel Cancel traveling Acc_occur Accident occurs Comp_cus Compensate customers End End executing Con1 I customer agree to travel Con2 I customer agrees to purchase cancel insurance Con3 I customer agrees to purchase accident insurance Con4 I customer does not agree to purchase Con5 I time reaches and travel starts any insurance Con6 I accident occurs Con7 I accident does not occur Con8 I customer has accident insurance Con9 I customer does not have accident insurance Con10 I time reaches and travel canceled Con11 I customer has cancel insurance Con12 I customer does not have cancel insurance Spec sconstrs As we have introduced in section part A, a single activity o a worklow is deined as: a( pc) l : acta( x, x.. x ). a 1 2 n state { x1, x2.. xn } According to this, we give deinitions or primary activities as ollowing: First deine database state that would be used in our activity deinition: state time : INT, cancelinsu : BOOL, accinsu : BOOL, hascancel : BOOL, hasaccident : BOOL, paycus : BOOL, agreeaccinssu : BOOL... The state deined above donates the data base o our example: time, a integer type simply donates the time progress, and relects the time based event in the way that when an activity is executed, the variable time would increase, and when the time satisies the guard o a time based event, the corresponding activity would be activated. Variable cancelinsu represents whether a customer choose to purchase a cancel insurance, while accinsu represents whether a customer choose to purchase an accident insurance. Variable hascancel represents whether a trip has been canceled and hasaccident represents whether accidents has occurred during the trip. Variable paycus donates whether the customer has had compensation and agreeaccinssu represents whether a customer already got an accident insurance. Notice that, when in practice, a time constraints would be much more complex, thus more deinitions should be made on time such as time progression, clock or timer, however, this is not what our paper ocus, thus we only give a raw deinition in the way to increase variable time in every execution o a activity. Based on the data state given above, the primary activities are given as below:

7 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY // action Purchase cancel insurance actpurcins cancelinsu alse cancelinsu ' true time' time 1 // action Purchase accident insurance actpurins accinsu alse accinsu ' true time' time 1 // action Start_travelling actstarttravel time deadline time' time 1 // action Cancel_travelling actcanceltravel hascancel alse hascancel ' true time' time 1 // action Accident_occurs actaccoccur hasaccident alse hasaccident ' true time' time 1 // action Compensating actcompcus paycus alse paycus ' true time' time 1 // predicate con3 con3 agreeaccinsu ture // predicate con5 con5 time deadline hascancel alse // predicate con6 con6 hasaccident ture // predicate con8 con8 accinsu ture Thus property i accident occurs, the customer would eventually be compensated, could be represented as: pconstrs Acc _ occur sconstrs ( accinsu true) ~ ( paycus true) The validation o this property is equivalence to the proo o implementation relation: Spec sconstrs. Let low (pc) = spec(pconstrs, low(pc)), by the rules o spec given in previously, the expression o low (pc) is showed as ollowing: low'( pc) Start; Soleedback; con1; Travelreg; ( con2; Pur c ins) ( con3; Pur _ a _ ins) ; Pre _ travel; 4 con con5; Starttravel; con6; Accoccur;(( con8; Compcus) con9) ; End con7 Spec ' pc, hidden : initial( hidden) AT ( low'( pc)) [ low'( pc)] SF ( low'( pc) ) pc, hidden, state pc By the deinition o Spec, it is clearly that we have Spec Spec '. Let P personassu ture, and Q paycus ture, the proo is equivalence to Spec ' P ~ Q, by the proo rules given previously, we have the ollowing ormulas: P[ low'( pc)] ( P' Q') (23) P low'( pc) low''( pc) Q ' (24) P Enablelow''( pc) (25) [ low'( pc)] SF ( low''( pc)) ( P ~ Q) (26) I (23),(24) and (25) hold, then (26) holds. According to (28) and the deinition o predicate P, we could see that in low (pc), ater activity Pur_a_ins was executed, then would have predicate P true. According to (24) and the deinition o predicate Q, we see that ater activity Comp_cus was executed, then would have predicate Q true. Thus i a sub-low low (pc) in which Pur_a_ins and Comp_cus eventually executed: low''( pc) spec( Compcus, spec( Purains, low'( pc))) and low''( pc) Start; Soleedback; con1; Travelreg; con3; Purains; Pretravel; con5; Starttravel; con6; Accoccur; con8; Compcus; End Then according to ormula (26) and ormula Spec ' [ low'( pc)], we could have the SF ( low''( pc)) implementation relation: Spec ' P ~ Q holds, and the eventually property P ~ Q holds. Which means, under the control constraint pconstrs, the data constraint sconstrs holds. From this example, we see that the modeling and validate o properties o a worklow are done in an uniied ramework and data properties are always related with control constraints. When in practice, situation would be much more complex, however, special operator spec would help us to minimize the control path and eicient algorithm could be designed.. CONCLUSION AND FURTHER WORKS In this paper, we used TLA or the modeling and analysis o worklow, and established an uniied ramework or the reasoning and validation o control and data properties. Compared with other modeling approaches, TLA has its advantages in providing a simpler and uniorm way to describing both control and database actors, as well as or their properties reasoning and veriication. We demonstrate several comparisons showed in Table II. In our approach, control graph will be constructed by TLA concurrent operators, and represented by a P-TLA ormula in which each activity is represented by a label and action pair, and relect the database update in every execution. Properties are represented by a T-TLA

8 34 JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY 2009 TABLE II. COMPARISON OF DIFFERENT WORKFLOW MODELING APPROACHES Modeling Formalization Has data Has control Features approach description description Notation General no yes Easy to use UML activity General No yes Easy to use Petri net Strict No yes Good at analysis in control properties TLA logic Strict no yes Good at analysis in control and data properties ormula, and introduced operator spec to TLA to iltrate the model that satisies the corresponding control constraints. By the rules o the speciic operator, eicient algorithm could be designed or the property veriication. The reasoning o properties is simple like the proo o normal TLA ormulas. As we can see, the validation o data property may base on the control properties. Thus, a uniied ramework would be better or properties reasoning. Besides, automated TLA prove method and the corresponding tools are existed, so it is possible or us to automatically reason the worklow properties. On the base o this approach, the composition o worklow model would be listed in our urther works. Task reinement as well as its soundness validation is one kind o worklow composition approaches. More over, the way o describing the semantics o time constraints, resource and other actors o worklow would be concerned into our urther study. REFERENCES [1] D.Georgakopoulos, M. Hornick, A. Sheth, An overview o worklow management: From process modeling to worklow automation inrastructure. Distributed and Parallel Databases, 1995, 3 (3): [2] Salimiard K, Wright M. Petri net based modeling o worklow systems: An overview. European Journal o Operational Research, 2001, 134 (3): [3] W.M.P van der Aalst. The application o Petri nets to work low management. The Journal o Circuits, Systems and Computers, 1998, 8 (1): [4] Marlon Dumas and Arthur H.M. ter Hostede. UML Activity Diagrams as a Worklow Speciication Language. In Proceedings o the UML' 2001 Conerence, Cooperative Inormation Systems Research Centre, Queensland University o Technology. [5] R.Eshuis, R.Wieringa. Veriication support or worklow design with UML activity graphs. The 24th Int l Con on Sotware Engineering, Orlando, USA, [6] Salomie, Ioan Cioara, A Layered Worklow Model Enhanced with Process Algebra Veriication or Industrial Processes. Intelligent Computer Communication and Processing, 2007 IEEE. [7] Davulcu H, Kier M, Ramakrishnan C, Ramakrishnan I. Logic based modeling and analysis o worklows. In : Proceedings o the ACM Symposium in PODS 98, Seattle, USA, [8] Leslie Lamport. The Temporal Logic o Actions[J]. ACM Transactions, [9] Leslie Lamport. veriication and speciication o concurrent programs. proceedings o a REX Workshop, Netherlands, June, [10] Leslie Lamport. Adding Process Algebra to TLA. First A. Author Chen Shu, 01/30/1981 Bachelor degree in computer science WuHan university computer science department WuHan P.R.China, Master degree in sotware engineering WuHan university sotware department WuHan P.R.China, PHD candidate in sotware engineering WuHan university sotware department WuHan P.R.China. Majored in sotware engineering, sotware ormalization and automation. Second B. Author Wu Guo Qing, 10/1954 Proessor, doctoral tutor in WuHan university computer science department. Majored in sotware engineering, sotware ormalization and automation.

Certificate Translation for Optimizing Compilers

Certificate Translation for Optimizing Compilers Certiicate Translation or Optimizing Compilers Gilles Barthe IMDEA Sotware and Benjamin Grégoire and César Kunz and Tamara Rezk INRIA Sophia Antipolis - Méditerranée Proo Carrying Code provides trust in

More information

Automated Theorem Proving and Proof Checking. Proof Checking. Motivation. Cunning Plan. Standard Architecture. History

Automated Theorem Proving and Proof Checking. Proof Checking. Motivation. Cunning Plan. Standard Architecture. History Automated Theorem Proving and Proo Checking Engler: Automatically Generating Malicious Disks using Symex IEEE Security and Privacy 2006 Use CIL and Symbolic Execution on Linux FS code Special model o memory,

More information

Proving the Correctness of Distributed Algorithms using TLA

Proving the Correctness of Distributed Algorithms using TLA Proving the Correctness of Distributed Algorithms using TLA Khushboo Kanjani, khush@cs.tamu.edu, Texas A & M University 11 May 2007 Abstract This work is a summary of the Temporal Logic of Actions(TLA)

More information

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems A Requirement Speciication Language or Coniguration Dynamics o Multiagent Systems Mehdi Dastani, Catholijn M. Jonker, Jan Treur* Vrije Universiteit Amsterdam, Department o Artiicial Intelligence, De Boelelaan

More information

10. SOPC Builder Component Development Walkthrough

10. SOPC Builder Component Development Walkthrough 10. SOPC Builder Component Development Walkthrough QII54007-9.0.0 Introduction This chapter describes the parts o a custom SOPC Builder component and guides you through the process o creating an example

More information

Ad-hoc Workflow: Problems and Solutions

Ad-hoc Workflow: Problems and Solutions Ad-hoc Worklow: Problems and Solutions M. Voorhoeve and W. van der Aalst Dept. o Mathematics and Computing Science Eindhoven University o Technology Eindhoven, The Netherlands, 5600MB Abstract The paper

More information

9.8 Graphing Rational Functions

9.8 Graphing Rational Functions 9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction

More information

Counting Interface Automata and their Application in Static Analysis of Actor Models

Counting Interface Automata and their Application in Static Analysis of Actor Models Counting Interace Automata and their Application in Static Analysis o Actor Models Ernesto Wandeler Jörn W. Janneck Edward A. Lee Lothar Thiele Abstract We present an interace theory based approach to

More information

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.

More information

Generell Topologi. Richard Williamson. May 6, 2013

Generell Topologi. Richard Williamson. May 6, 2013 Generell Topologi Richard Williamson May 6, Thursday 7th January. Basis o a topological space generating a topology with a speciied basis standard topology on R examples Deinition.. Let (, O) be a topological

More information

Automated Planning for Feature Model Configuration based on Functional and Non-Functional Requirements

Automated Planning for Feature Model Configuration based on Functional and Non-Functional Requirements Automated Planning or Feature Model Coniguration based on Functional and Non-Functional Requirements Samaneh Soltani 1, Mohsen Asadi 1, Dragan Gašević 2, Marek Hatala 1, Ebrahim Bagheri 2 1 Simon Fraser

More information

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute

More information

Design and Realization of user Behaviors Recommendation System Based on Association rules under Cloud Environment

Design and Realization of user Behaviors Recommendation System Based on Association rules under Cloud Environment Research Journal o Applied Sciences, Engineering and Technology 6(9): 1669-1673, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientiic Organization, 2013 Submitted: January 19, 2013 Accepted: March

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 73 (2012) 1 22 Contents lists available at SciVerse ScienceDirect Data & Knowledge Engineering journal homepage: www.elsevier.com/locate/datak OCL-Lite: Finite reasoning on

More information

Piecewise polynomial interpolation

Piecewise polynomial interpolation Chapter 2 Piecewise polynomial interpolation In ection.6., and in Lab, we learned that it is not a good idea to interpolate unctions by a highorder polynomials at equally spaced points. However, it transpires

More information

Logic Debugging of Arithmetic Circuits

Logic Debugging of Arithmetic Circuits Logic Debugging o Arithmetic Circuits Samaneh Ghandali, Cunxi Yu, Duo Liu, Walter Brown, Maciej Ciesielski University o Massachusetts, Amherst, USA {samaneh, ycunxi, duo, webrown, ciesiel}@umass.edu Abstract

More information

Research Article Synthesis of Test Scenarios Using UML Sequence Diagrams

Research Article Synthesis of Test Scenarios Using UML Sequence Diagrams International Scholarly Research Network ISRN Sotware Engineering Volume 2012, Article ID 324054, 22 pages doi:10.5402/2012/324054 Research Article Synthesis o Test Scenarios Using UML Sequence Diagrams

More information

Global Constraints. Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019

Global Constraints. Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019 Global Constraints Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019 Global Constraints Global constraints are classes o constraints

More information

Reflection and Refraction

Reflection and Refraction Relection and Reraction Object To determine ocal lengths o lenses and mirrors and to determine the index o reraction o glass. Apparatus Lenses, optical bench, mirrors, light source, screen, plastic or

More information

Neighbourhood Operations

Neighbourhood Operations Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle

More information

foldr CS 5010 Program Design Paradigms Lesson 5.4

foldr CS 5010 Program Design Paradigms Lesson 5.4 oldr CS 5010 Program Design Paradigms Lesson 5.4 Mitchell Wand, 2012-2014 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. 1 Introduction In this lesson,

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle   holds various files of this Leiden University dissertation Cover Page The handle http://hdl.handle.net/1887/22891 holds various files of this Leiden University dissertation Author: Gouw, Stijn de Title: Combining monitoring with run-time assertion checking Issue

More information

A Fault Model Centered Modeling Framework for Self-healing Computing Systems

A Fault Model Centered Modeling Framework for Self-healing Computing Systems A Fault Model Centered Modeling Framework or Sel-healing Computing Systems Wei Lu 1, Yian Zhu 1, Chunyan Ma 1, and Longmei Zhang 2 1 Department o Sotware and Microelectronics, Northwestern Polytechnical

More information

CS485/685 Computer Vision Spring 2012 Dr. George Bebis Programming Assignment 2 Due Date: 3/27/2012

CS485/685 Computer Vision Spring 2012 Dr. George Bebis Programming Assignment 2 Due Date: 3/27/2012 CS8/68 Computer Vision Spring 0 Dr. George Bebis Programming Assignment Due Date: /7/0 In this assignment, you will implement an algorithm or normalizing ace image using SVD. Face normalization is a required

More information

2. Getting Started with the Graphical User Interface

2. Getting Started with the Graphical User Interface February 2011 NII52017-10.1.0 2. Getting Started with the Graphical User Interace NII52017-10.1.0 The Nios II Sotware Build Tools (SBT) or Eclipse is a set o plugins based on the popular Eclipse ramework

More information

Research on Image Splicing Based on Weighted POISSON Fusion

Research on Image Splicing Based on Weighted POISSON Fusion Research on Image Splicing Based on Weighted POISSO Fusion Dan Li, Ling Yuan*, Song Hu, Zeqi Wang School o Computer Science & Technology HuaZhong University o Science & Technology Wuhan, 430074, China

More information

Formalizing Cardinality-based Feature Models and their Staged Configuration

Formalizing Cardinality-based Feature Models and their Staged Configuration Formalizing Cardinality-based Feature Models and their Staged Coniguration Krzyszto Czarnecki, Simon Helsen, and Ulrich Eisenecker 2 University o Waterloo, Canada 2 University o Applied Sciences Kaiserslautern,

More information

Using VCS with the Quartus II Software

Using VCS with the Quartus II Software Using VCS with the Quartus II Sotware December 2002, ver. 1.0 Application Note 239 Introduction As the design complexity o FPGAs continues to rise, veriication engineers are inding it increasingly diicult

More information

On Modeling Query Refinement by Capturing User Intent through Feedback

On Modeling Query Refinement by Capturing User Intent through Feedback Proceedings o the Twenty-Third Australasian Database Conerence (ADC 2012), Melbourne, Australia On Modeling Query Reinement by Capturing User Intent through Feedback Md. Saiul Islam, Chengei Liu and Rui

More information

9. Reviewing Printed Circuit Board Schematics with the Quartus II Software

9. Reviewing Printed Circuit Board Schematics with the Quartus II Software November 2012 QII52019-12.1.0 9. Reviewing Printed Circuit Board Schematics with the Quartus II Sotware QII52019-12.1.0 This chapter provides guidelines or reviewing printed circuit board (PCB) schematics

More information

Specifying and Proving Broadcast Properties with TLA

Specifying and Proving Broadcast Properties with TLA Specifying and Proving Broadcast Properties with TLA William Hipschman Department of Computer Science The University of North Carolina at Chapel Hill Abstract Although group communication is vitally important

More information

Petri-net-based Workflow Management Software

Petri-net-based Workflow Management Software Petri-net-based Workflow Management Software W.M.P. van der Aalst Department of Mathematics and Computing Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands,

More information

A Classification System and Analysis for Aspect-Oriented Programs

A Classification System and Analysis for Aspect-Oriented Programs A Classiication System and Analysis or Aspect-Oriented Programs Martin Rinard, Alexandru Sălcianu, and Suhabe Bugrara Massachusetts Institute o Technology Cambridge, MA 02139 ABSTRACT We present a new

More information

UNIT #2 TRANSFORMATIONS OF FUNCTIONS

UNIT #2 TRANSFORMATIONS OF FUNCTIONS Name: Date: UNIT # TRANSFORMATIONS OF FUNCTIONS Part I Questions. The quadratic unction ollowing does,, () has a turning point at have a turning point? 7, 3, 5 5, 8. I g 7 3, then at which o the The structure

More information

Temporal Logic of Actions (TLA) (a brief introduction) Shmuel Katz Computer Science Department The Technion

Temporal Logic of Actions (TLA) (a brief introduction) Shmuel Katz Computer Science Department The Technion Temporal Logic of Actions (TLA) (a brief introduction) Shmuel Katz Computer Science Department The Technion CS236368 Formal Specifications Lecture-- TLA 1 Basic Idea Combine transitions with temporal logic

More information

The λ-calculus. 1 Background on Computability. 2 Some Intuition for the λ-calculus. 1.1 Alan Turing. 1.2 Alonzo Church

The λ-calculus. 1 Background on Computability. 2 Some Intuition for the λ-calculus. 1.1 Alan Turing. 1.2 Alonzo Church The λ-calculus 1 Background on Computability The history o computability stretches back a long ways, but we ll start here with German mathematician David Hilbert in the 1920s. Hilbert proposed a grand

More information

Xavier: A Robot Navigation Architecture Based on Partially Observable Markov Decision Process Models

Xavier: A Robot Navigation Architecture Based on Partially Observable Markov Decision Process Models Xavier: A Robot Navigation Architecture Based on Partially Observable Markov Decision Process Models Sven Koenig and Reid G. Simmons Carnegie Mellon University School o Computer Science Pittsburgh, PA

More information

Process Modelling using Petri Nets

Process Modelling using Petri Nets Process Modelling using Petri Nets Katalina Grigorova Abstract: This paper discusses the reasons, which impose Petri nets as a conceptual standard for modelling and analysis of workflow. Petri nets notation

More information

Larger K-maps. So far we have only discussed 2 and 3-variable K-maps. We can now create a 4-variable map in the

Larger K-maps. So far we have only discussed 2 and 3-variable K-maps. We can now create a 4-variable map in the EET 3 Chapter 3 7/3/2 PAGE - 23 Larger K-maps The -variable K-map So ar we have only discussed 2 and 3-variable K-maps. We can now create a -variable map in the same way that we created the 3-variable

More information

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices AN 608: HST Jitter and BER Estimator Tool or Stratix IV GX and GT Devices July 2010 AN-608-1.0 The high-speed communication link design toolkit (HST) jitter and bit error rate (BER) estimator tool is a

More information

Road Sign Analysis Using Multisensory Data

Road Sign Analysis Using Multisensory Data Road Sign Analysis Using Multisensory Data R.J. López-Sastre, S. Lauente-Arroyo, P. Gil-Jiménez, P. Siegmann, and S. Maldonado-Bascón University o Alcalá, Department o Signal Theory and Communications

More information

Chapter 3 Image Enhancement in the Spatial Domain

Chapter 3 Image Enhancement in the Spatial Domain Chapter 3 Image Enhancement in the Spatial Domain Yinghua He School o Computer Science and Technology Tianjin University Image enhancement approaches Spatial domain image plane itsel Spatial domain methods

More information

The Graph of an Equation Graph the following by using a table of values and plotting points.

The Graph of an Equation Graph the following by using a table of values and plotting points. Calculus Preparation - Section 1 Graphs and Models Success in math as well as Calculus is to use a multiple perspective -- graphical, analytical, and numerical. Thanks to Rene Descartes we can represent

More information

SIMULATION OPTIMIZER AND OPTIMIZATION METHODS TESTING ON DISCRETE EVENT SIMULATIONS MODELS AND TESTING FUNCTIONS

SIMULATION OPTIMIZER AND OPTIMIZATION METHODS TESTING ON DISCRETE EVENT SIMULATIONS MODELS AND TESTING FUNCTIONS SIMULATION OPTIMIZER AND OPTIMIZATION METHODS TESTING ON DISCRETE EVENT SIMULATIONS MODELS AND TESTING UNCTIONS Pavel Raska (a), Zdenek Ulrych (b), Petr Horesi (c) (a) Department o Industrial Engineering

More information

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in

More information

Global Caching, Inverse Roles and Fixpoint Logics

Global Caching, Inverse Roles and Fixpoint Logics Global Caching, Inverse Roles and Fixpoint Logics Rajeev Goré Logic and Computation Group College o Engineering and Computer Science The Australian National University Canberra ACT 0200, Australia Abstract.

More information

Proportional-Share Scheduling for Distributed Storage Systems

Proportional-Share Scheduling for Distributed Storage Systems Proportional-Share Scheduling or Distributed Storage Systems Abstract Yin Wang University o Michigan yinw@eecs.umich.edu Fully distributed storage systems have gained popularity in the past ew years because

More information

Distributed Systems Programming (F21DS1) Formal Verification

Distributed Systems Programming (F21DS1) Formal Verification Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on

More information

Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols

Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols The Third International Conerence on Availability, Reliability and Security Improving Techniques or Proving Undecidability o Checking Cryptographic Protocols Zhiyao Liang Computer Science Department University

More information

Research Progress for the Interest Control Protocol of Content-centric Networking

Research Progress for the Interest Control Protocol of Content-centric Networking Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Research Progress or the Interest Control Protocol o Content-centric Networing GAO QIANG, WANG WEIMING, ZHOU JINGJING Zhejiang Gongshang

More information

Unsupervised Learning of Probabilistic Models for Robot Navigation

Unsupervised Learning of Probabilistic Models for Robot Navigation Unsupervised Learning o Probabilistic Models or Robot Navigation Sven Koenig Reid G. Simmons School o Computer Science, Carnegie Mellon University Pittsburgh, PA 15213-3891 Abstract Navigation methods

More information

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering Decision Support Systems or E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering ABSTRACT The amount o trade conducted electronically has grown dramatically since the wide introduction

More information

Scheduling in Multihop Wireless Networks without Back-pressure

Scheduling in Multihop Wireless Networks without Back-pressure Forty-Eighth Annual Allerton Conerence Allerton House, UIUC, Illinois, USA September 29 - October 1, 2010 Scheduling in Multihop Wireless Networks without Back-pressure Shihuan Liu, Eylem Ekici, and Lei

More information

A new approach for ranking trapezoidal vague numbers by using SAW method

A new approach for ranking trapezoidal vague numbers by using SAW method Science Road Publishing Corporation Trends in Advanced Science and Engineering ISSN: 225-6557 TASE 2() 57-64, 20 Journal homepage: http://www.sciroad.com/ntase.html A new approach or ranking trapezoidal

More information

2. Design Planning with the Quartus II Software

2. Design Planning with the Quartus II Software November 2013 QII51016-13.1.0 2. Design Planning with the Quartus II Sotware QII51016-13.1.0 This chapter discusses key FPGA design planning considerations, provides recommendations, and describes various

More information

Learning Implied Global Constraints

Learning Implied Global Constraints Learning Implied Global Constraints Christian Bessiere LIRMM-CNRS U. Montpellier, France bessiere@lirmm.r Remi Coletta LRD Montpellier, France coletta@l-rd.r Thierry Petit LINA-CNRS École des Mines de

More information

Verifying Safety Property of Lustre Programs: Temporal Induction

Verifying Safety Property of Lustre Programs: Temporal Induction 22c181: Formal Methods in Software Engineering The University of Iowa Spring 2008 Verifying Safety Property of Lustre Programs: Temporal Induction Copyright 2008 Cesare Tinelli. These notes are copyrighted

More information

1.2 Related Work. Panoramic Camera PTZ Dome Camera

1.2 Related Work. Panoramic Camera PTZ Dome Camera 3rd International Conerence on Multimedia Technology ICMT 2013) A SPATIAL CALIBRATION METHOD BASED ON MASTER-SLAVE CAMERA Hao Shi1, Yu Liu, Shiming Lai, Maojun Zhang, Wei Wang Abstract. Recently the Master-Slave

More information

The λ-calculus. 1 Background on Computability. 2 Programming Paradigms and Functional Programming. 1.1 Alan Turing. 1.

The λ-calculus. 1 Background on Computability. 2 Programming Paradigms and Functional Programming. 1.1 Alan Turing. 1. The λ-calculus 1 Background on Computability The history o computability stretches back a long ways, but we ll start here with German mathematician David Hilbert in the 1920s. Hilbert proposed a grand

More information

1-2. Composition of Functions. OBJECTIVES Perform operations with functions. Find composite functions. Iterate functions using real numbers.

1-2. Composition of Functions. OBJECTIVES Perform operations with functions. Find composite functions. Iterate functions using real numbers. - OBJECTIVES Perorm operations with unctions. Find composite unctions. Iterate unctions using real numbers. Composition o Functions BUSINESS Each year, thousands o people visit Yellowstone National Park

More information

Section II. Nios II Software Development

Section II. Nios II Software Development Section II. Nios II Sotware Development This section o the Embedded Design Handbook describes how to most eectively use the Altera tools or embedded system sotware development, and recommends design styles

More information

FPGA PLB EVALUATION USING QUANTIFIED BOOLEAN SATISFIABILITY

FPGA PLB EVALUATION USING QUANTIFIED BOOLEAN SATISFIABILITY FPGA PLB EVALUATION USING QUANTIFIED BOOLEAN SATISFIABILITY Andrew C. Ling Electrical and Computer Engineering University o Toronto Toronto, CANADA email: aling@eecg.toronto.edu Deshanand P. Singh, Stephen

More information

The Synthesis of Cyclic Combinational Circuits

The Synthesis of Cyclic Combinational Circuits The Synthesis o Cyclic Combinational Circuits Marc D. Riedel riedel@paradise.caltech.edu Caliornia Institute o Technology Mail Code 136 93, Pasadena, CA 91125 Jehoshua Bruck bruck@paradise.caltech.edu

More information

An Approach for Performance Evaluation of Batch-sequential and Parallel Architectural Styles

An Approach for Performance Evaluation of Batch-sequential and Parallel Architectural Styles An Approach or Perormance Evaluation o Batch-sequential and Parallel Architectural Styles Golnaz Aghaee Ghazvini MSc student, Young Research Club, Njaabad Branch, Esahan, Iran Aghaee.golnaz@sco.iaun.ac.ir

More information

Balanced Multiresolution for Symmetric/Antisymmetric Filters

Balanced Multiresolution for Symmetric/Antisymmetric Filters Balanced Multiresolution or Symmetric/Antisymmetric Filters Mahmudul Hasan Faramarz F. Samavati Mario C. Sousa Department o Computer Science University o Calgary Alberta Canada {mhasan samavati smcosta}@ucalgary.ca

More information

CA441 BPM - Modelling Workflow with Petri Nets. Modelling Workflow with Petri Nets. Workflow Management Issues. Workflow. Process.

CA441 BPM - Modelling Workflow with Petri Nets. Modelling Workflow with Petri Nets. Workflow Management Issues. Workflow. Process. Modelling Workflow with Petri Nets 1 Workflow Management Issues Georgakopoulos,Hornick, Sheth Process Workflow specification Workflow Implementation =workflow application Business Process Modelling/ Workflow

More information

Binary recursion. Unate functions. If a cover C(f) is unate in xj, x, then f is unate in xj. x

Binary recursion. Unate functions. If a cover C(f) is unate in xj, x, then f is unate in xj. x Binary recursion Unate unctions! Theorem I a cover C() is unate in,, then is unate in.! Theorem I is unate in,, then every prime implicant o is unate in. Why are unate unctions so special?! Special Boolean

More information

AN ad hoc network is a collection of mobile nodes

AN ad hoc network is a collection of mobile nodes 96 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 19, NO. 7, JULY 008 A Sel-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks Abdelouahid Derhab and Nadjib Badache

More information

Formal specification of semantics of UML 2.0 activity diagrams by using Graph Transformation Systems

Formal specification of semantics of UML 2.0 activity diagrams by using Graph Transformation Systems Formal specification of semantics of UML 2.0 activity diagrams by using Graph Transformation Systems Somayeh Azizi 1, Vahid Panahi 2 Computer science department, Sama Technical and vocational, Training

More information

Composing Fair Objects

Composing Fair Objects Composing Fair Objects G.W. Hamilton School of Computer Applications Dublin City University Ireland hamilton@compapp.dcu.ie D. Méry Université Henri Poincaré Nancy France mery@loria.fr J.P. Gibson Department

More information

Structured Parallel Programming with Deterministic Patterns

Structured Parallel Programming with Deterministic Patterns Structured Parallel Programming with Deterministic Patterns May 14, 2010 USENIX HotPar 2010, Berkeley, Caliornia Michael McCool, Sotware Architect, Ct Technology Sotware and Services Group, Intel Corporation

More information

Specifying and Verifying External Behaviour of Fair Input/Output Automata by Using the Temporal Logic of Actions

Specifying and Verifying External Behaviour of Fair Input/Output Automata by Using the Temporal Logic of Actions INFORMATICA, 2015, Vol. 26, No. 4, 685 704 685 2015 Vilnius University DOI: http://dx.doi.org/10.15388/informatica.2015.71 Specifying and Verifying External Behaviour of Fair Input/Output Automata by Using

More information

Composite functions. [Type the document subtitle] Composite functions, working them out.

Composite functions. [Type the document subtitle] Composite functions, working them out. Composite unctions [Type the document subtitle] Composite unctions, workin them out. luxvis 11/19/01 Composite Functions What are they? In the real world, it is not uncommon or the output o one thin to

More information

ScienceDirect. Using Search Algorithms for Modeling Economic Processes

ScienceDirect. Using Search Algorithms for Modeling Economic Processes vailable online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 6 ( 03 ) 73 737 International Economic onerence o Sibiu 03 Post risis Economy: hallenges and Opportunities, IES 03

More information

Connecting Definition and Use? Tiger Semantic Analysis. Symbol Tables. Symbol Tables (cont d)

Connecting Definition and Use? Tiger Semantic Analysis. Symbol Tables. Symbol Tables (cont d) Tiger source program Tiger Semantic Analysis lexical analyzer report all lexical errors token get next token parser construct variable deinitions to their uses report all syntactic errors absyn checks

More information

Lagrangian relaxations for multiple network alignment

Lagrangian relaxations for multiple network alignment Noname manuscript No. (will be inserted by the editor) Lagrangian relaxations or multiple network alignment Eric Malmi Sanjay Chawla Aristides Gionis Received: date / Accepted: date Abstract We propose

More information

Enforcing Structural Invariants using Dynamic Frames

Enforcing Structural Invariants using Dynamic Frames Enorcing Structural Invariants using Dynamic Frames Diego Garbervetsky, Daniel Gorín, and Ariel Neisen Departamento de Computación, FCEyN, Universidad de Buenos Aires {diegog,dgorin,aneisen}@dc.uba.ar

More information

Message authentication

Message authentication Message authentication -- Reminder on hash unctions -- MAC unctions hash based block cipher based -- Digital signatures (c) Levente Buttyán (buttyan@crysys.hu) Hash unctions a hash unction is a unction

More information

A novel algorithm for multi-node load forecasting based on big data of distribution network

A novel algorithm for multi-node load forecasting based on big data of distribution network International Conerence on Advanced Electronic Science and Technology (AEST 206) A novel algorithm or multi-node load orecasting based on big data o distribution network Guangsong Hou, Ke Xu, Shoubin Yin,

More information

Lab 9 - GEOMETRICAL OPTICS

Lab 9 - GEOMETRICAL OPTICS 161 Name Date Partners Lab 9 - GEOMETRICAL OPTICS OBJECTIVES Optics, developed in us through study, teaches us to see - Paul Cezanne Image rom www.weidemyr.com To examine Snell s Law To observe total internal

More information

GABRIEL C. DRUMMOND-COLE

GABRIEL C. DRUMMOND-COLE MILY RIHL: -CTGORIS FROM SCRTCH (TH SIC TWO-CTGORY THORY) GRIL C. DRUMMOND-COL I m trying to be really gentle on the category theory, within reason. So in particular, I m expecting a lot o people won t

More information

Proceedings of the Sixth International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007)

Proceedings of the Sixth International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007) Electronic Communications o the EASST Volume X (2007) Proceedings o the Sixth International Workshop on Graph Transormation and Visual Modeling Techniques (GT-VMT 2007) Visual Programming with Recursion

More information

From Tables to Frames

From Tables to Frames From Tables to Frames Aleksander Pivk, Philipp Cimiano, and York Sure J. Stean Institute, Dep. o Intelligent Systems, Ljubljana, Slovenia http://ai.ijs.si/ aleksander.pivk@ijs.si Institute AIFB, University

More information

THIN LENSES: BASICS. There are at least three commonly used symbols for object and image distances:

THIN LENSES: BASICS. There are at least three commonly used symbols for object and image distances: THN LENSES: BASCS BJECTVE: To study and veriy some o the laws o optics applicable to thin lenses by determining the ocal lengths o three such lenses ( two convex, one concave) by several methods. THERY:

More information

A MULTI-LEVEL IMAGE DESCRIPTION MODEL SCHEME BASED ON DIGITAL TOPOLOGY

A MULTI-LEVEL IMAGE DESCRIPTION MODEL SCHEME BASED ON DIGITAL TOPOLOGY In: Stilla U et al (Eds) PIA7. International Archives o Photogrammetry, Remote Sensing and Spatial Inormation Sciences, 36 (3/W49B) A MULTI-LEVEL IMAGE DESCRIPTION MODEL SCHEME BASED ON DIGITAL TOPOLOG

More information

2. Recommended Design Flow

2. Recommended Design Flow 2. Recommended Design Flow This chapter describes the Altera-recommended design low or successully implementing external memory interaces in Altera devices. Altera recommends that you create an example

More information

Leslie Lamport: The Specification Language TLA +

Leslie Lamport: The Specification Language TLA + Leslie Lamport: The Specification Language TLA + This is an addendum to a chapter by Stephan Merz in the book Logics of Specification Languages by Dines Bjørner and Martin C. Henson (Springer, 2008). It

More information

A Method of Sign Language Gesture Recognition Based on Contour Feature

A Method of Sign Language Gesture Recognition Based on Contour Feature Proceedings o the World Congress on Engineering and Computer Science 014 Vol I WCECS 014, -4 October, 014, San Francisco, USA A Method o Sign Language Gesture Recognition Based on Contour Feature Jingzhong

More information

Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems

Proceedings of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems USENIX Association Proceedings o HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Lihue, Hawaii, USA May 18 21, 2003 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION 2003 by The USENIX Association

More information

An Analytic Model for Embedded Machine Vision: Architecture and Performance Exploration

An Analytic Model for Embedded Machine Vision: Architecture and Performance Exploration 419 An Analytic Model or Embedded Machine Vision: Architecture and Perormance Exploration Chan Kit Wai, Prahlad Vadakkepat, Tan Kok Kiong Department o Electrical and Computer Engineering, 4 Engineering

More information

Combining Module Selection and Replication for Throughput-Driven Streaming Programs

Combining Module Selection and Replication for Throughput-Driven Streaming Programs Combining Module Selection and Replication or Throughput-Driven Streaming Programs Jason Cong, Muhuan Huang, Bin Liu, Peng Zhang and Yi Zou Computer Science Department, University o Caliornia, Los Angeles

More information

COMP 763. Eugene Syriani. Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science. McGill University

COMP 763. Eugene Syriani. Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science. McGill University Eugene Syriani Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science McGill University 1 OVERVIEW In the context In Theory: Timed Automata The language: Definitions and Semantics

More information

Computer Data Analysis and Plotting

Computer Data Analysis and Plotting Phys 122 February 6, 2006 quark%//~bland/docs/manuals/ph122/pcintro/pcintro.doc Computer Data Analysis and Plotting In this lab we will use Microsot EXCEL to do our calculations. This program has been

More information

Traffic-Aware Placement of NFV Middleboxes

Traffic-Aware Placement of NFV Middleboxes Traic-Aware Placement o NFV Middleboxes Wenrui Ma, Carlos Medina, and Deng Pan School o Computing and Inormation Sciences Florida International University, Miami, FL wma6@iu.edu, cmedi45@iu.edu, pand@iu.edu

More information

Hoare Logic. COMP2600 Formal Methods for Software Engineering. Rajeev Goré

Hoare Logic. COMP2600 Formal Methods for Software Engineering. Rajeev Goré Hoare Logic COMP2600 Formal Methods for Software Engineering Rajeev Goré Australian National University Semester 2, 2016 (Slides courtesy of Ranald Clouston) COMP 2600 Hoare Logic 1 Australian Capital

More information

Fractal Art: Fractal Image and Music Generator

Fractal Art: Fractal Image and Music Generator Proceedings o the 7th WSEAS Int. Con. on Signal Processing, Computational Geometry & Artiicial Vision, Athens, Greece, August 4-6, 007 159 Fractal Art: Fractal Image and Music Generator RAZVAN TANASIE

More information

L ENSES. Lenses Spherical refracting surfaces. n 1 n 2

L ENSES. Lenses Spherical refracting surfaces. n 1 n 2 Lenses 2 L ENSES 2. Sherical reracting suraces In order to start discussing lenses uantitatively, it is useul to consider a simle sherical surace, as shown in Fig. 2.. Our lens is a semi-ininte rod with

More information

Joint Congestion Control and Scheduling in Wireless Networks with Network Coding

Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Title Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Authors Hou, R; Wong Lui, KS; Li, J Citation IEEE Transactions on Vehicular Technology, 2014, v. 63 n. 7, p. 3304-3317

More information

Workflow : Patterns and Specifications

Workflow : Patterns and Specifications Workflow : Patterns and Specifications Seminar Presentation by Ahana Pradhan Under the guidance of Prof. Rushikesh K. Joshi Department of Computer Science and Engineering Indian Institute of Technology,

More information

PROPER TECHNIQUE OF SOFTWARE INSPECTION USING GUARDED COMMAND LANGUAGE

PROPER TECHNIQUE OF SOFTWARE INSPECTION USING GUARDED COMMAND LANGUAGE International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 153-157 PROPER TECHNIQUE OF SOFTWARE INSPECTION USING GUARDED COMMAND LANGUAGE Neeraj Kumar Singhania University,

More information