An ECA-based Control-rule formalism for the BPEL Process Modularization *
|
|
- Lily Annabel Moore
- 5 years ago
- Views:
Transcription
1 Availale online at Proceia Environmental Sciences 11 (2011) An ECA-ase Control-rule formalism for the BPEL Process Moularization * Bang Ouyang, Farong Zhong **, Huan Liu Department of Computer Science,Zhejiang Normal University Jinhua , Zhejiang Province, P. R. China,ouy888@163.com, zfr@zjnu.cn, liuhuan04jsj@126.com Astract Because usinesses are constantly changing, the control flow of usiness process must e pluggale, i.e., it shoul e efine in a flexile manner so that any change in the flow can e easily accommoate. The prolem of astraction with respect to languages for We Services Composition has gaine a lot of attention lately. In this paper, An ECAase control-rule formalism is introuce to moularize the monolithic BPEL process structure. Using such a formalism, usiness users not only can moel executale cross-organizational usiness processes, ut also can easily manage changing usiness environments Pulishe y Elsevier Lt. Open access uner CC BY-NC-ND license. Selection an/or peer-review uner responsiility of the Intelligent Information Technology Application Research Association. Keywors:component: formalism; BPEL Process; composition language astraction; control-rules; 1.Introuction Business Process Execution Language (BPEL) [1], short for We Services Business Process Execution Language (WS-BPEL) is an OASIS stanar executale language for specifying actions within usiness processes with we services. Processes in Business Process Execution Language export an import information y using we service interfaces exclusively. BPEL has gaine a lot of attraction an support from inustry as well as acaemia. The momentum of BPEL is seen through case stuies, an a large numer of BPEL engine implementations in the inustry suggest that BPEL will e the stanar of choice for coorinate We service composition implementations. Service composition shares some common features with workflows [2]. BPEL is ase on the concepts of workflows. However, usinesses are constantly changing, the control flow must e pluggale, i.e., it shoul e efine in a flexile manner so that any change in the flow can e easily accommoate. Keeping this issue in min, a concept of control-rules has een introuce to capture the control flow. In this approach all the activities in the control flow are reay to execute in parallel as soon as the process Pulishe y Elsevier Lt. Open access uner CC BY-NC-ND license. Selection an/or peer-review uner responsiility of the Intelligent Information Technology Application Research Association. oi: /j.proenv
2 512 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) starts, ut the execution sequence is governe y links that propagate from activity to activity. Using rules the moeler can specify the irection of flow from one activity to another ase on an optional conition. 2.Relate Works The prolem of astraction with respect to languages for We services composition has gaine a lot of attention lately. Researchers have approache this prolem from various angles having the same ojective, i.e., to facilitate the process of moeling service compositions. Zeng [3] has evelope a ynamic We service composition system that is capale of ynamic composition an moification of running workflows y using a usiness rule inference engine. Business rule templates are use to efine the usiness policies, which in turn are use to generate process schemas. These rules must e efine y omain experts prior to moeling. An XML ase language is evelope to map the process specifications into the composition engine which runs the process. Our approach on the other han, is uil on top of inustry stanar language an captures rules irectly from the moeler. SWORD [4] is another eveloper toolkit for uiling composite We services using rule-ase plan generation. To create a composite service, the service requestor only nees specify the initial an finial states for the composite service, the plan generation then can e achieve using a rule-ase expert system. Again, this system also oes not utilize BPEL or any other We service stanar, which reners the approach unfeasile in practical use. All the rule ase approaches mentione aove apply pure rule ase methoology. Charfi [5] claim that pure rule ase approach is not appropriate to capture all the aspects of We services composition an put forwar a hyri composition approach. The focus of this research is erive from Aspect Oriente Programming(AOP) an the usiness rules are propose to e implemente in an aspect-oriente extension of BPEL calle AO4BPEL [6]. The usage of such technique requires AO4BPEL complaint implementation, which has not yet een provie. Our approach iffers from the aove work as regars to supporting rule ase We services composition in the following manner: Only one classification of rules is efine that hanle the control flow part of the composition linking activities together. Instea of capturing control flow etails using eclarative if-then rules, which later on raises issues of refinement an transformation complexities, we use rule that are in BPEL native format. 3.Rule Base Composition 3.1.Overview Business rules are pieces of knowlege aout the usiness an it is not appropriate to ury that knowlege eep in coe where no one can ientify it as such [7]. Recently there has een a tren of introucing rules into We services composition [8, 9]. These approaches follow a pure rule ase approach for the composition an encapsulate the whole evelopment life cycle. This pure rule ase approach is not appropriate for eveloping We service compositions [5]. A multitue of rules makes the composition ifficult to unerstan an maintain. We therefore avocate the use of rules for capturing the *Supporte y the National Natural Science Founation of China uner Grant No **Corresponing author.
3 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) control an ata flow only instea of specifying the whole composition process in terms of rules. Our partial rule approach allows for a more unerstanale service composition y reucing complexity an avoiing monolithic process efinitions. The authors in [5] also avocate that usiness rules cannot capture certain aspects of We services composition. For instance, we cannot efine a usiness rule that states that two services shoul e calle in parallel. In fact, what is neee is a tight integration etween rule-ase languages an We service composition languages in orer to e ale to use activities an variales as terms an facts in the rule language. By oing so we will have refine rules at a lower level of execution that can more easily efine control flow semantics of the composition language. Therefore, we propose using BPEL activities as terms in our rule formalism instea of conventional eclarative statements. In BPEL, the core composition specification only efines the asic control an ata flow etween the services to e compose. If we reak own the usiness logic unerlying the composition into several parts or moules, the composition ecomes more flexile since each of these parts can evolve inepenent of the rest an can e create, moifie or elete ynamically at runtime. The iea is to moularize the control flow into iniviual units, each represente as a rule, linking a single pre-activity with a single post-activity so that when usiness policies are suject to change, we only have to moify the corresponing units that moularize the implementation of the usiness process. Moreover, this moularization reuces the complexity of the composition an oosts the aaptaility. 3.2.Control-Rule Formalism Among various types of usiness rules ientifie y researchers [10, 11], one type is the Reaction Rules also known as ECA (Event-Conition-Action) rules that are concerne with the invocation of actions in response to events ase conitions uner which actions must e taken. The control-rules that we use are similar to ECA rules, in that an event is consiere to e completion of an activity, conition specifies the transition conition, an action efines another activity that will e reay to execute after the first activity completes its execution. The structure of a control-rule is as follows: ControlRule { From (activity) [TransitionConition (Boolean expression)] To (activity) Context (flow) } A control-rule links two activities together as a unit/moule. From specifies a source activity upon the execution of which the To or target activity shoul e execute. TransitionConition is an optional Boolean expression that functions as a guar for following this specifie link. If the transition conition is omitte, it is eeme to e present with the constant value true. An if the transition conition evaluate to false, the link is marke as negative an the target activity is not execute. The links following this target activity are also marke as negative, i.e., the consequence of this ecision is to propagate a negative status to the links ownwars. The significance of transition conitions (use along with join conitions) is actuate in the case of choice an ecision patterns. When joining the activities efine y control-rules, the whole control flow is prouce in the form of irecte graph. This graph ase approach oes not require the structure constructs of BPEL. Thus constructs like sequence, flow, an switch are astracte away from the moeler. The control flow is organize using noes that perform work an lines of control etween them escriing the flow of execution. Here an issue arises, i.e., when the processes grows in size an has iterative tasks then maintaining the process ecomes ifficult [12], ecause control lines in such cases may have many tangle inter-epenencies. Changing the flow also ecomes ifficult as the moeler nees to e aware of
4 514 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) epenencies of a particular noe across the entire flow. In orer to get ri of this prolem, we propose to use the while structure construct as an iterative activity. Another structure activity that we use is the pick activity which funamentally is more an event management activity than a structure activity. To moel a special case of simultaneously arriving messages we propose another structure activity calle MultipleReceive that is internally represente with a flow construct an can contain more than one receive activities. All these structure activities may constitute a control flow of their own. Thus the control-rules can e hierarchically neste within these structures an the level at which the rule occurs can e ientifie y the Context attriute of the control-rule. In summary the activity of a control-rule can e anyone of the primitive activities of BPEL; assign (for ata transformations); while (for looping); pick (iffere choice, or event); or our own efine MultipleReceive activity. 4.Patterns analyst It is important to analyze the approach regaring various control flow patterns that may e encountere uring moeling. This is to ensure that any possile scenario can e hanle using the control-rule formalism. In this chapter we analyze how the graph oriente structure of our approach can hanle the most commonly occurring workflow patterns. The control flow perspective provies an essential insight into usiness process moeling effectiveness an expressiveness. A conceptual moel shoul escrie all relevant static an ynamic aspects of the prolem at han. This implies that a process moeling technique shoul have sufficient expressive power in orer to moel all possile patterns [13]. As escrie in [14], a pattern is the astraction from a concrete form which keeps recurring in specific non aritrary contexts. Therefore it is important to analyze common patterns encountere in usiness process moeling. We evaluate our approach using a set of workflow patterns ocumente in [15] an communication patterns ocumente in [16] 4.1.Workflow Patterns The workflow patterns have een compile from an analysis of existing workflow languages an they capture typical control flow epenencies encountere in workflow moeling. These patterns are argualy suitale for analysis of We services composition moeling, since the situations they capture are also relevant in this omain. We shall consier the patterns that are supporte y BPEL only [2]. a a c c an a (a) Sequence () Parallel Split (c) Synchronization a c1 c2 c c or a a c3 c1 c2 c3 c () Exclusive Choice (e) Simple Merge (f) Multi-Choice Figure 1. Workflow patterns Sequence: An activity in a workflow process is enale after the completion of another activity in the same process. This pattern can e hanle y using control-rule without any transition conition, originating from an activity a to another activity (see Fig.1(a)). Parallel Split: A point in the process where a single threa of control splits into multiple threas of control which can e execute in parallel, thus allowing activities to e execute simultaneously or in
5 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) any orer. This pattern can e hanle y using control-rules without transition conitions, originating from one activity a an targeting at ifferent activities, c, to e execute in parallel (see Fig.1()) Synchronization: A point in the process where multiple parallel ranches converge into one single threa of control, thus synchronizing multiple threas. It is an assumption of this pattern that after an incoming ranch has een complete, it cannot e complete again while the merge is still waiting for other ranches to e complete. This pattern can e hanle y control-rules with no transition conition, originating from ifferent activities, c, an targeting at one activity a. An AND join conition must e specifie at the target activity (see Fig.1(c)). Exclusive Choice: A point in the workflow process where ase on a ecision or workflow control ata, one of several ranches is chosen. This pattern is hanle y control-rules originating from one activity a an targeting ifferent activities, c,. Each rule shoul e accompanie with a isjoint transition conition c1, c2 an c3(see Fig.1()) Simple Merge: A point in the workflow process where two or more alternative ranches come together without synchronization. It is an assumption of this pattern that none of the alternative ranches is ever execute in parallel. The pattern can e hanle y using control-rules originate from ifferent activities, c, an targeting at one activity a. An OR join conition must e specifie at the target activity(see Fig.1(e)) Multi-Choice : A point in the process, where, ase on a ecision or control ata, a numer of ranches are chosen an execute as parallel threas. This pattern can e hanle y control-rules originating from an activity a an targeting at ifferent activities, c,. A joint transition conition specifie will result in multiple threas of execution(see Fig.1(f)). Synchronizing Merge: A point in the process where multiple paths converge into one single threa. Some of these paths are active (i.e., they are eing execute) an some are not. If only one path is active, the activity after the merge is triggere as soon as this path completes. If more than one path is active, synchronization of all active paths nees to take place efore the next activity is triggere. This pattern is hanle in the same way pattern simple merge is hanle, i.e., using control-rules originate from ifferent activities, c, an targeting at one activity a an having an OR join conition at the target activity. Implicit Termination: A given su-process is terminate when there is nothing left to o, i.e., termination oes not require an explicit termination activity. Implicit termination is suppose y the flow construct an as we use flow construct to envelope the control flow, the process is terminate implicitly. Multiple Instances without Synchronization: Within the context of a single case, multiple instances of an activity may e create, i.e., there is a facility for spawning of new threas of control, all of them inepenent of each other. This pattern can e hanle y using a while activity with a conition an a context of the case that is spawning off new threa (say process A) an using an invoke activity insie the oy of while that is invoking an operation of another process (say B). The process B will e receiving message from the corresponing invoke of process A which is have the attriute createinstance assigne to yes. This can cause multiple instances. Multiple Instance with Synchronization: This pattern has three su categories. All can e hanle using our approach ecause the solution is ase on while an pick activity which our approach support. For more etails on the solution of these patterns, reaer is referre to [2] Deferre Choice: A point in a process where one among several alternative ranches is chosen ase on information which is not necessarily availale when this point is reache. This can e hanle using pick activity. Cancel Activity an Cancel Case: A cancel activity terminates a running instance of an activity, while canceling a case leas to the removal of an entire workflow instance. Cancel Case is solve with the
6 516 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) terminate activity, which is use to aanon all execution within a usiness process instance of which the terminate activity is a part. Cancel Activity is ealt with using fault an compensation hanlers, specifying the course of action in cases of faults an cancellations. 4.2.Communication Patterns. The Communication Patterns are relate to the way in which system moules interact in the context of Enterprise Application Integration (EAI). They are argualy suitale for the analysis of the communication moeling ailities involving We services composition, given the strong overlap etween EAI an We services technologies. Two types of communications are istinguishe, namely synchronous an asynchronous communication. Synchronous communication involves Request/Reply, One-Way an Synchronous Polling patterns, whereas asynchronous communication involves Message Passing patterns. All of these patterns are supporte in our approach using various arrangements of messaging activities, i.e., receive, invoke an reply. Accoring to the type of communication an the activity selecte y the moeler, the system coul attaches variale attriutes to the activity ase on the signatures of operations involve. 5.Contriutions an future research An ECA-ase control-rule formalism is introuce to moularize the monolithic BPEL process structure. A control-rule efines the irection of flow from one activity to another along with a transition conition an it captures the control flow etails of the usiness process. BPEL activities are use irectly as terms in the rule system instea of conventional if-then-else eclarative statements. This helps in efining more refine rules at the execution level that can capture the process ehavioral in more realistic fashion. Changes in usiness policies pertinent to the process flow can e easily incorporate just y changing the rules, proviing agility against change. As the flow is automatically generate using rules, the moeler oes not have to other aout the interepenencies of activities. Also the rules can e change inepenent to each other. Accoring to BPEL specification, an exception, event or a compensation action can span over the entire process, over a group of activities, or over a single activity. Currently exception/event/compensation hanling over the process level an single activity levels supporte. In the future, flexiility will e provie to the moeler to specify these hanlers over multiple activities. This can e achieve y introucing hanler over an iniviual or group of rules. As a single rule can accumulate two activities at a time, it can provie the asis for multiple activity grouping. References [1] OASIS. We Services Business Process Execution Language Version 2.0. OASIS Stanar 11. April [2] P. Wohe, W.M.P. vaner Aalst, M. Dumas, Arthur H.M. ter Hofstee, Analysis of We Services Composition Languages: The Case of BPEL4W In: Proceeings of the 22n International Conference on Conceptual Moeling (ER 03), Springer-Verlag, vol.2813, pp , Octoer 2003 [3] L. Zeng. Dynamic We Services Composition. Ph.D. thesis, The School of Computer Science an Engineering, University of New South Wales, August 2003 [4] S. R. Ponnekanti, A. Fox. SWORD: A eveloper Toolkit for We Service Composition. In: Proceeings of the 11th Worl Wie We Conference, Honolulu, HI, USA, 2002 [5] A. Charfi. Aspect-Oriente Workflow Languages: AO4BPEL an Applications. PhD thesis, TU Darmstat, Fachereich Informatik, 2007.
7 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) [6] A. Chaffi, M. Mezini. Aspect-Oriente We Service Composition with A04BPEL. In: L.J. Zhang, M. Jeckle, Proceeings of European Conference on We Services (ECOWS 04), Erfurt, Germany, Springer-Verlag, vol.3250, p.168., 2004 [7] B. von Halle. Business Rules Applie: Builing Better Systems using the Business Rules Approach. Wiley, [8] WANG Cong,WANG Zhi-xue,JIANG Guang-jie. Business Process Description Metho Base on ECA Rules. In: Journal of UEST of China. Vol.35 No.1, pp , Fe [9] HE Chunlin, TENG Yun, PENG Renming. We Ser vice Oriente Workflow Moel Base on ECA Rules. In: Computer Science, Vol.36 No.8, pp , Aug 2009 [10] D. Hay, K. A. Healy. Defining Business Rules-What are they really?. Technical report 1.3, The Business Rules Group, July [11] K. Taveter, G. Wagner. Agent-Oriente Enterprise Moeling Base on Business Rules. In: H. S. Kunii, S. Jajoia, A. Selverg, Proceeings of the 20th International Conference on Conceptual Moeling, Yokohama, Japan, Springer-Verlag, vol.2224, pp , Novemer [12] D. Ganesarajah, E. Lupu. Workflow-Base Composition of We-Services: A Business Moel or a Programming Paraigm?. In: Proceeings of the 6th International Enterprise Distriute Oject Computing Conference (EDOC 02), Lausanne, Switzerlan, Septemer, pp , 2002 [13] B. Kiepuszewski. ExpressiVeness an Suitaility of Languages for Control Flow Moelling in Workflows. Ph.D. thesis, Faculty of Information Technology, Queenslan University of Technology, Novemer 2002 [14] D. Riehle, H. Zullighoven. Unerstaning an Using Patterns in Software Development. Theory an Practice of Oject Systems, 2(1), pp [15] Workflow Management Coalition. Terminology&Glossary. Document Numer WFMC-TC-1011, Document Status- Issue 3.0, Feruary 1999 [16] W. A. Ruh, F. X. Maginnis, W. J. Brown. Enterprise Application Integration:A Wiley Tech Brief. John Wiley an Sons, Inc, 2001
An Introduction of BOM Modeling Framework
An Introuction of BOM Moeling Framework Qiang He, Ming-xin Zhang, an Jian-xing Gong Astract Component ase moeling has een a research hotpot in the area of Moeling an Simulation for a long time. In orer
More informationPART 2. Organization Of An Operating System
PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationCMSC 430 Introduction to Compilers. Spring Register Allocation
CMSC 430 Introuction to Compilers Spring 2016 Register Allocation Introuction Change coe that uses an unoune set of virtual registers to coe that uses a finite set of actual regs For ytecoe targets, can
More informationChange Patterns and Change Support Features in Process-Aware Information Systems
hange Patterns an hange Support eatures in -Aware Information Systems arbara Weber 1,, Stefanie Rinerle 2, an Manfre Reichert 3 1 Quality ngineering Research Group, University of Innsbruck, Austria arbara.weber@uibk.ac.at
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationEfficient and Scalable Sequence-Based XML Filtering
Efficient an Scalale Sequence-Base XML Filtering Mariam Salloum University of California, Riversie, CA, USA msalloum@cs.ucr.eu ABSTRACT The uiquitous aoption of XML as the stanar of ata exchange over the
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationFrom an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller
From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationFinite Automata Implementations Considering CPU Cache J. Holub
Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More informationAlgorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times
Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal
More informationAdvanced method of NC programming for 5-axis machining
Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationEnabling Rollback Support in IT Change Management Systems
Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti
More informationJigCell Model Connector: building large molecular network models from components
Simulation Applications JigCell Moel Connector: builing large molecular network moels from components Simulation: Transactions of the Society for Moeling an Simulation International 2018, Vol. 94(11) 993
More informationExperion PKS R500 Migration Planning Guide
Experion PKS R500 Migration Planning Guie EPDOC-XX70-en-500E May 2018 Release 500 Document Release Issue Date EPDOC-XX70- en-500e 500 0 May 2018 Disclaimer This ocument contains Honeywell proprietary information.
More informationHandling missing values in kernel methods with application to microbiology data
an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic
More informationDEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR
Mechanical Testing an Diagnosis ISSN 2247 9635, 2012 (II), Volume 4, 28-36 DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Valentina GOLUBOVIĆ-BUGARSKI, Branislav
More informationOptimal Routing and Scheduling for Deterministic Delay Tolerant Networks
Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico
More informationSpanheight, A Natural Extension of Bandwidth and Treedepth
Master s Thesis Spanheight, A Natural Extension of Banwith an Treeepth Author: N. van Roen Supervisor: Prof. r. Hans. L. Bolaener A thesis sumitte in fulfilment of the requirements for the egree of Master
More informationA Plane Tracker for AEC-automation Applications
A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)
More informationImage compression predicated on recurrent iterated function systems
2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationProving Vizing s Theorem with Rodin
Proving Vizing s Theorem with Roin Joachim Breitner March 25, 2011 Proofs for Vizing s Theorem t to be unwiely unless presente in form a constructive algorithm with a proof of its correctness an termination.
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationChapter 9 Memory Management
Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationNAND flash memory is widely used as a storage
1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage
More informationMODULE VII. Emerging Technologies
MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking
More informationPART 5. Process Coordination And Synchronization
PART 5 Process Coorination An Synchronization CS 503 - PART 5 1 2010 Location Of Process Coorination In The Xinu Hierarchy CS 503 - PART 5 2 2010 Coorination Of Processes Necessary in a concurrent system
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationTREE SPECIES CLASSIFICATION USING RADIOMETRY, TEXTURE AND SHAPE BASED FEATURES
TREE SPECIES CLASSIFICATIO USIG RADIOMETRY, TEXTURE AD SHAPE BASED FEATURES Maria S. Kulikova 1, Meena Mani 1, Anuj Srivastava 2, Xavier Descomes 1, Josiane Zeruia 1 1 Ariana Research Group, IRIA/I3S 06902
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationMore Raster Line Issues. Bresenham Circles. Once More: 8-Pt Symmetry. Only 1 Octant Needed. Spring 2013 CS5600
Spring 03 Lecture Set 3 Bresenham Circles Intro to Computer Graphics From Rich Riesenfel Spring 03 More Raster Line Issues Fat lines with multiple pixel with Symmetric lines n point geometry how shoul
More informationVariable Independence and Resolution Paths for Quantified Boolean Formulas
Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean
More informationA MIMO Fuzzy Controller for tracking: Robot control. Carl Crane Professor, Mechanical Engineering University of Florida Gainesville, FL 32611
A MIMO Fuzzy Controller for tracking: Robot control Paul A.C. Mason Assistant Professor, Kevin Walchko Research Assistant Carl Crane Professor, Mechanical Engineering University of Floria Gainesville,
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationAutomation of Bird Front Half Deboning Procedure: Design and Analysis
Automation of Bir Front Half Deboning Proceure: Design an Analysis Debao Zhou, Jonathan Holmes, Wiley Holcombe, Kok-Meng Lee * an Gary McMurray Foo Processing echnology Division, AAS Laboratory, Georgia
More informationACE: And/Or-parallel Copying-based Execution of Logic Programs
ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationAnimated Surface Pasting
Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationVerifying performance-based design objectives using assemblybased vulnerability
Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA
More informationFuzzy Learning Variable Admittance Control for Human-Robot Cooperation
Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationOn the Energy Efficiency of Content Delivery Architectures
On the Energy Efficiency of Delivery Architectures Kyle Guan, Gary Atkinson, an Daniel C. Kilper Bell Las, Acatel-Lucent, 79 Holmel Roa, Holmel, NJ 07733 Ece Gulsen MIT, 77 Mass. Ave., Camrige, MA 039
More informationA new fuzzy visual servoing with application to robot manipulator
2005 American Control Conference June 8-10, 2005. Portlan, OR, USA FrA09.4 A new fuzzy visual servoing with application to robot manipulator Marco A. Moreno-Armenariz, Wen Yu Abstract Many stereo vision
More informationMODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services
MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationCONSTRUCTION AND ANALYSIS OF INVERSIONS IN S 2 AND H 2. Arunima Ray. Final Paper, MATH 399. Spring 2008 ABSTRACT
CONSTUCTION AN ANALYSIS OF INVESIONS IN S AN H Arunima ay Final Paper, MATH 399 Spring 008 ASTACT The construction use to otain inversions in two-imensional Eucliean space was moifie an applie to otain
More informationMODULE II. Network Programming And Applications
MODULE II Network Programming An Applications Computer Networks an Internets -- Moule 2 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Internet services an communication paraigms Client-server
More informationOverlap Interval Partition Join
Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan
More informationNew Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction
New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationOptimization of cable-stayed bridges with box-girder decks
Avances in Engineering Software 31 (2000) 417 423 www.elsevier.com/locate/avengsoft Optimization of cable-staye briges with box-girer ecks L.M.C. Simões*, J.H.J.O. Negrão Department of Civil Engineering,
More informationDesign Management Using Dynamically Defined Flows
Design Management Using Dynamically Deine Flows Peter R. Sutton*, Jay B. Brockman** an Stephen W. Director* *Department o Electrical an Computer Engineering, Carnegie Mellon University, Pittsburgh, PA
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationThe Berlin Airlift ( ) was an operation by the United States and Great. Linear Programming. Preview Exercises
790 Chapter 7 Sstems of Equations an Inequalities 108. The reason that sstems of linear inequalities are appropriate for moeling health weight is ecause guielines give health weight ranges, rather than
More informationPAPER. 1. Introduction
IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,
More informationDepth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique
17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi
More informationWorkflow : Patterns and Specifications
Workflow : Patterns and Specifications Seminar Presentation by Ahana Pradhan Under the guidance of Prof. Rushikesh K. Joshi Department of Computer Science and Engineering Indian Institute of Technology,
More informationFault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs
Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More information