KAOS: a KLAIM Extension for Reasoning on Programmable QoS
|
|
- Edith McDaniel
- 5 years ago
- Views:
Transcription
1 KAOS: a KLAIM Extension for Reasoning on Programmable QoS Emilio Tuosto etuosto@di.unipi.it Dipartimento di Informatica Universitá di Pisa In cooperation with: R. De Nicola, G. Ferrari, U. Montanari and R. Pugliese KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.1/15
2 Plan of the talk KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15
3 Plan of the talk WAN Programming with QoS KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15
4 Plan of the talk WAN Programming with QoS A representation of QoS parameters KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15
5 Plan of the talk WAN Programming with QoS A representation of QoS parameters KAOS KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15
6 Plan of the talk WAN Programming with QoS A representation of QoS parameters KAOS KAOS & Hypergraphs: reasoning on QoS issues KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15
7 Plan of the talk WAN Programming with QoS A representation of QoS parameters KAOS KAOS & Hypergraphs: reasoning on QoS issues Details in International Symposium on Verification - Theory and Practice (LNCS) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15
8 Wide Area Network Programming Issues Absence of centralised control Administrative domains Interoperability Mobility (of resources and computation) Network Awareness Applications are location dependent Locations have different features and allow multiple (security) policies Independently programmed in a distributed environment Service Level Agreement Security... KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.3/15
9 Klaim KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15
10 Klaim Multiple TS KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15
11 Klaim Multiple TS Localities: first class citizens KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15
12 Klaim Multiple TS Localities: first class citizens Process migration KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15
13 Klaim Multiple TS Localities: first class citizens Process migration Q Q a(t)@s R P eval(p )@s R P site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15
14 Klaim Multiple TS Localities: first class citizens Process migration Q Q a(t)@s R P eval(p )@s R P site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15
15 Klaim Multiple TS Localities: first class citizens Process migration R Q P a(t)@s eval(p )@s R Q P P ::= nil α.p P 1 P 2 α ::= a@s a ::=... // Klaim actions site s site s ε(p ) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15
16 KAOS: Gateways KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15
17 KAOS: Gateways Coordinators (super processes) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15
18 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15
19 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15
20 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management Q Q P P R P R site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15
21 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management Q Q new(s, P ) P P R P R site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15
22 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management Q Q P P R P R site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15
23 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management Q Q P ::= γ.p P 1 P 2 γ ::= α κ ν(s κ) κ s R site s P R site s s κ δ l Cost κ abstracts characteristics of connections according to many dimensions (bandwidth, latency, distance, access rights...) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15
24 Connection costs Algebra on costs: c-semiring. A, +,, 0, 1 is a constraint semiring if A is a set (0, 1 A), and + and are binary operations on A that satisfy the following properties: + is commutative, associative, idempotent, 0 is its unit element and 1 is its absorbing element; is commutative, associative, distributes over +, 1 is its unit element, and 0 is its absorbing element. The additive operation of a c-semiring induces a partial order on A defined as a A b c : a + c = b. The minimal element is thus 0 and the maximal 1 KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.6/15
25 Examples of connection costs N, min, +, +, 0, the c-semiring of natural numbers N where the additive operation is min the multiplicative operation is the sum over natural numbers ({A}),,, A, A}, c-semiring of capabilities A where the additive operation is the multiplicative operation is KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.7/15
26 KAOS: Example 1. message on s t 2. check message s Send msg to t 3. download message KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.8/15
27 KAOS: Example 1. message on s <10,{i,o},2> x <100,{i,o,n},2> t 2. check message s t z <300,{i,o},60> s 3. download message Send msg to t <10,{i},20> y <150,{i,o},2> KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.8/15
28 KAOS: Example 1. message on s <10,{i,o},2> x <100,{i,o,n},2> t 2. check message s t z <300,{i,o},60> s 3. download message Send msg to t Costs are triples κ = d, C, p where <10,{i},20> 1. d is the geographical distance (in Km); y <150,{i,o},2> 2. C {i, o, n} are the capabilities, where i, o and n stand for input, output and creation of new nodes, respectively; 3. p is the price (in euros). KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.8/15
29 KAOS: Example Costs are elements of the cartesian product of 1. (N, min, +, +, 0), 2. ( ({i, o, n}), glb,, {i, o, n}, {i, o, n}), 3. (Q, min, +, +, 0). proved to be a c-semiring [BMR97] Operations and + are d, C, p d, C, p = d + d, C C, p + p d, C, p + d, C, p = min{d, d }, glb{c, C }, min{p, p }. Accordingly, the neutral elements of and +, respectively are defined as 1 = 0, {i, o, n}, 0 and 0 = +,, +. KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.9/15
30 Hypergraphs Programming model 2 Tackling new non-functional computational phenomena of systems using SHR. The metaphor is WAN systems as Hypergraphs WAN computations as SHR In other words: Components are represented by hyperedges Systems are bunches of (connected) hyperedges Computing means to rewrite hyperedge......according to a synchronisation policy KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.10/15
31 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15
32 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z G ::= nil ν y.g L( x) G G KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15
33 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z G ::= nil ν y.g L( x) G G Syntactic Judgement Γ G, fn(g) Γ KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15
34 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z G ::= nil ν y.g L( x) G G Syntactic Judgement Γ G, fn(g) Γ An example: L : 3, M : 2 x, y ν z.(l(y, z, x) M(y, z)) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15
35 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z G ::= nil ν y.g L( x) G G Syntactic Judgement Γ G, fn(g) Γ An example: y L : 3, M : 2 x, y ν z.(l(y, z, x) M(y, z)) x L M z KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15
36 Replacement of Hyperedges L G KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15
37 Replacement of Hyperedges L G G G L 3 G2 G2 KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15
38 Replacement of Hyperedges L G G2 G1 G L KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15
39 Replacement of Hyperedges L G G2 G1 G L Edge replacement: local Synchronisation as distributed constraint solving New node creation Node fusion: mobility model KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15
40 Replacement of Hyperedges L G Edge replacement: local G1 1 2 G L G2 Synchronisation as distributed constraint solving New node creation Node fusion: mobility model Benefits: Powerful model of system composition (π, π-i, fusion) LTS for Ambient......and for Klaim and path reservation for KAOS KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15
41 KAOS & Hypergraphs [[ s :: L P ]] = Γ (ν x, p)([[ P ]] p s m,n ( u, x, p) n j=1 G κ j t j (x j, v j )) ζ ζ G G ζ P... G G KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.13/15
42 KAOS & Hypergraphs [[ s :: L P ]] = Γ (ν x, p)([[ P ]] p s m,n ( u, x, p) n j=1 G κ j t j (x j, v j )) ζ ζ... G G [ nil ] p = nil [ o t ] p = L o t (p) [ γ.p ] p = L γ.p (p) ζ [ ε(p )@s ] p = (ν u)(ε T s (P ) (u, p) S P (u)) P G G [ P 1 P 2 ] p = [ P 1 ] p [ P 2 ] p [ rec X. P ] p = [ P [ rec X. P / X ] ] p.... KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.13/15
43 Graph for the message example t G κ tx x x x G κ zx x G κ xz t G κ xt t G κ ty ε T s S Ff,t z G κzs z G κ sz y y y G κ yz z z z s s s L bigfile,file KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.14/15
44 KAOS Graph semantics: pros & cons KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15
45 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15
46 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) + Determines the optimal path (also KAOS) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15
47 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) + Determines the optimal path (also KAOS) + Path reservation KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15
48 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) + Determines the optimal path (also KAOS) + Path reservation + Path routing KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15
49 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) + Determines the optimal path (also KAOS) + Path reservation + Path routing Theorem KAOS remote actions are routed on paths with minimal cost (wrt the c-semiring operations) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15
A Soft Constraint-Based Approach to QoS-Aware Service Selection
A Soft Constraint-Based Approach to QoS-Aware Service Selection Mohamed Anis Zemni 1, Salima Benbernou 1, Manuel Carro 2 1 LIPADE, Université Paris Descartes, France 2 Facultad de Informática, Universidad
More informationResource Access and Mobility Control with Dynamic Privileges Acquisition
Resource Access and Mobility Control with Dynamic Privileges Acquisition Daniele Gorla Rosario Pugliese Dipartimento di Sistemi e Informatica, Università di Firenze e-mail: {gorla,pugliese}@dsi.unifi.it
More informationTypes for access control
Theoretical Computer Science 240 (2000) 215 254 www.elsevier.com/locate/tcs Types for access control Rocco De Nicola a;, GianLuigi Ferrari b, Rosario Pugliese a, Betti Venneri a a Dipartimento di Sistemi
More informationSemantic Optimization of Preference Queries
Semantic Optimization of Preference Queries Jan Chomicki University at Buffalo http://www.cse.buffalo.edu/ chomicki 1 Querying with Preferences Find the best answers to a query, instead of all the answers.
More informationThe Klaim Project: Theory and Practice
The Klaim Project: Theory and Practice Lorenzo Bettini 1, Viviana Bono 2, Rocco De Nicola 1, Gianluigi Ferrari 3, Daniele Gorla 1, Michele Loreti 1, Eugenio Moggi 4, Rosario Pugliese 1, Emilio Tuosto 3,
More informationFoundational Calculi for Network Aware Programming
Foundational Calculi for Network Aware Programming An Assessment from a Programming Perspective GIANLUIGI FERRARI Dipartimento di Informatica, Università di Pisa ROSARIO PUGLIESE Dipartimento di Sistemi
More informationGraphs and Graph Transformations for Object-Oriented and Service-Oriented Systems
Università degli Studi di Pisa Dipartimento di Informatica Dottorato di Ricerca in Informatica Ph.D. Thesis Graphs and Graph Transformations for Object-Oriented and Service-Oriented Systems Liang Zhao
More informationStatic Analysis by A. I. of Embedded Critical Software
Static Analysis by Abstract Interpretation of Embedded Critical Software Julien Bertrane ENS, Julien.bertrane@ens.fr Patrick Cousot ENS & CIMS, Patrick.Cousot@ens.fr Radhia Cousot CNRS & ENS, Radhia.Cousot@ens.fr
More informationCS131 Typed Lambda Calculus Worksheet Due Thursday, April 19th
CS131 Typed Lambda Calculus Worksheet Due Thursday, April 19th Name: CAS ID (e.g., abc01234@pomona.edu): I encourage you to collaborate. collaborations below. Please record your Each question is worth
More informationDealing with Incomplete Preferences in Soft Constraint Problems
Dealing with Incomplete Preferences in Soft Constraint Problems Mirco Gelain, Maria Silvia Pini, Francesca Rossi, and K. Brent Venable Dipartimento di Matematica Pura ed Applicata, Università di Padova,
More informationComplex Systems Design &DistributedCalculusandCoordination
Complex Systems Design &DistributedCalculusandCoordination Concurrency and Process Algebras: Theory and Practice - Klaim Francesco Tiezzi University of Camerino francesco.tiezzi@unicam.it A.A. 2014/2015
More informationSection 1.8. Simplifying Expressions
Section 1.8 Simplifying Expressions But, first Commutative property: a + b = b + a; a * b = b * a Associative property: (a + b) + c = a + (b + c) (a * b) * c = a * (b * c) Distributive property: a * (b
More informationNetwork models and graph theory
Network models and graph theory G. Ferrari Trecate Dipartimento di Ingegneria Industriale e dell Informazione (DIII) Università degli Studi di Pavia Industrial Automation Ferrari Trecate (DII) Network
More informationA General Method for Assessment of Security in Complex Services
A General Method for Assessment of Security in Complex Services Leanid Krautsevich 1, Fabio Martinelli 2, and Artsiom Yautsiukhin 2 1 Department of Computer Science, University of Pisa, Pisa, Italy krautsev@di.unipi.it
More informationAGILE: Software Architecture for Mobility
AGILE: Software Architecture for Mobility L. Andrade 6, P. Baldan 8, H. Baumeister 1, R. Bruni 2, A. Corradini 2, R. De Nicola 3, J. L. Fiadeiro 6, F. Gadducci 2, S. Gnesi 4, P. Hoffman 7, N. Koch 1, P.
More informationGram s relation for cone valuations
Gram s relation for cone valuations Sebastian Manecke Goethe Universität Frankfurt joint work with Spencer Backman and Raman Sanyal July 31, 2018 Gram s relation for cone valuations Sebastian Manecke 1
More informationThe Klaim Project: Theory and Practice
The Klaim Project: Theory and Practice Lorenzo Bettini 1, Viviana Bono 2, Rocco De Nicola 1, Gianluigi Ferrari 3, Daniele Gorla 1, Michele Loreti 1, Eugenio Moggi 4, Rosario Pugliese 1, Emilio Tuosto 3,
More informationCategorical models of type theory
1 / 59 Categorical models of type theory Michael Shulman February 28, 2012 2 / 59 Outline 1 Type theory and category theory 2 Categorical type constructors 3 Dependent types and display maps 4 Fibrations
More informationExpressiveness and Complexity of a Graph Logic
1 Expressiveness and Complexity of a Graph Logic (Cambridge) joint work with Philippa Gardner (Imperial College) and Giorgio Ghelli (Pisa) 2 A View of Process Algebras A term algebra T given by a functional
More informationType Soundness and Race Freedom for Mezzo
Type Soundness and Race Freedom for Mezzo Thibaut Balabonski François Pottier Jonathan Protzenko INRIA FLOPS 2014 1 / 42 Mezzo in a few words Mezzo is a high-level programming language, equipped with:
More information3. According to universal addressing, what is the address of vertex d? 4. According to universal addressing, what is the address of vertex f?
1. Prove: A full m-ary tree with i internal vertices contains n = mi + 1 vertices. 2. For a full m-ary tree with n vertices, i internal vertices, and l leaves, prove: (i) i = (n 1)/m and l = [(m 1)n +
More informationHw 4 Due Feb 22. D(fg) x y z (
Hw 4 Due Feb 22 2.2 Exercise 7,8,10,12,15,18,28,35,36,46 2.3 Exercise 3,11,39,40,47(b) 2.4 Exercise 6,7 Use both the direct method and product rule to calculate where f(x, y, z) = 3x, g(x, y, z) = ( 1
More informationComputing Aggregate Functions in Sensor Networks
Computing Aggregate Functions in Sensor Networks Antonio Fernández Anta 1 Miguel A. Mosteiro 1,2 Christopher Thraves 3 1 LADyR, GSyC,Universidad Rey Juan Carlos 2 Dept. of Computer Science, Rutgers University
More informationA fuzzy constraint assigns every possible tuple in a relation a membership degree. The function
Scribe Notes: 2/13/2013 Presenter: Tony Schnider Scribe: Nate Stender Topic: Soft Constraints (Ch. 9 of CP handbook) Soft Constraints Motivation Soft constraints are used: 1. When we seek to find the best
More informationPure Lambda Calculus. Lecture 17
Pure Lambda Calculus Lecture 17 Lambda Calculus Lambda Calculus (λ-calculus) is a functional notation introduced by Alonzo Church in the early 1930s to formalize the notion of computability. Pure λ-calculus
More informationChapter 2 The Operation of Fuzzy Set
Chapter 2 The Operation of Fuzzy Set Standard operations of Fuzzy Set! Complement set! Union Ma[, ]! Intersection Min[, ]! difference between characteristics of crisp fuzzy set operator n law of contradiction
More informationSimulation and Analysis of Distributed Systems in Klaim
Simulation and Analysis of Distributed Systems in Klaim Francesco Calzolai and Michele Loreti Dipartimento di Sistemi e Informatica Università di Firenze Abstract. Network and distributed systems typically
More informationO Klaim: a coordination language with mobile mixins
O Klaim: a coordination language with mobile mixins Lorenzo Bettini 1 Viviana Bono 2 Betti Venneri 1 1 Dipartimento di Sistemi e Informatica, Università di Firenze, {bettini,venneri}@dsi.unifi.it 2 Dipartimento
More informationLANGUAGE PROCESSORS. Presented By: Prof. S.J. Soni, SPCE Visnagar.
LANGUAGE PROCESSORS Presented By: Prof. S.J. Soni, SPCE Visnagar. Introduction Language Processing activities arise due to the differences between the manner in which a software designer describes the
More informationComputational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example
Lecture 2: Combinatorial search and optimisation problems Different types of computational problems Examples of computational problems Relationships between problems Computational properties of different
More informationCourse on Probabilistic Methods in Concurrency. (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1
Course on Probabilistic Methods in Concurrency (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1 The pi-calculus and the asynchronous pi-calculus. Catuscia Palamidessi INRIA
More informationOn the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems
On the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems Nicoleta Neagu and Stefano Bistarelli 2,3 and Boi Faltings Artificial Intelligence Laboratory (LIA), Computer Science
More informationThe Extended Algebra. Duplicate Elimination. Sorting. Example: Duplicate Elimination
The Extended Algebra Duplicate Elimination 2 δ = eliminate duplicates from bags. τ = sort tuples. γ = grouping and aggregation. Outerjoin : avoids dangling tuples = tuples that do not join with anything.
More informationCalculus of Inductive Constructions
Calculus of Inductive Constructions Software Formal Verification Maria João Frade Departmento de Informática Universidade do Minho 2008/2009 Maria João Frade (DI-UM) Calculus of Inductive Constructions
More informationUNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES (SOLUTIONS ) CHAPTER 3: Partial derivatives and differentiation
UNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES SOLUTIONS ) 3-1. Find, for the following functions: a) fx, y) x cos x sin y. b) fx, y) e xy. c) fx, y) x + y ) lnx + y ). CHAPTER 3: Partial derivatives
More informationDSAS Laboratory no 4. Laboratory 4. Logic forms
Laboratory 4 Logic forms 4.1 Laboratory work goals Going from Boolean functions to Boolean forms. Logic forms equivalence. Boolean forms simplification. Shannon s theorems. Representation in NAND and NOR
More informationCS 6110 S14 Lecture 38 Abstract Interpretation 30 April 2014
CS 6110 S14 Lecture 38 Abstract Interpretation 30 April 2014 1 Introduction to Abstract Interpretation At this point in the course, we have looked at several aspects of programming languages: operational
More informationProgram Calculus Calculational Programming
Program Calculus Calculational Programming National Institute of Informatics June 21 / June 28 / July 5, 2010 Program Calculus Calculational Programming What we will learn? Discussing the mathematical
More informationDeadlock Avoidance in SCC
Deadlock Avoidance in SCC based on the AMAST 2008 paper Types and deadlock freedom in a calculus of services, sessions and pipelines Roberto Bruni 1 Leonardo Gaetano Mezzina 2 1 Dipartimento di Informatica
More informationOn the Expressiveness of Polyadicity in Higher-Order Process Calculi
On the Expressiveness of Polyadicity in Higher-Order Process Calculi Ivan Lanese, Jorge A. Pérez, Davide Sangiorgi (Univ. di Bologna) Alan Schmitt (INRIA Grenoble - Rhône Alpes) ICTCS 09 Cremona, September
More informationImplementation of transducers in Vaucanson
Implementation of transducers in Vaucanson Sarah O Connor LRDE seminar, June 23, 2004 http://vaucanson.lrde.epita.fr/ Copying this document Copying this document Copyright
More informationType Inference with Recursive Type Equations
Type Inference with Recursive Type Equations Mario Coppo Dipartimento di Informatica, Università di Torino, Corso Svizzera 185, 10149 Torino, Italy coppo@di.unito.it http://www.di.unito.it/ coppo Abstract.
More informationHiding local state in direct style: a higher-order anti-frame rule
1 / 65 Hiding local state in direct style: a higher-order anti-frame rule François Pottier January 28th, 2008 2 / 65 Contents Introduction Basics of the type system A higher-order anti-frame rule Applications
More informationImproving Query Plans. CS157B Chris Pollett Mar. 21, 2005.
Improving Query Plans CS157B Chris Pollett Mar. 21, 2005. Outline Parse Trees and Grammars Algebraic Laws for Improving Query Plans From Parse Trees To Logical Query Plans Syntax Analysis and Parse Trees
More information(Pre-)Algebras for Linguistics
2. Introducing Preordered Algebras Linguistics 680: Formal Foundations Autumn 2010 Algebras A (one-sorted) algebra is a set with one or more operations (where special elements are thought of as nullary
More informationFlexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract
Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,
More informationTheorem Proving Principles, Techniques, Applications Recursion
NICTA Advanced Course Theorem Proving Principles, Techniques, Applications Recursion 1 CONTENT Intro & motivation, getting started with Isabelle Foundations & Principles Lambda Calculus Higher Order Logic,
More informationConnectivity of the zero-divisor graph for finite rings
Connectivity of the zero-divisor graph for finite rings Reza Akhtar and Lucas Lee Abstract The vertex-connectivity and edge-connectivity of the zero-divisor graph associated to a finite commutative ring
More informationRandomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec.
Randomized rounding of semidefinite programs and primal-dual method for integer linear programming Dr. Saeedeh Parsaeefard 1 2 3 4 Semidefinite Programming () 1 Integer Programming integer programming
More informationMobile Applications in X-KLAIM
Mobile Applications in X-KLAIM Lorenzo Bettini 1 Rocco De Nicola 1 GianLuigi Ferrari 2 Rosario Pugliese 1 1 Dipartimento di Sistemi e Informatica, Università di Firenze e-mail: fbettini,denicola,puglieseg@dsi.unifi.it
More informationProgramming Languages Lecture 14: Sum, Product, Recursive Types
CSE 230: Winter 200 Principles of Programming Languages Lecture 4: Sum, Product, Recursive Types The end is nigh HW 3 No HW 4 (= Final) Project (Meeting + Talk) Ranjit Jhala UC San Diego Recap Goal: Relate
More informationCS 671, Automated Reasoning
CS 671, Automated Reasoning Lesson 20: Type Constructs based on Intersection (II): dependent records, abstract data types, basic algebra April 3, 2001 Last time we discussed record types and their representation
More informationRelational Algebra. B term 2004: lecture 10, 11
Relational lgebra term 00: lecture 0, Nov, 00 asics Relational lgebra is defined on bags, rather than relations. ag or multiset allows duplicate values; but order is not significant. We can write an expression
More informationGraph based codes for distributed storage systems
/23 Graph based codes for distributed storage systems July 2, 25 Christine Kelley University of Nebraska-Lincoln Joint work with Allison Beemer and Carolyn Mayer Combinatorics and Computer Algebra, COCOA
More informationWeakly Relational Domains for Floating-Point Computation Analysis
Weakly Relational Domains for Floating-Point Computation Analysis Eric Goubault, Sylvie Putot CEA Saclay, F91191 Gif-sur-Yvette Cedex, France {eric.goubault,sylvie.putot}@cea.fr 1 Introduction We present
More informationData integration lecture 3
PhD course on View-based query processing Data integration lecture 3 Riccardo Rosati Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza {rosati}@dis.uniroma1.it Corso di Dottorato
More informationAdvanced Query Processing
Advanced Query Processing CSEP544 Nov. 2015 CSEP544 Optimal Sequential Algorithms Nov. 2015 1 / 28 Lecture 9: Advanced Query Processing Optimal Sequential Algorithms. Semijoin Reduction Optimal Parallel
More informationMetaKlaim: A Type Safe Multi-stage Language for Global Computing
Under consideration for publication in Math. Struct. in Comp. Science MetaKlaim: A Type Safe Multi-stage Language for Global Computing G I A N L U I G I F E R R A R I 1 and E U G E N I O M O G G I 2 and
More informationCOT 6405 Introduction to Theory of Algorithms
COT 6405 Introduction to Theory of Algorithms Topic 16. Single source shortest path 11/18/2015 1 Problem definition Problem: given a weighted directed graph G, find the minimum-weight path from a given
More informationApplication Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective
Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Ruozhou Yu, Guoliang Xue, and Xiang Zhang Arizona State University Outlines Background and Motivation System Modeling
More informationFormal Systems II: Applications
Formal Systems II: Applications Functional Verification of Java Programs: Java Dynamic Logic Bernhard Beckert Mattias Ulbrich SS 2017 KIT INSTITUT FÜR THEORETISCHE INFORMATIK KIT University of the State
More informationf (Pijk ) V. may form the Riemann sum: . Definition. The triple integral of f over the rectangular box B is defined to f (x, y, z) dv = lim
Chapter 14 Multiple Integrals..1 Double Integrals, Iterated Integrals, Cross-sections.2 Double Integrals over more general regions, Definition, Evaluation of Double Integrals, Properties of Double Integrals.3
More informationThe 2-core of a Non-homogeneous Hypergraph
July 16, 2012 k-cores A Hypergraph G on vertex set V is a collection E of subsets of V. E is the set of hyperedges. For ordinary graphs, e = 2 for all e E. The k-core of a (hyper)graph is the maximal subgraph
More informationCSC 501 Semantics of Programming Languages
CSC 501 Semantics of Programming Languages Subtitle: An Introduction to Formal Methods. Instructor: Dr. Lutz Hamel Email: hamel@cs.uri.edu Office: Tyler, Rm 251 Books There are no required books in this
More informationUNIT-II NUMBER THEORY
UNIT-II NUMBER THEORY An integer n is even if, and only if, n equals twice some integer. i.e. if n is an integer, then n is even an integer k such that n =2k An integer n is odd if, and only if, n equals
More informationRed-Black Trees (2) Antonio Carzaniga. April 23, Faculty of Informatics Università della Svizzera italiana Antonio Carzaniga
Red-Black Trees (2) Antonio Carzaniga Faculty of Informatics Università della Svizzera italiana April 23, 2013 Recap on Red-Black Trees 2006 Antonio Carzaniga Recap on Red-Black Trees 12 5 18 2 9 15 19
More informationModelling Downgrading in Information Flow Security. A. Bossi, C. Piazza, and S. Rossi. Dipartimento di Informatica Università Ca Foscari di Venezia
Modelling Downgrading in Information Flow Security A. Bossi, C. Piazza, and S. Rossi Dipartimento di Informatica Università Ca Foscari di Venezia bossi, piazza, srossi @dsi.unive.it Joint Meeting MYTHS/MIKADO/DART,
More informationDYNAMIC ADAPTATION OF ACCESS CONTROL POLICIES
DYNAMIC ADAPTATION OF ACCESS CONTROL POLICIES Vijay Bharadwaj and John Baras Institute for Systems Research University of Maryland College Park MD 20742 ABSTRACT We describe an architecture and algorithms
More informationSYNERGY INSTITUTE OF ENGINEERING & TECHNOLOGY,DHENKANAL LECTURE NOTES ON DIGITAL ELECTRONICS CIRCUIT(SUBJECT CODE:PCEC4202)
Lecture No:5 Boolean Expressions and Definitions Boolean Algebra Boolean Algebra is used to analyze and simplify the digital (logic) circuits. It uses only the binary numbers i.e. 0 and 1. It is also called
More informationModule 6. Knowledge Representation and Logic (First Order Logic) Version 2 CSE IIT, Kharagpur
Module 6 Knowledge Representation and Logic (First Order Logic) 6.1 Instructional Objective Students should understand the advantages of first order logic as a knowledge representation language Students
More informationDependent Object Types - A foundation for Scala's type system
Dependent Object Types - A foundation for Scala's type system Draft of January 14, 2010 Do Not Distrubute Martin Odersky, Georey Alan Washburn EPFL Abstract. 1 Introduction This paper presents a proposal
More informationInteraction Nets vs. the ρ-calculus: Introducing Bigraphical Nets
Interaction Nets vs. the ρ-calculus: Introducing Bigraphical Nets Maribel Fernández 1 Ian Mackie 1 François-Régis Sinot 2 1 DCS, King s College London 2 LIX, École Polytechnique Rho-Calculus Workshop,
More informationHoare logic. A proof system for separation logic. Introduction. Separation logic
Introduction Hoare logic Lecture 6: Examples in separation logic In the previous lecture, we saw how reasoning about pointers in Hoare logic was problematic, which motivated introducing separation logic.
More informationNegations in Refinement Type Systems
Negations in Refinement Type Systems T. Tsukada (U. Tokyo) 14th March 2016 Shonan, JAPAN This Talk About refinement intersection type systems that refute judgements of other type systems. Background Refinement
More informationGraph Theory and Optimization Approximation Algorithms
Graph Theory and Optimization Approximation Algorithms Nicolas Nisse Université Côte d Azur, Inria, CNRS, I3S, France October 2018 Thank you to F. Giroire for some of the slides N. Nisse Graph Theory and
More informationInductive datatypes in HOL. lessons learned in Formal-Logic Engineering
Inductive datatypes in HOL lessons learned in Formal-Logic Engineering Stefan Berghofer and Markus Wenzel Institut für Informatik TU München = Isabelle λ β HOL α 1 Introduction Applications of inductive
More informationTopology basics. Constraints and measures. Butterfly networks.
EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April
More informationPredictive Bandwidth Control for GEO Satellite Networks
Outline Predictive Bandwidth Control for GEO Satellite Networks L. Chisci 1 R. Fantacci 2 T. Pecorella 3 1 Dpt. di Sistemi e Informatica Università di Firenze, Italy. 2 Dpt. di Elettronica e Telecomunicazioni
More informationDependent Object Types - A foundation for Scala s type system
Dependent Object Types - A foundation for Scala s type system Draft of September 9, 2012 Do Not Distrubute Martin Odersky, Geoffrey Alan Washburn EPFL Abstract. 1 Introduction This paper presents a proposal
More informationCircuit analysis summary
Boolean Algebra Circuit analysis summary After finding the circuit inputs and outputs, you can come up with either an expression or a truth table to describe what the circuit does. You can easily convert
More informationCoordination Languages
c.hankin@imperial.ac.uk Department of Computing, BCS Advanced Programming Group Lecture, December 2008 Outline 1 Introduction 2 Linda 3 JavaSpaces 4 KLAIM 5 AspectK 6 Example Programs 7 Conclusions Outline
More informationSoft constraints: Polynomial classes, Applications
Soft constraints: Polynomial classes, Applications T. Schiex INRA - Toulouse, France Padova 2004 - Soft constraints p. 1 Polynomial classes structural classes: when the constraint (hyper)-graph has good
More informationLecture 5 - Axiomatic semantics
Program Verification March 2014 Lecture 5 - Axiomatic semantics Lecturer: Noam Rinetzky Scribes by: Nir Hemed 1.1 Axiomatic semantics The development of the theory is contributed to Robert Floyd, C.A.R
More informationGrad operator, triple and line integrals. Notice: this material must not be used as a substitute for attending the lectures
Grad operator, triple and line integrals Notice: this material must not be used as a substitute for attending the lectures 1 .1 The grad operator Let f(x 1, x,..., x n ) be a function of the n variables
More informationBoolean Algebra. P1. The OR operation is closed for all x, y B x + y B
Boolean Algebra A Boolean Algebra is a mathematical system consisting of a set of elements B, two binary operations OR (+) and AND ( ), a unary operation NOT ('), an equality sign (=) to indicate equivalence
More informationOn Covering a Graph Optimally with Induced Subgraphs
On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number
More informationTowards a Notion of Transaction in Graph Rewriting 1
GT-VMT Towards a Notion of Transaction in Graph Rewriting P. Baldan a, A. Corradini b, F.L. Dotti c, L. Foss b,d, F. Gadducci b, L. Ribeiro d a Università Ca Foscari di Venezia, Italy b Università di Pisa,
More informationSelf-Controlling Architecture Structured Agents
Self-Controlling Architecture Structured Agents Mieczyslaw M. Kokar (contact author) Department of Electrical and Computer Engineering 360 Huntington Avenue, Boston, MA 02115 ph: (617) 373-4849, fax: (617)
More informationCommunication in Distributed Systems
Communication in Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università
More informationTHE -COMPOSITION OF INTUITIONISTIC FUZZY IMPLICATIONS: AN ALGEBRAIC STUDY OF POWERS AND FAMILIES
Volume 9, No. 1, Jan. - 2018 (Special ssue) nternational Journal of Mathematical Archive-9(1), 2018, 71-77 Available online through www.ijma.info SSN 2229 5046 THE -COMPOSTON OF NTUTONSTC FUZZY MPLCATONS:
More informationComputing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes
Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Marta Pujol and Mercè Villanueva Combinatorics, Coding and Security Group (CCSG) Universitat Autònoma de Barcelona (UAB) VIII JMDA, Almería
More informationCombinatorics of free product graphs
Combinatorics of free product graphs Gregory Quenell March 8, 994 Abstract We define the return generating function on an abstract graph, and develop tools for computing such functions. The relation between
More informationEmbedding logics in Dedukti
1 INRIA, 2 Ecole Polytechnique, 3 ENSIIE/Cedric Embedding logics in Dedukti Ali Assaf 12, Guillaume Burel 3 April 12, 2013 Ali Assaf, Guillaume Burel: Embedding logics in Dedukti, 1 Outline Introduction
More informationBlock Crossings in Storyline Visualizations
Block Crossings in Storyline Visualizations Thomas van Dijk, Martin Fink, Norbert Fischer, Fabian Lipp, Peter Markfelder, Alexander Ravsky, Subhash Suri, and Alexander Wolff 3/15 3/15 block crossing 3/15
More informationCS415 Compilers. Syntax Analysis. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University
CS415 Compilers Syntax Analysis These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University Limits of Regular Languages Advantages of Regular Expressions
More informationGeneralized alternative and Malcev algebras
Mathematics Publications Mathematics 1982 Generalized alternative and Malcev algebras Irvin R. Hentzel Iowa State University, hentzel@iastate.edu H.F. Smith Iowa State University Follow this and additional
More informationOn the Recognizability of Arrow and Graph Languages
On the Recognizability of Arrow and Graph Languages Christoph Blume Sander Bruggink Barbara König Universität Duisburg-Essen, Germany Background Applications of finite automata and regular (word) languages
More informationSynchronous Specification
Translation Validation for Synchronous Specification in the Signal Compiler Van-Chan Ngo Jean-Pierre Talpin Thierry Gautier INRIA Rennes, France FORTE 2015 Construct a modular translation validationbased
More informationSecurity Protocol Deployment Risk
Security Protocol Deployment Risk Simon N. Foley 1, Giampaolo Bella 2,3, and Stefano Bistarelli 4,5 1 Department of Computer Science, University College Cork, Ireland 2 SAP Research, Mougins, France 3
More informationA soft constraint-based approach to the cascade vulnerability problem
Journal of Computer Security 13 (2005) 699 720 699 IOS Press A soft constraint-based approach to the cascade vulnerability problem Stefano Bistarelli a,b, Simon N. Foley c and Barry O Sullivan d a Istituto
More information