CompEuro 1992 Proceedings Computer Systems and Software Engineering最新文献

筛选
英文 中文
Formal verifications: an industrial case study 正式验证:一个工业案例研究
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218507
B. Vergauwen, J. Lewi
{"title":"Formal verifications: an industrial case study","authors":"B. Vergauwen, J. Lewi","doi":"10.1109/CMPEUR.1992.218507","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218507","url":null,"abstract":"By means of the mu PABX example, the adequacy of temporal logic was demonstrated for the specification and formal verification of industrial reactive systems. The aim of the mu PABX system is to provide services that are issued by phone-users of the mu PABX. In contrast to a real PABX, the mu PABX offers only one type of service to its subscribers: two-party voice calls. Formal verification avoids the deficiencies of testing by proving mathematically that the system behaves according to the specification. For this to be possible, the system behavior must be defined with mathematical precision. The focus is on the formal verification of the mu PABX. It is demonstrated that, if temporal logic is used, the task of proof construction can be 100% automated. An implementation of the mu PABX system is discussed.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
General-to-specific learning of Horn clauses from positive examples 从一般到具体的霍恩从句的正例学习
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218444
I. Stahl, B. Tausend, R. Wirth
{"title":"General-to-specific learning of Horn clauses from positive examples","authors":"I. Stahl, B. Tausend, R. Wirth","doi":"10.1109/CMPEUR.1992.218444","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218444","url":null,"abstract":"The authors describe a method for learning disjunctive concepts represented as Horn clauses in a general-to-specific manner. They have identified a restricted class of Horn clauses for which positive examples are sufficient to detect overgeneral clauses. The method, developed and implemented in a system called INDICO, extracts as much constraining information as possible from the examples, such that the space of possible solutions can be searched efficiently. INDICO works in three steps. First, the argument types of the target predicate are determined. Second, the example set is partitioned and for each partition a clause head is determined which covers all the examples in the partition. Third, the clauses are specialized by adding literals, including newly invented ones, to their body until the definition is correct. Some experimental results are presented.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A hierarchical memory structure for the 3D shelling technique 三维炮击技术的分层存储结构
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218502
L. Shen, M.F.A. Deprettere
{"title":"A hierarchical memory structure for the 3D shelling technique","authors":"L. Shen, M.F.A. Deprettere","doi":"10.1109/CMPEUR.1992.218502","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218502","url":null,"abstract":"The authors earlier proposed a new space partitioning for mapping computations of the radiosity method onto a highly pipelined parallel architecture (L.S. Shen et al., 1990; 1991). This shelling technique can alleviate the communication load between the host and the processors in a shared-memory architecture, but the system performance might deteriorate when increasing the number of processors. A memory structure which is a hierarchy of resident set, cache, and main memory is presented. It can reduce the average access time of a patch and thus provide better balancing between processing throughput and memory bandwidth, to enhance the pipelinability of computations. A method of selecting the resident set is described, and different policies in the cache design are investigated.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why to go Business Class (IT applications) 为何选择商务舱(IT 应用)
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218459
J. Barbe, C. Verhoest
{"title":"Why to go Business Class (IT applications)","authors":"J. Barbe, C. Verhoest","doi":"10.1109/CMPEUR.1992.218459","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218459","url":null,"abstract":"Business applications still represent the largest installed software base of the information technology market. The authors identify business applications as those information systems which are, in general, characterized by a relative low level of algorithmic complexity, a large amount of persistent data needing concurrent access, the need for online access within a given delay, and a high degree of security. They present the Business Class project, which foresees a generic object-oriented (OO) model for analysis, several technology related OO models for design, an integrated CASE tool environment to support both phases, and an accompanying methodology, all dedicated to the domain of business applications. The possible benefits of the use of OO technology for business application development are discussed. The solution proposed by the Business Class project is introduced. The generic OO model used for the analysis phase is described.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and proof of multipliers by correctness-preserving transformation 乘法器的保正变换设计与证明
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218503
C. D. Kloos, W. Dosch, B. Moller
{"title":"Design and proof of multipliers by correctness-preserving transformation","authors":"C. D. Kloos, W. Dosch, B. Moller","doi":"10.1109/CMPEUR.1992.218503","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218503","url":null,"abstract":"Transformational development makes it possible to design systems and simultaneously to prove them correct. Transformational developments are presented of multiplier circuits from a common specification. Careful choice of the notation (a functional language with polymorphic and dependent higher-order sub types), and of the foundations for the transformations (some lemmas over the data domains, embeddings of functions into more general ones, and use of the unfold/fold strategy) allows one to highlight the design decisions in a systematic manner. The major design decisions are discussed, and important intermediate versions of the algorithms arising during the derivation are given. One sample development is presented.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124138034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Developments in autonomous vehicle navigation 自动驾驶汽车导航的发展
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218441
S. Neusser, J. Nijhuis, L. Spaanenburg
{"title":"Developments in autonomous vehicle navigation","authors":"S. Neusser, J. Nijhuis, L. Spaanenburg","doi":"10.1109/CMPEUR.1992.218441","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218441","url":null,"abstract":"An approach to autonomous vehicle navigation using neural networks to imitate human driving behavior is presented. The results are based on the measured actions of a real human driver in a real car. The car environment and the information that is recorded during driving are described. The problem that should be solved by the neural network is discussed. The actual learning of the driving task is presented. The quality of the leaned driving behavior is reviewed. The experiments showed that medium-sized neural networks were able to approximate the driving behavior within a maximum error of 5%.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122296380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A taskgraph clustering algorithm based on an attraction metric between tasks 一种基于任务间吸引力度量的任务图聚类算法
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218483
J. Opsommer
{"title":"A taskgraph clustering algorithm based on an attraction metric between tasks","authors":"J. Opsommer","doi":"10.1109/CMPEUR.1992.218483","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218483","url":null,"abstract":"Task granularity is a critical issue in the partitioning of a parallel program. To adjust automatically the task granularity for the target system, the solution used for the grain-size problem is the bottom-up approach: first the program is partitioned into elementary operations and mathematical functions and then several operations are combined into larger tasks. The conglomeration of tasks is controlled by attraction values: the attraction between two tasks is proportional to the benefit of aggregating the two tasks. The clustering heuristic is embedded in the definition of the attraction between tasks as only tasks with an attraction value higher than a certain threshold are conglomerated. It is assumed that the task graph structure and the task lengths are known at compile time. This information is used by the clustering algorithm. The algorithm defines an attraction between two tasks and then conglomerates the tasks for which the attraction is larger than a given threshold.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optical bridges for fiber optic local area networks 用于光纤局域网的光桥
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218467
M. Hamdi
{"title":"Optical bridges for fiber optic local area networks","authors":"M. Hamdi","doi":"10.1109/CMPEUR.1992.218467","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218467","url":null,"abstract":"The author discusses the problem of designing high-speed fiber-optic LANs. A brief description of the architecture of a bridge is given, and its conceptual design is provided. Optical logic gates, which are the basic elements in designing optical digital circuits, are introduced. The design of an all-optical storage device, which is the basic component of the buffering system in a bridge, is shown. The design and operation of electronic shift registers and optical shift registers are explained. These optical shift registers constitute the whole buffering system in a bridge. The implementation of an optical lookup table needed for packet processing in a bridge is provided.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling and allocation for the high-level synthesis of DSP algorithms by exploitation of data transfer mobility 利用数据传输的移动性为DSP高级综合算法提供调度和分配
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218519
A. Oláh, S. H. Gerez, S.M.H. de Groot
{"title":"Scheduling and allocation for the high-level synthesis of DSP algorithms by exploitation of data transfer mobility","authors":"A. Oláh, S. H. Gerez, S.M.H. de Groot","doi":"10.1109/CMPEUR.1992.218519","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218519","url":null,"abstract":"A scheduling and allocation method is given for the high-level synthesis of DSP algorithms described by iterative data flow graphs. The method is based on the concept of scheduling ranges. It generates overlapped schedules, while performing retiming and loop folding implicitly. The scheduler operates on the input and output data transfers of the operations in the graph, allowing a trade-off of functional units against buses. For each transfer a scheduling range is computed and the optimal position within this range is found by modified force-directed scheduling. The method has obtained optimal results for well-known benchmark examples.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Explanation-based learning for the automated reuse of programs 用于自动重用程序的基于解释的学习
CompEuro 1992 Proceedings Computer Systems and Software Engineering Pub Date : 1992-05-04 DOI: 10.1109/CMPEUR.1992.218477
R. Bergmann
{"title":"Explanation-based learning for the automated reuse of programs","authors":"R. Bergmann","doi":"10.1109/CMPEUR.1992.218477","DOIUrl":"https://doi.org/10.1109/CMPEUR.1992.218477","url":null,"abstract":"A new approach for software reuse is presented which allows for the efficient preparation of already available programs, so that they can be automatically reused for novel programming tasks. Explanation-based learning from programs, guided by a domain theory of the semantics of the programming language, was used to acquire skeletal programs. For that purpose, a symbolic trace is constructed as an explanation of the functioning of a program, which may contain different types of control constructs such as sequential execution, conditional execution, and recursion. Explanation-based generalization was extended to explicitly handle these different kinds of execution control which are most essential for computer programs.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信