Sci. Ann. Comput. Sci.最新文献

筛选
英文 中文
Faithful Modeling of Product Lines with Kripke Structures and Modal Logic 基于Kripke结构和模态逻辑的产品线忠实建模
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2016.1.69
Z. Diskin, Aliakbar Safilian, T. Maibaum, Shoham Ben-David
{"title":"Faithful Modeling of Product Lines with Kripke Structures and Modal Logic","authors":"Z. Diskin, Aliakbar Safilian, T. Maibaum, Shoham Ben-David","doi":"10.7561/SACS.2016.1.69","DOIUrl":"https://doi.org/10.7561/SACS.2016.1.69","url":null,"abstract":"Software product lines are now an established framework for software design. They are specified by special diagrams called feature models. For formal analysis, the latter are usually encoded by Boolean propositional theories. We discuss a major deficiency of this semantics, and show that it can be fixed by considering a product to be an instantiation process rather than its final result. We call intermediate states of this process partial products, and argue that what a feature model really defines is a poset of its partial products. We argue that such structures can be viewed as special Kripke structure that we call partial product Kripke structures, ppKS. To specify these Kripke structures, we propose a CTL-based logic, called partial product CTL, ppCTL. We show how to represent a feature model M by a ppCTL theory ML(M) (ML stands for modal logic) such that any ppKS satisfying the theory is equal to the partial product line determined by M . Hence, ML(M) can be considered a sound and complete representation of M . We also discuss several applications of the modal logic view in feature modeling, including refactoring of feature models.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Qualifications of Instruction Sequence Failures, Faults and Defects: Dormant, Effective, Detected, Temporary, and Permanent 指令序列故障、错误和缺陷的资格:休眠、有效、检测、临时和永久
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2021.1.1
J. Bergstra
{"title":"Qualifications of Instruction Sequence Failures, Faults and Defects: Dormant, Effective, Detected, Temporary, and Permanent","authors":"J. Bergstra","doi":"10.7561/SACS.2021.1.1","DOIUrl":"https://doi.org/10.7561/SACS.2021.1.1","url":null,"abstract":"Starting out from the survey of instruction sequence faults from [6] program faults are classified according to the conventional criteria of being dormant, effective, detected, temporary, and permanent. Being retrospectively approved is introduced as an additional qualification. For this theoretical investigation the context is simplified by contemplating instruction sequences as a theoretical model for programs, and by assuming that instruction sequences are supposed to compute total transformations on finite bit sequences of a fixed length only. The main conclusion which can be drawn from this work concerns the notion of dormancy. First of all it is noticed that the unconventional notion of a dormant failure is both plausible and amenable to a straightforward and convincing definition. The conventional notion of a dormant fault, however, is much harder to grasp and the definition of a dormant fault which is provided in the paper may be disputed. The notion of a dormant fault seems to admit no convincing intuition. All faults are defects but not the other way around. The idea of a fault exclusively depends on an instruction sequence and a specification of which it is considered to be a candidate implementation. In the presence of a design, however, in addition to faults, the notion of a deviation from design (DFD) defect arises, which constitutes a class of defects many of which are not faults. For DFD defects the notion of dormancy admits a straightforward and convincing definition.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model Checking Delay Differential Equations Against Metric Interval Temporal Logic 时延微分方程在度量区间时间逻辑下的模型检验
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2017.1.77
P. N. Mosaad, M. Fränzle, Bai Xue
{"title":"Model Checking Delay Differential Equations Against Metric Interval Temporal Logic","authors":"P. N. Mosaad, M. Fränzle, Bai Xue","doi":"10.7561/SACS.2017.1.77","DOIUrl":"https://doi.org/10.7561/SACS.2017.1.77","url":null,"abstract":"Delay differential equations (DDEs) play an important role in the modeling of dynamic processes. Delays arise in contemporary control schemes like networked distributed control and can cause deterioration of control performance, invalidating both stability and safety properties. This induces an interest in DDE especially in the area of modeling and verification of embedded control. In this article, we present an approach aiming at automatic safety verification of a simple class of DDEs against requirements expressed in a linear-time temporal logic. As requirements specification language, we exploit metric interval temporal logic (MITL) with a continuous-time semantics evaluating signals over metric spaces. We employ an over-approximation method based on interval Taylor series to enclose the solution of the DDE and thereby reduce the continuous-time verification problem for MITL formulae to a discrete-time problem over sequences of Taylor coefficients. We encode sufficient conditions for satisfaction as SMT formulae over polynomial arithmetic and use the iSAT3 SMT solver in its bounded model-checking mode for discharging the resulting proof obligations, thus proving satisfaction of time-bounded MITL specifications by the trajectories induced by a DDE. In contrast to our preliminary work in [44], we can verify arbitrary time-bounded MITL formulae, including nesting of modalities, rather than just invariance properties.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128945840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quasi-Algebras versus Regular Algebras - Part I 拟代数与正则代数-第一部分
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2015.1.89
A. Iorgulescu
{"title":"Quasi-Algebras versus Regular Algebras - Part I","authors":"A. Iorgulescu","doi":"10.7561/SACS.2015.1.89","DOIUrl":"https://doi.org/10.7561/SACS.2015.1.89","url":null,"abstract":"Starting from quasi-Wajsberg algebras (which are generalizations of Wajsberg algebras), whose regular sets are Wajsberg algebras, we introduce a theory of quasi-algebras versus, in parallel, a theory of regular algebras. We introduce the quasi-RM, quasi-RML, quasi-BCI, (commutative, positive implicative, quasi-implicative, with product) quasi-BCK, quasi-Hilbert and quasi-Boolean algebras as generalizations of RM, RML, BCI, (commutative, positive implicative, implicative, with product) BCK, Hilbert and Boolean algebras respectively. In Part I, the first part of the theory of quasi-algebras versus the first part of a theory of regular algebras is presented. We introduce the quasi-RM and the quasi-RML algebras and we present two equivalent definitions of quasi-BCI and of quasi-BCK algebras.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121756926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Safety Properties and Their Monitoring 安全属性及其监测
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2012.2.327
Grigore Roşu
{"title":"On Safety Properties and Their Monitoring","authors":"Grigore Roşu","doi":"10.7561/SACS.2012.2.327","DOIUrl":"https://doi.org/10.7561/SACS.2012.2.327","url":null,"abstract":"Various definitions of safety properties as sets of execution traces have been introduced in the literature, some over finite traces, others over infinite traces, yet others over both finite and infinite traces. By employing cardinality arguments, this paper first shows that these notions of safety are ultimately equivalent, by showing each of them to have the cardinal of the continuum. It is then shown that all safety properties can be characterized as \"always past\" properties, and then that the problem of monitoring a safety property can be arbitrarily hard. Finally, two decidable specification formalisms for safety properties are discussed, namely extended regular expressions and past time LTL. It is shown that monitoring the former requires non-elementary space. An optimal monitor synthesis algorithm is given for the latter; the generated monitors run in space linear with the number of temporal operators and in time linear with the size of the formula.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125986642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Derived-Term Automata of Multitape Expressions with Composition 复合多带表达式的派生项自动机
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2017.2.137
A. Demaille
{"title":"Derived-Term Automata of Multitape Expressions with Composition","authors":"A. Demaille","doi":"10.7561/SACS.2017.2.137","DOIUrl":"https://doi.org/10.7561/SACS.2017.2.137","url":null,"abstract":"Rational expressions are powerful tools to define automata, but often restricted to single-tape automata. Our goal is to unleash their expressive power for transducers, and more generally, any multitape automaton; for instance (a |x+b+ |y)∗. We generalize the construction of the derived-term automaton by using expansions. This approach generates small automata, and even allows us to support a composition operator.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation and Verification in a Process Calculus for Spatially-Explicit Ecological Models 空间显式生态模型过程演算的模拟与验证
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2013.1.119
A. Philippou, Mauricio Toro, Margarita Antonaki
{"title":"Simulation and Verification in a Process Calculus for Spatially-Explicit Ecological Models","authors":"A. Philippou, Mauricio Toro, Margarita Antonaki","doi":"10.7561/SACS.2013.1.119","DOIUrl":"https://doi.org/10.7561/SACS.2013.1.119","url":null,"abstract":"We propose palps, a Process Algebra with Locations for Population Systems. palps allows us to produce spatially-explicit individualbased ecological models and to reason about their behavior. palps has two abstraction levels: At the first level, we may define the behavior of an individual of a population and, at the second level, we may specify a system as the collection of individuals of various species located in space. In palps, the individuals move through their life cycle while changing their location and interact with each other in various ways such as predation, infection or mating. Furthermore, we propose a translation of a subset of palps into the probabilistic model checker prism. We illustrate our framework via models of dispersal in metapopulations and by applying prism on palps models for verifying temporal logic properties and conducting reachability and steady-state analysis.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116354178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence UC和EUC使用一次签名篡改证据的弱比特承诺
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2013.2.191
Ioana Boureanu, S. Vaudenay
{"title":"UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence","authors":"Ioana Boureanu, S. Vaudenay","doi":"10.7561/SACS.2013.2.191","DOIUrl":"https://doi.org/10.7561/SACS.2013.2.191","url":null,"abstract":"Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. These commitments are weak in that it is legitimate that a party could cheat. Unlike in several similar lines of work, in our case, the party is not obliged to cheat, but he has ability to cheat if and when needed. The empowered party is the sender, i.e., the protocols are also sender-strong. We motivate the construction of such primitives at both theoretical and practical levels. Such protocols complete the picture of existent receiver-strong weak bit-commitments based on tamper-evidence. We also show that existent receiver-strong protocols of the kind are not EUC-secure, i.e., they are only UC-secure. Further, we put forward a second formalisation of tamper-evident distinguishable envelopes which renders those protocols and the protocols herein EUC-secure. We finally draw most implication-relations between the tamper-evident devices, our weak sender-strong commitments, the existent weak receiver-strong commitments, as well as standard commitments. The mechanisms at the foundation of these primitives are lightweight and the protocols yielded are end-to-end humanly verifiable.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Calculus of Evolving Objects 演化物体的演算
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7892/BORIS.37161
M. Dezani-Ciancaglini, P. Giannini, Oscar Nierstrasz
{"title":"A Calculus of Evolving Objects","authors":"M. Dezani-Ciancaglini, P. Giannini, Oscar Nierstrasz","doi":"10.7892/BORIS.37161","DOIUrl":"https://doi.org/10.7892/BORIS.37161","url":null,"abstract":"The demands of developing modern, highly dynamic applications have led to an increasing interest in dynamic programming languages and mechanisms. Not only applications must evolve over time, but the object models themselves may need to be adapted to the requirements of different run-time contexts. Class-based models and prototype-based models, for example, may need to co-exist to meet the demands of dynamically evolving applications. Multi-dimensional dispatch, fine-grained and dynamic software composition, and run-time evolution of behaviour are further examples of diverse mechanisms which may need to co-exist in a dynamically evolving run-time environment How can we model the semantics of these highly dynamic features, yet still offer some reasonable safety guarantees? To this end we present an original calculus in which objects can adapt their behaviour at run-time to changing contexts. Both objects and environments are represented by first-class mappings between variables and values. Message sends are dynamically resolved to method calls. Variables may be dynamically bound, making it possible to model a variety of dynamic mechanisms within the same calculus. Despite the highly dynamic nature of the calculus, safety properties are assured by a type assignment system.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dynamic Chromatic Number of Bipartite Graphs 二部图的动态色数
Sci. Ann. Comput. Sci. Pub Date : 1900-01-01 DOI: 10.7561/SACS.2016.2.249
S. Saqaeeyan, Esmaiel Mollaahamdi
{"title":"Dynamic Chromatic Number of Bipartite Graphs","authors":"S. Saqaeeyan, Esmaiel Mollaahamdi","doi":"10.7561/SACS.2016.2.249","DOIUrl":"https://doi.org/10.7561/SACS.2016.2.249","url":null,"abstract":"A dynamic coloring of a graph G is a proper vertex coloring such that for every vertex v ∈ V (G) of degree at least 2, the neighbors of v receive at least 2 colors. The smallest integer k such that G has a dynamic coloring with k colors, is called the dynamic chromatic number of G and denoted by χ2(G). Montgomery conjectured that for every r-regular graph G, χ2(G) − χ(G) ≤ 2 [19]. Finding an optimal upper bound for χ2(G) − χ(G) seems to be an intriguing problem. We show that there is a constant d such that every bipartite graph G with δ(G) ≥ d, has χ2(G) − χ(G) ≤ 2⌈ ∆(G) δ(G) ⌉. It was shown that χ2(G) − χ(G) ≤ α (G) + k [2]. Also, χ2(G) − χ(G) ≤ α(G) + k ∗ [1]. We prove that if G is a simple graph with δ(G) > 2, then χ2(G) − χ(G) ≤ α ′(G)+ω(G) 2 +k . Among other results, we prove that for a given bipartite graph G = [X,Y ], determining whether G has a dynamic 4coloring l : V (G) → {a, b, c, d} such that a, b are used for part X and c, d are used for part Y is NP-complete.","PeriodicalId":394919,"journal":{"name":"Sci. Ann. Comput. Sci.","volume":"34 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信