首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 46 毫秒
1.
网络通信协议的属性文法规格说明   总被引:4,自引:0,他引:4  
房鼎益 《软件学报》1998,9(4):296-300
本文给出一个基于属性文法的网络通信协议的形式说明与自动生成的模型.首先引入了一个扩展的属性文法描述工具,讨论了用其描述协议的并行、同步、延时(时序)等特性的有关问题;然后研究了基于属性文法的网络通信协议自动生成环境及其核心算法——属性计算(即语义分析)算法.  相似文献   

2.
一个基于属性文法的分布式软件构架描述语言   总被引:1,自引:1,他引:1  
  相似文献   

3.
近年来协议工程支撑环境的研究得到了迅速的发展,正逐渐趋于工程化,规范化、形式化、属性文法是描述程序设计语言语义特性的工具,本文介绍了采用属性文法及增量式语法分析法构造ASN.1语法制导编辑环境的方法,本系统采用面向对象的语言JAVA实现。  相似文献   

4.
邹维 《计算机学报》1990,13(12):916-925
本文介绍了用属性定义语言ALADIN写的FORTRAN语言的属性文法。该文法描述了FORTRAN语言的语法结构及其静态语义,包括作用域规则、说明的建立、表达式分析和出错处理等。  相似文献   

5.
华庆一 《计算机学报》1996,19(5):351-357
本文描述一种基于属性文法并结合事件模型的用户界面规格说明方法。主要强调如何在直接操作式用户界面中表示多线性对话模型。这种属性文法的规格说明可以用一个嵌套在支持通信、同步、和对话执行的运行时结构中的属性文法解释器来实现。  相似文献   

6.
协议工程是80年代才发展起来的一门新兴学科,它是计算机通信及网络研究的一个新的重要的领域,有许多值得研究的理论与技术问题。本文试图对协议工程系统的基本概念、组成及其特性作一简要论述,并对协议的开发过程,即:协议的设计、描述、验证、实现以及测试等作了进一步的介绍和探讨。  相似文献   

7.
8.
图形化、集成化的软件体系结构开发环境对于推动软件体系结构相关技术的研究和应用具有重要的意义.提出了一种基于图文法的可视化编辑环境生成机制.对于给定的软件体系结构风格的图文法描述,可以自动生成相应的图文法制导的体系结构编辑工具.与常见的基于Meta-Model的开发环境相比,这种图文法制导的开发方式更多地利用了相应软件体系结构风格的内在语义,从而提高了环境的易用性和可靠性. 设计并实现了一个原型系统Artemis-GADE(graph grammar-directed architecture development environment),初步验证了上述途径的可行性.  相似文献   

9.
基于属性文法和语义网络的综合知识表示模型   总被引:3,自引:1,他引:3  
本文提出了一个属性文法计算模型与语义网络表示模型相结合的综合知识表示模型.根据形式化的语义网络表示模型和属性文法的特点,该模型使用属性文法的符号建立了一些适合于语义网络表示模型的语法和语义规则模式,并且可通过扩充的属性文法的解释器来实现推理.  相似文献   

10.
张志远 《计算机工程》2005,31(Z1):138-139
用状态转换图分析正规式时需要考虑的情况比较多,容易造成疏漏。且这种方法需要递归进行,多次扫描正规式,效率不高。该文采用SLR分析加属性文法只需一遍扫描就可以将正规式转存为NFA,效率要高得多。  相似文献   

11.
软件测试自动化系统的性质及其描述方法   总被引:2,自引:0,他引:2  
本文从分析软件测试自动化的必要条件出发,讨论了软件测试自动化对形式化的特殊要求,提出了用于软件测试自动化的形式系统应具有的性质。基于框架的互补定义的形式描述方法可以作为用于软件测试自动化的形式系统的描述方法。  相似文献   

12.
Communication protocols form a language which can be recognized by extended finite automata, and compiler generating tools can help with its implementation. This paper presents a project for implementing the ISO OSI layers which are most relevant to LANs. Taking advantage of modular and repetitive OSI architecture, a layer implementation model is proposed, introducing sharp distinctions between protocol layer-dependent and independent modules, so that the implementation effort can be largely reduced. It is also shown that layer-dependent modules can be generated automatically by using software tools developed for compiler construction. It is assumed that the protocols to be implemented have already been verified and validated in their abstract forms using other techniques, since these aspects are not covered by the method proposed. Measures of program sizes and execution speeds obtained following the approach proposed are reported; they show that most of the layer code can be produced by automatic tools and the overall software complexity enables the OSI architecture to be implemented for single-board microcomputers.  相似文献   

13.
《自动化信息》2009,(9):77-79,71
随着现代电力电子技术和微电子技术的迅猛发展,自动化,智能化程度的不断的提高,中高压大功率变频调速装置的研制和应用渐渐成熟起来,其中部分产品还采用了GPRS远程通信技术,将现场的实时数据、运行状态和故障状态传递到远方终端,以实现对现场设备的远程监控和维护。  相似文献   

14.
介绍了异种机互连系统中 ,在Mainframe上实现的高层协议通讯软件 ,提供的文件传送功能使得在不同主机之间正确地传送信息。  相似文献   

15.
本文介绍了一种蓄电池参数测量的实验方案,通过对方案的实现过程的分析,利用了计算机软件强大的数据处理能力,将VB软件和单片机利用串口通信建立桥梁。将大量的数据信息通过计算机手段来完成存储和分析;本文还介绍了实测数据分析来体现此设计方案的可行性和实用性。  相似文献   

16.
Computer-supported networks are discussed as distinct social forms which may provide shelter to other forms such as a small cooperative ensemble, a particular community of practice, yet offer some special perspectives. Foremost among these perspectives are power issues, but also the role of networks in generating knowledge, in encouraging and bounding plurality (by management control as well as by standardisation). One particular aspect of networking explored in this paper is the locatedness of activities in a specific time-spacecontextuality.  相似文献   

17.
ATM技术正应用于高速网际互连之中,以其不同于传统路由器的特点而逐步显示出其优越特性。文中介绍了ATM上的多重协议-MPOA的3种模型详细分析了它们的路由特点、信息格式、基本操作等内容。讨论了它们各自的优缺点及解决措施。  相似文献   

18.
Summary A model for communication protocols calledsystems of communicating machines is used to specify a data transfer protocol with variable window size (e.g., HDLC), which is an arbitrary nonnegative integer, and to analyze it for freedom from deadlocks. The model uses a combination of finite state machines and variables. This allows the size of the specification (i.e., number of states and variables) to be linear in the window size, a considerable reduction from the pure finite state machine model. A new type of analysis is demonstrated which we callsystem state analysis. This is similar to thereachability analysis used in the pure finite state model, but it provides substantial simplication by reducing the number of states generated. For example, with the protocol in this paper, ifw is the window size, then the global analysis producesO(w 5) states, while the system state analysis producesO(w 3) states. The system state analysis is then combined with an inductive proof, extending the analysis to all nonnegative integersw. Gilbert M. Lundy, Jr was born in New Orleans, Louisiana, in 1954. After completing schools in Plano, Texas, he attended Texas A & M University, receiving the B.A. in mathematics (1976). From 1977–81 he served as a Lieutenant in the U.S. Army, based at Fort Ord, California. From 1981–84 he was a software engineer at E-Systems, in Dallas, Texas. During this period he also completed the M.S. program in Computer Science at the University of Texas at Dallas. From 1984 to 1988, he was a graduate student at Georgia Institute of Technology, receiving the Ph.D. in 1988. His research was in the formal modeling of communication protocols for computer networks. Since September 1988, he has been an Assistant Professor of computer science at the U.S. Naval Postgraduate School in Monterey, CA. He teaches classes and performs research in computer networks and communications. Raymond E. Miller received his Ph.D. degree from the University of Illinois, Urbana-Champaign, in 1957. He was a Research Staff Member at IBM Thomas J. Watson Research Center, Yorktown, Heights, NY, from 1957 to 1980, Director of the School of Information and Computer Science at Georgia Tech from 1980 to 1987, and is currently a Professor of Computer Science at the University of Maryland, College Park, and Director of the NASA Center of Excellence in Space Data and Information Sciences at Goddard Space Flight Center. He has written over 90 technical papers in areas of theory of computation, machine organization, parallel computation, and communication protocols. Dr. Miller is a Fellow of the American Association for the Advancement of Science, a Fellow of the IEEE and a member of ACM. Among his numerous society activities he served as an ACM Council Member-at-Large from 1976–1982, Editor in Chief of the Journal of the ACM from 1972–1976, a Board Member of the Computing Research Association from 1983–1991, and President of the Computing Sciences Accreditation Board from 1985–1987. Currently he is a member of the Board of Governors of the IEEE Computer Society and Vice President for Educational Activities.This research was performed while the authors were at Georgia Institute of Technology  相似文献   

19.
一种软件系统运行安全保护方法   总被引:1,自引:0,他引:1  
陈伍军  吕志军  刘岸  吴琨  仲海骏  曾庆凯 《计算机工程》2005,31(16):139-141,143
通过分析软件系统自身安全的各种保护方案的优缺点,提出了一种软件系统的运行安全保护方法。描述了该方法的通信协议和具体实现技术,并给出了一个在实际系统中的应用实例和性能测试结果。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号