共查询到20条相似文献,搜索用时 15 毫秒
1.
The first-order temporal logics with □ and ○ of time structures isomorphic to ω (discrete linear time) and trees of ω-segments (linear time with branching gaps) and some of its fragments are compared: the first is not recursively axiomatizable. For the second, a cut-free complete sequent calculus is given, and from this, a resolution system is derived by the method of Maslov. 相似文献
2.
3.
Formal Methods in System Design - We introduce a framework for the verification of protocols involving a distinguished machine (referred to as a leader) orchestrating the operation of an arbitrary... 相似文献
4.
The Journal of Supercomputing - 相似文献
5.
Alan Chamberlain Mark Paxton Kevin Glover Martin Flintham Dominic Price Chris Greenhalgh Steve Benford Peter Tolmie Eiman Kanjo Amanda Gower Andy Gower Dawn Woodgate Danaë Stanton Fraser 《Personal and Ubiquitous Computing》2014,18(7):1775-1792
Participate was a 3-year collaboration between industry and academia to explore how mobile, Web and broadcast technologies could combine to deliver environmental campaigns. In a series of pilot projects, schools used mobile sensors to enhance science learning; visitors to an ecological attraction employed mobile phones to access and generate locative media; and the public played a mobile phone game that challenged their environmental behaviours. Key elements of these were carried forward into an integrated trial in which participants were assigned a series of environmental missions as part of an overarching narrative that was delivered across mobile, broadcast and Web platforms. These experiences use a three-layered structure for campaigns that draw on experts, local groups and the general public, who engage through a combination of playful characterisation and social networking. 相似文献
6.
Opportunistic Spectrum Access in a pervasive computing system can enable a set of secondary user devices to access unused spectrum, or whitespace, found between the transmissions of a set of primary user devices. The design objective for an efficient secondary user access strategy is to be able to “scavenge” spatio-temporally fragmented bandwidth while limiting the amount of disruption caused to the primary user devices. In this paper, we propose an access strategy which is based on measurement and modeling of the whitespace as perceived by the secondary user devices. A secondary user device continually monitors and models its surrounding whitespace, and then accesses the available spectrum so that the effective secondary throughput is maximized while the resulting disruption to the primary user devices is limited to a pre-defined bound. We first develop analytical expressions for the secondary throughput and primary disruption, and then perform ns2 based simulation experiments to validate its effectiveness under various topologies, user traffic profiles, and secondary user populations. 相似文献
7.
Currently known sequent systems for temporal logics such as linear time temporal logic and computation tree logic either rely on a cut rule, an invariant rule, or an infinitary rule. The first and second violate the subformula property and the third has infinitely many premises. We present finitary cut-free invariant-free weakening-free and contraction-free sequent systems for both logics mentioned. In the case of linear time all rules are invertible. The systems are based on annotating fixpoint formulas with a history, an approach which has also been used in game-theoretic characterisations of these logics. 相似文献
8.
Multipurpose prototypes for assessing user interfaces in pervasive computing systems 总被引:1,自引:0,他引:1
In pervasive computing systems, prototypes serve several uses and have different requirements related to those uses. We've developed CogTool to enable low-cost, rapid construction of interactive prototypes that serve all three UI purposes. CogTools core prototyping technique is storyboarding -specifically, interactive storyboarding using HTML. Rather than covering all possible pervasive systems, CogTool focuses on systems involving deliberate commands that the user invokes by some motor action. Such systems include PDAs, cell phones, handheld terminals (such as those used by rental car return personnel), in-vehicle driver information systems, and certain wearable computers that run desktop- or PDA-like applications. 相似文献
9.
10.
Targeting at modeling the high-level dynamics of pervasive computing systems, we introduce bond computing systems (BCS) consisting
of objects, bonds and rules. Objects are typed but addressless representations of physical or logical (computing and communicating)
entities. Bonds are typed multisets of objects. In a BCS, a configuration is specified by a multiset of bonds, called a collection.
Rules specify how a collection evolves to a new one. A BCS is a variation of a P system introduced by Gheorghe Paun where,
roughly, there is no maximal parallelism but with typed and unbounded number of membranes, and hence, our model is also biologically
inspired. In this paper, we focus on regular bond computing systems (RBCS), where bond types are regular, and study their
computation power and verification problems. Among other results, we show that the computing power of RBCS lies between linearly
bounded automata (LBA) and LBC (a form of bounded multicounter machines) and hence, the regular bond-type reachability problem
(given an RBCS, whether there is some initial collection that can reach some collection containing a bond of a given regular
type) is undecidable. We also study a restricted model (namely, B-boundedness) of RBCS where the reachability problem becomes decidable. 相似文献
11.
Causal knowledge based on causal analysis can advance the quality of decision-making and thereby facilitate a process of transforming strategic objectives into effective actions. Several creditable studies have emphasized the usefulness of causal analysis techniques. Partial least squares (PLS) path modeling is one of several popular causal analysis techniques. However, one difficulty often faced when we commence research is that the causal direction is unknown due to the lack of background knowledge. To solve this difficulty, this paper proposes a method that links the Bayesian network and PLS path modeling for causal analysis. An empirical study is presented to illustrate the application of the proposed method. Based on the findings of this study, conclusions and implications for management are discussed. 相似文献
12.
This paper presents a framework for the specification and verification of timing properties of reactive systems using Temporal Logic with Clocks (TLC). Reactive systems usually contain a number of parallel processes, therefore, it is essential to study and analyse each process based on its own local time. TLC is a temporal logic extended with multiple clocks, and it is in particular suitable for the specification of reactive systems. In our framework, the behavior of a reactive system is described through a formal specification; its timing properties, including safety and liveness properties, are expressed by TLC formulas. We also propose several demonstration techniques, such as an application of local reasoning and deriving fixed-time rules from the proof system of TLC, for proving that a reactive system meets its temporal specification. Under the proposed framework, the timing properties of a reactive system can therefore be directly reasoned about from the formal specification of the system. 相似文献
13.
14.
R. Aversa B. Di Martino M. Ficco S. Venticinque 《Simulation Modelling Practice and Theory》2011,19(8):1758-1772
Position represents a relevant attribute needed by many applications, whose contexts are characterized by pervasiveness of the objects/things in the considered scenarios. In order to infer positions of pervasive objects, which are neither equipped with any location-sensing technologies, nor are unable to locate themselves, it is needed to support them with an appropriate infrastructure, which allows to determine their position in a manner that is transparent to applications. In this work, we aim at extending the positioning service using an agent-based approach, in order to discover and localize different kinds of objects, exploiting cheap and embedded technologies. We describe the design and the implementation of a layered architecture, that supports the localization of devices, and simple pervasive and ubiquitous objects. A simulation tool has been develop to evaluate the proposed solution in different application scenarios of every-day life. 相似文献
15.
16.
Adrian K. Clear Thomas Holland Simon Dobson Aaron Quigley Ross Shannon Paddy Nixon 《Pervasive and Mobile Computing》2010,6(5):575-589
Pervasive systems are large-scale systems consisting of many sensors capturing numerous types of information. As this data is highly voluminous and dimensional, data analysis tasks can be extremely cumbersome and time-consuming. Enabling computers to recognise real-world situations is an even more difficult problem, involving not only data analysis, but also consistency checking. Here we present Situvis, an interactive visualisation tool for representing sensor data and creating higher-level abstractions from the data. This paper builds on previous work, Clear et al. (2009) [8] through evolved tool functionality and an evaluation of Situvis. A user-trial consisting of 10 participants shows that Situvis can be used to complete the key tasks in the development process of situation specifications in over 50% less time than an improvised alternative toolset. 相似文献
17.
Failure diagnosis of discrete-event systems with linear-time temporal logic specifications 总被引:1,自引:0,他引:1
The paper studies failure diagnosis of discrete-event systems (DESs) with linear-time temporal logic (LTL) specifications. The LTL formulas are used for specifying failures in the system. The LTL-based specifications make the specification specifying process easier and more user-friendly than the formal language/automata-based specifications; and they can capture the failures representing the violation of both liveness and safety properties, whereas the prior formal language/automaton-based specifications can capture the failures representing the violation of only the safety properties (such as the occurrence of a faulty event or the arrival at a failed state). Prediagnosability and diagnosability of DESs in the temporal logic setting are defined. The problem of testing prediagnosability and diagnosability is reduced to the problem of model checking. An algorithm for the test of prediagnosability and diagnosability, and the synthesis of a diagnoser is obtained. The complexity of the algorithm is exponential in the length of each specification LTL formula, and polynomial in the number of system states and the number of specifications. The requirement of nonexistence of unobservable cycles in the system, which is needed for the diagnosis algorithms in prior methods to work, is relaxed. Finally, a simple example is given for illustration. 相似文献
18.
This article is concerned with the problem of dynamic event-triggered prescribed performance control for nonlinear systems under signal temporal logic tasks. By utilizing the method of prescribed performance control, the constrained plant can be transformed into an unconstrained one, and a dynamic event-triggered feedback control law is generated for the transformed system to ensure that the signal temporal logic specification is satisfied. A dynamic event-triggered mechanism is designed to guarantee the event-triggered stability, safety and complex specification. Besides, Zeno phenomenon is definitely avoided. Compared with the continuous-time feedback controller, the event-triggered controller has proven to be effective in reducing sensing, communication and computation costs. Finally, two simulations are given to illustrate the effectiveness of theoretical results. 相似文献
19.
Connecting the physical world with pervasive networks 总被引:14,自引:0,他引:14
This article addresses the challenges and opportunities of instrumenting the physical world with pervasive networks of sensor-rich, embedded computation. The authors present a taxonomy of emerging systems and outline the enabling technological developments. 相似文献
20.
Coalition logic (CL) is one of the most influential logical formalisms for strategic abilities of multi-agent systems. CL can specify what a group of agents can achieve through choices of their actions, denoted by [C]? to state that a group of agents C can have a strategy to bring about ? by collective actions, no matter what the other agents do. However, CL lacks the temporal dimension and thus can not capture the dynamic aspects of a system. Therefore, CL can not formalize the evolvement of rational mental attitudes of the agents such as knowledge, which has been shown to be very useful in specifications and verifications of distributed systems, and has received substantial amount of studies. In this paper, we introduce coalition logic of temporal knowledge (CLTK), by incorporating a temporal logic of knowledge (Halpern and Vardi’s logic of CKL n ) into CL to equip CL with the power to formalize how agents’ knowledge (individual or group knowledge) evolves over the time by coalitional forces and the temporal properties of strategic abilities as well. Furthermore, we provide an axiomatic system for CLTK and prove that it is sound and complete, along with the complexity of the satisfiability problem which is shown to be EXPTIME-complete. 相似文献