共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we give an operational and denotational semantics for a meta-language of the 3APL agent programming language. With this meta-language, various 3APL interpreters can be programmed. We prove equivalence of the operational and denotational semantics. Furthermore, we give an operational semantics for object-level 3APL. Using this semantics, we relate the 3APL meta-language to object-level 3APL by providing a specific interpreter, the semantics of which will prove to be equivalent to object-level 3APL. 相似文献
2.
M. J. A. Caswell 《Formal Aspects of Computing》1997,9(1):68-77
There are numerous methods of formally defining the semantics of computer languages. Each method has been designed to fulfil a different purpose. For example, some have been designed to make reasoning about languages as easy as possible; others have been designed to be accessible to a large audience and some have been designed to ease implementation of languages. Given two semantics definitions of a language written using two separate semantics definition methods, we must be able to show that the two are in fact equivalent. If we cannot do this then we either have an error in one of the semantics definitions, or more seriously we have a problem with the semantics definition methods themselves.Three methods of defining the semantics of computer languages have been considered, i.e. Denotational Semantics, Structural Operational Semantics and Action Semantics. An equivalence between these three is shown for a specific example language by first defining its semantics using each of the three definition methods. The proof of the equivalence is then constructed by selecting pairs of the semantics definitions and showing that they define the same language.A full version of this paper can be accessed via our web page http://www.cs.man.ac.uk/fmethods/ facj.html 相似文献
3.
4.
开放网络环境中信任的自动建立 总被引:2,自引:0,他引:2
提出了一种基于混杂方式的通用信任模型以及在这种模型下的信任协商过程。信任协商利用信任策略对信任实体本地资源进行约束,既可以用于建立信任也可以用于获取服务。还分析了信任协商协议的复杂性,其通信开销为线性,计算开销为O(N·K)。 相似文献
5.
While the semantics of local variables in programming languages is by now well-understood, the semantics of pointer-addressed heap variables is still an outstanding issue. In particular, the commonly assumed relational reasoning principles for data representations have not been validated in a semantic model of heap variables. In this paper, we define a parametricity semantics for a Pascal-like language with pointers and heap variables which gives such reasoning principles. It turns out that the correspondences between data representations cannot simply be relations between states, but more intricate correspondences that also need to keep track of visible locations whose pointers can be stored and leaked. 相似文献
6.
7.
8.
Yan Wang Kwei-Jay Lin Duncan S. Wong Vijay Varadharajan 《Service Oriented Computing and Applications》2009,3(2):129-146
In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions.
From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly
when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality
provided by service clients. In this paper, we first present a trust management framework that is event-driven and rule-based.
In this framework, trust computation is based on formulae. But rules are defined to determine which formula to use and what
arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation
metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting
suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process.
Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new
service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality
services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed
approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed framework
is adaptable for different domains and complex trust evaluation systems.
相似文献
Vijay VaradharajanEmail: |
9.
纯函数式I/O的操作语义 总被引:8,自引:0,他引:8
目前被人们广泛采用的处理函数式I/O的机制有三种,MonadDialogue,CPS,本文采用CCS的理论和方法,把互模拟等价作为I/O程序的相等关系,描述了这三种I/O机制的操作语义,推导出这三种I/O机制相互之间的转换关系,从而证明了这三种I/O机制在语义上是等价的。 相似文献
10.
11.
Liveness in Timed and Untimed Systems 总被引:1,自引:0,他引:1
Roberto Segala Rainer Gawlick Jørgen Søgaard-Andersen Nancy Lynch 《Information and Computation》1998,141(2):119
12.
由于无线传感器网络开放性、动态性等特点,导致整个网络易受攻击而极为脆弱,给传统安全机制带来严峻挑战,从而限制了无线传感器网络的发展。作为对基于密码体系的安全手段的重要补充,信任管理在解决来自网络的内部攻击,识别恶意节点、自私节点及低竞争力节点方面有着显著的优势。本文将节点的能量信息引入节点信任度计算模型中,提高了系统安全性、可靠性和公平性。通过仿真分析说明,模型以较少的资源消耗对网络的资源配置、性能、安全和通信进行统一的维护和管理,能够保证网络正常有效地运行,既缓解了WSN的管理困难,也为信任应用研究开辟了新的途径。 相似文献
13.
随着Web服务的高速发展,其可靠性已经受到了越来越多的重视.针对当前拜占庭错误容忍算法对Web服务支持的不足,提出并设计了一种面向Web服务的拜占庭错误容忍算法.该算法与著名的CLBFT算法有显著区别.在Web服务中,为了支持组合服务必须对进行通信的Web服务双方都创建复制品,而CLBFT算法只在服务器方创建复制品.使用基于状态机的主动复制技术,在进行通信的Web服务双方都创建复制品.引入接收窗口和接收点对异步环境下的消息进行批量确认,同步各复制品收到消息的时间.用I/O自动机给出该算法的自动机模型,并通过遵循TPC-App Benchmark规范的实验平台实现了算法,验证了算法可行性. 相似文献
14.
Simulation-based assertional techniques and process algebraic techniques are two of the major methods that have been proposed for the verification of concurrent and distributed systems. It is shown how each of these techniques can be applied to the task of verifying systems described as input/output automata; both safety and liveness properties are considered. A small but typical circuit is verified in both of these ways, first using forward simulations, an execution correspondence lemma, and a simple fairness argument, and second using deductions within the process algebra DIOA for I/O automata. An extended evaluation and comparison of the two methods is given.Supported by NSF grant CCR-89-15206, by DARPA contracts N00014-89-J-1988 and N00014-92J-4033, and by ONR contract N00014-91-J-1046. 相似文献
15.
16.
Constantinos Djouvas Nancy D. Griffeth Nancy A. Lynch 《Electronic Notes in Theoretical Computer Science》2006,164(4):67-82
A hard problem in network testing is verifying the correctness of a class of networks, as well as the actual networks under test. In practice, at most a few networks (sometimes only one) are actually tested. Thus an important question is how to select one or more networks that are sufficiently representative to apply the results to a class of networks. We present a model-based technique for selecting a representative network. The central theorem establishes that the representative network displays any faults present in any network of the class. This paper introduces the concept of “self-similarity,” which is used to select the network, and presents the results of an experiment in testing one class of networks. 相似文献
17.
提出两类离散事件域的自动机作为控制分析与综合的中间模型,基于广义受控对象的等价事件模型,递阶型的控制器可被系统地综合。为了保证系统分析和综合的正确性,利用Hoare逻辑得到一些验证规则。最后以一级倒立摆的控制为例加以说明。 相似文献
18.
刘鑫 《电脑编程技巧与维护》2012,10(10):78-79,122
详细分析Windows的I/O机制,提出了分别在用户级、系统级、驱动级的FO模拟操作,通过实际案例和源代码分享在I/O模拟上的得失,着重介绍鼠标与键盘的模拟. 相似文献
19.
随着NOW在科学研究中白益广泛的应用,如何为NOW上的科学计算提供高性能的输入输出成为我们面临的一个新课题。作者根据NOW的特点,设计并实现了一个具有NOW特色的基于CollectiveI/Q的并行I/O系统,吸取了DDIO与two-phaseI/O的优点,从而有效地解决了高带宽和低延迟问题。初步的系统吞吐量测试显示了良好的性能。 相似文献
20.
基于行为的信任体系是适应于无线传感器网络资源受限特性的一种安全增强机制.该体系通过节点的过往行为来评估节点的可信度,从而提高任务完成的质量.现有NS2上的WSN仿真方法往往只模拟网络中的某一个层次,不能满足该体系层次融合和网内逐跳信息处理的两个基本特点.在AD HOC仿真平台的基础上进行改动,在MAC层和网络接口层之间增加信任处理层,实现对节点完成不同类型的任务的能力进行评估.同时,对路由算法进行改进,使其选择信任度更高的节点作为路由的下一跳,从而降低不良节点对无线传感器网络中路由功能的影响.利用该文的仿真框架对基于行为的信任体系进行仿真验证,结果表明该体系的存在有效地提高了路由的成功率. 相似文献