共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
《IEEE transactions on pattern analysis and machine intelligence》1980,(2):183-194
In systems of asynchronous processes using messagelists with SEND–RECEIVE primitives for interprocess communication recovery primitives are defined to perform state restoration: MARK saves a particular point in the execution of the program; RESTORE resets the system state to an earlier point (saved by MARK); and PURGE discards redundant information when it is no longer needed for possible state restoration. 相似文献
3.
X-machines were proposed by Holcombe as a possible specification language and since then a number of further investigations
have demonstrated that the model is intuitive and easy to use. In particular, stream X-machines (SXM), a particular class of X-machines, have been found to be extremely useful in practice. Furthermore, a method of testing
systems specified as SXMs exists and is proved to detect all faults of the implementation provided that the system meets certain
“design for test conditions”. Recently, a system of communicating SXMs was introduced as a means of modelling parallel processing. This paper proves that each communicating machine component can
be transformed in a straightforward manner so that the entire system will behave like a single stream X-machine - the equivalent
SXM of the system. The paper goes on to investigate the applicability of the SXM testing method to a system of communicating
SXMs and identifies a class of communicating SXMs for which the equivalent SXM of the system meets the “design for test conditions”.
Received November 1999 / Accepted in revised form June 2001 相似文献
4.
Expressing First-Order pi-Calculus in Higher-Order Calculus of Communicating Systems 总被引:1,自引:0,他引:1 下载免费PDF全文
Xian Xu 《计算机科学技术学报》2009,24(1):122-137
In the study of process calculi, encoding between different calculi is an effective way to compare the expressive power of calculi and can shed light on the essence of where the difference lies. Thomsen and Sangiorgi have worked on the higher-order calculi (higher-order Calculus of Communicating Systems (CCS) and higher-orderπ-calculus, respectively) and the encoding from and to first-orderπ-calculus. However a fully abstract encoding of first-orderπ-calculus with higher-order CCS is not available up-tod... 相似文献
5.
6.
Engineering Executable Agents using Multi-context Systems 总被引:2,自引:0,他引:2
Sabater Jordi; Sierra Carles; Parsons Simon; Jennings Nicholas R. 《Journal of Logic and Computation》2002,12(3):413-442
7.
This paper proposes a methodology for the development of distributed real-time systems. The methodology consists of the Hierarchical
Communicating Real-Time State Machines (H-CRSM) modelling language, and the Violin toolset. H-CRSM combines Statecharts constructs with CSP-like timed communications. Violin provides a visual environment supporting in a seamless way all the life-cycle development phases of an H-CRSM system. Temporal
validation rests on assertion checking during system simulation. Code generation is based on Java and a customizable runtime.
The practical use of H-CRSM/Violin is shown by an example.
A preliminary version of this paper appears in Proc. of Joint Modular Languages Conference (JMLC'2003), Klagenfurt, Austria, August 2003, LNCS 2789, Springer, pp. 110–121.
Angelo Furfaro, Phd, is a computer science assistant professor at Unical, DEIS, teaching object-oriented programming. His research interests
include: multiagent systems, Petri nets, parallel simulation, verification of time-dependent systems, distributed measurement
systems. He is a member of ACM.
Libero Nigro is a full professor of computer science at Unical, DEIS, where he teaches object-oriented programming, software engineering
and real-time systems courses. He is the responsible of Software Engineering Laboratory (www.lis.deis.unical.it). His current
research interests include: software engineering of time-dependent and distributed systems, real-time systems, Petri nets,
modeling and parallel simulation of complex systems, distributed measurement systems. Prof. Nigro is a member of ACM and IEEE.
Francesco Pupo, Phd, is a computer science assistant professor at Unical, DEIS, teaching introductory programming and computer architecture
courses. His research interests include: Petri nets, discrete-event simulation, real-time systems, distributed measurement
systems. 相似文献
8.
We present a partially typed semantics for Dπ, a distributed π-calculus. The semantics is designed for mobile agents in open distributed systems in which some sites may harbor malicious intentions. Nonetheless, the semantics guarantees traditional type-safety properties at good locations by using a mixture of static and dynamic type-checking. We show how the semantics can be extended to allow trust between sites, improving performance and expressiveness without compromising type safety. 相似文献
9.
10.
本文分析了当前分布式入侵检测系统中存在的一般性缺陷,介绍了移动Agent的概念和优点,提出一种新的基于移动Agent的分布式入侵检测系统模型DIDSMA。DIDSMA采用分散的数据分析的机制,用静态代理作为主机监视器,用移动代理来收集数据、对数据进行集成和分析,并对入侵做出反应,解决了当前分布式入侵检测系统中存在的主要问题。 相似文献
11.
In the Semantic Web, vocabularies are defined and shared among knowledge workers to describe linked data for scientific, industrial or daily life usage. With the rapid growth of online vocabularies, there is an emergent need for approaches helping users understand vocabularies quickly. In this paper, we study the summarization of vocabularies to help users understand vocabularies. Vocabulary summarization is based on the structural analysis and pragmatics statistics in the global Semantic Web. Local Bipa... 相似文献
12.
Toru Ishida 《Autonomous Agents and Multi-Agent Systems》1998,1(2):139-167
Since real-time search provides an attractive framework for resource-bounded problem solving, this paper extends the framework for autonomous agents and for a multiagent world. To adaptively control search processes, we propose -search which allows suboptimal solutions with error, and -search which balances the tradeoff between exploration and exploitation. We then consider search in uncertain situations, where the goal may change during the course of the search, and propose a moving target search (MTS) algorithm. We also investigate real-time bidirectional search (RTBS) algorithms, where two problem solvers cooperatively achieve a shared goal. Finally, we introduce a new problem solving paradigm, called organizational problem solving, for multiagent systems. 相似文献
13.
14.
A. V. Zorine 《Cybernetics and Systems Analysis》2013,49(6):890-897
The cybernetic approach is used to develop a mathematical model for communicating queuing systems. Conflicting input flows of the first queuing system and one of the input flows of the second queuing system are formed in a synchronous Markov random environment with a finite number of states. Another input flow of the second queuing system consists of retrials arriving from the first queuing system. The transition of a customer from the first queuing system to the second one takes a random amount of time. Servicing is performed by a cyclic algorithm with fixed duration. 相似文献
15.
16.
《IEEE transactions on systems, man, and cybernetics. Part A, Systems and humans : a publication of the IEEE Systems, Man, and Cybernetics Society》2008,38(6):1-1220
17.
18.
This paper presents a multi-agent model of a distributed information system, using what is described as an engineering approach to real world application environment. The objective is to define, using proven ideas in the industrial context, the agent-based behaviour of the distributed system, which must operate correctly and effectively in an error-prone environment. Issues such as stability, robustness and scalability have also been addressed, along with some new ideas on a high-level communication strategies, as distinct from protocol-based communications. The work is being carried out under the DREAM theme at Keele, an earlier version of the approach having been successfully applied to agent-based manufacturing in an international project called HMS, in which some of the world’s major manufacturing industries participated. 相似文献
19.
Donald G. Marks Peter Mell Michael Stinson 《Journal of Network and Systems Management》2004,12(1):95-110
Modern Intrusion Detection Systems (IDSs) are distributed real-time systems that detect unauthorized use or attacks upon an organization's network and/or hosts. The components of most distributed IDSs are arranged in a hierarchical tree structure, where the sensor nodes pass information to the analyzer nodes. Optimal placement of the analyzer nodes results in an improved response time for the IDS, and isolation of attacks within the IDS network. Since the network topology and workload are constantly changing, we are able to maintain near-optimal placement of the analyzer nodes by instantiating them as mobile agents. The analyzer nodes may then relocate, reproduce or be deleted as necessary. Such flexibility improves the response times and the stability of an IDS. The movement of the analyzer nodes also offers some protection against denial-of-service attacks, since secure analyzer nodes will be relocated to take over some of the functionality of the host under attack. 相似文献
20.
Li-min Liu Michael Halper James Geller Yehoshua Perl 《Distributed and Parallel Databases》1999,7(1):37-65
A major problem that arises in many large application domains is the discrepancy among terminologies of different information systems. The terms used by the information systems of one organization may not agree with the terms used by another organization even when they are in the same domain. Such a situation clearly impedes communication and the sharing of information, and decreases the efficiency of doing business. Problems of this nature can be overcome using a controlled vocabulary (CV), a system of concepts that consolidates and unifies the terminologies of a domain. However, CVs are large and complex and difficult to comprehend. This paper presents a methodology for representing a semantic network-based CV as an object-oriented database (OODB). We call such a representation an Object-Oriented Vocabulary Repository (OOVR). The methodology is based on a structural analysis and partitioning of the source CV. The representation of a CV as an OOVR offers both the level of support typical of database management systems and an abstract view which promotes comprehension of the CV's structure and content. After discussing the theoretical aspects of the methodology, we apply it to the MED and InterMED, two existing CVs from the medical field. A program, called the OOVR Generator, for automatically carrying out our methodology is described. Both the MED-OOVR and the InterMED-OOVR have been created using the OOVR Generator, and each exists on top of ONTOS, a commercial OODBMS. The OOVR derived from the InterMED is presently available on the Web. 相似文献