Deterministic timed automata are strictly less expressive than their non-deterministic counterparts, which are again less expressive than those with silent transitions. As a consequence, timed automata are in general non-determinizable. This is unfortunate since deterministic automata play a major role in model-based testing, observability and implementability. However, by bounding the length of the traces in the automaton, effective determinization becomes possible. We propose a novel procedure for bounded determinization of timed automata. The procedure unfolds the automata to bounded trees, removes all silent transitions and determinizes via disjunction of guards. The proposed algorithms are optimized to the bounded setting and thus are more efficient and can handle a larger class of timed automata than the general algorithms. We show how to apply the approach in a fault-based test-case generation method, called model-based mutation testing, that was previously restricted to deterministic timed automata. The approach is implemented in a prototype tool and evaluated on several scientific examples and one industrial case study. To our best knowledge, this is the first implementation of this type of procedure for timed automata. 相似文献
Multiple sclerosis is characterized by inflammatory demyelination and axonal loss as pathophysiological correlates of relapsing activity and progressive development of clinical disability. The molecular processes involved in this pathogenesis are still unclear as they are quite complex and heterogeneous. In this article we present protein expression analysis of brain and spinal cord tissues from different models of murine experimental autoimmune encephalomyelitis (EAE), the most commonly used animal model for multiple sclerosis. We observed a number of EAE-specific protein expression and PTM differences. Proteome analysis was extended to multiple sclerosis specimens in order to validate the EAE findings. Our findings suggest the regulation of a number of proteins that shed light on the molecular mechanisms of the disease processes taking place in EAE and multiple sclerosis. We found consistent modulation of proteins including serum amyloid P component, sirtuin 2, dihydropyrimidinase-related protein family proteins, stathmin 1, creatine kinase B and chloride intracellular channel protein 1. Functional classification of the proteins by database and the literature mining reveals their association with neuronal development and myelinogenesis, suggesting possible disease processes that mediate neurodegeneration. 相似文献
It is well known that help prompts shape how users talk to spoken dialogue systems. This study investigated the effect of
help prompt placement on older users’ interaction with a smart home interface. In the dynamic help condition, help was only
given in response to system errors; in the inherent help condition, it was also given at the start of each task. Fifteen older
and sixteen younger users interacted with a smart home system using two different scenarios. Each scenario consisted of several
tasks. The linguistic style users employed to communicate with the system (interaction style) was measured using the ratio of commands to the overall utterance length (keyword ratio) and the percentage of content
words in the user’s utterance that could be understood by the system (shared vocabulary). While the timing of help prompts
did not affect the interaction style of younger users, it was early task-specific help supported older users in adapting their
interaction style to the system’s capabilities. Well-placed help prompts can significantly increase the usability of spoken
dialogue systems for older people. 相似文献
Streak surfaces are among the most important features to support 3D unsteady flow exploration, but they are also among the computationally most demanding. Furthermore, to enable a feature driven analysis of the flow, one is mainly interested in streak surfaces that show separation profiles and thus detect unstable manifolds in the flow. The computation of such separation surfaces requires to place seeding structures at the separation locations and to let the structures move correspondingly to these locations in the unsteady flow. Since only little knowledge exists about the time evolution of separating streak surfaces, at this time, an automated exploration of 3D unsteady flows using such surfaces is not feasible. Therefore, in this paper we present an interactive approach for the visual analysis of separating streak surfaces. Our method draws upon recent work on the extraction of Lagrangian coherent structures (LCS) and the real-time visualization of streak surfaces on the GPU. We propose an interactive technique for computing ridges in the finite time Lyapunov exponent (FTLE) field at each time step, and we use these ridges as seeding structures to track streak surfaces in the time-varying flow. By showing separation surfaces in combination with particle trajectories, and by letting the user interactively change seeding parameters such as particle density and position, visually guided exploration of separation profiles in 3D is provided. To the best of our knowledge, this is the first time that the reconstruction and display of semantic separable surfaces in 3D unsteady flows can be performed interactively, giving rise to new possibilities for gaining insight into complex flow phenomena. 相似文献
The global scale and distribution of companies have changed the economy and dynamics of businesses. Web-based collaborations and cross-organizational processes typically require dynamic and context-based interactions between people and services. However, finding the right partner to work on joint tasks or to solve emerging problems in such scenarios is challenging due to scale and temporary nature of collaborations. Furthermore, actor competencies evolve over time, thus requiring dynamic approaches for their management. Web services and SOA are the ideal technical framework to automate interactions spanning people and services. To support such complex interaction scenarios, we discuss mixed service-oriented systems that are composed of both humans and software services, interacting to perform certain activities. As an example, consider a professional online support community consisting of interactions between human participants and software-based services. We argue that trust between members is essential for successful collaborations. Unlike a security perspective, we focus on the notion of social trust in collaborative networks. We show an interpretative rule-based approach to enable humans and services to establish trust based on interactions and experiences, considering their context and subjective perceptions. 相似文献
Network communication has become indispensable in business, education and government. With the pervasive role of the Internet as a means of sharing information across networks, its misuse for destructive purposes, such as spreading malicious code, compromising remote hosts, or damaging data through unauthorized access, has grown immensely in the recent years. The classical way of monitoring the operation of large network systems is by analyzing the system logs for detecting anomalies. In this work, we introduce hierarchical network map, an interactive visualization technique for gaining a deeper insight into network flow behavior by means of user-driven visual exploration. Our approach is meant as an enhancement to conventional analysis methods based on statistics or machine learning. We use multidimensional modeling combined with position and display awareness to view source and target data of the hosts in a hierarchical fashion with the ability to interactively change the level of aggregation or apply filtering. The interdisciplinary approach integrating data warehouse technology, information visualization and decision support brings about the benefit of efficiently collecting the input data and aggregating over very large data sets, visualizing the results and providing interactivity to facilitate analytical reasoning 相似文献
By means of service-oriented architectures the IT support of processes can be designed as a portfolio of individual IT services provided by different suppliers. The processes are designed based on selection decisions between IT services that potentially have to be included. Many companies formulate a multitude of requirements for investments in IT services at ever shorter intervals. However, the scope of the desired investments usually exceeds the available budget. Thus, companies face the challenge of allocating the limited budget to investments in the most promising combination of IT services. This is hardly possible without methodical support. In addition, the allocation is often done intuitively and subject to the decision-makers?? affinity with IT. Therefore, this paper develops a quantitative, multi-period procedure model for the purpose of maximizing the enterprise value in accordance with value based management, which considers the dependencies of the periodical selection decisions. In the following, a decision logic for the heuristic solution to the selection problem is presented and its application is demonstrated by means of an illustrative case example. 相似文献
The interoperability of proof assistants and the integration of their libraries is a highly valued but elusive goal in the field of theorem proving. As a preparatory step, in previous work, we translated the libraries of multiple proof assistants, specifically the ones of Coq, HOL Light, IMPS, Isabelle, Mizar, and PVS into a universal format: OMDoc/MMT. Each translation presented great theoretical, technical, and social challenges, some universal and some system-specific, some solvable and some still open. In this paper, we survey these challenges and compare and evaluate the solutions we chose. We believe similar library translations will be an essential part of any future system interoperability solution, and our experiences will prove valuable to others undertaking such efforts.
Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects (without own processing power, e.g. RFID tags). This paper introduces a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects. The integration is done by associating public keys to passive objects, which can be used by peers to validate proxies (peers additionally acting on behalf of objects). To overcome the problem of limited storage capacity on small embedded objects, ECC keys are used. 相似文献