210 research outputs found

    Razvoj i analiza formalnih modela za korišćenje i deljenje resursa u distribuiranim softverskim sistemima

    Get PDF
    This thesis investigates problems of formal, mathematically based, representation and analysis of controlled usage and sharing of resources in distributed software systems. We present a model for confidential name passing, and a model for controlled resource usage. For the second model we also introduce a type system for performing a static verification that can ensure absence of unauthorized usages of resources in the system.У тези су разматрани проблеми формалног описа и анализе дељења и коришћења ресурса у дистрибуираним софтверским системима. Уведен је један рачун који моделира поверљиво дељење имена и један који моделира контролисано коришћење ресурса. За други модел предложен је и типски систем за статичку проверу који осигурава одсуство неауторизованог коришћења ресурса у систему.U tezi su razmatrani problemi formalnog opisa i analize deljenja i korišćenja resursa u distribuiranim softverskim sistemima. Uveden je jedan račun koji modelira poverljivo deljenje imena i jedan koji modelira kontrolisano korišćenje resursa. Za drugi model predložen je i tipski sistem za statičku proveru koji osigurava odsustvo neautorizovanog korišćenja resursa u sistemu

    Razvoj i analiza formalnih modela za korišćenje i deljenje resursa u distribuiranim softverskim sistemima

    Get PDF
    This thesis investigates problems of formal, mathematically based, representation and analysis of controlled usage and sharing of resources in distributed software systems. We present a model for confidential name passing, and a model for controlled resource usage. For the second model we also introduce a type system for performing a static verification that can ensure absence of unauthorized usages of resources in the system.У тези су разматрани проблеми формалног описа и анализе дељења и коришћења ресурса у дистрибуираним софтверским системима. Уведен је један рачун који моделира поверљиво дељење имена и један који моделира контролисано коришћење ресурса. За други модел предложен је и типски систем за статичку проверу који осигурава одсуство неауторизованог коришћења ресурса у систему.U tezi su razmatrani problemi formalnog opisa i analize deljenja i korišćenja resursa u distribuiranim softverskim sistemima. Uveden je jedan račun koji modelira poverljivo deljenje imena i jedan koji modelira kontrolisano korišćenje resursa. Za drugi model predložen je i tipski sistem za statičku proveru koji osigurava odsustvo neautorizovanog korišćenja resursa u sistemu

    About Dynamical Systems Appearing in the Microscopic Traffic Modeling

    Full text link
    Motivated by microscopic traffic modeling, we analyze dynamical systems which have a piecewise linear concave dynamics not necessarily monotonic. We introduce a deterministic Petri net extension where edges may have negative weights. The dynamics of these Petri nets are well-defined and may be described by a generalized matrix with a submatrix in the standard algebra with possibly negative entries, and another submatrix in the minplus algebra. When the dynamics is additively homogeneous, a generalized additive eigenvalue may be introduced, and the ergodic theory may be used to define a growth rate under additional technical assumptions. In the traffic example of two roads with one junction, we compute explicitly the eigenvalue and we show, by numerical simulations, that these two quantities (the additive eigenvalue and the growth rate) are not equal, but are close to each other. With this result, we are able to extend the well-studied notion of fundamental traffic diagram (the average flow as a function of the car density on a road) to the case of two roads with one junction and give a very simple analytic approximation of this diagram where four phases appear with clear traffic interpretations. Simulations show that the fundamental diagram shape obtained is also valid for systems with many junctions. To simulate these systems, we have to compute their dynamics, which are not quite simple. For building them in a modular way, we introduce generalized parallel, series and feedback compositions of piecewise linear concave dynamics.Comment: PDF 38 page

    An AHP (Analytic Hierarchy Process)/ANP (Analytic Network Process)-based multi- criteria decision approach for the selection of solar-thermal power plant investment projects

    Full text link
    In this paper the AHP (Analytic Hierarchy Process) and the ANP (Analytic Network Process) are applied to help the managing board of an important Spanish solar power investment company to decide whether to invest in a particular solar-thermal power plant project and, if so, to determine the order of priority of the projects in the company's portfolio. Project management goes through a long process, from obtaining the required construction permits and authorizations, negotiating with different stakeholders, complying with complex legal regulations, to solving the technical problems associated with plant construction and distribution of the energy generated. The whole process involves high engineering costs. The decision approach proposed in this paper consists of three phases. In the first two phases, the managing board must decide whether to accept or reject a project according to a set of criteria previously identified by the technical team. The third phase consists of establishing a priority order among the projects that have proven to be economically profitable based on project risk levels and execution time delays. This work analyzes the criteria that should be taken into account to accept or reject proposals for investment, as well as the risks used to prioritize some projects over others.The translation of this paper has been funded by the Universitat Politecnica de Valencia.Aragonés Beltrán, P.; Chaparro González, FV.; Pastor Ferrando, JP.; Pla Rubio, A. (2014). An AHP (Analytic Hierarchy Process)/ANP (Analytic Network Process)-based multi- criteria decision approach for the selection of solar-thermal power plant investment projects. Energy. 66:222-238. doi:10.1016/j.energy.2013.12.016S2222386

    Western Oregon University 2006-2007 Course Catalog

    Get PDF
    https://digitalcommons.wou.edu/coursecatalogs/1003/thumbnail.jp

    Western Oregon University 2009-2010 Course Catalog

    Get PDF
    https://digitalcommons.wou.edu/coursecatalogs/1006/thumbnail.jp

    Western Oregon University 2004-2005 Course Catalog

    Get PDF
    https://digitalcommons.wou.edu/coursecatalogs/1001/thumbnail.jp

    Western Oregon University 2010-2011 Course Catalog

    Get PDF
    https://digitalcommons.wou.edu/coursecatalogs/1007/thumbnail.jp

    Western Oregon University 2011-2012 Course Catalog

    Get PDF
    https://digitalcommons.wou.edu/coursecatalogs/1008/thumbnail.jp

    Principles of Security and Trust

    Get PDF
    This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems
    corecore