286,583 research outputs found

    Monitoring Networks through Multiparty Session Types

    Get PDF
    In large-scale distributed infrastructures, applications are realised through communications among distributed components. The need for methods for assuring safe interactions in such environments is recognized, however the existing frameworks, relying on centralised verification or restricted specification methods, have limited applicability. This paper proposes a new theory of monitored π-calculus with dynamic usage of multiparty session types (MPST), offering a rigorous foundation for safety assurance of distributed components which asynchronously communicate through multiparty sessions. Our theory establishes a framework for semantically precise decentralised run-time enforcement and provides reasoning principles over monitored distributed applications, which complement existing static analysis techniques. We introduce asynchrony through the means of explicit routers and global queues, and propose novel equivalences between networks, that capture the notion of interface equivalence, i.e. equating networks offering the same services to a user. We illustrate our static-dynamic analysis system with an ATM protocol as a running example and justify our theory with results: satisfaction equivalence, local/global safety and transparency, and session fidelity

    Monitoring Networks through Multiparty Session Types

    Get PDF
    In large-scale distributed infrastructures, applications are realised through communications among distributed components. The need for methods for assuring safe interactions in such environments is recognised, however the existing frameworks, relying on centralised verification or restricted specification methods, have limited applicability. This paper proposes a new theory of monitored π-calculus with dynamic usage of multiparty session types (MPST), offering a rigorous foundation for safety assurance of distributed components which asynchronously communicate through multiparty sessions. Our theory establishes a framework for semantically precise decentralised run-time enforcement and provides reasoning principles over monitored distributed applications, which complement existing static analysis techniques. We introduce asynchrony through the means of explicit routers and global queues, and propose novel equivalences between networks, that capture the notion of interface equivalence, i.e. equating networks offering the same services to a user. We illustrate our static–dynamic analysis system with an ATM protocol as a running example and justify our theory with results: satisfaction equivalence, local/global safety and transparency, and session fidelity

    Analytical study of the conjecture rule for the combination of multipole effects in LHC

    Get PDF
    This paper summarizes the analytical investigation done on the conjecture law found by tracking for the effect on the dynamic aperture of the combination of two multipoles of various order. A one-dimensional model leading to an integrable system has been used to find closed formulae for the dynamic aperture associated with a fully distributed multipole. The combination has then been studied and the resulting expression compared with the assumed conjecture law. For integrated multipoles small with respect to the focusing strength, the conjecture appears to hold, though with an exponent different from the one expected by crude reasoning

    Distributed system contract monitoring

    Get PDF
    Runtime verification of distributed systems poses various challenges. A pivotal challenge is the choice of how to distribute the monitors themselves across the system. On one hand, centralised monitoring may result in increased communication overhead and information exposure across locations, while, on the other hand, systems with dynamic topologies and properties are difficult to address using static monitor choreographies. In this paper we present mDPi, a location-aware π-calculus extension for reasoning about the distributed monitoring scenario. We also define numerous monitoring strategies for a regular expression-based logic, including a novel approach in which monitors migrate to ensure local monitoring. Finally, we present a number of results which emerge from this formalism, justifying our approach.peer-reviewe

    Cooperation platform for distributed manufacturing

    Get PDF
    The aim of the paper is to analyse contemporary trends in distributed manufacturing (DM) research and to present a concept to develop and test some task allocation, planning and scheduling algorithms for DM network organisations. Some concepts to identify key factor criteria and reasoning policies and rules for production/manufacturing decision support system are also undertaken. And finally, an aim is to draw a proposal for a development of a prototype decision support system with necessary communication and knowledge oriented modules to be implemented in an example of dynamic, DM and logistics network structure, particularly for very popular dynamic cluster forms in Poland. The developed concept of the organization of a multi-entity DM network will enable business-effective use of the system, supporting manufacturing decision making, consulting and offering information services in the control centre (the so-called Competence Centre) by constructing virtual reality and access to services in a distributed network of cloud computing type. Integration of the whole system into one information system will enable analysis and network resource optimization of manufacturing and logistics processes, new analytical functions, reduction of delays in the manufacturing system, management of changes and risks, and visualization of the current state of the DM system

    Distributed Approximation of Fixed-Points in Trust Structures

    Get PDF
    Recently, Carbone, Nielsen and Sassone introduced the trust-structure framework; a semantic model for trust-management in global-scale distributed systems. The framework is based on the notion of trust structures; a set of ``trust-levels'' ordered by two distinct partial orderings. In the model, a unique global trust-state is defined as the least fixed-point of a collection of local policies assigning trust-levels to the entities of the system. However, the framework is a purely denotational model: it gives precise meaning to the global trust-state of a system, but without specifying a way to compute this abstract mathematical object. This paper complements q the denotational model of trust structures with operational techniques. It is shown how the least fixed-point can be computed using a simple, totally-asynchronous distributed algorithm. Two efficient protocols for approximating the least fixed-point are provided, enabling sound reasoning about the global trust-state without computing the exact fixed-point. Finally, dynamic algorithms are presented for safe reuse of information between computations, in face of dynamic trust-policy updates
    corecore