74 research outputs found

    Lightening Global Types

    Full text link
    Global session types prevent participants from waiting for never coming messages. Some interactions take place just for the purpose of informing receivers that some message will never arrive or the session is terminated. By decomposing a big global type into several light global types, one can avoid such kind of redundant interactions. Lightening global types gives us cleaner global types, which keep all necessary communications. This work proposes a framework which allows to easily decompose global types into light global types, preserving the interaction sequences of the original ones but for redundant interactions.Comment: In Proceedings PLACES 2014, arXiv:1406.331

    Dynamic Role Authorization in Multiparty Conversations

    Get PDF
    Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at runtime. Building on previous work on conversation types with flexible role assignment, here we report initial results on a typed framework for the analysis of multiparty communications with dynamic role authorization and delegation. In the underlying process model, communication prefixes are annotated with role authorizations and authorizations can be passed around. We extend the conversation type system so as to statically distinguish processes that never incur in authorization errors. The proposed static discipline guarantees that processes are always authorized to communicate on behalf of an intended role, also covering the case in which authorizations are dynamically passed around in messages.Comment: In Proceedings BEAT 2014, arXiv:1408.556

    Self-Adaptive Monitors for Multiparty Sessions

    Get PDF

    Self-adaptive multiparty sessions

    Get PDF

    Curative Care as the Access Point to Rural Social Transformation a Case Study of the Comprehensive Rural Health Project

    Get PDF
    Health inequities based on geographic differences and between rural and urban populations in modern India demonstrate the stark differences in health access and community development throughout the country. More than 70% of the Indian population lives in rural areas, and yet a greater proportion of health care spending is devoted to urban populations. In 2004-5, 29.2% of both central and state public expenditures were allocated to urban allopathic services while 11.8% went to rural allopathic services (Balarajan, Selvaraj, and Subramanian 2011, 508). There are more than twice as many government beds in urban than in rural areas and geographic distribution of health care services have been unplanned and unequal within India, to the detriment of the rural poor (CBHI 2008). The Indian government has not been able to provide the timely and quality emergency medical services to the masses, particularly in rural areas. According to a report from the National Commission on Macroeconomics and Health, The Ministry of Health and Family Welfare (MOHFW), and the Government of India, the average villager has to travel 2.2 km to receive a paracetamol tablet, over 6km for a blood test, and 20km for hospital care (Garg et al. 2012). Studies have found that there are often problems in rural areas where the most basic emergency obstetric care has been found to be lacking (Subhan and Jain 2010). 39 million Indians per year fall into poverty from out –of-pocket expenditures for health care, and out of this 30.6 million are from rural areas (Balarajan, Selvaraj, and Subramanian 2011, 510)

    Panther - January 1979- Vol. LIII, NO. 10

    Get PDF
    https://digitalcommons.pvamu.edu/pv-panther-newspapers/1960/thumbnail.jp

    Qualitative Case Study on F-35 Fighter Production Delays Affecting National Security Guidance

    Get PDF
    Approaching $400 billion for its establishment and production, the F-35 Joint Strike Fighter (JSF) is the Department of Defense\u27s (DoD) largest acquisition program in U.S. history. Unfortunately, significant delays have immobilized the program\u27s production rate, and little research has examined whether and how such delays directly affect national security. The purpose of this study was to determine whether and how production delays in the JSF program directly affect national security. The theoretical foundations for this qualitative case study were Condorcet\u27s modernization theory and Giddens\u27s globalization framework. Data were collected from interviews with 15 senior DoD civilian, military, and JSF officials and were coded and categorized to identify themes and patterns related to the source of production delays and reasons behind their persistence. Data were triangulated using archival records and government research documents. Key findings revealed concurrency issues, Helmet Mounted Display malfunctions, engine concerns, scheduling mishaps, national security vulnerabilities, and astronomical funding outside of the budget. Such factors were responsible for fighter program delays, which affect national security. The results are deemed significant, as the fighter has been a critical \u27piece to the puzzle\u27 in the national security strategy as well as other national defense guidance issues. These findings have implications for social change in that they may inform senior DoD officials of policy-related concerns due to continued delays and their impacts on national security interests. Additionally, the study identifies concerns related to sustaining international partnerships that have significant interests embedded into this program

    A comparative study of technological learning and organizational capability development in complex products systems: Distinctive paths of three latecomers in military aircraft industry

    Get PDF
    This paper identifies different patterns of latecomers’ technological learning in developing complex products systems (CoPS). The experiences of South Korea, China, and Brazil in military aircraft development are compared to explain the learning process in attaining indigenous technological capability. The military aircraft development programs involving international technology transfer agreements have been documented to investigate the technological learning patterns. We find different technology acquisition modes determined by latecomers’ focus of knowledge-base: technological for “make” and production for “buy”. We also find that these modes may influence the process of learning-by-doing. In addition, we find how the role of foreign partners influences technology acquisition mode. Whereas an active role results in co-production or co-development arrangement, a passive role leads to the vitalization of reverse engineering. We also shed light on the role of government policy initiatives that facilitate technological learning. Lastly, this paper extensively documented the successful technological learning in South Korea’s T-50 and Brazil’s AMX joint venture projects

    Online Safety Nets: How Perceived Isolation Motivates Network Closure.

    Full text link
    The feeling of being alone – and drive to vanquish that feeling – represents a common interest among theorists in communication, psychology, and sociology. Despite extensive literatures on isolation, exclusion, rejection, and loneliness, less is known about how these feelings reverberate through personal networks. Concurrently, the ascent of mobile and social technologies has generated a range of communicative possibilities that complicate our understanding of how people respond to moments of social isolation. Indeed, evolving network theories suggest that these media affordances have the potential to steer communication toward certain people and away from others. In this dissertation, I attempt to interlace this dual theoretical backdrop, integrating classic theories on the experience of social isolation with recent theories on the social implications of online affordances. I argue that perceived isolation is likely to drive people toward network closure, or what Kadushin (2012) refers to as “network safety”. I also argue that this thrust is more likely to occur in online networks that are defined by availability and awareness, such as Facebook. In order to substantiate these claims, this dissertation encompasses studies measuring online network outcomes in combination with three different versions of perceived isolation: induced exclusion (Study 1), exclusion reactivity (Study 2), and rejection sensitivity (Study 3). Altogether, the combined results indicate that feelings of isolation can shift social attention and preference toward trusted ties and core circles. Over time, these patterns suggest that people who experience more frequent and intense feelings of isolation may choose to fortify close relationships and closed communities, rather than embrace weak ties and open networks. To conclude, I contextualize the findings within other models of perceived isolation, and propose an extra component for the observed network dynamics. Expanding on this phenomenon, I theorize how certain cognitive states may operate as network switches, changing personal network motivations in a dynamic manner. With the emergence of increased availability and awareness, individuals have increased capacity to choose, and thus shift, their personal network patterns during daily life. Consequently, I call for new research on the cognitive mechanisms that underlie social network motivations, perceptions, and choices.PhDCommunication StudiesUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/133276/1/joebayer_1.pd
    • …
    corecore