1,514 research outputs found
A model checker for performance and dependability properties
Markov chains are widely used in the context of
performance and reliability evaluation of systems of various
nature. Model checking of such chains with respect to
a given (branching) temporal logic formula has been proposed
for both the discrete [8] and the continuous time setting
[1], [3]. In this short paper, we describe the prototype
model checker for discrete and continuous-time
Markov chains, where properties are expressed in appropriate
extensions of CTL.We illustrate the general benefits
of this approach and discuss the structure of the tool
Modelling and analyzing adaptive self-assembling strategies with Maude
Building adaptive systems with predictable emergent behavior is a challenging task and it is becoming a critical need. The research community has accepted the challenge by introducing approaches of various nature: from software architectures, to programming paradigms, to analysis techniques. We recently proposed a conceptual framework for adaptation centered around the role of control data. In this paper we show that it can be naturally realized in a reflective logical language like Maude by using the Reflective Russian Dolls model. Moreover, we exploit this model to specify, validate and analyse a prominent example of adaptive system: robot swarms equipped with self-assembly strategies. The analysis exploits the statistical model checker PVeStA
Theorizing in information systems research: A reflexive analysis of the adaptation of theory in information systems research
In this paper we consider what it means to be an informed IS researcher by focusing attention on theory adaptation in IS research. The basic question we seek to address is: When one borrows theory from another discipline, what are the issues that one must consider? After examining the role of theory in IS research, we focus on escalation theory applied to IS projects as an example. In doing so, we seek to generate increased awareness of the issues that one might consider when adapting theories from other domains to research in our field. This increased awareness may then translate to a more informed use of theories in IS. Following a self-reflexive tale of how and why escalation theory was adopted to IS research, we offer four recommendations for theory adaptation: (1) consider the fit between selected theory and phenomenon of interest, (2) consider the theory’s historical context, (3) consider how the theory impacts the choice of research method, and (4) consider the contribution of theorizing to cumulative theory
Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking
Electronic commerce needs the aid of software tools to check the validity of business processes in order to fully automate the exchange of information through the network. Symbolic model checking has been used to formally verify specifications of secure transactions in a system for business-to-business applications. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and the faults are detected through symbolic verification
DEPAS: A Decentralized Probabilistic Algorithm for Auto-Scaling
The dynamic provisioning of virtualized resources offered by cloud computing
infrastructures allows applications deployed in a cloud environment to
automatically increase and decrease the amount of used resources. This
capability is called auto-scaling and its main purpose is to automatically
adjust the scale of the system that is running the application to satisfy the
varying workload with minimum resource utilization. The need for auto-scaling
is particularly important during workload peaks, in which applications may need
to scale up to extremely large-scale systems.
Both the research community and the main cloud providers have already
developed auto-scaling solutions. However, most research solutions are
centralized and not suitable for managing large-scale systems, moreover cloud
providers' solutions are bound to the limitations of a specific provider in
terms of resource prices, availability, reliability, and connectivity.
In this paper we propose DEPAS, a decentralized probabilistic auto-scaling
algorithm integrated into a P2P architecture that is cloud provider
independent, thus allowing the auto-scaling of services over multiple cloud
infrastructures at the same time. Our simulations, which are based on real
service traces, show that our approach is capable of: (i) keeping the overall
utilization of all the instantiated cloud resources in a target range, (ii)
maintaining service response times close to the ones obtained using optimal
centralized auto-scaling approaches.Comment: Submitted to Springer Computin
Quantum-state control in optical lattices
We study the means to prepare and coherently manipulate atomic wave packets
in optical lattices, with particular emphasis on alkali atoms in the
far-detuned limit. We derive a general, basis independent expression for the
lattice operator, and show that its off-diagonal elements can be tailored to
couple the vibrational manifolds of separate magnetic sublevels. Using these
couplings one can evolve the state of a trapped atom in a quantum coherent
fashion, and prepare pure quantum states by resolved-sideband Raman cooling. We
explore the use of atoms bound in optical lattices to study quantum tunneling
and the generation of macroscopic superposition states in a double-well
potential. Far-off-resonance optical potentials lend themselves particularly
well to reservoir engineering via well controlled fluctuations in the
potential, making the atom/lattice system attractive for the study of
decoherence and the connection between classical and quantum physics.Comment: 35 pages including 8 figures. To appear in Phys. Rev. A. March 199
- …