6,817 research outputs found
Synthesizing and executing plans in Knowledge and Action Bases
We study plan synthesis for a variant of Knowledge and Action Bases (KABs). KABs have been recently introduced as a rich, dynamic framework where states are full-fledged description logic (DL) knowledge bases (KBs) whose extensional part is manipulated by actions that can introduce new objects from an infinite domain. We show that, in general, plan existence over KABs is undecidable even under severe restrictions. We then focus on the class of state-bounded KABs, for which plan existence is decidable, and we provide sound and complete plan synthesis algorithms, through a novel combination of techniques based on standard planning, DL query answering, and finite-state abstractions. All results hold for any DL with decidable query answering. We finally show that for lightweight DLs, plan synthesis can be compiled into standard ADL planning. © 2016, CEUR-WS. All rights reserved
Plan Synthesis for Knowledge and Action Bases
We study plan synthesis for a variant of Knowledge and Action Bases (KABs), a rich, dynamic framework, where states are description logic (DL) knowledge bases (KBs) whose extensional part is manipulated by actions that possibly introduce new objects from an infinite domain. We show that plan existence over KABs is undecidable even under severe restrictions. We then focus on state-bounded KABs, a class for which plan existence is decidable, and provide sound and complete plan synthesis algorithms, which combine techniques based on standard planning, DL query answering, and finite-state abstraction. All results hold for any DL with decidable query answering. We finally show that for lightweight DLs, plan synthesis can be compiled into standard ADL planning
Verifying Privacy-Type Properties in a Modular Way
Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlink ability) that play an important role in many modern applications are formalised using a notion of equivalence. In this paper, we study the notion of trace equivalence and we show how to establish such an equivalence relation in a modular way. It is well-known that composition works well when the processes do not share secrets. However, there is no result allowing us to compose processes that rely on some shared secrets such as long term keys. We show that composition works even when the processes share secrets provided that they satisfy some reasonable conditions. Our composition result allows us to prove various equivalence-based properties in a modular way, and works in a quite general setting. In particular, we consider arbitrary cryptographic primitives and processes that use non-trivial else branches. As an example, we consider the ICAO e-passport standard, and we show how the privacy guarantees of the whole application can be derived from the privacy guarantees of its sub-protocols
Average Consensus in the Presence of Delays and Dynamically Changing Directed Graph Topologies
Classical approaches for asymptotic convergence to the global average in a
distributed fashion typically assume timely and reliable exchange of
information between neighboring components of a given multi-component system.
These assumptions are not necessarily valid in practical settings due to
varying delays that might affect transmissions at different times, as well as
possible changes in the underlying interconnection topology (e.g., due to
component mobility). In this work, we propose protocols to overcome these
limitations. We first consider a fixed interconnection topology (captured by a
- possibly directed - graph) and propose a discrete-time protocol that can
reach asymptotic average consensus in a distributed fashion, despite the
presence of arbitrary (but bounded) delays in the communication links. The
protocol requires that each component has knowledge of the number of its
outgoing links (i.e., the number of components to which it sends information).
We subsequently extend the protocol to also handle changes in the underlying
interconnection topology and describe a variety of rather loose conditions
under which the modified protocol allows the components to reach asymptotic
average consensus. The proposed algorithms are illustrated via examples.Comment: 37 page
Behavioral types in programming languages
A recent trend in programming language research is to use behav- ioral type theory to ensure various correctness properties of large- scale, communication-intensive systems. Behavioral types encompass concepts such as interfaces, communication protocols, contracts, and choreography. The successful application of behavioral types requires a solid understanding of several practical aspects, from their represen- tation in a concrete programming language, to their integration with other programming constructs such as methods and functions, to de- sign and monitoring methodologies that take behaviors into account. This survey provides an overview of the state of the art of these aspects, which we summarize as the pragmatics of behavioral types
Why Canât Tyrone Write: Reconceptualizing Flower and Hayes for African-American Adolescent Male Writers
Using qualitative methods and a case study design, the perceptions and writing processes of three African-American eighth grade males were explored. Data were derived from semi-structured and informal interviews; and document analysis. The study concluded that the perceptions of the three participantsâ writing processes did not adhere to the steps depicted by the cognitive process model of writing (Flower and Hayes, 1981) that has become a dominant model for describing the composing processes of students. Recommendations are made for altering the Flower and Hayes model to depict how these three, African-American eighth graders perceive school writing
Demystifying CXL Memory with Genuine CXL-Ready Systems and Devices
The high demand for memory capacity in modern datacenters has led to multiple
lines of innovation in memory expansion and disaggregation. One such effort is
Compute eXpress Link (CXL)-based memory expansion, which has gained significant
attention. To better leverage CXL memory, researchers have built several
emulation and experimental platforms to study its behavior and characteristics.
However, due to the lack of commercial hardware supporting CXL memory, the full
picture of its capabilities may still be unclear to the community. In this
work, we explore CXL memory's performance characterization on a
state-of-the-art experimental platform. First, we study the basic performance
characteristics of CXL memory using our proposed microbenchmark. Based on our
observations and comparisons to standard DRAM connected to local and remote
NUMA nodes, we also study the impact of CXL memory on end-to-end applications
with different offloading and interleaving policies. Finally, we provide
several guidelines for future programmers to realized the full potential of CXL
memor
- âŠ