592 research outputs found

    Graphical Encoding of a Spatial Logic for the pi-Calculus

    Get PDF
    This paper extends our graph-based approach to the verification of spatial properties of π-calculus specifications. The mechanism is based on an encoding for mobile calculi where each process is mapped into a graph (with interfaces) such that the denotation is fully abstract with respect to the usual structural congruence, i.e., two processes are equivalent exactly when the corresponding encodings yield isomorphic graphs. Behavioral and structural properties of π-calculus processes expressed in a spatial logic can then be verified on the graphical encoding of a process rather than on its textual representation. In this paper we introduce a modal logic for graphs and define a translation of spatial formulae such that a process verifies a spatial formula exactly when its graphical representation verifies the translated modal graph formula

    The effects of hospital clowning on physical and emotional states of pediatric patients during chemotherapy treatment

    Get PDF
    Background: Pediatric cancer treatments interfere with the patient’s life on physical, psychological, and social levels. Hospital Clowns (HCs) use nonpharmacological techniques to reduce the distress that hospital treatments can cause and increase children’s wellbeing, but few studies have analyzed their effects. Objective: This study examined the HC effects on the physical and emotional responses of pediatric patients during ambulatory chemotherapy. Given the variability in patients’ adjustments to cancer treatment, the role of a child’s age and temperament, and caregiver anxiety was considered in explaining the responses over and beyond the HC effects on patient outcomes. Method: Following a quasi-experimental design, 82 pediatric patients were assigned to one of two conditions: HC intervention versus control group (CG) in two separate trials. Pediatric patients self-reported of physical symptoms (pain, nausea, and fatigue) and emotional states (distress, happiness, and calm) were measured at baseline and post-chemotherapy in both trials. Caregivers provided information on children’s temperament and reported their own anxiety. Marginal Multilevel Modeling was used to examine the effects of the HC interventions on the outcomes by controlling caregiver anxiety, and child age and emotionality. Results: Compared to the CG, patients receiving the HC visit during chemotherapy reported higher levels of calm and happiness, and less fatigue, pain, and distress. HCs did not affect nausea. Conclusions: This study showed the importance of HCs as agents of supportive pediatric care, whose short-term effects during ambulatory chemotherapy seem to contribute to increasing the well-being of pediatric patients.info:eu-repo/semantics/acceptedVersio

    On duality relations for session types

    Get PDF
    Session types are a type formalism used to describe communication protocols over private session channels. Each participant in a binary session owns one endpoint of a session channel. A key notion is that of duality: the endpoints of a session channel should have dual session types in order to guarantee communication safety. Duality relations have been independently defined in different ways and different works, without considering their effect on the type system. In this paper we systematically study the existing duality relations and some new ones, and compare them in order to understand their expressiveness. The outcome is that those relations are split into two groups, one related to the na¨ıve inductive duality, and the other related to a notion of mutual compliance, which we borrow from the literature on contracts for web-services

    Effective representation of RT-LOTOS terms by finite time petri nets

    Get PDF
    The paper describes a transformational approach for the specification and formal verification of concurrent and real-time systems. At upper level, one system is specified using the timed process algebra RT-LOTOS. The output of the proposed transformation is a Time Petri net (TPN). The paper particularly shows how a TPN can be automatically constructed from an RT-LOTOS specification using a compositionally defined mapping. The proof of the translation consistency is sketched in the paper and developed in [1]. The RT-LOTOS to TPN translation patterns formalized in the paper are being implemented. in a prototype tool. This enables reusing TPNs verification techniques and tools for the profit of RT-LOTOS

    Tools and verification

    Get PDF
    This chapter presents different tools that have been developed inside the Sensoria project. Sensoria studied qualitative analysis techniques for verifying properties of service implementations with respect to their formal specifications. The tools presented in this chapter have been developed to carry out the analysis in an automated, or semi-automated, way. We present four different tools, all developed during the Sensoria project, exploiting new techniques and calculi from the Sensoria project itself

    A Spatial-Epistemic Logic for Reasoning about Security Protocols

    Full text link
    Reasoning about security properties involves reasoning about where the information of a system is located, and how it evolves over time. While most security analysis techniques need to cope with some notions of information locality and knowledge propagation, usually they do not provide a general language for expressing arbitrary properties involving local knowledge and knowledge transfer. Building on this observation, we introduce a framework for security protocol analysis based on dynamic spatial logic specifications. Our computational model is a variant of existing pi-calculi, while specifications are expressed in a dynamic spatial logic extended with an epistemic operator. We present the syntax and semantics of the model and logic, and discuss the expressiveness of the approach, showing it complete for passive attackers. We also prove that generic Dolev-Yao attackers may be mechanically determined for any deterministic finite protocol, and discuss how this result may be used to reason about security properties of open systems. We also present a model-checking algorithm for our logic, which has been implemented as an extension to the SLMC system.Comment: In Proceedings SecCo 2010, arXiv:1102.516

    NAP-2 Secreted by Human NK Cells Can Stimulate Mesenchymal Stem/Stromal Cell Recruitment

    Get PDF
    SummaryStrategies for improved homing of mesenchymal stem cells (MSCs) to a place of injury are being sought and it has been shown that natural killer (NK) cells can stimulate MSC recruitment. Here, we studied the chemokines behind this recruitment. Assays were performed with bone marrow human MSCs and NK cells freshly isolated from healthy donor buffy coats. Supernatants from MSC-NK cell co-cultures can induce MSC recruitment but not to the same extent as when NK cells are present. Antibody arrays and ELISA assays confirmed that NK cells secrete RANTES (CCL5) and revealed that human NK cells secrete NAP-2 (CXCL7), a chemokine that can induce MSC migration. Inhibition with specific antagonists of CXCR2, a receptor that recognizes NAP-2, abolished NK cell-mediated MSC recruitment. This capacity of NK cells to produce chemokines that stimulate MSC recruitment points toward a role for this immune cell population in regulating tissue repair/regeneration
    corecore