517 research outputs found

    Formação de multiplicadores: orientações pedagógicas.

    Get PDF

    Formação de multiplicadores: modelo de eficácia.

    Get PDF
    bitstream/CPATC/19590/1/Doc-107.pd

    Formação de multiplicadores: dinâmica de jogos.

    Get PDF
    bitstream/CPATC/19591/1/Doc-108.pd

    Desafios e demandas do agronegócio.

    Get PDF
    Nos dias de hoje, o mundo gira, basicamente, no sentido da mudança que sinaliza: maior conforto, maior agilidade, maior destreza e maior flexibilidade nos contatos interpessoais.bitstream/item/123030/1/Desafios-e-demandas-www.cpatc.embrapa.br-index.pd

    Effective representation of RT-LOTOS terms by finite time petri nets

    Get PDF
    The paper describes a transformational approach for the specification and formal verification of concurrent and real-time systems. At upper level, one system is specified using the timed process algebra RT-LOTOS. The output of the proposed transformation is a Time Petri net (TPN). The paper particularly shows how a TPN can be automatically constructed from an RT-LOTOS specification using a compositionally defined mapping. The proof of the translation consistency is sketched in the paper and developed in [1]. The RT-LOTOS to TPN translation patterns formalized in the paper are being implemented. in a prototype tool. This enables reusing TPNs verification techniques and tools for the profit of RT-LOTOS

    Cannibalism and Gang Involvement in the Cinematic Lives of Asian Gangsters

    Get PDF
    Abstract: Previous works focusing on Asian organized crime groups have examined the history, structure, function, and the extent of their legal and illegal business enterprises. While credible, such a line of inquiry omits crucial information on the source and reasoning behind membership and affiliation for members in Asian organized crime groups, such as the "Jok-Pok", Triads, and Yakuza. Due to the secretive nature of those organized crime groups, such an omission leaves a major gap in the understanding as to why Asian youths join gangs. This paper examines the prevailing characteristics of membership and affiliation within Asian gangs by analyzing Asian gangsters in Asian (Chinese, Japanese, Korean) cinema. Results indicate that the lure of economic benefits, exposure to gang life from within one's family and lack of opportunities to achieve legitimate goals constitute the three most pervasive themes that define membership within Asian gangs as represented in popular cinema

    Resolving Non-Determinism in Choreographies

    Get PDF
    Resolving non-deterministic choices of choreographies is a crucial task. We introduce a novel notion of realisability for choreographies –called whole-spectrum implementation– that rules out deterministic implementations of roles that, no matter which context they are placed in, will never follow one of the branches of a non-deterministic choice. We show that, under some conditions, it is decidable whether an implementation is whole-spectrum. As a case study, we analyse the POP protocol under the lens of whole-spectrum implementation

    A Spatial-Epistemic Logic for Reasoning about Security Protocols

    Full text link
    Reasoning about security properties involves reasoning about where the information of a system is located, and how it evolves over time. While most security analysis techniques need to cope with some notions of information locality and knowledge propagation, usually they do not provide a general language for expressing arbitrary properties involving local knowledge and knowledge transfer. Building on this observation, we introduce a framework for security protocol analysis based on dynamic spatial logic specifications. Our computational model is a variant of existing pi-calculi, while specifications are expressed in a dynamic spatial logic extended with an epistemic operator. We present the syntax and semantics of the model and logic, and discuss the expressiveness of the approach, showing it complete for passive attackers. We also prove that generic Dolev-Yao attackers may be mechanically determined for any deterministic finite protocol, and discuss how this result may be used to reason about security properties of open systems. We also present a model-checking algorithm for our logic, which has been implemented as an extension to the SLMC system.Comment: In Proceedings SecCo 2010, arXiv:1102.516
    corecore