5 research outputs found

    Timed contract compliance under event timing uncertainty

    Get PDF
    Despite that many real-life contracts include time constraints, for instance explicitly specifying deadlines by when to perform actions, or for how long certain behaviour is prohibited, the literature formalising such notions is surprisingly sparse. Furthermore, one of the major challenges is that compliance is typically computed with respect to timed event traces with event timestamps assumed to be perfect. In this paper we present an approach for evaluating compliance under the effect of imperfect timing information, giving a semantics to analyse contract violation likelihood.peer-reviewe

    Una experiencia para fomentar la presencia de la Mujer en Informática a través del 11 de Febrero: Aprendiendo igualdad en la ciencia

    Get PDF
    La baja presencia de mujeres en carreras de ingeniería en general, y en informática en particular, ha sido reconocida por diferentes estudios internacionales. Esto está ocasionando un sesgo tanto en la industria como en la universidad hacia una visión única de la Informática, perdiendo la riqueza que ofrece siempre la diversidad. Así, nuestro centro, en el contexto de la iniciativa del 11 de Febrero Día Internacional de la Mujer y la Niña en la Ciencia, ha propuesto durante los últimos dos cursos una serie de actividades dirigidas a estudiantes de Secundaria con el fin de hacer visibles a las mujeres en el ámbito de la Ciencia, en general, y en el de la Informática, en particular. Con ello se pretende crear roles femeninos, fuera de estereotipos, y promover prácticas que favorezcan la igualdad de género. Los objetivos últimos son animar a las nuevas generaciones de alumnas a estudiar Ingeniería Informática a fin de romper la brecha de género, y desterrar falsos estereotipos entre los estudiantes sobre las capacidades o competencias de la mujer.The small number of women in engineering studies in general, and in computer science in particular, has been recognized by different international studies. This is causing a bias in both the industry and the university towards a single vision of computing, losing the wealth that diversity always offers. Thus, our Engineering School, in the context of the initiative 11 February, International Day of Women and Girls in Science, has proposed, during the last two academic courses, different activities aimed at high school students to highlight the role of women in the field of Science, in general, and Computer Science, in particular. The main aim is to foster female roles, outside all the stereotypes, and promote practices that favour gender equality. The ultimate goals are to encourage new generations of female students to study Computer Science in order to break the gender gap, and banish false stereotypes among students about the skills or competencies of women

    Modeling and Simulation of the IEEE 802.11e Wireless Protocol with Hidden Nodes using Colored Petri Nets

    Get PDF
    Wireless technologies are continuously evolving, including features such as the extension to mid- and long-range communications and the support of an increasing number of devices. However, longer ranges increase the probability of suffering from hidden terminal issues. In the particular case of Wireless Local Area Networks (WLANs), the use of Quality of Service (QoS) mechanisms introduced in IEEE 802.11e compromises scalability, exacerbates the hidden node problem, and creates congestion as the number of users and the variety of services in the network grow. In this context, this paper presents a configurable Colored Petri Net (CPN) model for the IEEE 802.11e protocol with the aim of analyzing the QoS support in mid- and long-range WLANs The CPN model covers the behavior of the protocol in the presence of hidden nodes to examine the performance of the RTS/CTS exchange in scenarios where the QoS differentiation may involve massive collision chains and high delays. Our CPN model sets the basis for further exploring the performance of the various mechanisms defined by the IEEE 802.11 standard. We then use this CPN model to provide a comprehensive study of the effectiveness of this protocol by using the simulation and monitoring capabilities of CPN Tools
    corecore