200 research outputs found

    Deciding observational congruence of finite-state CCS expressions by rewriting

    Get PDF
    AbstractWe propose a term rewriting approach to verify observational congruence between guarded recursive (finite-state) CCS expressions. Starting from the complete axiomatization of observational congruence for this subset of CCS, a non-terminating rewriting relation has been defined. This rewriting relation is ω-canonical over a subclass of infinite derivations, structured fair derivations, which compute all the ω-normal forms. The rewriting relation is shown to be complete with respect to the axiomatization by proving that every structured fair derivation computes a term that denotes an rτ-normal process graph. The existence of a finite representation for ω-normal forms allows the definition of a rewriting strategy that, in a finite number of rewriting steps, decides observational congruence of guarded recursive (finite-state) CCS expressions

    Statistical properties of acoustic emission signals from metal cutting processes

    Full text link
    Acoustic Emission (AE) data from single point turning machining are analysed in this paper in order to gain a greater insight of the signal statistical properties for Tool Condition Monitoring (TCM) applications. A statistical analysis of the time series data amplitude and root mean square (RMS) value at various tool wear levels are performed, �nding that ageing features can be revealed in all cases from the observed experimental histograms. In particular, AE data amplitudes are shown to be distributed with a power-law behaviour above a cross-over value. An analytic model for the RMS values probability density function (pdf) is obtained resorting to the Jaynes' maximum entropy principle (MEp); novel technique of constraining the modelling function under few fractional moments, instead of a greater amount of ordinary moments, leads to well-tailored functions for experimental histograms.Comment: 16 pages, 7 figure

    Architectural mismatch tolerance

    Get PDF
    The integrity of complex software systems built from existing components is becoming more dependent on the integrity of the mechanisms used to interconnect these components and, in particular, on the ability of these mechanisms to cope with architectural mismatches that might exist between components. There is a need to detect and handle (i.e. to tolerate) architectural mismatches during runtime because in the majority of practical situations it is impossible to localize and correct all such mismatches during development time. When developing complex software systems, the problem is not only to identify the appropriate components, but also to make sure that these components are interconnected in a way that allows mismatches to be tolerated. The resulting architectural solution should be a system based on the existing components, which are independent in their nature, but are able to interact in well-understood ways. To find such a solution we apply general principles of fault tolerance to dealing with arch itectural mismatche

    Application-Layer Connector Synthesis

    Full text link
    International audienceThe heterogeneity characterizing the systems populating the Ubiquitous Computing environment prevents their seamless interoperability. Heterogeneous protocols may be willing to cooperate in order to reach some common goal even though they meet dynamically and do not have a priori knowledge of each other. Despite numerous e orts have been done in the literature, the automated and run-time interoperability is still an open challenge for such environment. We consider interoperability as the ability for two Networked Systems (NSs) to communicate and correctly coordinate to achieve their goal(s). In this chapter we report the main outcomes of our past and recent research on automatically achieving protocol interoperability via connector synthesis. We consider application-layer connectors by referring to two conceptually distinct notions of connector: coordinator and mediator. The former is used when the NSs to be connected are already able to communicate but they need to be speci cally coordinated in order to reach their goal(s). The latter goes a step forward representing a solution for both achieving correct coordination and enabling communication between highly heterogeneous NSs. In the past, most of the works in the literature described e orts to the automatic synthesis of coordinators while, in recent years the focus moved also to the automatic synthesis of mediators. Within the Connect project, by considering our past experience on automatic coordinator synthesis as a baseline, we propose a formal theory of mediators and a related method for automatically eliciting a way for the protocols to interoperate. The solution we propose is the automated synthesis of emerging mediating connectors (i.e., mediators for short)

    A unifying perspective on protocol mediation: interoperability in the Future Internet

    Get PDF
    Given the highly dynamic and extremely heterogeneous software systems composing the Future Internet, automatically achieving interoperability between software components —without modifying them— is more than simply desirable, it is quickly becoming a necessity. Although much work has been carried out on interoperability, existing solutions have not fully succeeded in keeping pace with the increasing complexity and heterogeneity of modern software, and meeting the demands of runtime support. On the one hand, solutions at the application layer target higher automation and loose coupling through the synthesis of intermediary entities, mediators, to compensate for the differences between the interfaces of components and coordinate their behaviours, while assuming the use of the same middleware solution. On the other hand, solutions to interoperability across heterogeneous middleware technologies do not reconcile the differences between components at the application layer. In this paper we propose a unified approach for achieving interoperability between heterogeneous software components with compatible functionalities across the application and middleware layers. First, we provide a solution to automatically generate cross-layer parsers and composers that abstract network messages into a uniform representation independent of the middleware used. Second, these generated parsers and composers are integrated within a mediation framework to support the deployment of the mediators synthesised at the application layer. More specifically, the generated parser analyses the network messages received from one component and transforms them into a representation that can be understood by the application-level mediator. Then, the application-level mediator performs the necessary data conversion and behavioural coordination. Finally, the composer transforms the representation produced by the application-level mediator into network messages that can be sent to the other component. The resulting unified mediation framework reconciles the differences between software components from the application down to the middleware layers. We validate our approach through a case study in the area of conference management

    Privacy by Design: From Technologies to Architectures (Position Paper)

    Get PDF
    Existing work on privacy by design mostly focus on technologies rather than methodologies and on components rather than architectures. In this paper, we advocate the idea that privacy by design should also be addressed at the architectural level and be associated with suitable methodologies. Among other benefits, architectural descriptions enable a more systematic exploration of the design space. In addition, because privacy is intrinsically a complex notion that can be in tension with other requirements, we believe that formal methods should play a key role in this area. After presenting our position, we provide some hints on how our approach can turn into practice based on ongoing work on a privacy by design environment

    Formal verification of safety protocol in train control system

    Get PDF
    In order to satisfy the safety-critical requirements, the train control system (TCS) often employs a layered safety communication protocol to provide reliable services. However, both description and verification of the safety protocols may be formidable due to the system complexity. In this paper, interface automata (IA) are used to describe the safety service interface behaviors of safety communication protocol. A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN. A case study of using this method to describe and verify a safety communication protocol is included. The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks, livelocks and several mandatory consistency properties. A prototype of safety protocols is also developed based on the presented formally verifying method

    Nephrin Is Expressed on the Surface of Insulin Vesicles and Facilitates Glucose-Stimulated Insulin Release

    Get PDF
    Nephrin, an immunoglobulin-like protein essential for the function of the glomerular podocyte and regulated in diabetic nephropathy, is also expressed in pancreatic beta-cells, where its function remains unknown. The aim of this study was to investigate whether diabetes modulates nephrin expression in human pancreatic islets and to explore the role of nephrin in beta-cell function. Nephrin expression in human pancreas and in MIN6 insulinoma cells was studied by Western blot, PCR, confocal microscopy, subcellular fractionation, and immunogold labeling. Islets from diabetic (n = 5) and nondiabetic (n = 7) patients were compared. Stable transfection and siRNA knockdown in MIN-6 cells/human islets were used to study nephrin function in vitro and in vivo after transplantation in diabetic immunodeficient mice. Live imaging of green fluorescent protein (GFP)-nephrin-transfected cells was used to study nephrin endocytosis. Nephrin was found at the plasma membrane and on insulin vesicles. Nephrin expression was decreased in islets from diabetic patients when compared with nondiabetic control subjects. Nephrin transfection in MIN-6 cells/pseudoislets resulted in higher glucose-stimulated insulin release in vitro and in vivo after transplantation into immunodeficient diabetic mice. Nephrin gene silencing abolished stimulated insulin release. Confocal imaging of GFP-nephrin-transfected cells revealed nephrin endocytosis upon glucose stimulation. Actin stabilization prevented nephrin trafficking as well as nephrin-positive effect on insulin release. Our data suggest that nephrin is an active component of insulin vesicle machinery that may affect vesicle-actin interaction and mobilization to the plasma membrane. Development of drugs targeting nephrin may represent a novel approach to treat diabetes

    Software Engineering for Self-Adaptive Systems: A second Research Roadmap

    Get PDF
    The goal of this roadmap paper is to summarize the state of-the-art and identify research challenges when developing, deploying and managing self-adaptive software systems. Instead of dealing with a wide range of topics associated with the field, we focus on four essential topics of self-adaptation: design space for adaptive solutions, processes, from centralized to decentralized control, and practical run-time verification and validation. For each topic, we present an overview, suggest future directions, and focus on selected challenges. This paper complements and extends a previous roadmap on software engineering for self-adaptive systems published in 2009 covering a different set of topics, and reflecting in part on the previous paper. This roadmap is one of the many results of the Dagstuhl Seminar 10431 on Software Engineering for Self-Adaptive Systems, which took place in October 2010
    corecore