164 research outputs found
Specifying Logic Programs in Controlled Natural Language
Writing specifications for computer programs is not easy since one has to
take into account the disparate conceptual worlds of the application domain and
of software development. To bridge this conceptual gap we propose controlled
natural language as a declarative and application-specific specification
language. Controlled natural language is a subset of natural language that can
be accurately and efficiently processed by a computer, but is expressive enough
to allow natural usage by non-specialists. Specifications in controlled natural
language are automatically translated into Prolog clauses, hence become formal
and executable. The translation uses a definite clause grammar (DCG) enhanced
by feature structures. Inter-text references of the specification, e.g.
anaphora, are resolved with the help of discourse representation theory (DRT).
The generated Prolog clauses are added to a knowledge base. We have implemented
a prototypical specification system that successfully processes the
specification of a simple automated teller machine.Comment: 16 pages, compressed, uuencoded Postscript, published in Proceedings
CLNLP 95, COMPULOGNET/ELSNET/EAGLES Workshop on Computational Logic for
Natural Language Processing, Edinburgh, April 3-5, 199
Attempto - From Specifications in Controlled Natural Language towards Executable Specifications
Deriving formal specifications from informal requirements is difficult since
one has to take into account the disparate conceptual worlds of the application
domain and of software development. To bridge the conceptual gap we propose
controlled natural language as a textual view on formal specifications in
logic. The specification language Attempto Controlled English (ACE) is a subset
of natural language that can be accurately and efficiently processed by a
computer, but is expressive enough to allow natural usage. The Attempto system
translates specifications in ACE into discourse representation structures and
into Prolog. The resulting knowledge base can be queried in ACE for
verification, and it can be executed for simulation, prototyping and validation
of the specification.Comment: 15 pages, compressed, uuencoded Postscript, to be presented at EMISA
Workshop 'Naturlichsprachlicher Entwurf von Informationssystemen -
Grundlagen, Methoden, Werkzeuge, Anwendungen', May 28-30, 1996, Ev. Akademie
Tutzin
Attempto Controlled English (ACE)
Attempto Controlled English (ACE) allows domain specialists to interactively
formulate requirements specifications in domain concepts. ACE can be accurately
and efficiently processed by a computer, but is expressive enough to allow
natural usage. The Attempto system translates specification texts in ACE into
discourse representation structures and optionally into Prolog. Translated
specification texts are incrementally added to a knowledge base. This knowledge
base can be queried in ACE for verification, and it can be executed for
simulation, prototyping and validation of the specification.Comment: 13 pages, compressed, uuencoded Postscript, to be presented at CLAW
96, The First International Workshop on Controlled Language Applications,
Katholieke Universiteit Leuven, 26-27 March 199
Declarative Specification
Deriving formal specifications from informal requirements is extremely difficult since one has to overcome the conceptual gap between an application domain and the domain of formal specification methods. To reduce this gap we introduce application-specific specification languages, i.e., graphical and textual notations that can be unambiguously mapped to formal specifications in a logic language. We describe a number of realised approaches based on this idea, and evaluate them with respect to their domain specificity vs. generalit
Declarative specifications
Deriving formal specifications from informal requirements is extremely difficult since one has to overcome the conceptual gap between an application domain and the domain of formal specification methods. To reduce this gap we introduce application-specific specification languages, i.e., graphical and textual notations that can be unambiguously mapped to formal specifications in a logic language. We describe a number of realised approaches based on this idea, and evaluate them with respect to their domain specificity vs. generalit
A Rare Case of Toxic Epidermal Necrolysis with Unexpected Fever Resulting from Dengue Virus
Toxic epidermal necrolysis (TEN), also known as Lyell's syndrome, is a life-threatening disease with common development of large wounds. Thus, affected patients are usually treated in specialized centers. Herein, we present a case of TEN in a patient infected with human immunodeficiency virus with the additional, unexpected diagnosis of dengue fever. In this context, we discuss cause, diagnosis, pathology, and treatment of TEN and highlight the role of rare and unexpected findings, as in this case an additional tropical virus infection. We underpin the importance of an interdisciplinary approach involving dermatologists, ophthalmologists, intensive care physicians, burn specialists and various other departments and emphasize the challenge of TEN treatment, especially if rare pathological findings occur
Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors
Quantum Key Distribution with the BB84 protocol has been shown to be
unconditionally secure even using weak coherent pulses instead of single-photon
signals. The distances that can be covered by these methods are limited due to
the loss in the quantum channel (e.g. loss in the optical fiber) and in the
single-photon counters of the receivers. One can argue that the loss in the
detectors cannot be changed by an eavesdropper in order to increase the covered
distance. Here we show that the security analysis of this scenario is not as
easy as is commonly assumed, since already two-photon processes allow
eavesdropping strategies that outperform the known photon-number splitting
attack. For this reason there is, so far, no satisfactory security analysis
available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix
added, references update
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
Post-stroke inhibition of induced NADPH oxidase type 4 prevents oxidative stress and neurodegeneration
Ischemic stroke is the second leading cause of death worldwide. Only one moderately effective therapy exists, albeit with contraindications that exclude 90% of the patients. This medical need contrasts with a high failure rate of more than 1,000 pre-clinical drug candidates for stroke therapies. Thus, there is a need for translatable mechanisms of neuroprotection and more rigid thresholds of relevance in pre-clinical stroke models. One such candidate mechanism is oxidative stress. However, antioxidant approaches have failed in clinical trials, and the significant sources of oxidative stress in stroke are unknown. We here identify NADPH oxidase type 4 (NOX4) as a major source of oxidative stress and an effective therapeutic target in acute stroke. Upon ischemia, NOX4 was induced in human and mouse brain. Mice deficient in NOX4 (Nox4(-/-)) of either sex, but not those deficient for NOX1 or NOX2, were largely protected from oxidative stress, blood-brain-barrier leakage, and neuronal apoptosis, after both transient and permanent cerebral ischemia. This effect was independent of age, as elderly mice were equally protected. Restoration of oxidative stress reversed the stroke-protective phenotype in Nox4(-/-) mice. Application of the only validated low-molecular-weight pharmacological NADPH oxidase inhibitor, VAS2870, several hours after ischemia was as protective as deleting NOX4. The extent of neuroprotection was exceptional, resulting in significantly improved long-term neurological functions and reduced mortality. NOX4 therefore represents a major source of oxidative stress and novel class of drug target for stroke therapy
- …