164 research outputs found

    Specifying Logic Programs in Controlled Natural Language

    Full text link
    Writing specifications for computer programs is not easy since one has to take into account the disparate conceptual worlds of the application domain and of software development. To bridge this conceptual gap we propose controlled natural language as a declarative and application-specific specification language. Controlled natural language is a subset of natural language that can be accurately and efficiently processed by a computer, but is expressive enough to allow natural usage by non-specialists. Specifications in controlled natural language are automatically translated into Prolog clauses, hence become formal and executable. The translation uses a definite clause grammar (DCG) enhanced by feature structures. Inter-text references of the specification, e.g. anaphora, are resolved with the help of discourse representation theory (DRT). The generated Prolog clauses are added to a knowledge base. We have implemented a prototypical specification system that successfully processes the specification of a simple automated teller machine.Comment: 16 pages, compressed, uuencoded Postscript, published in Proceedings CLNLP 95, COMPULOGNET/ELSNET/EAGLES Workshop on Computational Logic for Natural Language Processing, Edinburgh, April 3-5, 199

    Attempto - From Specifications in Controlled Natural Language towards Executable Specifications

    Full text link
    Deriving formal specifications from informal requirements is difficult since one has to take into account the disparate conceptual worlds of the application domain and of software development. To bridge the conceptual gap we propose controlled natural language as a textual view on formal specifications in logic. The specification language Attempto Controlled English (ACE) is a subset of natural language that can be accurately and efficiently processed by a computer, but is expressive enough to allow natural usage. The Attempto system translates specifications in ACE into discourse representation structures and into Prolog. The resulting knowledge base can be queried in ACE for verification, and it can be executed for simulation, prototyping and validation of the specification.Comment: 15 pages, compressed, uuencoded Postscript, to be presented at EMISA Workshop 'Naturlichsprachlicher Entwurf von Informationssystemen - Grundlagen, Methoden, Werkzeuge, Anwendungen', May 28-30, 1996, Ev. Akademie Tutzin

    Attempto Controlled English (ACE)

    Full text link
    Attempto Controlled English (ACE) allows domain specialists to interactively formulate requirements specifications in domain concepts. ACE can be accurately and efficiently processed by a computer, but is expressive enough to allow natural usage. The Attempto system translates specification texts in ACE into discourse representation structures and optionally into Prolog. Translated specification texts are incrementally added to a knowledge base. This knowledge base can be queried in ACE for verification, and it can be executed for simulation, prototyping and validation of the specification.Comment: 13 pages, compressed, uuencoded Postscript, to be presented at CLAW 96, The First International Workshop on Controlled Language Applications, Katholieke Universiteit Leuven, 26-27 March 199

    Declarative Specification

    Get PDF
    Deriving formal specifications from informal requirements is extremely difficult since one has to overcome the conceptual gap between an application domain and the domain of formal specification methods. To reduce this gap we introduce application-specific specification languages, i.e., graphical and textual notations that can be unambiguously mapped to formal specifications in a logic language. We describe a number of realised approaches based on this idea, and evaluate them with respect to their domain specificity vs. generalit

    Declarative specifications

    Get PDF
    Deriving formal specifications from informal requirements is extremely difficult since one has to overcome the conceptual gap between an application domain and the domain of formal specification methods. To reduce this gap we introduce application-specific specification languages, i.e., graphical and textual notations that can be unambiguously mapped to formal specifications in a logic language. We describe a number of realised approaches based on this idea, and evaluate them with respect to their domain specificity vs. generalit

    A Rare Case of Toxic Epidermal Necrolysis with Unexpected Fever Resulting from Dengue Virus

    Get PDF
    Toxic epidermal necrolysis (TEN), also known as Lyell's syndrome, is a life-threatening disease with common development of large wounds. Thus, affected patients are usually treated in specialized centers. Herein, we present a case of TEN in a patient infected with human immunodeficiency virus with the additional, unexpected diagnosis of dengue fever. In this context, we discuss cause, diagnosis, pathology, and treatment of TEN and highlight the role of rare and unexpected findings, as in this case an additional tropical virus infection. We underpin the importance of an interdisciplinary approach involving dermatologists, ophthalmologists, intensive care physicians, burn specialists and various other departments and emphasize the challenge of TEN treatment, especially if rare pathological findings occur

    Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors

    Full text link
    Quantum Key Distribution with the BB84 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can be covered by these methods are limited due to the loss in the quantum channel (e.g. loss in the optical fiber) and in the single-photon counters of the receivers. One can argue that the loss in the detectors cannot be changed by an eavesdropper in order to increase the covered distance. Here we show that the security analysis of this scenario is not as easy as is commonly assumed, since already two-photon processes allow eavesdropping strategies that outperform the known photon-number splitting attack. For this reason there is, so far, no satisfactory security analysis available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix added, references update

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Post-stroke inhibition of induced NADPH oxidase type 4 prevents oxidative stress and neurodegeneration

    Get PDF
    Ischemic stroke is the second leading cause of death worldwide. Only one moderately effective therapy exists, albeit with contraindications that exclude 90% of the patients. This medical need contrasts with a high failure rate of more than 1,000 pre-clinical drug candidates for stroke therapies. Thus, there is a need for translatable mechanisms of neuroprotection and more rigid thresholds of relevance in pre-clinical stroke models. One such candidate mechanism is oxidative stress. However, antioxidant approaches have failed in clinical trials, and the significant sources of oxidative stress in stroke are unknown. We here identify NADPH oxidase type 4 (NOX4) as a major source of oxidative stress and an effective therapeutic target in acute stroke. Upon ischemia, NOX4 was induced in human and mouse brain. Mice deficient in NOX4 (Nox4(-/-)) of either sex, but not those deficient for NOX1 or NOX2, were largely protected from oxidative stress, blood-brain-barrier leakage, and neuronal apoptosis, after both transient and permanent cerebral ischemia. This effect was independent of age, as elderly mice were equally protected. Restoration of oxidative stress reversed the stroke-protective phenotype in Nox4(-/-) mice. Application of the only validated low-molecular-weight pharmacological NADPH oxidase inhibitor, VAS2870, several hours after ischemia was as protective as deleting NOX4. The extent of neuroprotection was exceptional, resulting in significantly improved long-term neurological functions and reduced mortality. NOX4 therefore represents a major source of oxidative stress and novel class of drug target for stroke therapy
    • …
    corecore