The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
OpenGIS SQL is a standard for incorporating GIS and spatial concepts into SQL. Two types of methods are part of OpenGIS SQL: (1) boolean methods for topological relationships among spatial objects, and (2) methods for specifying spatial operations. We prove that the complete set of 2-dimensional spatial relationships defined by Egenhofer can all be specified using OpenGIS SQL operations and relationships...
Witness functions have recently been introduced in cryptographic protocols' literature as a new powerful way to prove protocol correctness with respect to secrecy. In this paper, we extend them to the property of authentication. We show how to use them safely and we run an analysis on a modified version of the Woo-Lam protocol. We show that it is correct with respect to authentication.
Integrating access control into business processes is a non-trivial task. This paper presents an approach that combines the UML and B languages for the specification and validation of RBAC policies at the process level. It starts by modeling the access control rules using our extension of UML2 activity diagrams denominated as BAAC@UML (Business Activity Access Control with UML). The BAAC@UML models...
The text analyses the steps to produce and disseminate historical information from image document field in the context of the changes of the document in the digital techniques. The historian is framed as a collector and its gesture as an art of linking dispersed informations. We focused the rythm of the production of pharmaceutical knowledge at the first brazilian school of pharmacy of Ouro Preto,...
There are many famous examples of expert criticism causing untold damage to scientific research. When Minsky noted that a neuron could not perform an exclusive-or he derailed research in artificial neural networks. Fuzzy set theory has attracted expert criticism like few other innovations. Osherson, Smith and Elkan are the critics examined in this paper.
Cloud environments are being increasingly used for deploying and executing business processes to provide a high level of performance with low operating cost. Nevertheless, due to the lack of explicit and formal description of the resource perspective in existing business processes, cloud resources cannot be efficiently and optimally managed. The aim of the present paper is to offer a formal definition...
The reconfigurable composite services (CWSs) can repair itself if any execution problems occur, in order to complete successfully its own execution. The research problem in which we are interested in is how to ensure the correctness of reconfigurable CWSs. This paper proposes an incremental design approach for modeling and verifying reconfigurable CWSs by using EventB. We start by abstractly specifying...
The main issues for the fulfillment service level agreements (SLA) are concerned with problem of variability of QoS properties (vQoS). Indeed, the QoS properties may evolve frequently either because of internal changes or because of workload fluctuations. To solve the vQoS problem, we first introduced three variability operators: replicate, delete and replace. These operators will be used to reconfigure...
Event-B is a formal method which uses first-order logic and set theory as the underlying mathematical notation for specifying and reasoning about discrete systems. Rod in is an Eclipse plug-in that offers a good tool support for Event-B. The aim of this paper consists in applying Event-B and Rod in to prove the non-starvation property of satisfying requests for services in a multi-agent system.
Service based applications leveraging different features are today the underpinnings of enterprise computing. However, current Web services composition systems make only use of functional requirements in the selection process of component Web services while transactional consistency is a crucial parameter of most business applications. In this work, we propose a formal approach for enforcing transactional...
Composite applications leveraging the functionalities offered by Web services are today the underpinnings of enterprise computing. However, current Web services composition systems make only use of functional requirements in the selection process of component Web services, while the transactional consistency and quality of service (QoS) are crucial parameters of most business applications. In this...
At the Large Hadron Collider (LHC) High Energy Physics (HEP) experiment at CERN, 15 PB of raw data is recorded per year. As it was considered inconvenient to store, access and process this data using the traditional hardware and software tools, this data gets reduced to 10-200 TB per year. This paper investigates the applicability of the MapReduce paradigm for analyzing HEP data. In a case study,...
When using visualisations to explore mathematics, I was seduced by their aesthetics. It led me to see them as a form of art and to start to produce mathematical visualisations just for the sake of it. I began to study the interactions between mathematics and art. At the same time, I discovered that mathematicians have a very special way to look to the world. This paper is an account of my research...
Specifying a complex system, such as workflow applications, is a difficult task, which can not be done in one step. The stepwise refinement technique. facilitates the understanding of complex systems by dealing with the major issues before getting involved in the details. This papers presents a refinement based modelling approach of workflow Applications using UML Activity Diagrams. The proposed approach...
Verifying Web service composition in a dynamic environment remains one of the most difficult tasks despite the efforts and the previous proposed research works because new services can be composed during the execution step and others can automatically appear, disappear, or be updated. To achieve the Web service composition specification and verification, we introduce a new concept, called dynamic...
Given the increasing scale and complexity of cyber-attacks, innovative techniques must be developed to effectively respond to intrusions and enable affected software systems to survive security incidents. In this paper, we present a logical framework to model a service migration for software system survivability. A formal logic has been developed for system activity specification in which (1) service...
Computing at LHC is based on the Grid model, where geographically distributed local batch farms are federated using proper middleware. Several computing centers are considering a conversion to private clouds, capable of supporting alternative computing models along with the Grid one: CERN is pioneering such conversion. Computing tasks at LHC are mostly performed using ROOT, a framework for simulation,...
Reliable verification and validation techniques are essential to the development of wireless sensor networks (WSNs) in safety-critical domains. This paper proposes a hybrid verification and validation approach integrating formal methods and simulation to increase the quality of WSN development. Simulation, like model checking, can demonstrate the presence of faults but not guarantee their absence...
This paper presents a formal modeling and proof of a multi-agent system for requesting services, in which agents performs operations concurrently. The concurrent operations made by agents are specified and validated using a formal specification method Event-B.
Due to their distinguishable features, specification and verification of multi-agent systems are non-trivial tasks. In this paper, we present the modeling and verification of event-driven interaction in multi-agent systems. The model is specified and verified using Event-B and the Rodin platform.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.