60 results on '"French, Tim"'
Search Results
2. Automatic semantic knowledge extraction from electronic forms.
- Author
-
Wu, Haolin, French, Tim, Liu, Wei, and Hodkiewicz, Melinda
- Published
- 2024
- Full Text
- View/download PDF
3. The Expressivity of Quantified Group Announcements.
- Author
-
Alechina, Natasha, Ditmarsch, Hans van, French, Tim, and Galimullin, Rustam
- Subjects
SELF-expression ,PUBLIC communication ,ANNOUNCEMENTS ,COALITIONS - Abstract
Group announcement logic (GAL) and coalition announcement logic (CAL) allow us to reason about whether it is possible for groups and coalitions of agents to achieve their desired epistemic goals through truthful public communication. The difference between groups and coalitions in such a context is that the latter make their announcements in the presence of possible adversarial counter-announcements. As epistemic goals may involve some agents remaining ignorant, counter-announcements may preclude coalitions from reaching their goals. We study the relative expressivity of GAL and CAL and provide some results involving their more well-known sibling APAL. We also discuss how the presence of memory alters the relationship between groups and coalition. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. An ontology for maintenance procedure documentation.
- Author
-
Woods, Caitlin, French, Tim, Hodkiewicz, Melinda, and Bikaun, Tyler
- Subjects
ONTOLOGY ,MANUFACTURING processes ,ONTOLOGIES (Information retrieval) ,DOCUMENTATION ,ENGINEERING models ,PLANT maintenance ,MAINTENANCE - Abstract
In mining, manufacturing and industrial process industries, maintenance procedures are used as an aid to guide technicians through complex manual tasks. These procedures are not machine-readable, and cannot support reasoning in digitally integrated manufacturing systems. Procedure documents contain unstructured text and are stored in a variety of formats. The aim of this work is to query information held in real industrial maintenance procedures. To achieve this, we develop an ontology for maintenance procedures using the OWL 2 description language. We leverage classes and object properties from the ISO 15926 Part 14 Upper Ontology and create a domain ontology. The key contribution of this paper is a demonstration of trade-offs required when modelling an existing engineering artifact, where an abstraction of its contents is given a-priori. We provide an ontologically rigorous abstraction of notions captured in procedure documentation to a set of classes, relations and axioms that allow reasoning over the contents. Validation of the ontology is performed via a series of competency questions based on queries relevant to technicians, engineers and schedulers in industry. The ontology is applied to real world maintenance procedures from two industrial organisations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Homologous Recombination Deficiency: Concepts, Definitions, and Assays.
- Author
-
Stewart, Mark D, Vega, Diana Merino, Arend, Rebecca C, Baden, Jonathan F, Barbash, Olena, Beaubier, Nike, Collins, Grace, French, Tim, Ghahramani, Negar, Hinson, Patsy, Jelinic, Petar, Marton, Matthew J, McGregor, Kimberly, Parsons, Jerod, Ramamurthy, Lakshman, Sausen, Mark, Sokol, Ethan S, Stenzinger, Albrecht, Stires, Hillary, and Timms, Kirsten M
- Subjects
BIOMARKERS ,ADENOSINE diphosphate ,CANCER chemotherapy ,BRCA genes ,ANTIVIRAL agents ,METABOLIC disorders ,DNA repair ,PHENOTYPES - Abstract
Background Homologous recombination deficiency (HRD) is a phenotype that is characterized by the inability of a cell to effectively repair DNA double-strand breaks using the homologous recombination repair (HRR) pathway. Loss-of-function genes involved in this pathway can sensitize tumors to poly(adenosine diphosphate [ADP]-ribose) polymerase (PARP) inhibitors and platinum-based chemotherapy, which target the destruction of cancer cells by working in concert with HRD through synthetic lethality. However, to identify patients with these tumors, it is vital to understand how to best measure homologous repair (HR) status and to characterize the level of alignment in these measurements across different diagnostic platforms. A key current challenge is that there is no standardized method to define, measure, and report HR status using diagnostics in the clinical setting. Methods Friends of Cancer Research convened a consortium of project partners from key healthcare sectors to address concerns about the lack of consistency in the way HRD is defined and methods for measuring HR status. Results This publication provides findings from the group's discussions that identified opportunities to align the definition of HRD and the parameters that contribute to the determination of HR status. The consortium proposed recommendations and best practices to benefit the broader cancer community. Conclusion Overall, this publication provides additional perspectives for scientist, physician, laboratory, and patient communities to contextualize the definition of HRD and various platforms that are used to measure HRD in tumors. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. QUANTIFYING OVER BOOLEAN ANNOUNCEMENTS.
- Author
-
VAN DITMARSCH, HANS and FRENCH, TIM
- Subjects
ANNOUNCEMENTS ,LOGIC - Abstract
Various extensions of public announcement logic have been proposed with quantification over announcements. The best-known extension is called arbitrary public announcement logic, APAL. It contains a primitive language construct ...φ intuitively expressing that \after every public announcement of a formula, formula φ is true". The logic APAL is undecidable and it has an infinitary axiomatization. Now consider restricting the APAL quantification to public announcements of Boolean formulas only, such that ...φ intuitively expresses that \after every public announcement of a Boolean formula, formula φ is true". This logic can therefore be called Boolean arbitrary public announcement logic, BAPAL. The logic BAPAL is the subject of this work. Unlike APAL it has a infinitary axiomatization. Also, BAPAL is not at least as expressive as APAL. A further claim that BAPAL is decidable is deferred to a companion paper. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
7. Positive Announcements.
- Author
-
van Ditmarsch, Hans, French, Tim, and Hales, James
- Abstract
Arbitrary public announcement logic ( APAL ) reasons about how the knowledge of a set of agents changes after true public announcements and after arbitrary announcements of true epistemic formulas. We consider a variant of arbitrary public announcement logic called positive arbitrary public announcement logic ( A P A L + ), which restricts arbitrary public announcements to announcement of positive formulas. Positive formulas prohibit statements about the ignorance of agents. The positive formulas correspond to the universal fragment in first-order logic. As two successive announcements of positive formulas need not correspond to the announcement of a positive formula, A P A L + is rather different from APAL . We show that A P A L + is more expressive than public announcement logic PAL , and that A P A L + is incomparable with APAL . We also provide a sound and complete infinitary axiomatisation. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
8. Modelling Systems over General Linear Time.
- Author
-
McCabe-Dansted, John, Reynolds, Mark, and French, Tim
- Published
- 2016
- Full Text
- View/download PDF
9. A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks.
- Author
-
Epiphaniou, Gregory, French, Tim, Al-Khateeb, Haider, Dehghantanha, Ali, and Jahankhani, Hamid
- Published
- 2016
- Full Text
- View/download PDF
10. The World ˵Wild″ Web: Cyber-Security Intelligence Gathering Opportunities from the ˵Dark″ Side.
- Author
-
French, Tim and Epiphaniou, Gregory
- Published
- 2015
- Full Text
- View/download PDF
11. A complete axiomatization of a temporal logic with obligation and robustness.
- Author
-
FRENCH, TIM, MCCABE-DANSTED, JOHN C., and REYNOLDS, MARK
- Subjects
ROBUST statistics ,AXIOMS ,COMPLETENESS theorem ,LOGIC ,DEONTIC logic - Abstract
RoCTL* was proposed to model and specify the robustness of reactive systems. RoCTL* extended CTL* with the addition of Obligatory and Robustly operators, which quantify over failure-free paths and paths with one more failure, respectively. This article gives an axiomatization for all the operators of RoCTL* with the exception of the Until operator; this fragment is able to express similar contrary-to-duty obligations to the full RoCTL* logic. We call this formal system NORA, and give a completeness proof. We also consider the fragments of the language containing only path quantifiers but where atoms are dependent on histories. We examine semantic properties and potential axiomatizations for these fragments. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
12. Learning Time Delay Mealy Machines From Programmable Logic Controllers.
- Author
-
Caldwell, Ben, Cardell-Oliver, Rachel, and French, Tim
- Subjects
PROGRAMMABLE controllers ,MACHINE learning ,TIME delay systems ,COMPUTER software ,MATHEMATICAL models - Abstract
Programmable logic controllers (PLCs) are computers that are hardened for industrial environments and have I/O that are used to monitor and control a physical process. Learning automata specifications from PLCs provides an interface to verification tools that use an automata language, such as Uppaal. This paper introduces the time delay Mealy machine and demonstrates that it is sufficiently expressive to model PLC software. Using the LearnLib library, we implement a custom learning method to learn models from several industrial examples and analyze the efficiency. We show that the method is able to learn from simple PLC software, but the time required to learn increases rapidly with the scale of the software. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
13. Characterization of FGFR1 Locus in sqNSCLC Reveals a Broad and Heterogeneous Amplicon.
- Author
-
Rooney, Claire, Geh, Catherine, Williams, Victoria, Heuckmann, Johannes M., Menon, Roopika, Schneider, Petra, Al-Kadhimi, Katherine, Dymond, Michael, Smith, Neil R., Baker, Dawn, French, Tim, Smith, Paul D., Harrington, Elizabeth A., Barrett, J. Carl, and Kilgour, Elaine
- Subjects
NON-small-cell lung carcinoma ,FIBROBLAST growth factor receptors ,DNA copy number variations ,GENE expression ,STATISTICAL correlation ,BIOMARKERS ,MESSENGER RNA ,GENE amplification ,GENETICS - Abstract
FGFR1 amplification occurs in ~20% of sqNSCLC and trials with FGFR inhibitors have selected FGFR1 amplified patients by FISH. Lung cancer cell lines were profiled for sensitivity to AZD4547, a potent, selective inhibitor of FGFRs 1–3. Sensitivity to FGFR inhibition was associated with but not wholly predicted by increased FGFR1 gene copy number. Additional biomarker assays evaluating expression of FGFRs and correlation between amplification and expression in clinical tissues are therefore warranted. We validated nanoString for mRNA expression analysis of 194 genes, including FGFRs, from clinical tumour tissue. In a panel of sqNSCLC tumours 14.4% (13/90) were FGFR1 amplified by FISH. Although mean FGFR1 expression was significantly higher in amplified samples, there was significant overlap in the range of expression levels between the amplified and non-amplified cohorts with several non-amplified samples expressing FGFR1 to levels equivalent to amplified samples. Statistical analysis revealed increased expression of FGFR1 neighboring genes on the 8p12 amplicon (BAG4, LSM1 and WHSC1L1) in FGFR1 amplified tumours, suggesting a broad rather than focal amplicon and raises the potential for codependencies. High resolution aCGH analysis of pre-clinical and clinical samples supported the presence of a broad and heterogeneous amplicon around the FGFR1 locus. In conclusion, the range of FGFR1 expression levels in both FGFR1 amplified and non-amplified NSCLC tissues, together with the breadth and intra-patient heterogeneity of the 8p amplicon highlights the need for gene expression analysis of clinical samples to inform the understanding of determinants of response to FGFR inhibitors. In this respect the nanoString platform provides an attractive option for RNA analysis of FFPE clinical samples. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
14. Accelerating worst case execution time analysis of timed automata models with cyclic behaviour.
- Author
-
Al-Bataineh, Omar, Reynolds, Mark, and French, Tim
- Subjects
MACHINE theory ,ROBOTS ,MATHEMATICAL models ,ALGORITHMS ,ALGEBRA - Abstract
The paper presents a new efficient algorithm for computing worst case execution time (WCET) of systems modelled as timed automata (TA). The algorithm uses a set of abstraction techniques that improve significantly the efficiency of WCET analysis of TA models with cyclic behaviour. We show that the proposed abstractions are exact with respect to the WCET problem in the sense that the WCET computed in the abstract model is equal to the one computed in the concrete model. We also compare our algorithm with the one implemented in the model checker UPPAAL which shows that when infinite cycles exist (i.e. cycles that can be run infinitely often), UPPAAL's algorithm may not terminate, and when largely repetitive finite cycles exist (i.e. cycles that can be run a large number of times but finite), UPPAAL's algorithm suffers from the state space explosion, thus leading to a low efficiency or resource exhaustion. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
15. Finding Best and Worst Case Execution Times of Systems Using Difference-Bound Matrices.
- Author
-
Al-Bataineh, Omar, Reynolds, Mark, and French, Tim
- Published
- 2014
- Full Text
- View/download PDF
16. Expressiveness and succinctness of a logic of robustness.
- Author
-
McCabe-Dansted, John C., French, Tim, Pinchinat, Sophie, and Reynolds, Mark
- Subjects
REASONING ,CRITICAL thinking ,THOUGHT & thinking - Abstract
This paper compares the recently proposed Robust Full Computational Tree Logic (RoCTL*) to model robustness in concurrent systems with other computational tree logic (CTL*)-based logics. RoCTL* extends CTL* with the addition of the operators Obligatory and Robustly, which quantify over failure-free paths and paths with one more failure respectively. This paper focuses on examining the succinctness and expressiveness of RoCTL* by presenting translations to and from RoCTL*. The core result of this paper is to show that RoCTL* is expressively equivalent to CTL* but is non-elementarily more succinct. That is, RoCTL* does not add any expressive power over CTL*, but can represent some properties using vastly reduced formulae. We present a translation from RoCTL* into CTL* that preserves truth but may result in non-elementary growth in the length of the translated formula, as each nested Robustly operator may result in an extra exponential blowup. However, we show that this translation is optimal in the sense that any equivalence-preserving translation will require an extra exponential growth per nested Robustly. Note that this result has to do with the length of the translated formula. It has not been proved that there is no elementary decision procedure for RoCTL*; it is only known that RoCTL* must be at least as hard as CTL* (i.e., double exponential). We also compare RoCTL* to Quantified CTL* (QCTL*) and hybrid logics. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
17. An Efficient Tableau for Linear Time Temporal Logic.
- Author
-
Bian, Ji, French, Tim, and Reynolds, Mark
- Published
- 2013
- Full Text
- View/download PDF
18. Online learning classifiers in dynamic environments with incomplete feedback.
- Author
-
Behdad, Mohammad and French, Tim
- Published
- 2013
- Full Text
- View/download PDF
19. Verifying Temporal Properties in Real Models.
- Author
-
French, Tim, McCabe-Dansted, John, and Reynolds, Mark
- Published
- 2013
- Full Text
- View/download PDF
20. Model Checking General Linear Temporal Logic.
- Author
-
French, Tim, McCabe-Dansted, John, and Reynolds, Mark
- Published
- 2013
- Full Text
- View/download PDF
21. Indiscrete Models: Model Building and Model Checking over Linear Time.
- Author
-
French, Tim, McCabe-Dansted, John, and Reynolds, Mark
- Published
- 2013
- Full Text
- View/download PDF
22. Complexity of Model Checking over General Linear Time.
- Author
-
French, Tim, McCabe-Dansted, John, and Reynolds, Mark
- Published
- 2013
- Full Text
- View/download PDF
23. An Algebraic System of Temporal Structures.
- Author
-
French, Tim, McCabe-Dansted, John, and Reynolds, Mark
- Published
- 2013
- Full Text
- View/download PDF
24. Culture and e-Culture through a semiotic lens: E-banking localization.
- Author
-
French, Tim and Conrad, Marc
- Abstract
Intangible trust perceptions have been shown to form an important part of the User Experience (UX) in relation to various B2C (Business-to-Customer) contexts of use. The extant literature appears somewhat immature in relation to intangible trust and UX models from a “non-Western” perspective. Indeed it appears from our recent e-Banking audit using a novel cross-cultural Expert evaluation instrument that too often “Western” Banks (such as Deutsche Bank) rely on perceptions of “Eastern” cultures viewed through a lens that relies on stereotypical images, signs and Western style templates. We compare two contrasting e-Bank site localization design paradigms: namely that of Deutsche Bank and HSBC with respect to two target audiences: namely China and Taiwan. The findings of the e-Culture audit are aligned to the ubiquitous set of cultural dimensions first defined by Geert Hofstede. This alignment appears to show that the “Western” stereotypical paradigm is not in alignment with either Hofstede's Individualism/Collectivism metric nor with normative semiotic signs that reflect vibrant local urban street cultures. We go on to suggest that the use of card-sorting may speculatively be used to better engender localized sites that are aligned to local target. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
25. How far can automatic translation engines be used as a tool for stylistic analysis?
- Author
-
Crosbie, Tess, French, Tim, and Conrad, Marc
- Abstract
This pilot study investigates the potential of automatic translation engines to be used as a tool for literary stylistic analysis. By translating from English into one of 62 languages and then re-translating back into English, the resulting texts were compared with a stylistic analysis of the original. Although the similarity index varied widely between languages - between 90% and 32.9% - many stylistic features were retained. However, more subtle features of the texts were lost in the translation process. The similarity index gives a good indication of the literary subtlety / quality of the text, suggesting that this process may be useful as a preliminary “filtering” technique in deeper stylistic studies. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
26. A Two-Level Prioritization Approach for Regression Testing of Web Applications.
- Author
-
Garg, Deepak, Datta, Amitava, and French, Tim
- Abstract
A test case prioritization technique reschedules test cases for regression testing in an order to achieve specific goals like early fault detection. We propose a new two level prioritization approach to prioritize test cases for web applications as a whole. Our approach automatically selects modified functionalities in a web application and executes test cases on the basis of the impact of modified functionalities. We suggest several new prioritization strategies for web applications and examine whether these prioritization strategies improve the rate of fault detection for web applications. We propose a new automated test suite prioritization model for web applications that selects test cases related to modified functionalities and reschedules them using our new prioritization strategies to detect faults early in test suite execution. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
27. Towards a Context-Aware and Adaptable Room System for Intelligent "Trusted" Office-Spaces in Smart Cities.
- Author
-
French, Tim and Bessis, Nik
- Abstract
This visionary paper outlines a future intelligent building office space room system that seeks to ensure that the users of a rent able and/or shared office space do not perform actions that are likely to compromise IT security. We propose that a novel room agent leverages the emergent"smart" city paradigm so as to form an accurate a measure as possible of the trustworthiness of the human agents using the office space. Namely, by leveraging pervasive urban sensors embedded in a smart city built environment, data obtained by crowd sourcing as well as data gathered via Web 2.0. Human actions detected within the room itself and its immediate environs, together with the behavioural traces and patterns of a given individual embedded within a smart city context, can be used to calculate a measurable confidence trust level. We suggest that the use of a Linking Open (or object) Data (LOD) publishing approach can be used to integrate trust related distributed data in a collective and intelligent manner. Furthermore, we suggest the use of cloud diagram and tree map visualisation approaches to depict individual and environs trust levels at both coarse and fine grain levels. To achieve this, we illustrate the approach using a low-level architecture model. We then conclude by outlining our theoretical lightweight trust model which aims to demonstrate how a smart city in general and a smart space in particular can provide an increased level of trust visualisation for it's citizens, through collective intelligence gathering. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
28. Formal Modeling and Analysis of a Distributed Transaction Protocol in UPPAAL.
- Author
-
Al-Bataineh, Omar, French, Tim, and Woodings, Terry
- Abstract
We present a formal analysis of the well-known two phase atomic commitment protocol. The protocol is modeled as networks of timed automata using the model checker UPPAAL. The protocol has been verified in two different crash models, the crash-stop model, and the crash-recovery model. The paper also describes how dense-timed model checking technology may be applied to discover the worst case execution time and the corresponding worst-case scenario of the protocol. The analysis also allows us to illustrate various features of the UPPAAL tool, which shows that the specification language of the tool lacks the expressiveness to capture some desired properties of the protocol. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
29. PCA for improving the performance of XCSR in classification of high-dimensional problems.
- Author
-
Behdad, Mohammad, French, Tim, Barone, Luigi, and Bennamoun, Mohammed
- Published
- 2011
- Full Text
- View/download PDF
30. Becoming Aware of Propositional Variables.
- Author
-
van Ditmarsch, Hans and French, Tim
- Abstract
We examine a logic that combines knowledge, awareness, and change of awareness. Change of awareness involves that an agent becomes aware of propositional variables. We show that the logic is decidable, and we present a complete axiomatization. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
31. An investigation of real-valued accuracy-based learning classifier systems for electronic fraud detection.
- Author
-
Behdad, Mohammad, Barone, Luigi, French, Tim, and Bennamoun, Mohammed
- Published
- 2010
- Full Text
- View/download PDF
32. Considering Patterns in Class Interactions Prediction.
- Author
-
Kama, Nazri, French, Tim, and Reynolds, Mark
- Abstract
Impact analysis has been defined as an activity of assessing the potential consequences of making a set of changes to software artifacts. Several approaches have been developed including performing impact analysis on a reflected model of class interactions analysis using class interactions prediction. One of the important elements in developing the reflected model is a consideration of any design pattern that the software employs. In this paper we propose a new class interactions prediction approach that includes a basic pattern analysis i.e., Boundary-Controller-Entity (BCE) pattern in its prediction process. To demonstrate the importance of the pattern consideration in the prediction process, a comparison between the new approach (with pattern consideration) and two selected current approaches (without pattern consideration) were conducted. The contributions of the paper are two-fold: (1) a new class interactions prediction approach; and (2) evaluation results show the new approach gives better accuracy of class interactions prediction than the selected current approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
33. Axioms for Obligation and Robustness with Temporal Logic.
- Author
-
French, Tim, McCabe-Dansted, John C., and Reynolds, Mark
- Abstract
RoCTL* was proposed to model and specify the robustness of reactive systems. RoCTL* extended CTL* with the addition of Obligatory and Robustly operators, which quantify over failure-free paths and paths with one more failure respectively. This paper gives an axiomatisation for all the operators of RoCTL* with the exception of the Until operator; this fragment is able to express similar contrary-to-duty obligations to the full RoCTL* logic. We call this formal system NORA, and give a completeness proof. We also consider the fragments of the language containing only path quantifiers (but where variables are dependent on histories). We examine semantic properties and potential axiomatisations for these fragments. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
34. Awareness and Forgetting of Facts and Agents.
- Author
-
Ditmarsch, Hans van and French, Tim
- Published
- 2009
- Full Text
- View/download PDF
35. Simulation and Information: Quantifying over Epistemic Events.
- Author
-
van Ditmarsch, Hans and French, Tim
- Abstract
We introduce a multi-agent logic of knowledge with time where Fφ stands for ˵there is an informative event after which φ.″ Formula Fφ is true in a model iff it is true in all its refinements (i.e., atoms and back are satisfied; the dual of simulation). The logic is almost normal, and positive knowledge is preserved. The meaning of Fφ is also ˵after the agents become aware of new factual information, φ is true,″ and on finite models it is also ˵there is an event model (M,s) after which φ.″ The former provides a correspondence with bisimulation quantifiers in a setting with epistemic operators. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
36. A Temporal Logic of Robustness.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Konev, Boris, Wolter, Frank, French, Tim, Mc Cabe-Dansted, John C., and Reynolds, Mark
- Abstract
It can be desirable to specify polices that require a system to achieve some outcome even if a certain number of failures occur. This paper proposes a logic, RoCTL*, which extends CTL* with operators from Deontic logic, and a novel operator referred to as "Robustly". This novel operator acts as variety of path quantifier allowing us to consider paths which deviate from the desired behaviour of the system. Unlike most path quantifiers, the Robustly operator must be evaluated over a path rather than just a state; the Robustly operator quantifies over paths produced from the current path by altering a single step. The Robustly operator roughly represents the phrase "even if an additional failure occurs now or in the future". This paper examines the expressivity of this new logic, motivates its use and shows that it is decidable. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
37. Idempotent Transductions for Modal Logics.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Konev, Boris, Wolter, Frank, and French, Tim
- Abstract
We investigate the extension of modal logics by bisimulation quantifiers and present a class of modal logics which is decidable when augmented with bisimulation quantifiers. These logics are refered to as the idempotent transduction logics and are defined using the programs of propositional dynamic logic including converse and tests. This is a nontrivial extension of the decidability of the positive idempotent transduction logics which do not use converse operators in the programs (French, 2006). This extension allows us to apply bisimulation quantifiers to, for example, logics of knowledge, logics of belief and tense logics. We show the idempotent transduction logics preserve the axioms of propositional quantification and are decidable. The definition of idempotent transduction logics allows us to apply these results to a number of combined modal logics with a variety of interactions between modalities. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
38. Semiotic Models of Trust and Usability for Agent-Managed Grid Services.
- Author
-
French, Tim, Huang, Wei, Hill, Richard, and Polovina, Simon
- Abstract
This paper seeks to build upon existing work concerning the role of ˵soft″ issues including trust and usability in the context of Grid services. Previous research has suggested that there is a trust `gap΄. Without seeking to engender intangible trust, usability needs cannot be met effectively. Trust formation is a precursor of usability not only at the point of first contact with Grid services but also as an integral part of the user experience. Whilst tangible security aspects of Grid services are relatively well understood, intangible aspects of trust, are less well developed. The contribution offered here aims to fill the trust `gap΄ using Stamper΄s semiotic ladder. Consequently, a tailored HCI is identified to meet the usability and trust needs of a potentially diverse Grid user-community. The use of this approach is accordingly offered as means of satisfying the demands of a user-centric agent to fulfil this role. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
39. Non-Repudiable and Repudiable Authentications in E-Systems.
- Author
-
Yan, Song Y and French, Tim
- Abstract
Authentication and non-repudiation are intimately related to each other. In fact, a good authentication scheme must have the property of non-repudiation, otherwise the authentication scheme may not be very useful in practice since the signatory can deny his signature later. This may, however, not be the case for some advanced e-voting systems where non-repudiation should in fact be avoided whenever possible, since for the purpose of privacy. the e-voter does not want to disclose his authorship. Nevertheless, the authorship is veriffiable by the author if needed. In this paper, we propose two implementations for two types of authentication: 1) non-repudiable authentication in a scientiffic computing environment: computing the complex zeros of the Riemann
3 -function or verifying the Goldbach΄s conjecture, and 2) repudiable authentications in an e-voting environment. The security of the ffirst implementation is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP), whereas the second is based on the intractability of the Quadratic Residuosity Problem (QRP). [ABSTRACT FROM AUTHOR]- Published
- 2007
- Full Text
- View/download PDF
40. The DarkWeb: Cyber-Security Intelligence Gathering Opportunities, Risks and Rewards.
- Author
-
Epiphaniou, Gregory, French, Tim, and Maple, Carsten
- Subjects
INTERNET security ,ARTIFICIAL intelligence ,CYBERTERRORISM ,SIGNAL processing ,PREDICTION models - Abstract
We offer a partial articulation of the threats and opportunities posed by the so-called Dark Web (DW). We go on to propose a novel DW attack detection and prediction model. Signalling aspects are considered wherein the DW is seen to comprise a low cost signaling environment. This holds inherent dangers as well as rewards for investigators as well as those with criminal intent. Suspected DW perpetrators typically act entirely in their own self-interest (e.g. illicit financial gain, terrorism, propagation of extremist views, extreme forms of racism, pornography, and politics; so-called 'radicalisation'). DW investigators therefore need to be suitably risk aware such that the construction of a credible legally admissible, robust evidence trail does not expose investigators to undue operational or legal risk. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
41. Semantics for Knowledge and Change of Awareness.
- Author
-
Ditmarsch, Hans and French, Tim
- Subjects
AWARENESS ,SEMANTICS research ,MODAL logic ,THEORY of knowledge ,LOGIC - Abstract
We examine various logics that combine knowledge, awareness, and change of awareness. An agent can become aware of propositional propositions but also of other agents or of herself. The dual operation to becoming aware, forgetting, can also be modelled. Our proposals are based on a novel notion of structural similarity that we call awareness bisimulation, the obvious notion of modal similarity for structures encoding knowledge and awareness. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
42. The impact of germline mutations on targeted therapy.
- Author
-
Smith, Simon A, French, Tim, and Hollingsworth, Simon J
- Abstract
Targeted therapies provide clinical benefit and improved therapeutic index. They have a growing prominence in patient management and focus in drug development. Their development is fuelled by our deepening knowledge of complex disease phenotypes and the need for improvement in new therapeutic efficacy. Extrapolation of the biological discovery through to new therapy targeting the causal biological variants to drive clinical gain is challenging. Here, we review the impact of germline mutations on targeted therapies. Historically, germline changes have contributed most to our understanding of disease mechanisms, drug metabolism and exposure, the latter of which has enabled safer positioning of therapies, such as clopidogrel and irinotecan. Similarly, prescreening for germline variants can avoid potentially fatal hypersensitivity reactions with abacavir. However, germline mutations continue to emerge as a central player in targeting therapeutics; ivacaftor drives partial restoration of mucus secretion in cystic fibrosis patients harbouring specific mutations, and treatment with olaparib exploits germline mutations in BRCA genes to drive synthetic lethality as an anti-cancer mechanism. Central is definition of the causal link, association or contribution to the biological variance - and that we believe it is drugable for therapeutic gain. The demand for better therapies to treat modern diseases provides the appetite for continued investigation of the biological variance associated with germline mutations, inevitably leading to increased impact on the development of targeted therapeutics. Copyright © 2013 Pathological Society of Great Britain and Ireland. Published by John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
43. New test case prioritization strategies for regression testing of web applications.
- Author
-
Garg, Deepak, Datta, Amitava, and French, Tim
- Abstract
A test case prioritization technique reschedules test cases for regression testing in an order to achieve specific goals like early fault detection. Currently, black box testing of web applications requires manual prioritization of test cases which is very time consuming. We propose a new two level prioritization approach to prioritize test cases for web applications as a whole. Our approach selects modified functionalities in a web application and automatically executes test cases on the basis of the impact of modified functionalities. We suggest several new prioritization strategies for web applications and examine whether these prioritization strategies improve the rate of fault detection for web applications. We propose a new test suite prioritization model for web applications that detects modified functionalities, selects test cases related to those functionalities and reschedules them to detect faults early in test suite execution. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
44. Reprint of a process model for developing usable cross-cultural websites
- Author
-
Smith, Andy, Dunckley, Lynne, French, Tim, Minocha, Shailey, and Chang, Yu
- Subjects
WEBSITES ,CROSS-cultural studies ,WEB development ,COMPUTER-aided design ,APPLICATION software ,GRAPHICAL user interfaces ,PROGRAMMING languages ,INFORMATION technology auditing - Abstract
Abstract: In this paper we present a process model for developing usable cross-cultural websites. Compatible with ISO 13407, the process model documents an abstraction of the design process focusing on cultural issues in development. It provides a framework in which a variety of user-based and expert-based techniques for analysis and design are placed within the life-cycle of website development. In developing the model, we relate practical approaches to design with theories and models of culture and discuss the relevance of such theories to the practical design process. In particular we focus on four key concerns: how an audit of local website attractors can inform the design process; the concept of a cultural fingerprint to contrast websites with the cultural needs of local users; the problems associated with user evaluation; and cross-cultural team development. We then show their relation to our process model. We conclude by summarising our contribution to date within the field. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
45. On principal component analysis for high-dimensional XCSR.
- Author
-
Behdad, Mohammad, French, Tim, Barone, Luigi, and Bennamoun, Mohammed
- Abstract
XCSR is an accuracy-based learning classifier system which can handle classification problems with real-value features. However, as the number of features increases, a high classification accuracy comes at the cost of more resources: larger population sizes and longer computational running times. In this paper we investigate PCA-XCSR (a sequential application of PCA and XCSR) in three environments with different characteristics: a discrete and imbalanced environment (KDD'99 network intrusion), a continuous and highly symmetric environment (MiniBooNE), and a highly discrete, highly imbalanced environment (Census/Income (KDD)). These experiments show that in the three different environments, PCA-XCSR, in addition to being able to reduce the computational resources and time requirements of XCSR by approximately 50 %, is able to consistently maintain its high accuracy. In addition to that, it reduces the required population size needed by XCSR. Also, we suggest heuristics for selecting the number of principal components to use when using PCA-XCSR. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
46. On XCSR for electronic fraud detection.
- Author
-
Behdad, Mohammad, Barone, Luigi, French, Tim, and Bennamoun, Mohammed
- Abstract
Fraud is a serious problem that costs the worldwide economy billions of dollars annually. However, fraud detection is difficult as perpetrators actively attempt to mask their actions, among typically overwhelming large volumes of, legitimate activity. In this paper, we investigate the fraud detection problem and examine how learning classifier systems can be applied to it. We describe the common properties of fraud, introducing an abstract problem which can be tuned to exhibit those characteristics. We report experiments on this abstract problem with a popular real-time learning classifier system algorithm; results from our experiments demonstrating that this approach can overcome the difficulties inherent to the fraud detection problem. Finally we apply the algorithm to a real-world problem and show that it can achieve good performance in this domain. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
47. Subtypes of primary colorectal tumors correlate with response to targeted treatment in colorectal cell lines.
- Author
-
Schlicker, Andreas, Beran, Garry, Chresta, Christine M., McWalter, Gael, Pritchard, Alison, Weston, Susie, Runswick, Sarah, Davenport, Sara, Heathcote, Kerry, Alferez Castro, Denis, Orphanides, George, French, Tim, and A. Wessels, Lodewyk F.
- Subjects
CELL culture ,CELL lines ,CANCER patients ,GENE expression ,COLON cancer ,GENETIC regulation - Abstract
Background: Colorectal cancer (CRC) is a heterogeneous and biologically poorly understood disease. To tailor CRC treatment, it is essential to first model this heterogeneity by defining subtypes of patients with homogeneous biological and clinical characteristics and second match these subtypes to cell lines for which extensive pharmacological data is available, thus linking targeted therapies to patients most likely to respond to treatment. Methods: We applied a new unsupervised, iterative approach to stratify CRC tumor samples into subtypes based on genome-wide mRNA expression data. By applying this stratification to several CRC cell line panels and integrating pharmacological response data, we generated hypotheses regarding the targeted treatment of different subtypes. Results: In agreement with earlier studies, the two dominant CRC subtypes are highly correlated with a gene expression signature of epithelial-mesenchymal-transition (EMT). Notably, further dividing these two subtypes using iNMF (iterative Non-negative Matrix Factorization) revealed five subtypes that exhibit activation of specific signaling pathways, and show significant differences in clinical and molecular characteristics. Importantly, we were able to validate the stratification on independent, published datasets comprising over 1600 samples. Application of this stratification to four CRC cell line panels comprising 74 different cell lines, showed that the tumor subtypes are well represented in available CRC cell line panels. Pharmacological response data for targeted inhibitors of SRC, WNT, GSK3b, aurora kinase, PI3 kinase, and mTOR, showed significant differences in sensitivity across cell lines assigned to different subtypes. Importantly, some of these differences in sensitivity were in concordance with high expression of the targets or activation of the corresponding pathways in primary tumor samples of the same subtype. Conclusions: The stratification presented here is robust, captures important features of CRC, and offers valuable insight into functional differences between CRC subtypes. By matching the identified subtypes to cell line panels that have been pharmacologically characterized, it opens up new possibilities for the development and application of targeted therapies for defined CRC patient sub-populations. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
48. Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring.
- Author
-
French, Tim, Bessis, Nik, Maple, Carsten, and Asimakopoulou, Eleana
- Published
- 2012
- Full Text
- View/download PDF
49. Automatic extraction of angiogenesis bioprocess from text.
- Author
-
Wang, Xinglong, McKendrick, Iain, Barrett, Ian, Dix, Ian, French, Tim, Tsujii, Jun'ichi, and Ananiadou, Sophia
- Subjects
DRUG design ,DRUG development ,DATABASE searching ,BLOOD-vessel development ,NEOVASCULARIZATION ,MACHINE learning ,EVALUATION - Abstract
Motivation: Understanding key biological processes (bioprocesses) and their relationships with constituent biological entities and pharmaceutical agents is crucial for drug design and discovery. One way to harvest such information is searching the literature. However, bioprocesses are difficult to capture because they may occur in text in a variety of textual expressions. Moreover, a bioprocess is often composed of a series of bioevents, where a bioevent denotes changes to one or a group of cells involved in the bioprocess. Such bioevents are often used to refer to bioprocesses in text, which current techniques, relying solely on specialized lexicons, struggle to find.Results: This article presents a range of methods for finding bioprocess terms and events. To facilitate the study, we built a gold standard corpus in which terms and events related to angiogenesis, a key biological process of the growth of new blood vessels, were annotated. Statistics of the annotated corpus revealed that over 36% of the text expressions that referred to angiogenesis appeared as events. The proposed methods respectively employed domain-specific vocabularies, a manually annotated corpus and unstructured domain-specific documents. Evaluation results showed that, while a supervised machine-learning model yielded the best precision, recall and F1 scores, the other methods achieved reasonable performance and less cost to develop.Availability: The angiogenesis vocabularies, gold standard corpus, annotation guidelines and software described in this article are available at http://text0.mib.man.ac.uk/~mbassxw2/angiogenesis/Contact: xinglong.wang@gmail.com [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
50. Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures: A Graph Theoretic Social Network Mediated Approach.
- Author
-
Brown, Antony, Sant, Paul, Bessis, Nik, French, Tim, and Maple, Carsten
- Published
- 2010
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.