3,049 results on '"graph rewriting"'
Search Results
52. Towards A Formal Semantics For Autonomic Components
- Author
-
Aldinucci, Marco, Tuosto, Emilio, Priol, Thierry, editor, and Vanneschi, Marco, editor
- Published
- 2008
- Full Text
- View/download PDF
53. Software architecture for IoT-based health-care systems with cloud/fog service model
- Author
-
Sahar Adabi, Mehdi Hosseinzadeh, Masoumeh Hajvali, and Ali Rezaee
- Subjects
Graph rewriting ,Computer Networks and Communications ,Computer science ,business.industry ,Interoperability ,Cloud computing ,Operational semantics ,Domain (software engineering) ,Architecture tradeoff analysis method ,Architecture ,Software architecture ,Software engineering ,business ,Software - Abstract
Pervasive Healthcare systems are breeding rapidly and distributed systems such as fog, cloud, and IoT have made it possible for these systems to scale extensively with a certain need to sustain interoperability, reliability, availability, and response time. Notwithstanding those remarkable efforts that have been conducted for the architecting of such systems, there is a certain obligation toward the design of an architecture for the domain to constitute the aforementioned requirements. Our goal in this paper is to present a software architecture for IoT-based healthcare systems to address the above-mentioned non-functional requirements that include best practices of IoT, Fog, and Cloud planes. The proposed architecture is illustrated with 4 + 1 views and graph transformation is used to transform the models and expressing operational semantics. The architecture tradeoff analysis method is applied to evaluate different scenarios and both formal verifications and trade-off analysis proved the eligibility and competence of the proposed architecture.
- Published
- 2021
54. Using Markov Chain Based Estimation of Distribution Algorithm for Model-Based Safety Analysis of Graph Transformation
- Author
-
Einollah Pira
- Subjects
Model checking ,Graph rewriting ,Markov chain ,Computer science ,Evolutionary algorithm ,Probabilistic logic ,Computer Science Applications ,Theoretical Computer Science ,Computational Theory and Mathematics ,Estimation of distribution algorithm ,Hardware and Architecture ,Graph (abstract data type) ,State space ,Algorithm ,Software - Abstract
The ability to assess the reliability of safety-critical systems is one of the most crucial requirements in the design of modern safety-critical systems where even a minor failure can result in loss of life or irreparable damage to the environment. Model checking is an automatic technique that verifies or refutes system properties by exploring all reachable states (state space) of a model. In large and complex systems, it is probable that the state space explosion problem occurs. In exploring the state space of systems modeled by graph transformations, the rule applied on the current state specifies the rule that can perform on the next state. In other words, the allowed rule on the current state depends only on the applied rule on the previous state, not the ones on earlier states. This fact motivates us to use a Markov chain (MC) to capture this type of dependencies and applies the Estimation of Distribution Algorithm (EDA) to improve the quality of the MC. EDA is an evolutionary algorithm directing the search for the optimal solution by learning and sampling probabilistic models through the best individuals of a population at each generation. To show the effectiveness of the proposed approach, we implement it in GROOVE, an open source toolset for designing and model checking graph transformation systems. Experimental results confirm that the proposed approach has a high speed and accuracy in comparison with the existing meta-heuristic and evolutionary techniques in safety analysis of systems specified formally through graph transformations.
- Published
- 2021
55. A novel automated tower graph based ECG signal classification method with hexadecimal local adaptive binary pattern and deep learning
- Author
-
Abdulhamit Subasi, Turker Tuncer, and Sengul Dogan
- Subjects
Graph rewriting ,General Computer Science ,Artificial neural network ,business.industry ,Computer science ,Deep learning ,Feature extraction ,Hexadecimal ,Pattern recognition ,Feature selection ,02 engineering and technology ,Binary pattern ,03 medical and health sciences ,0302 clinical medicine ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,030217 neurology & neurosurgery - Abstract
Electrocardiography (ECG) signal recognition is one of the popular research topics for machine learning. In this paper, a novel transformation called tower graph transformation is proposed to classify ECG signals with high accuracy rates. It employs a tower graph, which uses minimum, maximum and average pooling methods altogether to generate novel signals for the feature extraction. In order to extract meaningful features, we presented a novel one-dimensional hexadecimal pattern. To select distinctive and informative features, an iterative ReliefF and Neighborhood Component Analysis (NCA) based feature selection is utilized. By using these methods, a novel ECG signal classification approach is presented. In the preprocessing phase, tower graph-based pooling transformation is applied to each signal. The proposed one-dimensional hexadecimal adaptive pattern extracts 1536 features from each node of the tower graph. The extracted features are fused and 15,360 features are obtained and the most discriminative 142 features are selected by the ReliefF and iterative NCA (RFINCA) feature selection approach. These selected features are used as an input to the artificial neural network and deep neural network and 95.70% and 97.10% classification accuracy was obtained respectively. These results demonstrated the success of the proposed tower graph-based method.
- Published
- 2021
56. Formal testing of timed graph transformation systems using metric temporal graph logic
- Author
-
Lucas Sakizloglou, Sven Schneider, Holger Giese, and Maria Maximova
- Subjects
Structure (mathematical logic) ,Graph rewriting ,Theoretical computer science ,Computer science ,Formalism (philosophy) ,Hasso-Plattner-Institut für Digital Engineering GmbH ,020207 software engineering ,02 engineering and technology ,Extension (predicate logic) ,Development (topology) ,020204 information systems ,Metric (mathematics) ,Theory of computation ,ddc:000 ,0202 electrical engineering, electronic engineering, information engineering ,State (computer science) ,Software ,Information Systems - Abstract
Embedded real-time systems generate state sequences where time elapses between state changes. Ensuring that such systems adhere to a provided specification of admissible or desired behavior is essential. Formal model-based testing is often a suitable cost-effective approach. We introduce an extended version of the formalism of symbolic graphs, which encompasses types as well as attributes, for representing states of dynamic systems. Relying on this extension of symbolic graphs, we present a novel formalism of timed graph transformation systems (TGTSs) that supports the model-based development of dynamic real-time systems at an abstract level where possible state changes and delays are specified by graph transformation rules. We then introduce an extended form of the metric temporal graph logic (MTGL) with increased expressiveness to improve the applicability of MTGL for the specification of timed graph sequences generated by a TGTS. Based on the metric temporal operators of MTGL and its built-in graph binding mechanics, we express properties on the structure and attributes of graphs as well as on the occurrence of graphs over time that are related by their inner structure. We provide formal support for checking whether a single generated timed graph sequence adheres to a provided MTGL specification. Relying on this logical foundation, we develop a testing framework for TGTSs that are specified using MTGL. Lastly, we apply this testing framework to a running example by using our prototypical implementation in the tool AutoGraph.
- Published
- 2021
57. Using graph rewriting to operationalize medical knowledge for the revision of concurrently applied clinical practice guidelines.
- Author
-
Michalowski, Martin, Rao, Malvika, Wilk, Szymon, Michalowski, Wojtek, and Carrier, Marc
- Subjects
- *
KNOWLEDGE graphs , *COMORBIDITY - Abstract
Clinical practice guidelines (CPGs) are patient management tools that synthesize medical knowledge into an actionable format. CPGs are disease specific with limited applicability to the management of complex patients suffering from multimorbidity. For the management of these patients, CPGs need to be augmented with secondary medical knowledge coming from a variety of knowledge repositories. The operationalization of this knowledge is key to increasing CPGs' uptake in clinical practice. In this work, we propose an approach to operationalizing secondary medical knowledge inspired by graph rewriting. We assume that the CPGs can be represented as task network models, and provide an approach for representing and applying codified medical knowledge to a specific patient encounter. We formally define revisions that model and mitigate adverse interactions between CPGs and we use a vocabulary of terms to instantiate these revisions. We demonstrate the application of our approach using synthetic and clinical examples. We conclude by identifying areas for future work with the vision of developing a theory of mitigation that will facilitate the development of comprehensive decision support for the management of multimorbid patients. • Integrating medical knowledge to revise concurrently applied CIGs using graph rewriting. • Operationalizing medical knowledge using rewriting operations in a clinical context. • Formalized theory for comprehensive decision support addressing the multimorbidity problem. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
58. Formal Design of Structural and Dynamic Features of Publish/Subscribe Architectural Styles
- Author
-
Loulou, Imen, Hadj Kacem, Ahmed, Jmaiel, Mohamed, Drira, Khalil, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Oquendo, Flavio, editor
- Published
- 2007
- Full Text
- View/download PDF
59. How much of UCCA can be predicted from AMR?
- Author
-
Pavlova, Siyana, Amblard, Maxime, Guillaume, Bruno, Semantic Analysis of Natural Language (SEMAGRAMME), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Natural Language Processing & Knowledge Discovery (LORIA - NLPKD), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), and Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
FOS: Computer and information sciences ,[INFO.INFO-TT]Computer Science [cs]/Document and Text Processing ,Artificial Intelligence (cs.AI) ,Computer Science - Artificial Intelligence ,Universal Conceptual Cognitive Annotation ,[SCCO.COMP]Cognitive science/Computer science ,[SCCO.LING]Cognitive science/Linguistics ,Semantic Framework ,Graph Rewriting ,Abstract Meaning Representation ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
International audience; In this paper, we consider two of the currently popular semantic frameworks: Abstract Meaning Representation (AMR)a more abstract framework, and Universal Conceptual Cognitive Annotation (UCCA)-an anchored framework. We use a corpus-based approach to build two graph rewriting systems, a deterministic and a non-deterministic one, from the former to the latter framework. We present their evaluation and a number of ambiguities that we discovered while building our rules. Finally, we provide a discussion and some future work directions in relation to comparing semantic frameworks of different flavors.
- Published
- 2022
60. Deep graph transformation for attributed, directed, and signed networks
- Author
-
Liang Zhao, Xiaojie Guo, Houman Homayoun, and Sai Manoj Pudukotai Dinakarrao
- Subjects
Graph rewriting ,Theoretical computer science ,Computer science ,Node (networking) ,Topology (electrical circuits) ,Directed graph ,Human-Computer Interaction ,Artificial Intelligence ,Hardware and Architecture ,Path (graph theory) ,Topological graph theory ,Language translation ,Laplacian matrix ,Software ,MathematicsofComputing_DISCRETEMATHEMATICS ,Information Systems - Abstract
Generalized from image and language translation, the goal of graph translation or transformation is to generate a graph of the target domain on the condition of an input graph of the source domain. Existing works are limited to either merely generating the node attributes of graphs with fixed topology or only generating the graph topology without allowing the node attributes to change. They are prevented from simultaneously generating both node and edge attributes due to: (1) difficulty in modeling the iterative, interactive, and asynchronous process of both node and edge translation and (2) difficulty in learning and preserving the inherent consistency between the nodes and edges in generated graphs. A general, end-to-end framework for jointly generating node and edge attributes is needed for real-world problems. In this paper, this generic problem of multi-attributed graph translation is named and a novel framework coherently accommodating both node and edge translations is proposed. The proposed generic edge translation path is also proven to be a generalization of existing topology translation models. Then, in order to discover and preserve the consistency of the generated nodes and edges, a spectral graph regularization based on our nonparametric graph Laplacian is designed. In addition, two extensions of the proposed model are developed for signed and directed graph translation. Lastly, comprehensive experiments on both synthetic and real-world practical datasets demonstrate the power and efficiency of the proposed method.
- Published
- 2021
61. The structure of the 3x + 1 problem
- Author
-
Alf Kimms
- Subjects
Sequence ,Graph rewriting ,graph transformation ,Applied Mathematics ,Structure (category theory) ,Wirtschaftswissenschaften ,Graph ,Collatz conjecture ,Combinatorics ,Transformation (function) ,collatz graph ,QA1-939 ,Discrete Mathematics and Combinatorics ,3x+1 problem ,Mathematics - Abstract
Paul Erdos said about the 3x + 1 problem, “Mathematics is not yet ready for such problems”. And he is seemingly right. Although we cannot solve this problem either, we provide some results about its structure. The so-called Collatz graph is iteratively transformed into a sequence of graphs by making use of some hidden structure information. It turns out that the transformation of graphs corresponds to a sequence of sets of numbers. It is shown that if the union of these number sets were equal to the set of integers greater than one, the famous Collatz conjecture would be true. OA platinum
- Published
- 2021
62. Meta-Modelling, Graph Transformation and Model Checking for the Analysis of Hybrid Systems
- Author
-
de Lara, Juan, Guerra, Esther, Vangheluwe, Hans, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Pfaltz, John L., editor, Nagl, Manfred, editor, and Böhlen, Boris, editor
- Published
- 2004
- Full Text
- View/download PDF
63. Using knowledge discovery to propose a two-phase model checking for safety analysis of graph transformations
- Author
-
Einollah Pira
- Subjects
Model checking ,Graph rewriting ,Sequence ,Theoretical computer science ,Markov chain ,Computer science ,020207 software engineering ,02 engineering and technology ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,State space ,Graph (abstract data type) ,State (computer science) ,Safety, Risk, Reliability and Quality ,Formal verification ,Software - Abstract
Safety is one of the most important features of modern software systems, especially safety-critical systems such as nuclear power plants, which can be checked exactly by model checking. Model checking is a formal verification technique that analyzes system properties through exploring all reachable states (state space) of a model of a system. The problem of the technique is that it confronts the state space explosion in large and complex systems due to exponential memory usage. Recent researches show that a partial and intelligent exploration of the state space can be a suitable solution to overcome this problem. In this paper, we propose a two-phase model checking for safety analysis of systems specified formally through graph transformations. In the first phase, the beam-search algorithm explores the state space to a specific number of states. In case of failure of the phase, the second phase starts: in systems specified through graph transformations, the rule applied on the previous state can determine the rule that can perform on the next state. In other words, the rule on current state depends on only the rule applied to previous state, not the one on earlier states. Hence, a Markov chain (MC) is estimated to capture dependencies between the sequence of applied rules in the state space explored by the beam-search algorithm. The MC is then employed to explore the remainder of the state space intelligently. To evaluate the effectiveness of the two-phase model checking, we implement it in GROOVE, an open source toolset for designing and model checking graph transformation systems. Experimental results show that the two-phase model checking has the high speed and accuracy in comparison with the existing meta-heuristic and evolutionary techniques.
- Published
- 2021
64. Modularized Morphing of Deep Convolutional Neural Networks: A Graph Approach
- Author
-
Changhu Wang, Tao Wei, and Chang Wen Chen
- Subjects
Graph rewriting ,Theoretical computer science ,Artificial neural network ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Convolutional neural network ,Residual neural network ,Graph ,020202 computer hardware & architecture ,Theoretical Computer Science ,Vertex (geometry) ,Morphing ,Computer Science::Graphics ,Morphism ,Computational Theory and Mathematics ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Software - Abstract
Network morphism is an effective learning scheme to morph a well-trained neural network to a new one with the network function completely preserved. However, existing network morphism scheme addresses only basic morphing types on the layer level. In this research, we address the central problem of network morphism at a higher level, i.e., how a convolutional layer can be morphed into an arbitrary module of a neural network. To simplify the representation of a network, we abstract a module as a graph with blobs as vertices and convolutional layers as edges. Based on this graph, the morphing process can be formulated as a graph transformation problem. Two atomic morphing operations are introduced to construct the graphs, based on which modules are classified into two families, i.e., simple morphable modules and complex modules. We present practical morphing solutions for both families, and prove that any module can be morphed from a single convolutional layer. Extensive experiments have been conducted based on the state-of-the-art ResNet on benchmarks to verify the effectiveness of the proposed solution.
- Published
- 2021
65. A modular graph transformation rule set for IFC‐to‐CityGML conversion
- Author
-
J. Lim, Rudi Stouffs, Helga Tauscher, Lim, Joie, 2Department of Architecture National University of Singapore Singapore Singapore, and Stouffs, Rudi
- Subjects
Graph rewriting ,Theoretical computer science ,3D city models ,business.industry ,Computer science ,CityGML ,building models ,Modular design ,Set (abstract data type) ,Geographic Markup Language ,General Earth and Planetary Sciences ,910.285 ,business - Abstract
Conversion of Industry Foundation Classes (IFC) building models into CityGML city models is one of the operational scenarios for BIM–GIS integration, with a variety of applications producing and consuming data on either side. Given the in‐depth cross‐domain knowledge required to specify such conversions, the heterogeneity of the IFC input data and the use cases for the resulting CityGML, flexible and configurable solutions are needed that make conversion details accessible to domain specialists. Graph transformation as a conversion method fulfils these requirements. We propose to extend the modularity given by single transformation rules at a more coarse‐grained level and identify four layers with modules of associated rules. We describe a self‐contained set of rules across these modules and demonstrate its application to a range of building models., Virtual Singapore
- Published
- 2021
66. Efficient Computation of Graph Overlaps for Rule Composition: Theory and Z3 Prototyping
- Author
-
Reiko Heckel, Nicolas Behr, and Maryam Ghaffari Saadat
- Subjects
FOS: Computer and information sciences ,Computer Science - Logic in Computer Science ,Graph rewriting ,Toy model ,Theoretical computer science ,Computer science ,business.industry ,Computation ,0102 computer and information sciences ,02 engineering and technology ,Modular design ,16. Peace & justice ,01 natural sciences ,Graph ,Logic in Computer Science (cs.LO) ,Automated theorem proving ,010201 computation theory & mathematics ,Graph patterns ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business - Abstract
Graph transformation theory relies upon the composition of rules to express the effects of sequences of rules. In practice, graphs are often subject to constraints, ruling out many candidates for composed rules. Focusing on the case of sesqui-pushout (SqPO) semantics, we develop a number of alternative strategies for computing compositions, each theoretically and with an implementation via the Python API of the Z3 theorem prover. The strategies comprise a straightforward generate-and-test strategy based on forbidden graph patterns, a variant with a more implicit logical encoding of the negative constraints, and a modular strategy, where the patterns are decomposed as forbidden relation patterns. For a toy model of polymer formation in organic chemistry, we compare the performance of the three strategies in terms of execution times and memory consumption., Comment: In Proceedings GCM 2020, arXiv:2012.01181
- Published
- 2020
67. Using graph rewriting methods for the semi-automatic generation of parametric infrastructure models.
- Author
-
Vilgertshofer, Simon and Borrmann, André
- Subjects
- *
REWRITING systems (Computer science) , *RAILROAD tracks , *PARAMETRIC modeling - Abstract
For the design of large infrastructure projects such as inner-city subway tracks, it proves necessary to consider differing model scales, ranging from the scale of several kilometers down to a few millimeters. This challenge can be addressed by using multi-scale product models comprising multiple levels of detail (LoD). Ensuring consistency across the different LoDs can be achieved by applying procedural and parametric modeling techniques while creating the model. This results in a flexible multi-scale model that can be easily modified on one scale while other scales are automatically updated. However, the correct application of parametric constraints and procedural dependencies has shown to be a very complex and time-consuming process. To address this issue, this papers presents a semi-automated detailing mechanism, which is based on formal procedures based on graphs and graph transformations. This paper discusses how procedural parametric models based on two-dimensional sketches can be represented by graphs and how detailing steps in the form of parametric modeling operations can be formalized by using rule-based graph rewriting. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
68. Modeling Software Architectures and Styles with Graph Grammars and Constraint Solving
- Author
-
Hirsch, Dan, Inverardi, Paola, Montanari, Ugo, and Donohoe, Patrick, editor
- Published
- 1999
- Full Text
- View/download PDF
69. Path planning for UAV/UGV collaborative systems in intelligent manufacturing
- Author
-
Chen Hua, Qiao Lu, Yu Su, Tian Junwei, and Qin Wang
- Subjects
050210 logistics & transportation ,Graph rewriting ,Job shop scheduling ,Computer science ,Mechanical Engineering ,Distributed computing ,05 social sciences ,Transportation ,Graph theory ,Mobile robot ,010501 environmental sciences ,Remotely operated underwater vehicle ,01 natural sciences ,Travelling salesman problem ,Drone ,0502 economics and business ,Motion planning ,Law ,0105 earth and related environmental sciences ,General Environmental Science - Abstract
Due to the development needs of the intelligent manufacturing industry, the use of drones is expanding indefinitely, and at the same time, extremely high requirements are imposed on the autonomous navigation of drones to reduce human intervention. This paper presents an UAV/ UGV scheduling problem in which the UAV needs to be recharged by the UGV in order to working in persistent tasks, and meanwhile, the UGV need to visits UGV working depots. Two different problem are presented: fixed charging sets problem (FCSP) and discrete charging sets problem (DCSP). In FCSP, charging sets are fixed, and a two-stage travelling salesman problem method is proposed to solve the problem. DCSP is a modification of FCSP while charging segments are discrete into serval segments, an graph transformation approach was proposed to transform DCSP into GTSP, so DCSP can be resolved by using GTSP solvers. Simulation results shows that both DCSP and FCSP can ensure UAV/UGV work in persistent tasks, and the graph transformation algorithm can efficiently transform DCSP into GTSP.
- Published
- 2020
70. Effective Loop Fusion in Polyhedral Compilation Using Fusion Conflict Graphs
- Author
-
Bin Ren, Yanzhi Wang, Jiexiong Guan, Wei Niu, and Gagan Agrawal
- Subjects
Profiling (computer programming) ,Graph rewriting ,Speedup ,Computer science ,Loop fusion ,Distributed computing ,020207 software engineering ,02 engineering and technology ,High memory ,Kernel (linear algebra) ,Operator (computer programming) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Code generation ,Software ,Information Systems - Abstract
Polyhedral auto-transformation frameworks are known to find efficient loop transformations that maximize locality and parallelism and minimize synchronization. While complex loop transformations are routinely modeled in these frameworks, they tend to rely on ad hoc heuristics for loop fusion. Although there exist multiple loop fusion models with cost functions to maximize locality and parallelism, these models involve separate optimization steps rather than seamlessly integrating with other loop transformations like loop permutation, scaling, and shifting. Incorporating parallelism-preserving loop fusion heuristics into existing affine transformation frameworks like Pluto, LLVM-Polly, PPCG, and PoCC requires solving a large number of Integer Linear Programming formulations, which increase auto-transformation times significantly. In this work, we incorporate polynomial time loop fusion heuristics into the Pluto-lp-dfp framework. We present a data structure called the fusion conflict graph (FCG), which enables us to efficiently model loop fusion in the presence of other affine loop transformations. We propose a clustering heuristic to group the vertices of the FCG, which further enables us to provide three different polynomial time greedy fusion heuristics, namely, maximal fusion , typed fusion , and hybrid fusion , while maintaining the compile time improvements of Pluto-lp-dfp over Pluto. Our experiments reveal that the hybrid fusion model, in conjunction with Pluto’s cost function, finds efficient transformations that outperform PoCC and Pluto by mean factors of 1.8× and 1.07×, respectively, with a maximum performance improvement of 14× over PoCC and 2.6× over Pluto.
- Published
- 2020
71. TOWARDS A GENERIC MAPPING FOR IFC-CITYGML DATA INTEGRATION
- Author
-
Helga Tauscher
- Subjects
lcsh:Applied optics. Photonics ,Graph rewriting ,010504 meteorology & atmospheric sciences ,Computer science ,business.industry ,lcsh:T ,0211 other engineering and technologies ,lcsh:TA1501-1820 ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,lcsh:Technology ,Development (topology) ,lcsh:TA1-2040 ,Synchronization (computer science) ,Isolation (database systems) ,CityGML ,Representation (mathematics) ,Software engineering ,business ,lcsh:Engineering (General). Civil engineering (General) ,computer ,021101 geological & geomatics engineering ,0105 earth and related environmental sciences ,Data integration - Abstract
Much work has been carried out on the topic of BIM-GIS integration. As a technical challenge in particular, research and development tackle the standard data formats of the two areas and aim for the conversion between, linking of or overarching querying over data sources of these formats. Usually, these operational cases (conversion, linking, querying) are examined in isolation or even treated as mutually exclusive and competing approaches. With Triple Graph Grammars, we propose to apply a method that allows to derive solutions for these operational cases from a common generic ruleset. We demonstrate this approach in a proof-of-concept implementation using eMoflon. Our work focusses on IFC and CityGML and we present and discuss a first end-to-end demonstration of integrating these standards with the proposed method. Going forward such representation of the correlation between IFC and CityGML, declarative, independent of particular operational implementations, can serve as a vehicle to capture and document acknowledged integration schemes for IFC and CityGML, complementing these two standards with a specification of their correlation.
- Published
- 2020
72. On the Laplacians and Normalized Laplacians for Graph Transformation with Respect to the Dicyclobutadieno Derivative of [n]Phenylenes
- Author
-
Sakander Hayat, Jia-Bao Liu, Zheng-Qun Cai, and Qian Zheng
- Subjects
Pure mathematics ,Graph rewriting ,Polymers and Plastics ,010405 organic chemistry ,Chemistry ,Computation ,Organic Chemistry ,Structure (category theory) ,Derivative ,Wiener index ,010402 general chemistry ,01 natural sciences ,0104 chemical sciences ,Materials Chemistry ,Spectrum analysis - Abstract
As a crucial tool for exploring and characterizing the structure properties of the molecular graphs, spectrum analysis and computation are flourishing in recent year. Let Ln be obtained from the tr...
- Published
- 2020
73. A query-retyping approach to model transformation co-evolution
- Author
-
Zinovy Diskin, Ludovico Iovino, Adrian Rutle, and Harald König
- Subjects
Graph rewriting ,Theoretical computer science ,Traceability ,Computer science ,Model transformation ,sync ,020207 software engineering ,02 engineering and technology ,Metamodeling ,Set (abstract data type) ,Transformation (function) ,Software_SOFTWAREENGINEERING ,Modeling and Simulation ,Encoding (memory) ,0202 electrical engineering, electronic engineering, information engineering ,computer ,Software ,computer.programming_language - Abstract
In rule-based approaches, a model transformation definition tells how an instance of a source metamodel should be transformed to an instance of a target metamodel. As these metamodels undergo changes, model transformations defined over these metamodels may get out of sync. Restoring conformance between model transformations and the metamodels is a complex and error-prone task. In this paper, we propose a formal approach to automatically co-evolve model transformations according to the evolution of the metamodels. The approach is based on encoding the model transformation definition as a query-retyping combination and the evolution of the metamodels as applications of graph transformation rules. These rules are used to obtain an evolved query over the evolved metamodel together with a new retyping from the target metamodel. We will identify the criteria which need to be fulfilled in order to make this automatic co-evolution possible. We provide a tool support for this procedure, in which, from a traceability model that represents the original model transformation definition, we derive a co-evolved traceability model that represents the evolved transformation definition. Moreover, we use a case study to evaluate the approach with a set of commonly performed metamodel evolutions.
- Published
- 2020
74. The Glasgow Subgraph Solver: Using Constraint Programming to Tackle Hard Subgraph Isomorphism Problem Variants
- Author
-
Ciaran McCreesh, Patrick Prosser, James Trimble, Gadducci, Fabio, and Kehrer, Timo
- Subjects
Graph rewriting ,Theoretical computer science ,Matching (graph theory) ,Computer science ,Subgraph isomorphism problem ,Inference ,0102 computer and information sciences ,02 engineering and technology ,Solver ,01 natural sciences ,Article ,Range (mathematics) ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Constraint programming ,020201 artificial intelligence & image processing ,State (computer science) - Abstract
The Glasgow Subgraph Solver provides an implementation of state of the art algorithms for subgraph isomorphism problems. It combines constraint programming concepts with a variety of strong but fast domain-specific search and inference techniques, and is suitable for use on a wide range of graphs, including many that are found to be computationally hard by other solvers. It can also be equipped with side constraints, and can easily be adapted to solve other subgraph matching problem variants. We outline its key features from the view of both users and algorithm developers, and discuss future directions.
- Published
- 2020
75. Computing Embeddings of Directed Bigraphs
- Author
-
Marco Peressotti, Marino Miculan, Alessio Chiapperini, Gadducci, Fabio, and Kehrer, Timo
- Subjects
Soundness ,Graph rewriting ,Theoretical computer science ,Reduction (recursion theory) ,Formal graph languages ,Computer science ,Bigraph ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,Complexity ,01 natural sciences ,Article ,Graph transformations ,Graph theory ,010201 computation theory & mathematics ,Completeness (order theory) ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,Reactive system ,Constraint satisfaction problem - Abstract
Directed bigraphs are a meta-model which generalises Milner’s bigraphs by taking into account the request flow between controls and names. A key problem about these bigraphs is that of bigraph embedding, i.e., finding the embeddings of a bigraph inside a larger one. We present an algorithm for computing embeddings of directed bigraphs, via a reduction to a constraint satisfaction problem. We prove soundness and completeness of this algorithm, and provide an implementation in jLibBig, a general Java library for manipulating bigraphical reactive systems, together with some experimental results.
- Published
- 2020
76. A graph transformation based approach for multi-agent systems reorganization
- Author
-
Guerrouf Fayçal and Allaoua Chaoui
- Subjects
Graph rewriting ,Theoretical computer science ,General Computer Science ,Computer science ,Multi-agent system - Published
- 2020
77. Topological consistency preservation with graph transformation schemes
- Author
-
Hakim Belhaouari, Pascale Le Gall, Romain Pascual, Agnès Arnould, Mathématiques et Informatique pour la Complexité et les Systèmes (MICS), CentraleSupélec-Université Paris-Saclay, Université de Poitiers - Faculté de Sciences fondamentales et appliquées, Université de Poitiers, Synthèse et analyse d'images (XLIM-ASALI), XLIM (XLIM), and Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Graph rewriting ,Theoretical computer science ,Combinatorial maps ,Consistency preservation ,Computer science ,business.industry ,020207 software engineering ,02 engineering and technology ,Static analysis ,Object (computer science) ,Data structure ,Consistency (database systems) ,Topology-based geometric modeling ,Product (mathematics) ,Rule schemes ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,[INFO]Computer Science [cs] ,DPO graph transformation ,Geometric modeling ,business ,Software ,Subdivision - Abstract
International audience; Topology-based geometric modeling tackles the issue of representing objects with data structures that encode the topological subdivision of modeled objects in vertices, edges, faces, and volumes. Such subdivisions can be represented with graphs labeled by dimensions on arcs, while modeling operations used to edit the objects can be formalized as graph transformations. Among the existing topological models, we consider generalized and oriented maps, defined as constrained labeled graphs, to ensure the well-formedness of the represented objects. Since a modeling operation should provide a correct object when applied to a correct object, graph transformations are provided with conditions to ensure the model consistency. Our approach exploits the firmly established framework of DPO graph transformations to implement modeling operations. We enrich standard DPO graph transformations with a product construction to ease the operation design, enabling generic modeling operations as rule schemes. We lift conditions from DPO rules to this enriched framework, ensuring the preservation of the topological consistency via static analysis of syntactic conditions on rule schemes.
- Published
- 2022
78. A Tracing Based Model to Identify Bottlenecks in Physically Distributed Applications
- Author
-
Clement Casse, Pascal Berthou, Philippe Owezarski, Sebastien Josset, Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), and Orange Labs
- Subjects
Distributed Tracing ,Multi-zones Cloud ,Hierarchical Model ,Property Graph ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,Edge-IoT ,Graph Rewriting - Abstract
International audience; The Cloud computing paradigm has become the new industry standard way of designing large scale applications. Over the past years, we observe an increased adoption of this technology on numerous IoT-Edge applications. And while this technology comes with its promises and benefits, considering almost infinite scalability, it also comes along with its drawbacks and challenges. Detecting partial failures or bottlenecks are new obstacles that arose with the adoption of Cloud Applications. Distributed Tracing now allows developers to gain insight on the composition of services within a distributed Application. Today we observe an increased adoption of this technology on numerous cloud-native architectures. The project OpenTelemetry proposes a specification for traces that normalizes this new monitoring data format. In this publication we present an approach that leverages these traces to identify bottlenecks at the scale of a physically distributed application. We propose an extension of our model that builds a hierarchical property graph to exhibit bottlenecks in an application that follows the layered Cloud-IoT network model. Based on OpenTelemetry traces we can maintain a model at runtime of the whole application and compute bottlenecks. Their identification relies on the scores provided by centrality algorithms.
- Published
- 2022
79. A layered approach to extracting programs from proofs with an application in graph theory
- Author
-
John S. Jeavons, John N. Crossley, Iman Poernomo, and Bolis Basit
- Subjects
Graph rewriting ,Theoretical computer science ,Other information and computing sciences not elsewhere classified ,Clique-width ,Voltage graph ,Graph (abstract data type) ,Directed graph ,Strength of a graph ,Null graph ,Graph property ,Mathematics - Abstract
In this paper we describe our system for automatically extracting "correct" programs from proofs using a development for the Curry-Howard process. Although program extraction has been developed by many authors (see [5,?,?]), our system has a number of novel features designed to make it very easy to use and as close as possible to ordinary mathematical terminology and practice. These features include 1. the use of Henkin's technique [6] to reduce higher-order logic to many-sorted (first-order) logic 2. the free use of new rules for induction subject to certain conditions 3. the extensive use of previously programmed (primitive) recursive functions. 4. the use of templates to make the reasoning much closer to normal mathematical proffs. 5. an extension of the technique of the use of Harrop formulae to classically true formulae (cf. the footnote on p.101 in Kreisel [9]); As an example of our system we give a constructive proof of the well-known theorem that every graph of even parity, which is non-trivial in the sense that it does not consist of isolated vertices, has a cycle. Given such a graph as input, the extracted program produces a cycle as promised.
- Published
- 2022
- Full Text
- View/download PDF
80. Topology Preserving Constrained Graph Layout
- Author
-
Michael Wybrow, Kim Marriott, and Tim Dwyer
- Subjects
Graph rewriting ,Graph bandwidth ,Computer science ,Other information and computing sciences not elsewhere classified ,Hardware_INTEGRATEDCIRCUITS ,Graph Layout ,Voltage graph ,Graph (abstract data type) ,Computer Science::Human-Computer Interaction ,Strength of a graph ,Null graph ,Topology ,Moral graph - Abstract
Constrained graph layout is a recent generalisation of force-directed graph layout which allows constraints on node placement. We give a constrained graph layout algorithm that takes an initial feasible layout and improves it while preserving the topology of the initial layout. The algorithm supports poly-line connectors and clusters. During layout the connectors and cluster boundaries act like impervious rubber-bands which try to shrink in length. The intended application for our algorithm is dynamic graph layout, but it can also be used to improve layouts generated by other graph layout techniques.
- Published
- 2022
- Full Text
- View/download PDF
81. A Methodology to Manage Structured and Semi-structured Data in Knowledge Oriented Graph
- Author
-
Valerio Bellandi, Paolo Ceravolo, Giacomo Alberto D’Andrea, Samira Maghool, and Stefano Siccardi
- Subjects
Data management ,Events graphs ,Graph rewriting ,Settore INF/01 - Informatica - Published
- 2022
82. Canonization of Reconfigurable PT Nets in Maude
- Author
-
Capra, L.
- Subjects
Maude ,Graph rewriting ,Settore INF/01 - Informatica ,Petri Nets ,Canonical form - Published
- 2022
83. Analysis of Graph Transformation Systems: Native vs Translation-based Techniques
- Author
-
Reiko Heckel, Maryam Ghaffari Saadat, and Leen Lambers
- Subjects
FOS: Computer and information sciences ,Computer Science - Logic in Computer Science ,Graph rewriting ,Theoretical computer science ,Computer science ,lcsh:Mathematics ,media_common.quotation_subject ,lcsh:QA1-939 ,Translation (geometry) ,lcsh:QA75.5-76.95 ,Session (web analytics) ,Logic in Computer Science (cs.LO) ,Software Engineering (cs.SE) ,Computer Science - Software Engineering ,Theorem provers ,Perspective (geometry) ,Encoding (memory) ,Satisfiability modulo theories ,F.4.2 ,Quality (business) ,lcsh:Electronic computers. Computer science ,media_common - Abstract
The paper summarises the contributions in a session at GCM 2019 presenting and discussing the use of native and translation-based solutions to common analysis problems for Graph Transformation Systems (GTSs). In addition to a comparison of native and translation-based techniques in this area, we explore design choices for the latter, s.a. choice of logic and encoding method, which have a considerable impact on the overall quality and complexity of the analysis. We substantiate our arguments by citing literature on application of theorem provers, model checkers, and SAT/SMT solver in GTSs, and conclude with a general discussion from a software engineering perspective, including comments from the workshop participants, and recommendations on how to investigate important design choices in the future., Comment: In Proceedings GCM 2019, arXiv:1912.08966
- Published
- 2019
84. RDF: A Reconfigurable Dataflow Model of Computation
- Author
-
Fradet, Pascal, Girault, Alain, Krishnaswamy, Ruby, Nicollin, Xavier, Shafiei, Arash, Sound Programming of Adaptive Dependable Embedded Systems (SPADES), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire d'Informatique de Grenoble (LIG), Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP ), Université Grenoble Alpes (UGA)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP ), Université Grenoble Alpes (UGA), Orange Labs [Issy les Moulineaux], France Télécom, and Inria Grenoble Rhône-Alpes, Université de Grenoble
- Subjects
Reconfigurable systems ,Static analyses ,Graph rewriting ,ACM: F.: Theory of Computation/F.1: COMPUTATION BY ABSTRACT DEVICES/F.1.1: Models of Computation ,ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.2: Semantics of Programming Languages/F.3.2.5: Program analysis ,Models of computation ,Boundedness ,[INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL] ,Synchronous dataflow ,[INFO.INFO-ES]Computer Science [cs]/Embedded Systems ,Liveness ,ACM: D.: Software/D.1: PROGRAMMING TECHNIQUES/D.1.3: Concurrent Programming/D.1.3.1: Parallel programming - Abstract
Dataflow Models of Computation (MoCs) are widely used in embedded systems, including multimedia processing, digital signal processing, telecommunications, and automatic control. In a dataflow MoC, an application is specified as a graph of actors connected by FIFO channels. One of the first and most popular dataflow MoCs, Synchronous Dataflow (SDF), provides static analyses to guarantee boundedness and liveness, which are key properties for embedded systems. However, SDF and most of its variants lacks the capability to express the dynamism needed by modern streaming applications. In particular, the applications mentioned above have a strong need for reconfigurability to accommodate changes in the input data, the control objectives, or the environment. We address this need by proposing a new MoC called Reconfigurable Dataflow (RDF). RDF extends SDF with transformation rules that specify how and when the topology and actors of the graph may be reconfigured. Starting from an initial RDF graph and a set of transformation rules, an arbitrary number of new RDF graphs can be generated at runtime. A key feature of RDF is that it can be statically analyzed to guarantee that all possible graphs generated at runtime will be consistent and live. We introduce the RDF MoC, describe its associated static analyses, and present its implementation and some experimental results.; Les modèles de calcul (MoCs) flot de données synchrones sont très utilisés dans les systèmes embarqués et les applications multimédia, de traitement du signal, de télécommunication et de contrôle automatique. Dans ce style de modèle, une application est spécifiée par un graphe d’acteurs connectés par des liens FIFO de communication. Un des MoCs les plus connus, SDF (pour Synchronous Dataflow), permet des analyses statiques qui garantissent l’exécution en mémoire bornée et l’absence d’interblocage, propriétés clés pour les systèmes embarqués. Néanmoins, SDF (et la plupart de ses variantes) ne permet pas d’exprimer la dynamicité requise par les applications embarquées modernes. En particulier, ces applications ont souvent besoin de se reconfigurer pour s’adapter aux changements (par ex., de débit ou de qualité) du flot d’entrée, des objectifs de contrôle ou de l’environnement. Afin de répondre à ce besoin, nous proposons RDF (pour Reconfigurable DataFlow) un MoC qui étend SDF avec des règles de transformations spécifiant comment la topologie du graphe flot de données peut être reconfiguré dynamiquement. En considérant un graphe SDF initial et un ensemble de règles de transformation, un nombre arbitraire de nouveaux graphes peuvent être produits. La principale qualité de RDF est qu’il peut être analysé statiquement pour garantir que tous les graphes générés dynamiquement s’exécuteront en mémoire bornée et sans interblocage. Nous présentons le modèle RDF, les analyses statiques associées, sa mise en oeuvre et quelques expérimentations.
- Published
- 2021
85. A tale of two graph models: a case study in wireless sensor networks
- Author
-
Michele Sevegnani, Blair Archibald, and Géza Kulcsár
- Subjects
Diagrammatic reasoning ,Graph rewriting ,Theoretical computer science ,Topology control ,Computer science ,Complex system ,Graph (abstract data type) ,Rewriting ,Wireless sensor network ,Rotation formalisms in three dimensions ,Software ,Theoretical Computer Science - Abstract
Designing and reasoning about complex systems such as wireless sensor networks is hard due to highly dynamic environments: sensors are heterogeneous, battery-powered, and mobile. While formal modelling can provide rigorous mechanisms for design/reasoning, they are often viewed as difficult to use. Graph rewrite-based modelling techniques increase usability by providing an intuitive, flexible, and diagrammatic form of modelling in which graph-like structures express relationships between entities while rewriting mechanisms allow model evolution. Two major graph-based formalisms are Graph Transformation Systems (GTS) and Bigraphical Reactive Systems (BRS). While both use similar underlying structures, how they are employed in modelling is quite different. To gain a deeper understanding of GTS and BRS, and to guide future modelling, theory, and tool development, in this experience report we compare the practical modelling abilities and style of GTS and BRS when applied to topology control in WSNs. To show the value of the models, we describe how analysis may be performed in both formalisms. A comparison of the approaches shows that although the two formalisms are different, from both a theoretical and practical modelling standpoint, they are each successful in modelling topology control in WSNs. We found that GTS, while featuring a small set of entities and transformation rules, relied on entity attributes, rule application based on attribute/variable side-conditions, and imperative control flow units. BRS on the other hand, required a larger number of entities in order to both encode attributes directly in the model (via nesting) and provide tagging functionality that, when coupled with rule priorities, implements control flow. There remains promising research mapping techniques between the formalisms to further enable flexible and expressive modelling.
- Published
- 2021
86. General diagram-recognition methodologies
- Author
-
Blostein, Dorothea, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Kasturi, Rangachar, editor, and Tombre, Karl, editor
- Published
- 1996
- Full Text
- View/download PDF
87. Graph Rewriting Techniques in Engineering Design
- Author
-
Lothar Kolbeck, Simon Vilgertshofer, Jimmy Abualdenien, and André Borrmann
- Subjects
graph rewriting ,graph theory ,graph grammars ,Geography, Planning and Development ,Building and Construction ,Engineering (General). Civil engineering (General) ,ddc ,Urban Studies ,HT165.5-169.9 ,SPP2187 ,design synthesis ,spatial grammars ,TA1-2040 ,City planning - Abstract
Capturing human knowledge underlying the design and engineering of products has been among the main goals of computational engineering since its very beginning. Over the last decades, various approaches have been proposed to tackle this objective. Among the most promising approaches is the application of graph theory for representing product structures by defining nodes representing entities and edges representing relations among them. The concrete meaning of these structures ranges from geometry representations over hierarchical product breakdowns to functional descriptions and flows of information or resources. On top of these graph structures, graph rewriting techniques provide another powerful layer of technology. By enabling the formal definition of rules for transforming graph structures, they allow on the one hand side to formally capture the engineering development process. On the other hand, the assembly of rewriting rules into graph grammars allows for an exhaustive search of the solution space of the engineering problem at hand. In combination with search strategies, an automated optimization of the design under given constraints and objectives can be realized. The paper provides an overview of the current state-of-the-art in graph rewriting and its applications in engineering design, with a focus on the built environment. It concludes with a discussion of the progress achieved and the missing research gaps.
- Published
- 2021
88. Using Distributed Tracing to Identify Inefficient Resources Composition in Cloud Applications
- Author
-
Cassé, Clément, Berthou, Pascal, Owezarski, Philippe, Josset, Sébastien, Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Orange Labs, and Orange Labs [Meylan]
- Subjects
Distributed Tracing ,Hierarchical Model ,Property Graph ,Cloud Computing ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,Graph Rewriting - Abstract
International audience; Cloud-Applications are the new industry standard way of designing Web-Applications. With Cloud Computing, Applications are usually designed as microservices, and developers can take advantage of thousands of such existing microservices, involving several hundred of cross-component communications on different physical resources. Microservices orchestration (as Kubernetes) is an automatic process, which manages each component lifecycle, and notably their allocation on the different resources of the cloud infrastructure. Whereas such automatic cloud technologies ease development and deployment, they nevertheless obscure debugging and performance analysis. In order to gain insight on the composition of services, distributed tracing recently emerged as a way to get the decomposition of the activity of each component within a cloud infrastructure. This paper aims at providing methodologies and tools (leveraging state-of-the-art tracing) for getting a wider view of application behaviours, especially focusing on application performance assessment. In this paper, we focus on using distributed traces and allocation information from microservices to model their dependencies as a hierarchical property graph. By applying graph rewriting operations, we managed to project and filter communications observed between microservices at higher abstraction layers like the machine nodes, the zones or regions. Finally, in this paper we propose an implementation of the model running on a microservices shopping application deployed on a Zonal Kubernetes cluster monitored by OpenTelemetry traces. We propose using the flow hierarchy metric on the graph model to pinpoint cycles that reveal inefficient resource composition inducing possible performance issues and economic waste.
- Published
- 2021
89. Models@Runtime: The Development and Re-Configuration Management of Python Applications Using Formal Methods
- Author
-
Radouane Nouara, Gregorio Díaz, Mohammed Mounir Bouhamed, Oussama Kamel, Allaoua Chaoui, Faculty of Information and Communication Technology (ICT), Instituto de Investigación en Informática, Universidad de Castilla-La Mancha, and Faculty of Medicine, University Constantine 3 Salah Boubnider
- Subjects
Technology ,Reflection (computer programming) ,formal methods ,Computer science ,QH301-705.5 ,QC1-999 ,petri nets ,application re-configuration ,Application re-configuration ,computer.software_genre ,Formal Methods ,Application lifecycle management ,graph rewriting rules ,General Materials Science ,Petri Nets ,Graph rewriting rules ,Layer (object-oriented design) ,Biology (General) ,Instrumentation ,QD1-999 ,computer.programming_language ,Fluid Flow and Transfer Processes ,Configuration management ,Graph rewriting ,application management ,Programming language ,Process Chemistry and Technology ,Physics ,General Engineering ,Python (programming language) ,Petri net ,Formal methods ,Engineering (General). Civil engineering (General) ,models@runtime ,Computer Science Applications ,Chemistry ,python application ,Application management ,TA1-2040 ,computer - Abstract
This work is licensed under a Creative Commons Attribution 4.0 International License. Models@runtime (models at runtime) are based on computation reflection. Runtimemodels can be regarded as a reflexive layer causally connected with the underlying system. Hence,every change in the runtime model involves a change in the reflected system, and vice versa. Tothe best of our knowledge, there are no runtime models for Python applications. Therefore, wepropose a formal approach based on Petri Nets (PNs) to model, develop, and reconfigure Pythonapplications at runtime. This framework is supported by a tool whose architecture consists of twomodules connecting both the model and its execution. The proposed framework considers executionexceptions and allows users to monitor Python expressions at runtime. Additionally, the applicationbehavior can be reconfigured by applying Graph Rewriting Rules (GRRs). A case study usingService-Level Agreement (SLA) violations is presented to illustrate our approach. 11 20
- Published
- 2021
- Full Text
- View/download PDF
90. Towards Control Flow Analysis of Declarative Graph Transformations with Symbolic Execution
- Author
-
Matthias Tichy and Florian Ege
- Subjects
Nondeterministic algorithm ,Graph rewriting ,Control flow analysis ,Imperative programming ,Control flow ,Computer science ,Programming language ,Path (graph theory) ,Pattern matching ,computer.software_genre ,Symbolic execution ,computer - Abstract
The declarative graph transformation language Henshin transforms instance models represented as graphs by applying a series of basic steps that match and replace structural patterns on parts of models. These simple transformation rules are then combined into control flow constructs similar to those of imperative programming languages to create more complex transformations. However, defects in the structure of control flow or in transformation rules might misschedule the application of operations, resulting in basic steps to be inapplicable or produce incorrect output. Understanding and fixing these bugs is complicated by the fact that pattern matching in rules is non-deterministic. Moreover, some control flow structures employ a nondeterministic choice of alternatives. This makes it challenging for developers to keep track of all the possible execution paths and interactions between them. For conventional programming languages, techniques have been developed to execute a program symbolically. By abstracting over the concrete values of variables in any actual run, generalized knowledge is gained about the possible behavior of the program. This can be useful in understanding problems and fixing bugs. In this paper, we present an approach to symbolically execute graph transformations for a subset of Henshin, using symbolic path constraints based on the cardinalities of graph pattern occurrences in the model.
- Published
- 2021
91. A Graph Transformation System formalism for correctness of Transactional Memory algorithms
- Author
-
Luciana Foss, André Rauber Du Bois, and Diogo João Cardoso
- Subjects
Model checking ,Graph rewriting ,Correctness ,Constant (computer programming) ,Shared memory ,Computer science ,State space ,Graph (abstract data type) ,Transactional memory ,Algorithm - Abstract
With the constant research and development of Transactional Memory (TM) systems, various algorithms have been proposed, and their correctness is always an important aspect to take into account. When analyzing TM algorithms, one of the most commonly used correctness criterion is opacity, which infers that the algorithm only generates executions that observe consistent states of the shared memory. In this work we present a formal definition to demonstrate that a given TM algorithm only generates opaque histories using a Graph Transformation System (GTS). We achieve that by introducing a methodology of translating an algorithm into production rules that manipulate the state of a graph. With a set initial state of transactions, the result of this method consists of a state space that includes every possible order of execution of transactional operations that are automatically checked for opacity, therefore all possible histories the algorithm can generate are checked for the safety property. As a case study we demonstrate our approach using the algorithm CaPR+.
- Published
- 2021
92. From pairwise to family-based generic analysis of delta-oriented model-based SPLs
- Author
-
Timo Kehrer, Christopher Pietsch, and Udo Kelter
- Subjects
Set (abstract data type) ,Delta ,Graph rewriting ,Software ,Theoretical computer science ,Dependency (UML) ,business.industry ,Computer science ,Product (mathematics) ,Pairwise comparison ,Core model ,business - Abstract
One way to implement model-based software product lines (MBSPLs) is to use a transformational approach known as Delta Modeling (DM). Here, an MBSPL is implemented by one core model and a set of delta modules. Delta modules define model transformations using edit operations which add, remove or modify model elements. Editings of different delta modules can be in conflict or depend on each other, leading to conflict and dependency relations between delta modules. Conflicts and unfulfilled dependencies can cause the generation of a product to fail or to lead to invalid models. In order to spot such defects, one needs analysis tools for each modeling (sub-)language used. Existing generic approaches to statically detect such defects in a language-agnostic manner analyze pairs of delta modules. However, the pairwise approach can lead to false positives, i.e., conflicts and unfulfilled dependencies are reported although product generation does not fail. Following the idea of family-based analysis, this paper presents a new approach to detect pseudo defects resolved by "healing effects" implied by the network of dependencies. These effects typically occur when a delta module (partially) reverts the effect of a preceding delta module. We have implemented our approach within the SiPL framework and evaluated our family-based analysis using a realistic MBSPL known as Body Comfort System (BCS).
- Published
- 2021
93. Attributed Graph Rewriting for Complex Event Processing Self-Management.
- Author
-
HIGASHINO, WILSON A., EICHLER, CÉDRIC, CAPRETZ, MIRIAM A. M., BITTENCOURT, LUIZ F., and MONTEIL, THIERRY
- Subjects
REWRITING systems (Computer science) ,EVENT processing (Computer science) ,WORKS councils ,AUTONOMIC computing ,GRAPH theory - Abstract
The use of Complex Event Processing (CEP) and Stream Processing (SP) systems to process high-volume, high-velocity Big Data has renewed interest in procedures for managing these systems. In particular, selfmanagement and adaptation of runtime platforms have been common research themes, as most of these systems run under dynamic conditions. Nevertheless, the research landscape in this area is still young and fragmented. Most research is performed in the context of specific systems, and it is difficult to generalize the results obtained to other contexts. To enable generic and reusable CEP/SP system management procedures and self-management policies, this research introduces the Attributed Graph Rewriting for Complex Event Processing Management (AGeCEP) formalism. AGeCEP represents queries in a language- and technologyagnostic fashion using attributed graphs. Query reconfiguration capabilities are expressed through standardized attributes, which are defined based on a novel classification of CEP query operators. By leveraging this representation, AGeCEP also proposes graph rewriting rules to define consistent reconfigurations of queries. To demonstrate AGeCEP feasibility, this research has used it to design an autonomic manager and to define a selected set of self-management policies. Finally, experiments demonstrate that AGeCEP can indeed be used to develop algorithms that can be integrated into diverse CEP systems. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
94. Graph rewriting in some categories of partial morphisms
- Author
-
Kennaway, Richard, Goos, Gerhard, editor, Hartmanis, Juris, editor, Ehrig, Hartmut, editor, Kreowski, Hans-Jörg, editor, and Rozenberg, Grzegorz, editor
- Published
- 1991
- Full Text
- View/download PDF
95. Dactl: An experimental graph rewriting language
- Author
-
Glauert, J. R. W., Kennaway, J. R., Sleep, M. R., Goos, Gerhard, editor, Hartmanis, Juris, editor, Ehrig, Hartmut, editor, Kreowski, Hans-Jörg, editor, and Rozenberg, Grzegorz, editor
- Published
- 1991
- Full Text
- View/download PDF
96. An Application of Term Rewriting Systems for Functional Programming
- Author
-
Kikuchi, Yutaka, Katayama, Takuya, Ohno, Yutaka, editor, and Matsuda, Toshiko, editor
- Published
- 1991
- Full Text
- View/download PDF
97. Graph rewriting rules for RDF database evolution: optimizing side-effect processing
- Author
-
Jacques Chabin, Cédric Eichler, Mirian Halfeld Ferrari, Nicolas Hiot, Laboratoire d'Informatique Fondamentale d'Orléans (LIFO), Université d'Orléans (UO)-Institut National des Sciences Appliquées - Centre Val de Loire (INSA CVL), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA), Sécurité des Données et des Systèmes (SDS), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université d'Orléans (UO)-Institut National des Sciences Appliquées - Centre Val de Loire (INSA CVL), and ANR-18-CE23-0010,SENDUP,réSEaux Numériques de Données sémantiques: Utilité et vie Privée(2018)
- Subjects
Graph rewriting ,Computer Networks and Communications ,Computer science ,Programming language ,0102 computer and information sciences ,02 engineering and technology ,computer.file_format ,computer.software_genre ,01 natural sciences ,Database evolution ,Side effect (computer science) ,010201 computation theory & mathematics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,RDF ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,computer ,ComputingMilieux_MISCELLANEOUS ,Information Systems - Abstract
Purpose Graph rewriting concerns the technique of transforming a graph; it is thus natural to conceive its application in the evolution of graph databases. This paper aims to propose a two-step framework where rewriting rules formalize instance or schema changes, ensuring graph’s consistency with respect to constraints, and updates are managed by ensuring rule applicability through the generation of side effects: new updates which guarantee that rule application conditions hold. Design/methodology/approach This paper proposes Schema Evolution Through UPdates, optimized version (SetUpOPT), a theoretical and applied framework for the management of resource description framework (RDF)/S database evolution on the basis of graph rewriting rules. The framework is an improvement of SetUp which avoids the computation of superfluous side effects and proposes, via SetUpoptND, a flexible and extensible package of solutions to deal with non-determinism. Findings This paper shows graph rewriting into a practical and useful application which ensures consistent evolution of RDF databases. It introduces an optimised approach for dealing with side effects and a flexible and customizable way of dealing with non-determinism. Experimental evaluation of SetUpoptND demonstrates the importance of the proposed optimisations as they significantly reduce side-effect generation and limit data degradation. Originality/value SetUp originality lies in the use of graph rewriting techniques under the closed world assumption to set an updating system which preserves database consistency. Efficiency is ensured by avoiding the generation of superfluous side effects. Flexibility is guaranteed by offering different solutions for non-determinism and allowing the integration of customized choice functions.
- Published
- 2021
98. Graph Rewriting for Enhanced Universal Dependencies
- Author
-
Guy Perrier, Bruno Guillaume, Semantic Analysis of Natural Language (SEMAGRAMME), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Natural Language Processing & Knowledge Discovery (LORIA - NLPKD), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), and Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)
- Subjects
Graph rewriting ,Theoretical computer science ,Parsing ,Computer science ,computer.software_genre ,computer ,[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL] ,Task (project management) ,Universal dependencies - Abstract
International audience; This paper describes a system proposed for the IWPT 2021 Shared Task on Parsing into Enhanced Universal Dependencies (EUD). We propose a Graph Rewriting based system for computing Enhanced Universal Dependencies, given the Basic Universal Dependencies (UD).
- Published
- 2021
99. Towards Trace-Graphs for Data-driven Test Case Mining in the Domain of Automated Driving
- Author
-
Maria Belen Bescos del Castillo, Lars Hoffmann, Christian Bartelt, Noah Metzger, Heiner Stuckenschmidt, and Michael Wommer
- Subjects
Graph rewriting ,business.industry ,Computer science ,Big data ,Context (language use) ,Directed graph ,computer.software_genre ,Automation ,Data-driven testing ,Data-driven ,Graphical model ,Data mining ,business ,computer - Abstract
Technological innovations in data science and artificial intelligence research have led to increasing task automation in autonomous driving. Currently, most test engineering processes in the industry are based on manual test case specification and the accumulation of certain test mile thresholds. This test engineering is very cost- and time-consuming. But especially the test case specification and selection is influenced by human bias. A promising potential approach to overcome those drawbacks is data-driven test case mining based on big data of sensor/actor recordings from real driving situations. The key challenge for data-driven test case mining, is handling the huge amount of data generated by the car sensors related to the open-world context of autonomous driving. This paper presents a novel data-driven approach to quantify events and situations which occur during recorded test drives by transforming multivariate time series data into a condensed, directed graph. This graphical model makes such events and situations comparable and enables the application of established coverage criteria and thus supports statistical statements regarding the coverage of potentially infinite operating environments. To illustrate the benefits of this approach, we conducted a quantitative evaluation in an industrial context in the domain of automated driving, including over 1000 km of field data. The overall results prove that a significant amount of the data characteristics do not get lost during the Graph transformation.
- Published
- 2021
100. Graph-Based Approach to Improve Individual Tree Crown Delineation in Temperate Forest using Structural And Spectral Information
- Author
-
Thomas Houet, Thierry Erudel, David Sheeren, Xavier Briottet, Sophie Fabre, M. Deluzet, ONERA / DOTA, Université de Toulouse [Toulouse], ONERA-PRES Université de Toulouse, Dynamiques et écologie des paysages agriforestiers (DYNAFOR), École nationale supérieure agronomique de Toulouse [ENSAT]-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), Littoral, Environnement, Télédétection, Géomatique UMR 6554 (LETG), Université de Nantes (UN)-Université de Brest (UBO)-Université de Rennes 2 (UR2), and Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Watershed ,LiDAR ,010504 meteorology & atmospheric sciences ,0211 other engineering and technologies ,02 engineering and technology ,01 natural sciences ,Individual tree crown ,[SPI]Engineering Sciences [physics] ,Délinéation ,Segmentation ,Forest ,021101 geological & geomatics engineering ,0105 earth and related environmental sciences ,Mathematics ,[PHYS]Physics [physics] ,Graph rewriting ,business.industry ,Hyperspectral imaging ,Temperate forest ,Pattern recognition ,Image segmentation ,Delineation ,15. Life on land ,Tree (graph theory) ,Hyperspectral ,Forêt ,Artificial intelligence ,Scale (map) ,business - Abstract
International audience; Forest characterization at tree scale is possible with remotely sensed images of high spatial resolution. A first step is the Individual Tree Crown (ITC) delineation which corresponds to the segmentation of canopy cover into different tree crowns. In this study, a new method based on an initial watershed segmentation of Canopy Height Model (CHM) is proposed. This method is based on a graph transformation of the initial segmentation map in order to apply structural criteria (calculated owning to CHM) and spectral criterion (computed on red, green and blue bands). Adaptive thresholds are defined according to the studied forest characteristics in order to improve low quality segmentation cases. This method has been applied on a complex forest site (Broadleaf dominant, steep relief…). The results show a 17% increase of global performance in comparison to the reference watershed segmentation.; La caractérisation de la forêt à l'échelle de l'arbre est possible avec des images de télédétection de haute résolution spatiale. Une première étape est la délimitation de la couronne individuelle des arbres (ITC) qui correspond à la segmentation du couvert forestier en différentes couronnes d'arbres. Dans cette étude, une nouvelle méthode basée sur une segmentation initiale des bassins versants du modèle de hauteur de la canopée (CHM) est proposée. Cette méthode est basée sur une transformation graphique de la carte de segmentation initiale afin d'appliquer des critères structurels (calculés en propriété au CHM) et spectraux (calculés sur des bandes rouges, vertes et bleues). Des seuils adaptatifs sont définis en fonction des caractéristiques forestières étudiées afin d'améliorer les cas de segmentation de faible qualité. Cette méthode a été appliquée sur un site forestier complexe (dominante feuillue, relief escarpé…). Les résultats montrent une augmentation de 17% de la performance globale par rapport à la segmentation des bassins versants de référence.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.