628 results on '"Formal model"'
Search Results
202. Safe simulation testing of systems with refusals and destructions
- Author
-
I. B. Burdonov and A. S. Kosachev
- Subjects
formal model ,model based testing ,complete testing ,simulation ,system with refusals and distructions ,Information technology ,T58.5-58.64 - Abstract
The paper deals with conformance testing based on formal specications. The con- cept of safe testing was earlier proposed by the authors for trace based conformance. This concept is propagated on the case of (weak) simulation based on a relation between specication and implementation states. The theory of safe simulation of systems with refusals and destructions is proposed. The problems of complete testing and sucient conditions for the existense of complete test suite are discussed. The practical algo- rithm of complete testing for restricted classes of specications and implementations is described.
- Published
- 2010
203. A Finite State Machine Approach to Algorithmic Lateral Inhibition for Real-Time Motion Detection †
- Author
-
María T. López, Aurelio Bermúdez, Francisco Montero, José L. Sánchez, and Antonio Fernández-Caballero
- Subjects
formal model ,finite state machines ,artificial neural networks ,motion detection ,field programmable gate array ,Chemical technology ,TP1-1185 - Abstract
Many researchers have explored the relationship between recurrent neural networks and finite state machines. Finite state machines constitute the best-characterized computational model, whereas artificial neural networks have become a very successful tool for modeling and problem solving. The neurally-inspired lateral inhibition method, and its application to motion detection tasks, have been successfully implemented in recent years. In this paper, control knowledge of the algorithmic lateral inhibition (ALI) method is described and applied by means of finite state machines, in which the state space is constituted from the set of distinguishable cases of accumulated charge in a local memory. The article describes an ALI implementation for a motion detection task. For the implementation, we have chosen to use one of the members of the 16-nm Kintex UltraScale+ family of Xilinx FPGAs. FPGAs provide the necessary accuracy, resolution, and precision to run neural algorithms alongside current sensor technologies. The results offered in this paper demonstrate that this implementation provides accurate object tracking performance on several datasets, obtaining a high F-score value (0.86) for the most complex sequence used. Moreover, it outperforms implementations of a complete ALI algorithm and a simplified version of the ALI algorithm—named “accumulative computation”—which was run about ten years ago, now reaching real-time processing times that were simply not achievable at that time for ALI.
- Published
- 2018
- Full Text
- View/download PDF
204. Matching Security Policies to Application Needs
- Author
-
Eckert, Claudia, Eloff, Jan H. P., editor, and von Solms, Sebastiaan H., editor
- Published
- 1995
- Full Text
- View/download PDF
205. Using a Formal Model as a Meta-Model in the Analysis of Team Behavior in Organizations
- Author
-
Stewart, R. W., Ellis, Keith, editor, Gregory, Amanda, editor, Mears-Young, Bridget R., editor, and Ragsdell, Gillian, editor
- Published
- 1995
- Full Text
- View/download PDF
206. Jupiter/MDD: The Jupiter Interoperator Multidatabase Dictionary
- Author
-
Murphy, John, Grimson, Jane, Patel, Dilip, editor, Sun, Yuan, editor, and Patel, Shushma, editor
- Published
- 1995
- Full Text
- View/download PDF
207. Correct-by-Construction Approach for Formal Verification of IoT Architecture
- Author
-
Zinah Hussein Toman, Lazhar Hamel, Sarah Hussein Toman, Mohamed Graiet, Faculté des Sciences de Monastir (FSM), Université de Monastir - University of Monastir (UM), Software Stack for Massively Geo-Distributed Infrastructures (STACK), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire des Sciences du Numérique de Nantes (LS2N), Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-École Centrale de Nantes (Nantes Univ - ECN), Nantes Université (Nantes Univ)-Nantes Université (Nantes Univ)-Nantes université - UFR des Sciences et des Techniques (Nantes univ - UFR ST), Nantes Université - pôle Sciences et technologie, Nantes Université (Nantes Univ)-Nantes Université (Nantes Univ)-Nantes Université - pôle Sciences et technologie, Nantes Université (Nantes Univ)-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), and Nantes Université (Nantes Univ)
- Subjects
Internet of Things(IoT) ,[INFO.INFO-WB]Computer Science [cs]/Web ,General Earth and Planetary Sciences ,Event-B ,Formal model ,IoT architecture ,General Environmental Science - Abstract
International audience; Many disciplines have adopted component-based principles to avail themselves of the many advantages they bring, especially component reusability. In a short time, the component-based architecture became a renown branch in the IT world and the center of interest of many researchers. Much work has been conducted in this context for the verification of component-based applications (CBAs). However, the main focus has been on the structural aspect of such compositions, while the behavioral aspect has seldom been dealt with. In this paper, our goal is to close this gap and propose a formal approach to verify the behavioral correctness of CBAs. We first define a set of requirements to be satisfied by the structure and the behavior of a CBA, represented by a set of interactions that may occur between their components. Then, we build a formal Event-B model to represent these requirements in a rigorous and non-ambiguous way. The use of the Event-B refinement technique allows us to master the complexity of CBAs by introducing their elements in an incremental manner. The correctness of the development is ensured by establishing a set of proof obligations, under the Rodin platform, and also by animating it with the ProB animator/model checker. The approach is illustrated by a running example.
- Published
- 2022
- Full Text
- View/download PDF
208. Evaluating a formal modelling language
- Author
-
Ruiz, Fidel, van Harmelen, Frank, Aben, Manfred, van de Plassche, Joke, Carbonell, Jaime G., editor, Siekmann, Jörg, editor, Goos, G., editor, Hartmanis, J., editor, van Leeuwen, J., editor, Steels, Luc, editor, Schreiber, Guus, editor, and Van de Velde, Walter, editor
- Published
- 1994
- Full Text
- View/download PDF
209. Managing entity versions within their contexts: A formal approach
- Author
-
Gançarski, Stéphane, Jomier, Geneviève, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, and Karagiannis, Dimitris, editor
- Published
- 1994
- Full Text
- View/download PDF
210. The Words of the Grand Débat national (Great National Debate): the Lexical Networks of the Contributions Submitted on Three Platforms
- Author
-
Ploux, Sabine, Genay, Michael, Ploux-Chillès, Leu, CAMS, Centre d'Analyse et de Mathématique sociales (CAMS), and École des hautes études en sciences sociales (EHESS)-Centre National de la Recherche Scientifique (CNRS)-École des hautes études en sciences sociales (EHESS)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
analyse sémantique ,data visualisation ,[SCCO.NEUR]Cognitive science/Neuroscience ,linguistics ,[SHS]Humanities and Social Sciences ,modèle formel ,semantic analysis ,traitement automatique des langues ,visualisation de données ,AZ20-999 ,History of scholarship and learning. The humanities ,General Materials Science ,linguistique et sciences du langage ,natural language processing ,formal model ,ComputingMilieux_MISCELLANEOUS - Abstract
À l’occasion du Grand Débat national, lancé le 15 janvier 2019, plusieurs plateformes comme celles du Grand Débat national (GDN), du Vrai Débat (VD) et d’Entendre la France (EF) ont recueilli les contributions de participants sur des sujets de société. Dans cet article, nous présentons une méthode pour extraire et analyser les réseaux lexicaux contenus dans les corpus de textes formés par ces contributions grâce au modèle géométrique des Atlas sémantiques. Les résultats qui en découlent donnent, d’une part, les mots et le profil partagés par les trois plateformes, ainsi que les mots et profils propres à chacune d’elles et, d’autre part, pour chacun des mots, son réseau lexical. La liste des mots surreprésentés dans ces corpus et partagés par les trois plateformes contient essentiellement des mots relatifs à l’écologie et à la fiscalité. Les listes propres à chacune d’elles montrent des profils distincts. En particulier, le corpus GDN contient une surreprésentation des mots incivilité et respect ainsi que des mots relatifs à l’écologie et au collectif, celui du VD une surreprésentation des termes relatifs à des organisations politiques, gouvernementales ou internationales, à des personnalités politiques, à des contingences personnelles, sociales et économiques, à des privilèges, à des modes de participation et de vote. Chez les contributeurs d’EF (moyenne d’âge : 29 ans), on observe une surreprésentation des mots relatifs aux discriminations, à la tolérance et à une écologie des pratiques. Enfin, deux exemples de réseaux lexicaux extraits du corpus GDN sont détaillés : celui du mot transport et celui du mot contre. Pour le mot contre, choisi car son réseau lexical révèle de nombreux sujets débattus par les contributeurs, nous montrons que la méthode permet d’expliciter et de faire la synthèse de liens sémantiques et de révéler leur organisation. Il ressort de cet exemple que le domaine de l’écologie est un centre organisateur qui articule les principaux thèmes abordés. During the Grand Débat national, launched on January 15, 2019, several platforms such as the Grand Débat national (GDN), Le Vrai Débat (VD), or Entendre la France (EF) collected contributions from participants on societal issues. In this article, we present a method for extracting and analyzing lexical networks derived from the text corpora formed by these contributions using the Semantic Atlas geometric model. The method permits to obtain (1) words and profiles shared by the three platforms, as well as words and profiles specific to each of them, (2) for each word, its lexical network. The list of words over-represented in these corpora and shared by the three platforms contains mainly words related to environmental issues and taxation. The lists specific to each of the platforms show distinct profiles. In particular, the GDN corpus shows an over-representation of words related to incivility and respect, as well as words related to environmental issues and the collective, the VD corpus shows an over-representation of terms related to political, governmental, or international organizations, political figures, personal, socio-economic contingencies, privileges, or modes of participation and voting. For EF, whose contributors are young (average age 29), one finds an over-representation of words related to discrimination, tolerance, and behaviours based on environmental concern. Finally, two examples of lexical networks extracted from the GDN corpus are detailed: that of the word transport (“transport”) and that of the word contre (“against”). For the word contre – chosen because its lexical network reveals which topics matter to the contributors – we show that the method makes explicit and synthesizes semantic links and reveals their organization. It can be seen from this example that environmental issues are an organizing center around which the main topics addressed by the contributors are articulated.
- Published
- 2021
- Full Text
- View/download PDF
211. Strategic Sovereignty.
- Author
-
Steinberg, Jessica
- Subjects
- *
RESOURCE exploitation , *SOVEREIGNTY , *MINERAL industries , *SOCIAL conflict , *PUBLIC demonstrations , *GOVERNMENT revenue , *MINES & mineral resources & the environment , *POLITICAL persecution , *GOVERNMENT policy , *WAR & society ,SOCIAL aspects - Abstract
In some regions of natural resource extraction, embedded local populations receive transfers that compensate them for environmental consequences of extraction; while in others, these populations receive no benefits and endure negative environmental externalities, which can lead to violent protest. This article develops a formal model of the strategic dynamics among a government, a natural resource extraction firm, and a local population in an extractive region to understand the variation in extractive outcomes. The model specifies the conditions under which firms will provide promised transfers to a local population, distributive conflict will occur, and how the government will respond. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
212. A Formal Model for Autonomous Planning in High Performance Systems.
- Author
-
Amato, Flora, Mazzeo, Antonino, Mazzocca, Nicola, and Moscato, Francesco
- Subjects
COMPUTER architecture ,CLOUD computing ,HIGH performance computing ,INTERNET of things ,COMPUTATIONAL complexity - Abstract
Nowadays, novel architectures like Cloud and Internet of Things (IoT) make available several resources like computing nodes, environmental sensors etc. that enable the introduction of more and more intelligent systems able to face complex situations. In particular management of critical and dangerous situations may take advantage of those systems whose complexity is growing up faster and faster. In this scenario, it is difficult to orchestrate different autonomous systems in order to face with new, previously unmanaged emergencies. In this work we present a modeling methodology and a planning techniques based on a multi-agent model. Agents describe capabilities of each available IoT element in an area where a critical situation has occurred; the planning methodology exploit both classical and a new counter-example based approaches to build a coordination plan of resources in order to achieve given goals like traffic management or people flight during a terrorist attack. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
213. PRIGUARD: A Semantic Approach to Detect Privacy Violations in Online Social Networks.
- Author
-
Kokciyan, Nadin and Yolum, Pinar
- Subjects
- *
RIGHT of privacy , *SOCIAL networks , *ONTOLOGY , *END users (Information technology) , *COMPUTER users , *INTERNET users - Abstract
Social network users expect the social networks that they use to preserve their privacy. Traditionally, privacy breaches have been understood as the malfunctioning of a given system. However, in online social networks, privacy breaches are not necessarily a malfunctioning of a system but a byproduct of its workings. The users are allowed to create and share content about themselves and others. When multiple entities start distributing content without a control, information can reach unintended individuals and inference can reveal more information about the user. Accordingly, this paper first categorizes the privacy violations that take place in online social networks. Our categorization yields that the privacy violations in online social networks stem from intricate interactions and detecting these violations requires semantic understanding of events. Our proposed approach is based on agent-based representation of a social network, where the agents manage users’ privacy requirements by creating commitments with the system. The privacy context, including the relations among users or content types, are captured using description logic. The proposed detection algorithm performs reasoning using the description logic and commitments on a varying depths of social networks. We implement the proposed model and evaluate our approach using real-life social networks. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
214. An integrated hazard identification method based on the hierarchical Colored Petri Net.
- Author
-
Wang, Rui, Zheng, Wei, Liang, Ci, and Tang, Tao
- Subjects
- *
HAZARDS , *PETRI nets , *ORGANIZATIONAL structure , *AUTOMATIC control systems , *RAILROAD accidents - Abstract
The traditional hazard analysis approaches applied to the socio-technical system cannot cover the complex organization structures, the interactions between systems and human behaviors, the interrelated factors among sub-systems and the safety culture of specific societies. This paper presents an integrated hazard identification approach named System-Theoretic Process Analysis Based on Formalization Model (BFM-STPA), which can solve the above issues. Firstly, the hierarchical control structure models of the socio-technical system are established through Colored Petri Nets (CPN) due to its strong description ability and executable ability, which may also be regarded as the graphical system specification. Secondly, the hazards can be identified according to the CPN models following a series of guide conditions. Thirdly, the comprehensive contributing factors to the hazards will be found out by tracing the former states within the reachability graph generated from CPN model. Finally, an integrated hazard log can be derived for further hazard analysis and safety-guided design. In this paper, the above method was applied in the Chinese Train Control System level 3 (CTCS-3). And the process of hazard identification for the scenario of Temporary Speed Restriction issued was elaborated in detail. Compared with the hazard log generated by Hazard and Operability (HAZOP), the hazard log generated by BFM-STPA covered not only the subsystem failures, but also the deviation of interactions among subsystems from design intent, human errors and socio-technical drawbacks related to the TSR Issued scenario of CTCS-3. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
215. Modelling timed reactive systems from natural-language requirements.
- Author
-
Carvalho, Gustavo, Cavalcanti, Ana, and Sampaio, Augusto
- Subjects
- *
NATURAL language processing , *DATA flow computing , *UNIFIED modeling language , *SEMANTICS , *ALGORITHMS - Abstract
At the very beginning of system development, typically only natural-language requirements are documented. As an informal source of information, however, natural-language specifications may be ambiguous and incomplete; this can be hard to detect by means of manual inspection. In this work, we present a formal model, named data-flow reactive system (DFRS), which can be automatically obtained from natural-language requirements that describe functional, reactive and temporal properties. A DFRS can also be used to assess whether the requirements are consistent and complete. We define two variations of DFRS: a symbolic and an expanded version. A symbolic DFRS (s-DFRS) is a concise representation that inherently avoids an explicit representation of (possibly infinite) sets of states and, thus, the state space-explosion problem. We use s-DFRS as part of a technique for test-case generation from natural-language requirements. In our approach, an expanded DFRS (e-DFRS) is built dynamically from a symbolic one, possibly limited to some bound; in this way, bounded analysis (e.g., reachability, determinism, completeness) can be performed. We adopt the s-DFRS as an intermediary representation from which models, for instance, SCR and CSP, are obtained for the purpose of test generation. An e-DFRS can also be viewed as the semantics of the s-DFRS from which it is generated. In order to connect such a semantic representation to established ones in the literature, we show that an e-DFRS can be encoded as a TIOTS: an alternative timed model based on the widely used IOLTS and ioco. To validate our overall approach, we consider two toy examples and two examples from the aerospace and automotive industry. Test cases are independently created and we verify that they are all compatible with the corresponding e-DFRS models generated from symbolic ones. This verification is performed mechanically with the aid of the NAT2TEST tool, which supports the manipulation of such models. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
216. Using Language Processing to Evaluate the Equivalency of the FASB and IASB Standards.
- Author
-
Fisher, Ingrid E. and Nehmer, Robert A.
- Subjects
GOVERNMENT accountability ,GOVERNMENT agencies ,TRANSPARENCY in government ,ACCOUNTING standards ,ACCOUNTANTS ,ACCOUNTING - Abstract
The passage of the Data Transparency and Accountability Act in the United States Congress will necessitate that government agencies provide more data in transparent formats. The issue of how to interpret such data remains an open question. The accounting profession has continued to struggle with common formats since the inception of balance sheets and income statements. The original FASB Conceptual Framework was developed to help construct consistent GAAP standards. XBRL was developed to provide a consistent representation of the data contained in financial statements and other financial documents. This research explores the use of two codifications (U.S. GAAP and IFRS) of GAAP standards in both their syntactic representation through XBRL taxonomies and their semantics through their authoritative references back to their own standards and codification. The research uses language theory to model the codifications in terms of the strings used to represent lexical content in the financial statements and to provide a systematic mapping to the semantics of the related XBRL specifications. The immediate objectives of this research are to provide a means to compare the semantic richness of U.S. GAAP and IFRS and to determine the consistency of either standardization with respect to the emerging shared Conceptual Framework. Ultimately, to the extent that the system is able to model both the syntax and the semantics of the financial statements, it could provide a baseline on which to consider assurance over parts of the financial statements, rather than over the financial statements taken as a whole. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
217. “Red, White, Yellow, Blue, All Out but You”.
- Author
-
Skvoretz, John and Bailey, Jasmón L.
- Subjects
- *
TEAMS , *SOCIAL groups , *MEDICAL care , *PERFORMANCE evaluation , *EXPECTATION (Psychology) - Abstract
Teams are ubiquitous in contemporary business, government, health care, and education settings; hence, the process of team formation is worth close examination. We propose models based in expectation states theory for the probability that a particular candidate (or subset of candidates) is selected from a pool of potential team members who are differentiated along diffuse status characteristics. The candidates may be equally qualified in other respects, but the ways in which they differ will be activated under specified conditions and influence their chances of selection. We use the “motherhood penalty” literature to illustrate the model and the inferences it affords. Our concluding discussion notes that although a step forward in understanding team selection, the model cannot be the whole story as “suitability,” a legitimate consideration in the team formation process, is unaddressed by an expectation states based model focused solely on attributions of competence as the drivers of teammate choice. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
218. A Formal Model of QoS-Aware Web Service Orchestration Engine.
- Author
-
Wang, Yong
- Abstract
QoS-aware applications can satisfy not only the functional requirements of the customers, but also the QoS requirements. QoS-aware Web service orchestration translates the QoS requirements of the customers into those of its component Web services. In a system viewpoint, we discuss issues on QoS-aware Web service orchestration and design a typical QoS-aware Web service orchestration engine called QoS-WSOE. More importantly, we establish a formal model of QoS-WSOE based on actor systems theory. Within the formal model, we use a three-layered pyramidal structure to capture the requirements of the customers with a concept named QoS-aware WSO service, characteristics of QoS-WSOE with a concept named QoS-aware WSO system, and structures and behaviors of QoS-WSOE with a concept named QoS-aware WSO behavior. Conclusions showing that a system with QoS-aware WSO behavior is a QoS-aware WSO system and further can provide QoS-aware WSO Service are drawn. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
219. A Simulation Model of a Human as a Material Handling Task Performer
- Author
-
Dongmin SHIN and Richard WYSK
- Subjects
Human Material Handling Task ,Colored Petri Net ,Simulation Framework ,Formal Model ,Information technology ,T58.5-58.64 ,Communication. Mass media ,P87-96 - Abstract
In this paper, a framework for a simulation approach to develop a formal representation of control and analysis of human-involved computer integrated manufacturing systems (Hi-CIM) is presented. Important properties of a human material handler within manufacturing systems are discussed and human tasks and errors are identified to build a simulation model. Based on the number of locations where a human operator is required to move to complete a task, material handling tasks are classified into two sets which include an on-the-spot task set and an around-the-system task set. For human errors associated with the task sets, a location error set and an orientation error set are defined. These task sets and error types provide a framework for developing a simulation model of a human material handling task-performing process. To represent the model, a colored Petri net model is used because it provides a good graphical and analytical representation of a system. Human tasks and error types are represented using color tokens. A simulation model of the system can be implemented based on the proposed colored Petri Net model.
- Published
- 2005
220. Dr.Aid: Supporting Data-governance Rule Compliance for Decentralized Collaboration in an Automated Way
- Author
-
Rui Zhao, Federica Magnoni, Petros Papapanagiotou, Jacques Fleuriot, and Malcolm Atkinson
- Subjects
FOS: Computer and information sciences ,Process management ,Computer Networks and Communications ,Computer science ,Computer Science - Artificial Intelligence ,02 engineering and technology ,obligation policy ,Data governance ,Computer Science - Databases ,020204 information systems ,data policy ,Formal language ,0202 electrical engineering, electronic engineering, information engineering ,Citizen science ,Automated reasoning ,formal model ,automated reasoning ,business.industry ,Corporate governance ,020207 software engineering ,Databases (cs.DB) ,Automation ,Human-Computer Interaction ,Artificial Intelligence (cs.AI) ,Work (electrical) ,business ,data governance ,Social Sciences (miscellaneous) ,Agile software development - Abstract
Collaboration across institutional boundaries is widespread and increasing today. It depends on federations sharing data that often have governance rules or external regulations restricting their use. However, the handling of data governance rules (aka. data-use policies) remains manual, time-consuming and error-prone, limiting the rate at which collaborations can form and respond to challenges and opportunities, inhibiting citizen science and reducing data providers' trust in compliance. Using an automated system to facilitate compliance handling reduces substantially the time needed for such non-mission work, thereby accelerating collaboration and improving productivity. We present a framework, Dr.Aid, that helps individuals, organisations and federations comply with data rules, using automation to track which rules are applicable as data is passed between processes and as derived data is generated. It encodes data-governance rules using a formal language and performs reasoning on multi-input-multi-output data-flow graphs in decentralised contexts. We test its power and utility by working with users performing cyclone tracking and earthquake modelling to support mitigation and emergency response. We query standard provenance traces to detach Dr.Aid from details of the tools and systems they are using, as these inevitably vary across members of a federation and through time. We evaluate the model in three aspects by encoding real-life data-use policies from diverse fields, showing its capability for real-world usage and its advantages compared with traditional frameworks. We argue that this approach will lead to more agile, more productive and more trustworthy collaborations and show that the approach can be adopted incrementally. This, in-turn, will allow more appropriate data policies to emerge opening up new forms of collaboration., Accepted for The 24th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
- Published
- 2021
- Full Text
- View/download PDF
221. Formal Analysis and Design of Supervisor and User Interface Allowing for Non-Deterministic Choices Using Weak Bi-Simulation
- Author
-
Shazada Muhammad Umair Khan and Wenlong He
- Subjects
user interface ,machine interface ,supervisor interface ,formal model ,composite interface ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
In human machine systems, a user display should contain sufficient information to encapsulate expressive and normative human operator behavior. Failure in such system that is commanded by supervisor can be difficult to anticipate because of unexpected interactions between the different users and machines. Currently, most interfaces have non-deterministic choices at state of machine. Inspired by the theories of single user of an interface established on discrete event system, we present a formal model of multiple users, multiple machines, a supervisor and a supervisor machine. The syntax and semantics of these models are based on the system specification using timed automata that adheres to desirable specification properties conducive to solving the non-deterministic choices for usability properties of the supervisor and user interface. Further, the succinct interface developed by applying the weak bi-simulation relation, where large classes of potentially equivalent states are refined into a smaller one, enables the supervisor and user to perform specified task correctly. Finally, the proposed approach is applied to a model of a manufacturing system with several users interacting with their machines, a supervisor with several users and a supervisor with a supervisor machine to illustrate the design procedure of human–machine systems. The formal specification is validated by z-eves toolset.
- Published
- 2018
- Full Text
- View/download PDF
222. Formal model of cyber attacks on virtualization tools and a measure of hypervisor vulnerability.
- Author
-
Nikolskiy, A. and Vasil'ev, Yu.
- Abstract
A description has been provided for a formal model of cyber attack on virtualization tools that allow one to formulate condition for the security of virtualization tools. The concept of measuring the vulnerability of virtualization tools has been introduced that characterizes the predisposition of a system to vulnerabilities that contribute to the implementation of cyber attacks in the proposed formal model. These characteristics of virtualization tools allow one to compare different hypervisors and estimate the presence of vulnerabilities in them. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
223. Prospects of modelling societal transitions: Position paper of an emerging community.
- Author
-
Holtz, Georg, Alkemade, Floortje, de Haan, Fjalar, Köhler, Jonathan, Trutnevyte, Evelina, Luthe, Tobias, Halbe, Johannes, Papachristos, George, Chappin, Emile, Kwakkel, Jan, and Ruutu, Sampsa
- Subjects
STAKEHOLDERS ,COMPUTATIONAL complexity ,ECONOMIC models ,ECONOMIC activity ,COOPERATION - Abstract
Societal transitions involve multiple actors, changes in institutions, values and technologies, and interactions across multiple sectors and scales. Given this complexity, this paper takes on the view that the societal transitions research field would benefit from the further maturation and broader uptake of modelling approaches. This paper shows how modelling can enhance the understanding of and support stakeholders to steer societal transitions. It discusses the benefits modelling provides for studying large societal systems and elaborates on different ways models can be used for transitions studies. Two model applications are presented in some detail to illustrate the benefits. Then, limitations of modelling societal transitions are discussed, which leads to an agenda for future activities: (1) better cooperation in the development of dynamic models, (2) stronger interaction with other transition scholars and stakeholders, and (3) use of additional modelling approaches that we think are relevant to and largely unexplored in transitions studies. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
224. Prejudice, Exclusion, and Economic Disadvantage.
- Author
-
Kelley, Jonathan and Evans, M. D. R.
- Subjects
- *
FINANCIAL services industry , *PREJUDICES , *FREE enterprise , *LABOR market , *SOCIOLOGY - Abstract
A central hypothesis about discrimination is that prejudice forces the stigmatized into low-paying, undesirable jobs. Prejudice clearly leads to exclusion. But surprisingly, evidence linking exclusion to disadvantage is mixed. We address this issue theoretically, providing a formal rational choice model combining arguments from sociology (on prejudice) and economics (on competition). Our theory suggests that economic organization is crucial. In economies dominated by monopoly, oligarchy, tradition, or government, prejudice may reduce some workers’ pay, and a disadvantageous secondary labor market may emerge. By contrast, in competitive free markets, exclusionary discrimination often occurs but does not reduce workers’ pay, nor does it induce a disadvantageous secondary labor market. Our theory suggests the conventional analytic approach to discrimination is misguided: Exclusion does not necessarily imply disadvantage; a shortfall in pay does not necessarily imply that the lower paid worker is disadvantaged; and analysis should focus on the overall subjective well-being or utility derived from a job, not on pay alone. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
225. A formal model for intellectual relationships among knowledge workers and knowledge organizations.
- Author
-
Mao-Lin Li, Duncan Yung, and ShiKuo Chang
- Subjects
- *
KNOWLEDGE workers , *KNOWLEDGE management , *ONLINE social networks , *MACHINE learning , *COMPUTER research - Abstract
An academic learning network consists of multiple knowledge organizations and knowledge workers. The intellectual relationships can be derived from the interactions among them. In this paper, we propose a formal model to describe the interactions in an academic learning network and further provide an evaluation process to quantify intellectual relationships. Our approach is also integrated with a realistic social network platform SMNET. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
226. Transforming time constraints of a GRAFCET graph into a suitable Petri net formalism.
- Author
-
Schumacher, Frank and Fay, Alexander
- Abstract
GRAphe Fonctionnel de Commande Etape Transition (GRAFCET) is a powerful graphical modeling language for the specification of controllers in discrete event systems and an international standard since 1988. It contributes to a more structural and model driven approach in the design of logic controllers but still lacks an exhaustive formal definition. As a step towards an exhaustive formal definition of GRAFCET this paper discusses time dependencies, as they are defined in IEC 60848, by comparing them to time constraints of timed Petri nets and Time Petri nets. Based on this analysis the authors propose an extension of a formal model for GRAFCET, which is a specific type of a control interpreted Petri net. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
227. Using Dynamic Probe for Deadlock Detection in Component-Based System.
- Author
-
Li, Chen, Huang, Linpeng, Chen, Luxi, and Luo, Weichao
- Abstract
Component-based development has gained a lot of attention in recent years. As a software development paradigm, it enhances the reusability and reduces the complexity but it also brings new challenges to Component-based System (CBS) reliability especially for deadlock problem. Since the CBS has a unique character which is component based, the composition might easily cause the deadlock of component connection in semantic and hurt the system reliability. In this paper, we present Dynamic Probe(DP) strategy for the deadlock problem of CBS. First a formal semantic model is proposed to abstract the interaction among the components for analyzing the deadlock connection, and then DP Detection algorithm is used to detect the deadlock loops, if the deadlock connections are detected then DP Elimination algorithm is used to evaluated the components reliability by several measurement indexes to find the component, which reliability lower than other components, and then replace it. Last, by the comparison to other related work, the result shows that the proposed strategy can both achieve lower processing cost and higher reliability. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
228. A Formal Model of Service Network and Its Description Using Pi-calculus.
- Author
-
Hu, Jing and Feng, Zhi-Yong
- Abstract
The concept of service network really helps to achieve dynamic, flexible, self-service composition. Service network is composed of nodes. The channel structure of nodes reflects the interaction between services and the dynamic structure of service composition. Besides a brief review and summary of the recent research of service composition and the formal description of interface, this paper defines the abstract service, service and the channel between them as the basic of service network. The definition of abstract service and service is given through the formal description of the syntax and semantic structure of channel. The relationship between channels is defined upon the definition mentioned above. All of the concept mentioned above can be described by Pi-calculus, and the validity of them is explained through an example at the end. The formal model presented in this paper provides the theoretical foundation for several works that base on service network, such as the dynamic service composition, the authentication of the correctness and consistency of service composition, and security of service composition. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
229. A Handling Management System for Freight with the Ambient Calculus and UHF RFID Tags.
- Author
-
Kato, Toru and Higuchi, Masahiro
- Abstract
This paper proposes a freight management system that confirms the correctness of container handling during shipping. The system determines the correctness by comparing container handling, which is sensed by UHF RFID tags, with formal models (formulae) written in the ambient calculus. The ambient calculus is a formal description language that is suitable for expressing freight systems with nested structures that dynamically change. The management system generates formulae automatically from several documents used in real freight systems. An implementation of the system and the results of several experiments using it are presented. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
230. Towards the Automated Engineering of Dependable Adaptive Services.
- Author
-
Baker, Thar, Randles, Martin, and Taleb-Bendiab, A.
- Abstract
The dependability of runtime composition of Cloud-Based Services is affected by many issues including scalability and reliability, which are commonly proposed to be solved by the use of adaptive software solutions. Usually, however, the use of various software paradigms to achieve such adaptability requires that the design of the formal operational model to be implicitly linked with the end implementation. Such rigid reliance upon a static model thereby constrains the adaptability and flexibility of the composition. This paper contends that in order for adaptable Cloud-Based Services to be produced, a formal model should be specified and enacted independently from the runtime implementation. The paper shows by use of situation calculus and software representation techniques for service composition, such as an Intention Description Language, how these issues can be addressed for assured runtime adaptable, deliberative systems. In conclusion, by use of a representative example and a case study, the methodology proposed is evaluated to highlight the advantages discussed, and to identify problems still to be resolved. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
231. Novel algorithm for detecting conflicts in firewall rules.
- Author
-
Gawanmeh, Amjad and Tahar, Sofiene
- Abstract
Firewalls are widely adopted for protecting private networks by filtering out undesired network traffic in and out of secured networks. Therefore, they play an important role in the security of communication systems. The verification of firewalls is a great challenge because of the dynamic characteristics of their operation, their configuration is highly error prone, and finally, they are considered the first defense to secure networks against attacks and unauthorized access. In this paper, we present a formal model for firewalls rulebase and a novel algorithm for detecting and identifying conflicts in firewalls rulebase. Our algorithm is based on calculating the conflict set of firewall configurations using the domain restriction. We show that the algorithm terminates, then we apply it on a firewall rulebase example. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
232. Distance Hijacking Attacks on Distance Bounding Protocols.
- Author
-
Cremers, Cas, Rasmussen, Kasper B., Schmidt, Benedikt, and Capkun, Srdjan
- Abstract
After several years of theoretical research on distance bounding protocols, the first implementations of such protocols have recently started to appear. These protocols are typically analyzed with respect to three types of attacks, which are historically known as Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. This type of attack poses a serious threat in many practical scenarios. We show that many proposed distance bounding protocols are vulnerable to Distance Hijacking, and we propose solutions to make these protocols resilient to this type of attack. We show that verifying distance bounding protocols using existing informal and formal frameworks does not guarantee the absence of Distance Hijacking attacks. We extend a formal framework for reasoning about distance bounding protocols to include overshadowing attacks. We use the resulting framework to prove the absence of all of the found attacks for protocols to which our countermeasures have been applied. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
233. FORMAL MODELLING AND VERIFICATION OF COMPENSATING WEB TRANSACTIONS.
- Author
-
DAS, SHIRSHENDU, CHAKRABORTY, SHOUNAK, and KAPOOR, HEMANGEE K.
- Subjects
DATABASES ,TRANSACTION systems (Computer systems) ,COMPUTER systems ,CALCULI ,BIOMINERALIZATION ,PATHOLOGY - Published
- 2012
234. A formal theory for web-based control for GSM Quality-of-Service.
- Author
-
Charles, Bassey Patience, Akinkumi, and Babatunde, O.
- Abstract
The need for effective web-based control ontology for GSM Quality-of-Service (QoS) demands the availability of a formal theory that allows for a dynamic interaction among the parties concerned. This dynamic control ontology follows a three-tier dynamic architecture that is void of total dependence on the information from the providers and also employs a feedback mechanism from the actual users of the services. This work proposes a formal model for Dynamic Control Ontology that will aid in providing efficient quality control measures over GSM services. Identified concepts and relationships were considered as basic facts and inferences around these concepts were defined. First-Order Logic, due to its expressivity was considered as the appropriate representational language for this formal model. This work would provide the platform for efficient reasoning and proofs of logical consequences that serve as answers to questions raised by government during its policy making, telecommunication companies when making findings on how to compete and take management decisions and subscribers in their choice of network. This model is expected to assist in ensuring effective quality, affordability of telephone services, as well as increased geographical spread of communication services in Nigeria. [ABSTRACT FROM PUBLISHER]
- Published
- 2011
- Full Text
- View/download PDF
235. Campaigning to the Median Voter or Mobilizing the Base? The Politics of Interest Group Influence on Political Party Platforms [AKA: "Gimme All Your Planks, or I'll Take These Voters Elsewhere"].
- Author
-
Yannitell Reinhardt, Gina and Victor, Jennifer
- Subjects
- *
PRESSURE groups , *VOTING research , *POLITICAL campaigns , *POLITICAL platforms , *POLITICAL opposition - Abstract
Downs predicts that presidential candidates will positions their platforms at the median. Whatdoes this mean for party platforms? Are we to expect them to be placed at the median as well, orfarther toward the poles, in order to pander to party loyalists? We investigate these questionstheoretically, formally, and empirically, and argue that parties view interest groups as a means tomobilize voters, while interest groups view parties and their platforms as a means to articulateinterests. A formal theoretical model derives the conditions under which parties would choose todiverge from the median and articulate an interest group's position in its platform, and anempirical analysis further shows that parties give platform concessions to ideologues positionedaway from the median, to groups that offer a credible threat of exit to the opposition party, and togroups that can credibly claim to mobilize voters. Both models account for a group's ability tomobilize voters, including size, party loyalty, and ideology. Data are derived from contentanalysis of Democratic Party platforms and platform hearing testimony from interest groups in1996, 2000, and 2004. Results show that interest groups can capture parties and their platformsand mold the platform to reflect their views. Parties are compliant because they rely on groupsto help turn out voters. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2009
236. A Generic Formal Framework for Protocol Interoperability Test and Test Cases Minimization.
- Author
-
Ning Zhong, Zun-wen He, and Jing-ming Kuang
- Subjects
GENETIC algorithms ,COMPUTER systems ,COMBINATORIAL optimization ,SOFTWARE engineering ,INFORMATION technology - Abstract
A generic formal framework for protocol interoperability test is proposed, which consider the common situation of protocol interoperability test by introducing the multi-stimuli principle in the multi-port FSM. A novel interoperability test sequences minimization scheme based on genetic algorithm (GA) is proposed to avoid the state space explosion problem, which easily occur in multi-stimuli systems during the interoperability test. Interoperability test sequences always contain two parts: interoperability part and local part. Conventional algorithms only remove redundancy from conformance test sequences and do not consider the redundant path relevant for interoperability part. During our work, the minimal-complete-coverage criterion and GA are applied to remove redundancy in both local transitions and interoperability transitions. Experiment results show that compare to conventional algorithm, our algorithm can avoid the state space explosion problem effectively and more practical for it can reduce the length of the test sequences and maintain the same transition coverage. [ABSTRACT FROM AUTHOR]
- Published
- 2008
237. Prescient Primaries?: A spatial voting model of US Primaries with early commitment and uncertainty over future preferences.
- Author
-
Porter, E. Grant
- Subjects
- *
PRIMARIES , *POLITICAL parties , *POLITICAL campaigns , *PRESIDENTIAL candidates , *VOTERS - Abstract
The acceleration and clustering of state primaries have resulted in an intra-party nomination campaign that has been remarkably successful at educating the public about the presidential candidates. With voters demanding unambiguous candidate choices, this front-loading of primaries has forced challengers to enter the nominating contest early and substantively differentiate themselves from their challengers long before the subsequent general election. In nominating their party's general election candidate, strategic primary voters will vote according to their own preferences as well as the population's preference distribution. However, given the temporal gap between the primary and general elections the expected distribution of the general election voters at the moment the candidates must commit to a policy is at best based upon a probabilistic expectation of the future distribution of voters at the time of the general election.In this paper I formalize the American electoral cycle as a one-dimensional, two-step, sequential election model characterized by: (1) two simultaneously-held, closed, single-shot, partisan primaries that limit candidate access to the subsequent general election to two nominees (one from each party); and, (2) a passive single-shot lottery-like general election that follows an exogenous shock, which changes the voters preference distribution. I assume voters must commit to an unambiguous and fixed policy position in the primary stage.The key theoretical insight concerns the temporal gap between the primary and general election and thus the effect of future uncertainty given the preselected unambiguous and inflexible candidate locations. This model rejects the pure strategy of full convergence and instead supports off-median equilibriums that are capable of being maintained over repeated electoral cycles. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2008
238. Strategic Dissents and Strategic Accommodation on the U.S. Courts of Appeals.
- Author
-
Broscheid, Andreas
- Subjects
- *
DISSENTING opinions (Law) , *JUDICIAL opinions , *LEGAL judgments , *WHISTLEBLOWERS , *DISSENTERS , *UNITED States appellate courts - Abstract
Several studies have argued that U.S. Courts of Appeals compliance with higher court preferences is partly caused by the presence of whistleblowers - potential dissenters - on three-judge panels. Other studies have argued that dissents can be explained with the whistleblower argument: Dissenters raise strategically alarms if a panel majority makes a decision that is contrary to higher court preferences, and if the dissenter prefers the higher court's expected decision to the panel majority's. The problem with the whistleblower explanation of dissents is that the whistleblower explanation of compliance cannot explain dissents - if panel majorities comply with higher court preferences, strategic dissents are pointless. This paper presents a model that solves this problem. Taking the quality of legal arguments into account, I argue that judges who disagree with the majority on a three-judge appeals panel will dissent if their legal argument if stronger than that of the majority. In several circumstances, it can be shown that the dissent in fact benefits the majority as it moves the decision outcome closer to its policy ideal. The results highlight the need to systematically analyze the legal arguments espoused in court opinions. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2007
239. Public Personnel Policy and Legislative Influence over Bureaucracy.
- Author
-
Desmarais, Bruce, Hoyman, Michelle, and Jacobson, Willow
- Subjects
- *
BUREAUCRACY , *PUBLIC officers , *POLITICAL planning , *LEGISLATION , *POLITICAL science , *GOVERNMENT agencies - Abstract
In this article we investigate the way(s) in which public personnel policy affects legislative influence over bureaucracy. Our research is motivated by a notable disconnect between the political science legislative influence literature and the public personnel literature. Public personnel scholars have long suggested that agency personnel structures play a role in determining the degree to which political principals influence agency operations, yet political scientists have yet to integrate personnel systems into a robust explanation of legislative influence. We first develop a formal theoretic model of legislative influence over bureaucracy. From which we derive comparative static propositions regarding the role of agency managerial authority in determining legislative influence. Our deductions are then tested in two statistical models that utilize data from a national, multiple policy area survey of the heads of state government administrative agencies. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2007
240. A Formal Cultural Model of the Structural-Hole Thesis.
- Author
-
Sun-ki Chai and Mooweon Rhee
- Subjects
FORMAL discipline ,SOCIAL networks ,SOCIAL structure ,CULTURE diffusion ,SOCIAL norms ,SOCIAL psychology - Abstract
Investigation of social networks is developed in two new directions theoretically. The first is the use of a formal choice-theoretic model to analyze of the consequences of network closure and structural holes on both group and individual outcomes. The second is the investigation of how cultural differences in social norms can affect outcomes under conditions in which network ties are endogenous. It is found that network closure has positive consequences for overall group welfare where members would otherwise have exit options that render sanctions against shirking ineffective. On the other hand, where closure is incomplete, a group member who has outside ties will receive higher benefits than members whose network is restricted to the group. In conditions where network ties are endogenous, it is noted that closure can be induced by a social norm that dictates against cooperation with any group member who develops or fails to dissolve a tie outside the group. It is arg ued that such a norm exists in many East Asian business environments, and that this helps to explain both the high level of solidarity and the relative egalitarianism in compensation found in such environments. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2007
241. The Zoning Game: A formal model of community planning.
- Author
-
Brierly, Allen Bronson
- Subjects
- *
ZONING , *LAND use , *COMMUNITIES , *URBAN planning , *STRATEGIC planning - Abstract
This study presents a unified analysis of formal strategies for regulating land use through zoning. The analysis proceeds in four stages. First spatial strategies such as building up (or tearing down), building out or filling-in, and variable density or full use, are defined as planning within a formal model of zoning decisions. Next a second community is introduced into the analysis to allow for competition that results in boundary formation. Third, the existence of both an unconstrained and constrained equilibrium are proven for a single community and metropolitan area under varying general conditions. The latter are particularly important findings because of the increasing reliance of urban development boundaries to influence patterns of land use. The former outcome is derived from a very general context of urban settlement that generates comparisons between types of planning equilibria. Forth, the regulation of density is then analyzed for the effects of constraints, such as urban development boundaries, or price and valuation. As a consequence of regulatory constraints, the formal analysis describes a situation producing a maximum rate of growth, "smart growth," managed growth rates, and sustainable rates of development. The findings indicate both the range of plausible outcomes and the effects of constraints in determining planning equilibrium. The primary finding is that urban development boundaries are effective constraints for managing growth, but they result in a rapid escalation of land prices and valuation of space which is inconsistent with smart growth. Other findings show that the type of the planning strategy selected determines how cost and demand conditions influence patterns of development. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2006
242. A Model of Survey Response: Perceptions about Candidate Issue Positions.
- Author
-
Sung-youn Kim, Lodge, Milton, and Taber, Charles S.
- Subjects
- *
SURVEYS , *POLITICAL candidates , *SENSORY perception , *PSYCHOLOGICAL factors , *JUDGMENT (Psychology) - Abstract
In this paper we propose and empirically test a model for how survey respondents answer questions asking their perceptions about a political candidate's issue positions. We argue that 1) the momentary accessibility of the issue concept in the memory of a respondent determines the strength of her/his internal perception, and thereby the reported judgment: specifically, the more often and recently an issue is activated, the stronger his/her perception will be, and equally importantly 2) this momentary activation of issue concept is determined by 4 well-established psychological factors. This theory was tested via an individual-level, multiple-agent-based simulation of the Lau-Redlawsk experiment data. A preliminary simulation result supports the theory. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2006
243. A Choice Model of Status and Fertility.
- Author
-
Hopcroft, Rosemary and Whitmeyer, Joseph
- Subjects
MATHEMATICAL statistics ,MAN-woman relationships ,SOCIAL facts ,INTERPERSONAL relations ,SOCIAL psychology ,SOCIAL perception ,SOCIAL interaction - Abstract
We use a few assumptions based on evolutionary reasoning to create a simple mathematical model of the relationships between a person's background status, investment in personal status, personal status, and fertility. The model generates seven predictions concerning these relationships and how they differ for men and women. For example, it predicts that background status will have a greater effect on personal status for men than for women. We test these predictions empirically and find them mostly supported. This study shows, therefore, the promise of both formal theory and evolutionary reasoning for understanding these fundamental human social phenomena. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2006
244. The Greedy Terrorist: Why Hierarchical Terrorist Organizations Underfund Operations.
- Author
-
Shapiro, Jacob N. and Siegel, David
- Subjects
- *
TERRORISM , *TERRORISTS , *POLITICAL science , *HIERARCHIES , *INTERNATIONAL crimes - Abstract
We present a hierarchical model of terror organizations that uses the observed variance in terrorists motivations to explain patterns of underfunding and to identify conditions under which government anti-terror efforts can be counter-productive. [ABSTRACT FROM AUTHOR]
- Published
- 2005
245. A Behavioral Model of Age and Turnout.
- Author
-
Collins, Nathan A.
- Subjects
- *
ELECTIONS , *VOTING , *PRACTICAL politics , *QUANTITATIVE research , *POLITICAL parties - Abstract
The literature on elections and voting is vast, and in many studies age has been reported as a substantively important and statistically significant predictor of turnout. Simple verbal theories have emerged to explain the relationship, but these provide only a rough conceptual picture of the relationship between age and turnout. In this paper, I begin with a look at what the data tell us, and I use psychological mechanisms to derive a simple quantitative model of the age-turnout curve. [ABSTRACT FROM AUTHOR]
- Published
- 2005
246. A Formal Model of Learning and Policy Diffusion.
- Author
-
Volden, Craig, Ting, Michael M., and Carpenter, Daniel P.
- Subjects
- *
GOVERNMENT policy , *POLICY analysis , *POLITICAL planning , *PUBLIC administration , *POLITICAL science , *POLICY sciences - Abstract
We present a model of learning and policy choice across governments. The model allows choice among multiple policies by n players over two periods. Players and policies are located in a unidimensional space and policies have unknown benefits prior to adoption. We characterize policy choice over time in two cases: first, when players cannot learn from one another; and, second, when players can learn from the past results of other governments. Thus the model can distinguish between diffusion by learning and independent adoptions by multiple governments. Among the findings are that learning from others causes policy experimentation to decrease due to informational free-riding, but adoption of beneficial policies to increase. Moderate governments are most likely to free-ride off others' experiments, and to abandon apparently unsuccessful experiments. Further, learning-based diffusion can be differentiated from similar but uncoordinated policy adoptions by discontinuities in the characteristics of the final adopters, by the emulation of the successes of other governments, and by the patterns of early experimenters vis-a-vis late adopters. ..PAT.-Conference Proceeding [ABSTRACT FROM AUTHOR]
- Published
- 2005
247. A Calculus of Tracking: Theory and Practice
- Author
-
Giorgio Di Tizio and Fabio Massacci
- Subjects
Ethics ,ad-blocker ,business.industry ,Computer science ,Information technology ,020206 networking & telecommunications ,02 engineering and technology ,QA75.5-76.95 ,Tracking (particle physics) ,medicine.disease ,BJ1-1725 ,online tracking, ad-blocker, formal model ,online tracking ,020204 information systems ,Electronic computers. Computer science ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Calculus ,General Earth and Planetary Sciences ,business ,formal model ,Calculus (medicine) ,General Environmental Science - Abstract
Online tracking techniques, the interactions among trackers, and the economic and social impact of these procedures in the advertising ecosystem have received increasing attention in the last years. This work proposes a novel formal model that describes the foundations on which the visible process of data sharing behaves in terms of the network configurations of the Internet (included CDNs, shared cookies, etc.). From our model, we define relations that can be used to evaluate the impact of different privacy mitigations and determine if websites should comply with privacy regulations. We show that the calculus, based on a fragment of intuitionistic logic, is tractable and constructive: any formal derivation in the model corresponds to an actual tracking practice that can be implemented given the current configuration of the Internet. We apply our model on a dataset obtained from OpenWPM to evaluate the effectiveness of tracking mitigations up to Alexa Top 100.
- Published
- 2021
248. Improving Productivity in Design and Development of Information Technology (IT) Service Delivery Simulation Models.
- Author
-
Beloglazov, Anton, Banerjee, Dipyaman, Hartman, Alan, and Buyya, Rajkumar
- Subjects
PRODUCTION (Economic theory) ,ECONOMIC development ,PRODUCT design ,INFORMATION technology management ,SIMULATION methods & models - Abstract
The unprecedented scale of Information Technology (IT) service delivery requires careful analysis and optimization of service systems. The simulation is an efficient way to handle the complexity of modeling and optimization of real-world service delivery systems. However, typically developed custom simulation models lack standard architectures and limit the reuse of design and implementation artifacts across multiple models. In this work, following the design science research methodology, based on a formal model of service delivery systems and applying an adapted software product line (SPL) approach, we create a design artifact for building product lines of IT service delivery simulation models, which vastly simplify and reduce the cost of simulation model design and development. We evaluate the design artifact by constructing a product line of simulation models for a set of IBM’s IT service delivery systems. We validate the proposed approach by comparing the simulation results obtained using our models with the results from the corresponding custom simulation models. The case study demonstrates that the proposed approach leads to 5–8 times reductions in the time required to design and develop related simulation models. The potential implications of the application of the proposed approach within an organization are quicker responses to changes in the business environment, more information to assist in managerial decisions, and reduced workload on the process reengineering specialists. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
249. Action Petri Net for Specifying Robot Motions.
- Author
-
Choi, Jongmyung, Lee, Youngho, Ryoo, Young-Jae, Choi, Jongsun, and Choi, Jaeyoung
- Subjects
ROBOTICS research ,PETRI nets ,HUMAN-robot interaction ,ROBOT motion ,HUMANOID robots ,COMPUTER systems - Abstract
Smart robots and smart services using robots are promising research fields in academia and industry. However, those smart services are based on basic motions of the robot, such as grabbing objects, and moving them to a designated place. In this paper, we propose a way to produce new motions without programming, from existing motions, through a motion composition method. Our motion composition method utilizes an Action Petri net, which is a variance of a Petri net, with both interpolation and composition operations on a transition. In the Action Petri net, a place is a posture or a moving action of a robot, and it is represented as a diagonal matrix with the robot's joint motor values. Robot motions can be generated from one posture to another posture, and from composing different postures and moving actions. All operations performed to generate new motions are carried out as matrix manipulation operations. Our approach provides a formal method to generate new motions from existing motions, and a practical method to create new motions in low level motion control, without programming. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
250. A formal model and verification problems for software defined networks.
- Author
-
Zakharov, V., Smelyansky, R., and Chemeritsky, E.
- Abstract
Software Defined Networking (SDN) is an approach to building computer networks that separate and abstract data planes and control planes of these systems. In a SDN a centralized controller manages a distributed set of switches. A set of open commands for packet forwarding and flow table updating was defined in the form of a protocol known as OpenFlow. In this paper we describe an abstract formal model of SDN, introduce a tentative language for specification of SDN forwarding policies, and set up formally model-checking problems for SDNs. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.