Browsing by Subject "Specifications"
Now showing items 1-13 of 13
-
Conference Object
An abstract channel specification and an algorithm implementing it using Java sockets
(2008)Models and specifications can be used in the design of distributed applications to formally reason about their safety properties. However, the benefits of using formal methods are often negated by the ad hoc process of ...
-
Article
Acceptance and resolution simulation studies for the dielectron spectrometer HADES at GSI
(1996)Design studies for a second generation dilepton spectrometer to be built at the SIS accelerator of GSI Darmstadt are presented. The basic design parameters of this system are specified and the different detector components ...
-
Article
Automated implementation of complex distributed algorithms specified in the IOA language
(2009)IOA is a formal language for describing Input/Output automata that serves both as a formal specification language and as a programming language (Garland et al. in http://theory.lcs.mit.edu/tds/ioa/manual.ps, 2004). The IOA ...
-
Conference Object
Brief announcement: A formal treatment of an abstract channel implementation using java sockets and TCP
(2007)Abstract models and specifications can be used in the design of distributed applications to formally reason about their safety properties. However, the benefits of using formal methods are offset by the challenging process ...
-
Article
Compact linear lead/lag metamaterial phase shifters for broadband applications
(2003)A compact one-dimensional phase shifter is proposed using alternating sections of negative refractive index (NRI) metamaterials and printed transmission lines (TL). The NRI metamaterial sections consist of lumped element ...
-
Article
Design of an advanced heavy tactical truck: A target cascading case study
(2001)The target cascading methodology is applied to the conceptual design of an advanced heavy tactical truck. Two levels are defined: an integrated truck model is represented at the top (vehicle) level and four independent ...
-
Article
Dynamic misspecification in nonparametric cointegrating regression
(2012)Linear cointegration is known to have the important property of invariance under temporal translation. The same property is shown not to apply for nonlinear cointegration. The limit properties of the Nadaraya-Watson (NW) ...
-
Conference Object
Fault-tolerant supervisory control of discrete event systems modeled by bounded Petri nets
(2007)This paper considers bounded Petri nets with both controllable and uncontrollable transitions, and addresses the synthesis of a fault-tolerant supervisor in a setting where the control specifications are described via ...
-
Article
On the automated implementation of time-based Paxos using the IOA compiler
(2010)Paxos is a well known algorithm for achieving consensus in distributed environments with uncertain processing and communication timing. Implementations of its variants have been successfully used in the industry (eg., ...
-
Article
Probabilistic resource failure in real-time process algebra
(1998)PACSR, a probabilistic extension of the real-time process algebra ACSR, is presented. The extension is built upon a novel treatment of the notion of a resource. In ACSR, resources are used to model contention in accessing ...
-
Article
Residual-based rank specification tests for AR-GARCH type models
(2015)This paper derives the asymptotic distribution for a number of rank-based and classical residual specification tests in AR-GARCH type models. We consider tests for the null hypotheses of no linear and quadratic serial ...
-
Conference Object
Tempo-toolkit: Tempo to java translation module
(2013)TIOA is a formal language for modeling distributed, concurrent, and timed/untimed systems as collections of interacting state machines, called Timed Input/Output Automata. TIOA provide natural mathematical notations for ...
-
Article
Using argumentation logic for firewall policy specification and analysis
(2006)Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...