Loading...
Search for: operational-semantics
0.01 seconds

    Modeling real-time coordination systems using timed Bchi automata

    , Article 2011 CSI International Symposium on Computer Science and Software Engineering, CSSE 2011, 15 June 2011 through 16 June 2011 ; June , 2011 , Pages 17-24 ; 9781612842073 (ISBN) Ahmadi Danesh, Z ; Izadi, M ; Sharif University of Technology
    2011
    Abstract
    Reo is an exogenous coordination language for synthesizing components participating in a component-based system. The notion of Bchi automaton over streams of records (BAR for short) is a proposed operational semantics for Reo that covers several aspects of coordination strategies such as synchronization, context dependencies and fairness constraints. In this paper and for the purpose of modeling real-time coordination systems specified by Reo, we present a timed version of BARs as the acceptors of timed streams of records. We show that timed BAR and its streams of records based semantics are more standard and also more expressive than timed constraint automaton which is the first proposed... 

    Content-based image retrieval based on relevance feedback and reinforcement learning for medical images

    , Article ETRI Journal ; Volume 33, Issue 2 , Apr , 2011 , Pages 240-250 ; 12256463 (ISSN) Lakdashti, A ; Ajorloo, H ; Sharif University of Technology
    Abstract
    To enable a relevance feedback paradigm to evolve itself by users' feedback, a reinforcement learning method is proposed. The feature space of the medical images is partitioned into positive and negative hypercubes by the system. Each hypercube constitutes an individual in a genetic algorithm infrastructure. The rules take recombination and mutation operators to make new rules for better exploring the feature space. The effectiveness of the rules is checked by a scoring method by which the ineffective rules will be omitted gradually and the effective ones survive. Our experiments on a set of 10,004 images from the IRMA database show that the proposed approach can better describe the semantic... 

    Implementation-aware model analysis: The case of buffer-throughput tradeoff in streaming applications

    , Article Proceedings of the ACM SIGPLAN Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES), 18 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 108-117 ; 9781450332576 (ISBN) Mirzazad Barijough, K ; Hashemi, M ; Khibin, V ; Ghiasi, S ; Sharif University of Technology
    Association for Computing Machinery  2015
    Abstract
    Models of computation abstract away a number of implementation details in favor of well-defined semantics. While this has unquestionable benefits, we argue that analysis of models solely based on operational semantics (implementation oblivious analysis) is unfit to drive implementation design space exploration. Specifically, we study the tradeoff between buffer size and streaming throughput in applications modeled as synchronous data flow (SDF) graphs. We demonstrate the inherent inaccuracy of implementation-oblivious approach, which only considers SDF operational semantic. We propose a rigorous transformation, which equips the state of the art buffer-throughput tradeoff analysis technique... 

    Implementation-aware model analysis: The case of buffer-throughput tradeoff in streaming applications

    , Article ACM SIGPLAN Notices ; Volume 50, Issue 5 , May , 2015 , Pages 103-112 ; 15232867 (ISSN) Barijough, K. M ; Hashemi, M ; Khibin, V ; Ghiasi, S ; Sharif University of Technology
    Association for Computing Machinery  2015
    Abstract
    Models of computation abstract away a number of implementation details in favor of well-defined semantics. While this has unquestionable benefits, we argue that analysis of models solely based on operational semantics (implementationoblivious analysis) is unfit to drive implementation design space exploration. Specifically, we study the tradeoff between buffer size and streaming throughput in applications modeled as synchronous data flow (SDF) graphs. We demonstrate the inherent inaccuracy of implementationoblivious approach, which only considers SDF operational semantic. We propose a rigorous transformation, which equips the state of the art buffer-throughput tradeoff analysis technique... 

    Modeling security protocols using operational semantics

    , Article ICEIT 2010 - 2010 International Conference on Educational and Information Technology, Proceedings, 17 September 2010 through 19 September 2010, Chongqing ; Volume 3 , 2010 , Pages V3179-V3185 ; 9781424480340 (ISBN) Samadi, M ; Mahrooghi, H ; Movaghar, A ; Faraahi, A ; Sharif University of Technology
    2010
    Abstract
    In this paper we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly defined initial intruder knowledge. We validate our framework by analyzing the Needham-Schroeder-Lowe protocol  

    Failure-based equivalence of constraint automata

    , Article International Journal of Computer Mathematics ; Volume 87, Issue 11 , 2010 , Pages 2426-2443 ; 00207160 (ISSN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Constraint automata are the first-proposed operational semantics of Reo coordination language. They can be composed not only by all well-defined composition operators of labeled transition systems but also by two new operators. The new operators are joining of constraint automata with respect to their common port names and hiding a port name in all transition labels. The operations of these two extra operators depend on the internal structures of the transition labels, while in the others each transition label is considered as a simple entity. An equivalence relation between transition systems is a congruence relation if the replacement of the components of a model by the equivalent ones... 

    Automata based model checking for reo connectors

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 15 April 2009 through 17 April 2009 ; Volume 5961 LNCS , 2010 , Pages 260-275 ; 03029743 (ISSN) ; 3642116221 (ISBN) Bonsangue, M. M ; Izadi, M ; Sharif University of Technology
    Abstract
    Reo is a connector language for the exogenous composition and orchestration of components in a software system. An operational semantics of Reo connectors can be given in terms of Büchi automata over a suitable alphabet of records, capturing both synchronization and context dependency requirements. In this paper, we define an action based linear time temporal logic for expressing properties of Reo connectors. Formulas can be synthesized into Büchi automata representing Reo connectors, thus leading to an automata based model checking algorithm. By generalizing standard automata based model checking algorithms for linear time temporal logic, we give an efficient on-the-fly algorithm for the... 

    A Buchi automata based model checking framework for reo connectors

    , Article Proceedings of the ACM Symposium on Applied Computing, 26 March 2012 through 30 March 2012 ; March , 2012 , Pages 1536-1543 ; 9781450308571 (ISBN) Keshishzadeh, S ; Izadi, M ; Movaghar, A ; Sharif University of Technology
    Abstract
    Reo is an exogenous coordination language for synchronizing components participating in a component-based system. In this paper we provide a verification framework for model checking of Reo connectors. The proposed framework applies an extension of Büchi automata as the operational semantic model for Reo connectors and a record-based extension of linear time temporal logic (LTL) for expressing properties. Several aspects of Reo connectors, specially synchronization, context dependencies and fairness constraints, are addressed by this model checker due to its supported underlying model. The main ideas behind this implementation are to introduce a symbolic representation for the main elements... 

    Restricted broadcast process theory

    , Article Proceedings - 6th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2008, 10 November 2008 through 14 November 2008, Cape Town ; 2008 , Pages 345-354 ; 9780769534374 (ISBN) Ghassemi, F ; Fokkink, W ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    We present a process algebra for modeling and reasoning about Mobile Ad hoc Networks (MANETs) and their protocols. In our algebra we model the essential modeling concepts of ad hoc networks, i.e. local broadcast, connectivity of nodes and connectivity changes. Connectivity and connectivity changes are modeled implicitly in the semantics, which results in a more compact state space. Our connectivity model supports unidirectional links. A key feature of our algebra is eliminating connectivity information from the specification of a network, and transferring its complexity to the semantics. We give a formal operational semantics for our process algebra, and define equivalence relations on... 

    Recasting constraint automata into Büchi automata

    , Article 5th International Colloquium on Theoretical Aspects of Computing, ICTAC 2008, Istanbul, 1 September 2008 through 3 September 2008 ; Volume 5160 LNCS , 2008 , Pages 156-170 ; 03029743 (ISSN) ; 3540857613 (ISBN); 9783540857617 (ISBN) Izadi, M ; Bonsangue, M. M ; Sharif University of Technology
    2008
    Abstract
    Constraint automata have been proposed as the operational semantics of Reo, a glue-code language for the exogenous composition and orchestration of components in a software system. In this paper we recast the theory of constraint automata into that of Büchi automata on infinite strings of records. We use records to express simultaneity constraints of I/O operations and show that every constraint automaton can be expressed as a Büchi automaton on an appropriate alphabet of records. Further, we give examples of component compositions that are expressible as Büchi automata but not as constraint automata. Finally, we show that the join composition operator for constraint automata and its... 

    Model checking of component-based systems and coordination models

    , Article 5th Doctoral Consortium on Enterprise Information Systems, DCEIS - In Conjunction with the 9th International Conference on Enterprise Information Systems, ICEIS 2007, Madeira, 12 June 2007 through 12 June 2007 ; 2007 , Pages 82-88 ; 9789898111043 (ISBN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    2007
    Abstract
    Reo is an exogenous coordination language for compositional construction of the coordinating subsystem of a component-based software. Constraint automaton is defined as the operational semantics of Reo. The main goal of this work is to prepare a model checking based verification environment for component-based systems, which their component connectors are modeled by Reo networks and Constraint Automata. We use compositional minimization and abstraction methods of model checking for verification of component-based systems and their component connectors modeled by Reo