Semantics-aware trace analysis

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trace Semantics for Coalgebras

Traditionally, traces are the sequences of labels associated with paths in transition systems X → P(A×X). Here we describe traces more generally, for coalgebras of the form X → P(F (X)), where F is a polynomial functor. The main result states that F ’s final coalgebra Z ∼= −→ F (Z) gives rise to a weakly final coalgebra with state space P(Z), in a suitable category of coalgebras. Weak finality ...

متن کامل

Trace Semantics via Determinization

This paper takes a fresh look at the topic of trace semantics in the theory of coalgebras. The first development of coalgebraic trace semantics used final coalgebras in Kleisli categories, stemming from an initial algebra in the underlying category. This approach requires some non-trivial assumptions, like dcpo enrichment, which do not always hold, even in cases where one can reasonably speak o...

متن کامل

Trace Semantics Is Fully

The discussion in the computer-science literature of the relative merits of linearversus branching-time frameworks goes back to the early 1980s. One of the beliefs dominating this discussion has been that the linear-time framework is not expressive enough semantically, making linear-time logics lacking in expressiveness. In this work we examine the branching-linear issue from the perspective of...

متن کامل

Semantics-aware program sampling

We present an algorithm for specifying and sampling from distributions over programs via a perturb-max approximation. Prior work is generally limited to sampling from priors over program syntax (for example, assigning lower probability to longer programs). We demonstrate a simple modification to the Perturb-and-MAP sampling algorithm that allows interpolation between such syntactic priors and p...

متن کامل

Semantics-Aware Perimeter Protection

Web services security is becoming a critical concern for any organization adopting the XML-based Web services approach to application integration. While many access control techniques for Web services are becoming available, several issues still need to be solved in order to correctly split the burden of securing Web services between the perimetral and the service level. In this paper, a techni...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGPLAN Notices

سال: 2009

ISSN: 0362-1340,1558-1160

DOI: 10.1145/1543135.1542527