A More Sensitive Context
نویسندگان
چکیده
Logic of Behaviour in Context (LBC) is a spatio-temporal logic for expressing properties of continuous-state processes, such as biochemical reaction networks. LBC builds on the existing Metric Interval Temporal Logic (MITL) and adds a “context modality” that explores the behaviour of a system when composed with an external process. LBC models are terms of the Continuous π-Calculus (cπ), a process algebra with continuous state space. Our previously published LBC model-checking technique required examining many points along the behavioural trajectory of a process; and potentially computing further trajectories branching off at every such point. This raised two difficulties: mixing temporal and spatial modalities could require computing a large number of trajectories, with costly numerical solution of differential equations; and might still fail to check intermediate values between discrete points on those trajectories. In this paper we make progress against both of these problems using techniques from signal temporal logic and from sensitivity analysis. Boolean signals aggressively compress trace information, allowing more efficient computation; and sensitivity analysis lets us reliably check formulae over a region by calculating a smaller number of sample trajectories.
منابع مشابه
CAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملKnowledge Translation in Healthcare – Towards Understanding its True Complexities; Comment on “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation”
This commentary argues that to fully appreciate the complexities of knowledge transfer one firstly has to distinguish between the notions of “data, information, knowledge and wisdom,” and that the latter two are highly context sensitive. In particular one has to understand knowledge as being personal rather than objective, and hence there is no form of knowledge that a-priori is more authoritat...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملارائه یک رتبهبند برای خطایاب معنایی با استفاده از ویژگیهای حساس به متن
Nowadays, a large volume of documents is generated daily. These documents generated by different persons, thus, the documents contain spelling errors. These spelling errors cause quality of the documents are decrease. Therefore, existence of automatic writing assistance tools such as spell checker/corrector can help to improve their quality. Context-sensitive are misspelled words that have been...
متن کاملPro le - Guided Context - Sensitive Program Analysis
Interprocedural analyses can be classiied as either context-insensitive, which tend to sacri-ce precision to gain eeciency, or context-sensitive, which are more precise but also more expensive. This paper discusses a proole-guided approach to interprocedural analysis that is context-sensitive, and hence more precise, for the \important" call sites for a function, and context-insensitive, and he...
متن کاملA Reliable Routing Algorithm for Delay Sensitive Data in Body Area Networks
Wireless body Area networks (WBANs) include a number of sensor nodes placed inside or on the human body to improve patient health and quality of life. Ensuring the transfer and receipt of data in sensitive data is a very important issue. Routing algorithms should support a variety of service quality such as reliability and delay in sending and receiving data. Loss of information or excessive da...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1702.03288 شماره
صفحات -
تاریخ انتشار 2017