Selected Topics of Theoretical Computer Science (456-335) Part 5
نویسندگان
چکیده
while true do (noncritB; flagB := true; turn := A; waitfor (flagA = false) ∨ (turn = B); critB ; flagB := false) . A global state of our system S = A‖B (processes A,B running in parallel; they communicate by shared variables) can be described by the values of a few (boolean) variables, i.e., by a (column) vector from {0, 1} for some fixed k. Our system S thus determines (can be equated with) a (finite) transition system (G,→) where G is the set of all global states and →⊆ G × G is the generated (unlabelled) transition relation, describing how a global state can change in one step; a concrete g0 ∈ G is the initial state. (E.g., the vector from {0, 1} k
منابع مشابه
What stakeholders will or will not say: A theoretical and empirical study of topic importance in Requirements Engineering elicitation interviews
Interviewing stakeholders is a way to elicit information about requirements for a system-to-be. A difficulty when preparing such elicitation interviews is to select the topics to discuss, so as to avoid missing important information. Stakeholders may spontaneously share information on some topics, but remain silent on others, unless asked explicitly. We propose the Elicitation Topic Map (ETM) t...
متن کاملGraph Theoretic Models
I feel particularly honored by this invitation to deliver the opening address at the annual meeting of the European Association for Theoretical Computer Science because I am not a computer scientist. Thus I must attribute my presence here to the importance of the field of graph theory as a useful mathematical model in your field. Similarly I was astounded by the invitation to give the opening l...
متن کاملSelected Topics of Theoretical Computer Science ( Vybrané partie z teoretické informatiky , 460 - 4043 ) Part
1 RSA-cryptosystem, and the underlying theory The aim of this section is to recall the RSA cryptographic method and the necessary theory showing its correctness, computational complexity, etc. 1.1 Creating an RSA system RSA (Rivest, Shamir, Adleman) is a particular method which can be used for the public-key cryptography. A concrete RSA system is created as follows: 1. Choose randomly two diffe...
متن کاملکندوکاوی در انعکاس موضوعات کتابداری و اطلاع رسانی در روزنامه های کثیرالانتشار سال 1390
Purpose: The objective of this research is to identify the occurrence rate , publication style and type of topics related to library and information science that were found in widely read newspapers in 1390 (2011). Methodology: In this research, the content analysis was used in order to investigate library and information science topics in widely read Iranian newspapers. The The statistical su...
متن کاملSplinting the hand to enhance motor control and brain plasticity.
Theoretical constructs on the values of splinting the hand are reviewed. Therapists treating poststroke patients face a fast changing technology environment. This new technology allows scientists and physicians the opportunity to evaluate brain function. Scientists can increase understanding of the effects of stroke on function based upon location and severity. Physicians can evaluate the effec...
متن کامل