Selected Topics of Theoretical Computer Science (456-335) Part 5

نویسندگان

  • Petr Jančar
  • FEI TU
چکیده

while true do (noncritB; flagB := true; turn := A; waitfor (flagA = false) ∨ (turn = B); critB ; flagB := false) . A global state of our system S = A‖B (processes A,B running in parallel; they communicate by shared variables) can be described by the values of a few (boolean) variables, i.e., by a (column) vector from {0, 1} for some fixed k. Our system S thus determines (can be equated with) a (finite) transition system (G,→) where G is the set of all global states and →⊆ G × G is the generated (unlabelled) transition relation, describing how a global state can change in one step; a concrete g0 ∈ G is the initial state. (E.g., the vector from {0, 1} k

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

What stakeholders will or will not say: A theoretical and empirical study of topic importance in Requirements Engineering elicitation interviews

Interviewing stakeholders is a way to elicit information about requirements for a system-to-be. A difficulty when preparing such elicitation interviews is to select the topics to discuss, so as to avoid missing important information. Stakeholders may spontaneously share information on some topics, but remain silent on others, unless asked explicitly. We propose the Elicitation Topic Map (ETM) t...

متن کامل

Graph Theoretic Models

I feel particularly honored by this invitation to deliver the opening address at the annual meeting of the European Association for Theoretical Computer Science because I am not a computer scientist. Thus I must attribute my presence here to the importance of the field of graph theory as a useful mathematical model in your field. Similarly I was astounded by the invitation to give the opening l...

متن کامل

Selected Topics of Theoretical Computer Science ( Vybrané partie z teoretické informatiky , 460 - 4043 ) Part

1 RSA-cryptosystem, and the underlying theory The aim of this section is to recall the RSA cryptographic method and the necessary theory showing its correctness, computational complexity, etc. 1.1 Creating an RSA system RSA (Rivest, Shamir, Adleman) is a particular method which can be used for the public-key cryptography. A concrete RSA system is created as follows: 1. Choose randomly two diffe...

متن کامل

کندوکاوی در انعکاس موضوعات کتابداری و اطلاع رسانی در روزنامه های کثیرالانتشار سال 1390

Purpose: The objective of this research is to identify the occurrence rate , publication style and type of topics related to library and information science that were found in widely read newspapers in 1390 (2011). Methodology: In this research, the content analysis was used in order to investigate library and information science topics in widely read Iranian newspapers. The The statistical su...

متن کامل

Splinting the hand to enhance motor control and brain plasticity.

Theoretical constructs on the values of splinting the hand are reviewed. Therapists treating poststroke patients face a fast changing technology environment. This new technology allows scientists and physicians the opportunity to evaluate brain function. Scientists can increase understanding of the effects of stroke on function based upon location and severity. Physicians can evaluate the effec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009