Feature Interaction Detection using Backward Reasoning with LOTOS1
نویسندگان
چکیده
The problem of detecting feature interactions in telephone systems design is addressed. The method proposed involves specification of the features in LOTOS, and uses an analysis technique called backward reasoning. This is is implemented in LOTOS by a combination of backward and forward execution. A tool to help carry out backward execution is presented. A detailed example of the use of the technique is given, involving the three-way-calling and call-waiting features.
منابع مشابه
Feature interaction detection using backward reasoning with LOTOS
The problem of detecting feature interactions in telephone systems design is addressed. The method proposed involves specification of the features in LOTOS, and uses an analysis technique called backward reasoning. This is is implemented in LOTOS by a combination of backward and forward execution. A tool to help carry out backward execution is presented. A detailed example of the use of the tec...
متن کاملPhishing website detection using weighted feature line embedding
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...
متن کاملGeometric reasoning for optimizing backward growing-based feature recognition
Feature recognition has been a weak link in most implementations of integrated CAD/CAM systems for machining. A method called Backward Growing was recently suggested as a simple, but effective means to recognize machining features from the boundary representation (brep) of a designed part. The method promises, through its simplicity, to be applicable to many varieties of machined shapes. Howeve...
متن کاملAnomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کاملKnowledge Based Interpretation of Line Drawing Images
This paper considers the application of knowledge based techniques to the automatic interpretation of line drawing images and describes progress in the development of a practical system which, although not fully automatic, provides a framework for approaching that goal through a diminishing level of operator intervention. This is achieved using a knowledge bascd system which cooperates with a c...
متن کامل