نتایج جستجو برای: monitors

تعداد نتایج: 11136  

2017
Jun Inoue Yoriyuki Yamagata

CSPE is a specification language for runtime monitors that can directly express concurrency in a bottom-up manner that composes the system from simpler, interacting components. It includes constructs to explicitly flag failures to the monitor, which unlike deadlocks and livelocks in conventional process algebras, propagate globally and aborts the whole system’s execution. Although CSPE has a tr...

2018
Jafar Hamin Bart Jacobs KU Leuven

Monitors constitute one of the common techniques to synchronize threads in multithreaded programs, where calling a wait command on a condition variable suspends the caller thread and notifying a condition variable causes the threads waiting for that condition variable to resume their execution. One potential problem with these programs is that a waiting thread might be suspended forever leading...

Journal: :CMAJ : Canadian Medical Association journal = journal de l'Association medicale canadienne 2011
Thomas P Bouchard Stephen J Genuis

discovered the synthetic progestin used in the first birth control pill, expressed concern about existing contraceptive methods and predicted fertility awareness and family planning through biochemical measurement of endogenous hormones at home. Today, multiple fertility monitors are available that provide couples with accurate biochemical measurement of the fertile window to plan or avoid preg...

2016
Zohreh Alavi Michael T. Cox

In this paper, we introduce a new technique for planning in a world under continuous change. Our approach is to make vision sensitive to relevant changes in the environment that can affect plans and goals. For this purpose, we applied a rationalebased monitor technique to the SHOP hierarchical planner. SHOP generates plan monitors that interact with a vision system and react only to those envir...

2002
Klaus Havelund Grigore Rosu

The problem of testing a linear temporal logic (LTL) formula on a finite execution trace of events, generated by an executing program, occurs naturally in runtime analysis of software. An algorithm which takes a past time LTL formula and generates an efficient dynamic prog-ramming algorithm is presented. The generated algorithm tests whether the formula is satisfied by a finite trace of events ...

2007
Feng Chen Thomas Ball

We present an extension of past time LTL with call/return atoms, called ptCaRet, together with a monitor synthesis algorithm for it. ptCaRet includes abstract variants of past temporal operators, which can express properties over traces in which terminated function or procedure executions are abstracted away into a call and a corresponding return. This way, ptCaRet can express safety properties...

2000
M. G. Ryskin

We study the theoretical accuracy of various methods that have been proposed to measure the luminosity of the LHC pp collider, as well as for Run II of the Tevatron pp̄ collider. In particular we consider methods based on (i) the total and forward elastic data, (ii) lepton-pair production and (iii) W and Z production.

2010
Harold Krikke

Due to the introduction of extended producer responsibility, Original Equipment Manufacturers are forced to set up a reverse logistic system for their 'own' discarded products. As part of this set-up, they have to determine strategies for the recovery of these products. In some of our previous works, we have described OR-optimisation models that give decision support in determining optimal reco...

2001

With the ubiquitous deployment of large scale networks, more and more complex human interactions are supported by computer applications. This poses new challenges on the expressiveness of security policy design systems, often requiring the use of new security paradigms. In this paper we identify a restricted type of obligation which is useful to express new security policies. This type of oblig...

2001
Carlos Ribeiro André Zúquete Paulo Ferreira

With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressiveness of security policy design systems, often requiring the use of new security paradigms. In this paper we identify a restricted type of obligation which is useful to express new security policies. This type of obliga...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید