Tble 1: Syntx of LOTOS/T+ E :: stop (untimed dedlock) j exit (successful termintion) j ; E (ction prex, untimed) j [P (t; x)]; E (ction prex, timed) j
|
|
- Rebecca Cameron
- 6 years ago
- Views:
Transcription
1 Protocol Synthesis from Timed nd Structured Specictions Akio Nkt Teruo Higshino Kenichi Tniguchi Dept. of Informtion nd Computer Sciences, Osk University Toyonk, Osk 56, Jpn Abstrct In this pper, we propose method to synthesize protocol specictions utomticlly from service specictions written in time-extended LOTOS clled LOTOS/T+. In LOTOS/T+, structured descriptions, such s prllelism nd interruption re llowed to describe service specictions, nd time-constrints mong non-djcent ctions cn be described using Presburger formuls. Here we ssume tht there is relible communiction chnnel between ny two nodes nd the mximum communiction dely for ech chnnel is bounded by constnt. Moreover we ssume service specictions hve no dedlocks. Under our simultion policy, speciction S is derived from given service speciction S nd given mximum communiction dely of ech chnnel. In S, timeconstrints necessry for exchnging synchroniztion messges re dded. If S nd S cn crry out the sme behviour, i.e., if S nd S re bisimultion equivlent when time is ignored, then correct protocol speciction for simulting S is derived from S utomticlly. 1 Introduction For designing relible distributed systems, protocol synthesis methods re useful [1]. In the recent yers, severl methods for synthesizing correct protocol specictions from given service specictions mechniclly hve been proposed for FSM, EFSM, LOTOS nd Petri Net models [, 3, 4]. However those proposls do not consider quntittive time constrints for the systems. It is highly desirble to synthesize protocol specictions from time-constrined service speci- ctions. Recently, in [5], method to derive protocol specictions from timed service specictions written in FSM model hs been proposed, but in such FSM model we cn not specify complicted order of ctions in structurl wy. In this pper, we propose method for synthesizing correct protocol specictions utomticlly from given service specictions written in sub-clss of LOTOS/T+ (which is modied version of [6]), one of timed extensions of LOTOS [7]. LOTOS/T+ hs n bility to specify complicted ction ordering such s prllel composition nd interruption. Moreover, in LOTOS/T+, time constrints mong ctions cn be specied s formuls using ddition, subtrction nd inequlities on integers. In ddition, using vribles to hold the time when preceding ctions re executed, we cn specify time constrints for succeeding ctions. In our method, we ssume tht () ech communiction chnnel is error-free nd its mximum propgtion dely is bounded by constnt, nd tht (b) ll nodes with their clocks cn strt their executions simultneously nd the clocks lwys synchronize ech other. Under this ssumption, we give simultion policy for ech node to execute ctions in exctly the sme order s specied in given service speciction. Bsiclly, the simultion policy is bsed on the method which we hve proposed in [3, 8]. Tht is, fter executing ech ction, sy, synchroniztion messge is sent to the node which executes succeeding ction, sy b, to inform tht hs been executed. If the execution time of is needed, the time is lso trnsmitted. The ction b must be executed fter the messge is received. We derive protocol specictions under the bove policy. However, if we consider timeconstrints, mny problems rise. For exmple, if service speciction sttes \the ction must be executed before time 3 t node 1, nd then the ction b must be executed before time 5 t node," nd if the mximum communiction dely from node 1 to node is 3 units of time, the synchroniztion messge sent from node 1 fter is executed my not rech node before time 5. To cope with this kind of problem, we restrict, for exmple, the time constrint of the ction to \before time " so tht we cn gurntee the synchroniztion messge reches node in time. As nother exmple, suppose tht service speciction sttes \the ction must be executed between time 1 nd 3 t node 1, nd fter tht the ction b must be executed between time 4 nd 5 t node ". If the mximum communiction dely from node 1 to node is 3 units of time, the sme observtion s the previous exmple holds, i.e., the synchroniztion messge from node 1 to node my not rech in time. But s for the bove cse, dierent solution is possible. Since ech node hs its own clock nd ll clocks synchronize ech other, the ordering of ctions nd b is gurnteed without ny messge exchnge. Tht is, the temporl ordering s the totl system is gurnteed if ech node decides the execution time of its ction (or b) using its own clock. In our derivtion method, rst, from given service speciction S nd given mximum dely of ech chnnel, we derive speciction S where dditionl time constrints re ppended to S so tht the messge exchnges re crried out in time. We mke only the wekest timing restrictions to S so tht ech node cn simulte S under the bove policy. If
2 Tble 1: Syntx of LOTOS/T+ E :: stop (untimed dedlock) j exit (successful termintion) j ; E (ction prex, untimed) j [P (t; x)]; E (ction prex, timed) j E[]E (choice) j EjjjE (synchronous prllel) j EjjE (synchronous prllel) j Ej[A]jE (generic prllel composition) j E[> E (disbling) j E >> E (enbling) j hide A in E (hiding) j sp A in E (\s soon s possible" execution) j P [g 1 ; : : : ; gk](e) (process invoction) S nd S cn execute the sme behviour (note tht the trnsformtion from S to S does not necessrily preserve the equivlence), i.e., if they re observtionlly equivlent (bisimultion equivlent[6]) when we consider sending/receiving ctions of synchroniztion messges nd n ction representing one unit time progress s unobservble, then protocol speciction stisfying S is derived utomticlly from S. The pper is orgnized s follows. Section describes our speciction lnguge LOTOS/T+. In Section 3 we explin the protocol synthesis method. Section 4 concludes this pper. LOTOS/T+ The speciction lnguge we use for describing both service specictions nd protocol specictions is LOTOS/T+, which is slightly modied one from LOTOS/T[6]. The syntx nd informl semntics of LOTOS/T+ re described below. Denition 1 Behviour expressions of LO- TOS/T+ is dened s Tble 1 (the preference of ech opertor is the sme s LOTOS[7]), where Act [ fig( Act stnds for nite set of ll observble ctions, nd i represents n internl (unobservble) ction), A Act, k N(N is set of nturl numbers), nd P (t; x) stnds for Presburger formul[9], tht is, rst order logic formul whose toms re integer liner inequlities, which hs free vrible t nd other free vribles x i. Here x def (x 1 ; x ; : : : ; x k ) for some k. Intuitively, t represents the current time, e stnds for n integer liner expression (ILE for short) nd e def (e 1 ; e ; : : : ; e k ) for some k, where ech e i is n ILE. In LOTOS/T+, time constrints of ctions re described in subclss of Presburger formuls, more speciclly, logicl combintions of the toms ech of which tkes the form of either e l t, t e u or x t. Here, e l (e u ) is n ILE representing the lower bound (upper bound, respectively) of the time n ction is executble. The tomic formul x t mens tht the ction's executed time is ssigned to the vrible x. For simplicity, we use n bbrevition e l t e u for e l t ^ t e u. Other symbols of inequlity such s <,,etc. my lso be used. In our semntics, n upper bound e u specied s time constrint of n ction mens the ction must be executed no lter thn e u. In this cse, we sy tht urgency of the ction t time e u is specied. Note tht in our lnguge, executbility nd urgency of ech ction t ech given time t re decidble[6]. Exmple 1 B [ t 3 ^ x t]; b[t x + 3]; c[t x + 4]; stop The behviour expression B represents the following behviour. The ction must be executed between time nd 3, nd the execution time of is ssigned to the vrible x. Then b must be executed exctly 3 units of time fter the execution of. And then c must be executed exctly 4 units of time fter. Exmple 1. E [x t]; b; c[t x + ]; stop. P [t 5]; stop[]b[t 1]; P The rst behviour expression is n exmple tht n ction without time constrints is inserted between time constrined ctions. b in the rst exmple cn be executed t ny time fter is executed, tht is, we consider tht formul \true" is omitted s time constrint of b. Moreover, n unbounded intervl \t x + " is specied s time constrint of c. The second one is n exmple of recursive processes. A clock is reset to t ech moment P is invoked. Generlly, ech instnce of processes hs its own clock loclly, which is reset to t the beginning of the process's run. If process P hs process prmeter like P (t), however, the clock is not reset to but to the ctul time t, tht is, P (t ) is invoked. The corresponding LTS's re shown in Fig. 1. The dierence between LOTOS/T+ nd LO- TOS/T is n interprettion of the behviour of internl ctions. In the method we propose, the dely of internl messges exchnged mong nodes is ssumed to be uncertin. On the other hnd, in LOTOS/T internl ctions re dened to be executed s soon s possible fter it is enbled, so we cnnot describe uncertin dely of internl ctions in LOTOS/T. Thus, we dene LOTOS/T+ so tht the executble time of internl ctions my be decided nondeterministiclly in the rnge of time constrints. To describe this property, we dene construct \sp A in B," representing the sme behviour B except the ctions in A must be executed s soon s possible they re enbled. The forml denition of the semntics is given s the inference rules in Fig.. From the rules, we cn utomticlly decide whether n ction [P (t; x)] is executble, if stisbility of the corresponding predictes P (; x) nd 9t 9x[t > ^ P (t ; x)] is decidble. P (; x) denotes whether is executble t the current time nd 9t 9x[t > ^ P (t ; x)] denotes whether
3 [t x]; b; c[t x + ]; stop b; c[t ]; stop b; c[t + 1 ]; stop b; c[t + ]; stop b b b c[t ]; stop c[t + 1 ]; stop c[t + ]; stop c stop E stop P Figure 1: The semntics of E nd P b P [t 4]; stop[]b[t ]; P [t 3]; stop [t ]; stop [t 1]; stop [t ]; stop stop?! stop (S1) P (; c) [P (t; x)]; B?! [cx]b (TAP1) ; B?! ; [t + 1t]B (UAP)?! B 1 B?! B exit?! stop (E1) 9t 9x[t > ^ P (t ; x)] [P (t; x)]; B?! [P (t + 1; x)]; [t + 1t]B (TAP) []B?! B 1?! B 1?! B 1 i Act [ f; ig B 6?! (CH1) B []B exit?! exit (E) ; B?! B (UAP1)?! B?! B B?! B i Act [ f; ig 6?! (CH) []B?! B1 []B (CH3)?! B1 B?! B j[a]jb B j[a]jb?! B 1 j[a]jb?! B?! j[a]jb [> B?! B 1 i A [ fg (PA1) i 6 A _ i (PA4)?! B 1 [> B (DI1)?! B1 B?! B [> B?! B 1 [> B (DI4)?! B 1 >> B []B?! B1 (CH4)?! B 1 B?! B j[a]jb?! B1 j[a]jb (PA) B [> B j[;]jb jjjb?! B?! B >> B?! B?! B (PA5)?! B 1 i Act [ f; ig (DI)?! B 1 >> B (EN1) j[a]jb []B?! B (CH5)?! B 1?! B 1 j[a]jb j[act]jb jjb [> B >> B?! B i 6 A _ i (PA3)?! B (PA6)?! B 1?! B 1 B?! B 6?! B?! B i (Act n A) [ f; ig?! B1 >> B hide A in B?! hide A in B (EN3)?! B 1 (DI3) i?! B (EN) (HI1) B?! B i A hide A in B?! i hide A in B (HI)?! B B?! 6 for ll A B sp A in B?! sp A in B (ASAP) B?! B hide A in B?! hide A in B (HI3) B sp A in B?! B?! sp A in B (ASAP1) [ex]bfg 1 g 1; : : : ; g k g kg?! B i P [g P [g1 ; : : : ; ](e) 1 ; : : : ; g k ](x) : B is denition g k?! B (PR1) Figure : The opertionl semntics of LOTOS/T+ my be executble in the future. Since P (t; x), time constrint of the ction, is Presburger formul, ll the predictes bove re lso Presburger formuls, so their stisbility is decidble[9, 6]. Hence, we cn construct mechniclly the corresponding LTS's (possibly, of innite stte spces) from given behviour expressions. Here we give some rules to show how to construct LTS's. Firstly, for the process E in Exmple (see Fig.1): E [t x]; b; c[t x + ]; stop ]; stop [ from the rule (TAP1)],?! b; c[t b; c[t ]; stop?! b; c[(t + 1) ]; stop [ from the rule (TAP)], Secondly, for the process P in Exmple (see Fig.1): P?! [t 4]; stop[]b[t ]; P [from the rules (PR1), (CH3), (TAP)],
4 [t 4]; stop[]b[t ]; P?! [t 3]; stop [from the rules (CH4), (TAP)], 3 Protocol Synthesis 3.1 Protocol Synthesis Problem In this section, we dene protocol synthesis problem from timed service specictions. First we introduce some nottions. Let plce() denote node ssignment for the ction. In the rest of this pper, we ssume tht k stnds for n ction with plce() k. Moreover, we use some nottions SP (B), EP (B), AP (B), whose intuitive menings re the sets of the strting nodes of B, the ending nodes of B, ll the prticipting nodes in B, respectively. For exmple, if B 1 ; b ; exitjjje 3 ; d ; exit, then SP (B) f1; 3g, EP (B) fg nd AP (B) f1; ; 3g. We cn derive them from B nd plce() mechniclly. The forml denitions of these nottions ppered in [3]. [Protocol Synthesis Problem] Assumptions: 1. there exists relible(errorfree), synchronous, full-duplex communiction chnnel between every two nodes.. there's no limittions on contents of messges exchnged mong nodes. 3. ll nodes hve their own clocks nd they lwys synchronize ech other. Inputs: A service speciction S. A node ssignment plce() for ech ction. An upper bound of dely d ij mx for ech chnnel from node i to j, such tht d iimx nd 8k d ij mx d ikmx + d kj mx. Here, we give the following restrictions for simplifying the derivtion. Restriction 1. S does not contin ny dedlock sttes. And S does not contin the synchronous prllel composition (rendezvous). Restriction. If S contins [> B s subexpression, must be nite process, nd there exists constnt t such tht cn execute no ction fter time t nd B cn execute ny ction only fter time t. Restriction 3. If S contins >> B s subexpression, must be nite process. Restriction 4. Every process invoction in S must not hve ny process prmeters, i.e. the behviour of ech invoked process does not depend on the previous behviour. Restriction 5. The context of ech process invoction P must be either ; P or [P (t; x)]; P, so tht just one ction precedes P. Restriction 6. For every subexpression []B of S, there exists node p such tht SP ( ) SP (B ) fpg, nd EP ( ) EP (B )[3]. Restriction 7. For every subexpression [> B of S, EP ( ) EP (B )[3]. Outputs: Protocol entity specictions Node 1, Node, : : :, Node n for ll nodes, which re correct in the following mening: Let I be the composite system which connects Node 1, Node, : : :, Node n together with communiction medium which hs chnnels from node i to j with mximum dely of d ij mx. Intuitively, fn ode i g i1;;:::;n re correct w.r.t. S when S cn strictly simulte I including timing properties, wheres I cn simulte S if time is ignored. In this cse, set of executble time of ech ction in I is nonempty subset of tht of the corresponding ction in S. Formlly, the correctness is dened s follows. Let I hide G in (sp G s in ((Node 1 jjjnode jjj : : : jjjnode n )j[g]jmedium)); where G is set of ll sending/receiving ctions of synchroniztion messges fs ij (m); r ij (m) j i; j f1; ; : : : ; ng; m Mg nd G s is set of ll sending ctions of synchroniztion messges fs ij (m)ji; j f1; ; : : : ; ng; m Mg, nd M edium is speciction of the communiction medium dened s follows: Medium jjji;jf1;;:::;ngchnnel ij Chnnel ij jjjmm (s ij(m)[x t]; r ij(m)[x t x + d ijmx ]; Chnnel ij) Note tht under the synchronous communiction medium, the sending ctions re executed s soon s possible they re enbled, becuse they re spontnous. In contrst, the receiving ctions re not spontnous, so they re not executed s soon s possible. Before dening the correctness, we need some preliminry denitions. Denition Reltions ) t,?! u, ) u re dened s follows: ( B B B ) t B def?! u B def ) u B def 8 < : ( B(?!) i?! (?!) i B ; Act [ f; g B(?!) i B ; B(?!)?! (?!) B ; Act [ f; ig B(?!) B ; B(?! i u)?! u (?! i u) B ; Act [ fg B(?! i u) B ; Denition 3 A binry reltion v t on behviour expressions is dened s mximum one of reltions R stisfying the following condition: If IRS, then for ll Act [ f; g, ll of the following conditions hold: 1. If I ) t I, then there exists some S s.t. S ) t S nd I RS.. If I ) t I, then there exists some S s.t. S ) t S nd I RS. 3. If S ) u S, then there exists some I s.t. I ) u I nd I RS. Here we dene the correctness.
5 Denition 4 We cll derived protocol speci- ction fnode i g i1;;:::;n s v t -correct w.r.t. S if the following reltion holds: hide G in (sp G s in ( (Node 1jjjNode jjj : : : jjjnode n)j[g]jmedium)) vt S 3. Synthesis Method Now we describe our method for synthesizing protocol specictions from timed service specictions. Bsiclly, we follow similr ide to our previous work[3, 8]. Thus, fter ech node executed n ction, it sends messges to the nodes which execute the succeeding ctions, informing them tht it hs nished. We refer this kind of messges s synchroniztion messges. To hndle time constrints between ctions on dierent nodes, we nturlly ssume tht synchroniztion messges my lso contin, if needed, informtion bout the time t which preceding ctions were executed. One mjor problem is tht the communiction dely my mke it impossible to execute n ction in time. In generl, ll relistic communiction medi hve propgtion dely, nd we cnnot neglect uncertinty of such dely in most cses. To overcome this problem, we propose the following method. First, for given service speciction S, we decide where to insert ctions sending or receiving synchroniztion messges to simulte S, ccording to the policy similr to [3, 8]. Then we restrict time-constrints of some ctions in S in order to gurntee the execution of succeeding ctions re possible t the worst cse of communiction dely, keeping the restriction to minimum. We represent the obtined speciction s Restr(S). Finlly, from the restricted speciction S Restr(S), we derive protocol entity specictions for ll nodes. If S nd S re equivlent[6], the derived protocol specictions re gurnteed correct w.r.t. S. In the following subsections, we describe how the simultion of the service speciction S is done, nd how we cn dene the trnsformtion Restr(), for ech construct of LOTOS/T Action Prex We cn simulte Action Prex p [P (t; x)]; B by sending synchroniztion messge from node p to ll the nodes in SP (B). If time constrints re specied by ssignment nd referrence of the vribles, nodes t which such vribles re ssigned to some vlues must propgte the vlues to the succeeding nodes. Exmple 3 Node 1 Node S 1 [x t]; b [t x + 5 ^ y t]; c 3 [t x + 7 ^ t y + 5]; exit d 1mx d 13mx d 3mx [x t]; s 1(m; x); exit r 1(m; x); b[t x + 5 ^ y t]; s 3(m ; x; y); exit Node 3 r 3(m ; x; y); c[t x + 5 ^ t y + 5]; exit Here we cn remove some redundncies in inserting synchroniztion messges when time is considered. Speciclly, if there's no executble time of succeeding ction tht is erlier thn or equl to some executble time of the preceding ction, nd there's no vlues to propgte to succeeding nodes, the synchroniztion messge t this plce is of no need to gurntee ctions' order, i.e., time implicitly gurntees the order (recll Assumption 3 in Section 3.1). For exmple, let S 1 [P (t; x)]; b [Q(t; y)]; exit nd suppose 9t; t ; x; y[p (t; x)^ Q(t ; y)^ t t] is unstisble. Then from the time constrints, is lwys executed before b, so even if we simply execute nd b t dierent plces, the order is still preserved. Therefore, we cn remove the synchroniztion messge from node 1 to node in this cse. Exmple 4 If the input is the following: S 1 [1 t 3]; b [4 t 5]; exit we will simply derive: d 1mx 4, Node 1 [1 t 3]; exit Node b[4 t 5]; exit becuse [(1 t 3) ^ (4 t 5) ^ (t t)] is unstisble. From now, we consider the cse where communiction dely ects the simultion. For ction prex p [P (t; x)]; B, we will derive speciction Restr(S) whose time constrint of p is restricted so tht there exists time to execute the succeeding ctions in B no mtter how lte the messges from the node p rech the nodes in SP (B). Becuse we describe time constrints in Presburger formuls, we cn esily restrict time constrints by logicl conjunction. Exmple 5 If the input is: S 1 [1 t 3]; b [4 t 7]; c 3 [5 t 1]; d [6 t 1]; exit d 1mx 4, d 3mx 4, d 3mx 3, we restrict the time constrint of ech ction s follows: d : 6 t 1 (unmodied) c 3 : 5 t 1^ 9t (t t + d 3mx ^ 6 t 1) ( 5 t 9) b : 4 t 7^ 9t (t t + d 3mx^ 5 t 9 ) ( 4 t 5) 1 : t 4 (unmodied (by Exmple 4)) So the derived protocol entity speciction will be the followings: Node 1 1 [1 t 3]; exit Node b [4 t 5]; s 3 (m1); r 3 (m); d [6 t 1]; exit Node 3 r 3 (m1); c 3 [5 t 9]; s 3 (m); exit
6 Now we cn dene Restr(S) formlly s follows. Denition 5 If S [Q(t; x)]; B, then Restr(S) is dened inductively s follows: Restr(S) def Restr(S; ;) Restr(S; V ) def 8 >< >: S if B exit; B stop or B P (Process invoction), [Q(t; x) ^ Q (t)]; Restr(B; V [ x) otherwise. where, if fb k [Q k (t; y k )] j k Kg is the set of strting ctions of Restr(B; V [ x) with their time constrints, 8 V kk f9t 9y k [t t + d plce();plce(b k )mx ^Q k (t >< ; y k )]g if for some k K s.t. Q(t; x)^ Q (t) def Q k (t ; y k ) ^ t t is stisble, or ny of the vribles in V [ x re >: referenced in B, true otherwise. To summrize this section, our derivtion tkes 3 steps: Step 1 determine t wht position the synchroniztion messges re needed. Step ccording to the results of Step 1 nd d ij mx, construct Restr(S). Step 3 decompose Restr(S) into ech node by the similr method to [3, 8], lredy described bove. 3.. Choice To simulte choice expressions, we must solve the problem bout distributed choice nd empty lterntives[3]. A choice expression []B is clled distributed choice if the strting ctions of nd B my be executed t dierent nodes. And we sy tht node p hs n empty lterntive w.r.t. []B if some ctions in B i my be executed t node p, wheres no ctions in B (imod)+1 re executed t node p. Distributed choice my cuse simultneous execution of the strting ctions of both nd B. Empty lterntives on node p my cuse unconditionl execution of B i even if B (imod)+1 is chosen. As for distributed choice, we void it by putting the sme restriction (Restriction 6) s [3]. We hve proposed method for solving the empty lterntive problem for the untimed cse in [3]. But, here, we will use slightly modied method. Unlike [3], the node where choice ws mde should immeditely sends messges to the nodes tht hve empty lterntives in order not to violte time constrints of succeeding processes. Moreover, to mke sure ech B i would not terminte before the messges sent to the nodes which hs empty lterntives rech the destintions, the ending nodes of the chosen expression will receive cknowledgments from the nodes with empty lterntives before executing the ending ctions (note tht if the strting ction of B i coincides the ending ction of it, i.e., the mximum length of B i 's ction sequences is 1, this simultion method my not be pplicble). Furthermore, to simulte choice expression []B in the bove wy successfully, we must not remove redundnt synchroniztion messges in both nd B, discussed in Section 3..1 (Exmple 4), otherwise the intermedite ctions of ech B i my be executed independently, no mtter which lterntive is chosen. To mke it possible to simulte choice in the wy bove, we must gurntee tht ll the messges rech the destintions in time by restricting the time constrints of some ctions. For choice expression []B, if the messges sent from the node choice ws mde wouldn't hve reched the destintions, or the cknowledgments wouldn't return, before the chosen behviour B i hve been done, extr time would be spent witing for the messges. So we will restrict the time constrints of the strting ctions of nd B so tht the messges cn rech in time. Exmple 6 Consider the following input: S 1 [ t 5 ^ x t]; b [t x + 3]; c 3 [t x + 6]; exit []d 1 [3 t 9]; e 3 [t 1]; exit d 1mx, d 3mx 4, d 13mx 3 We must restrict the time constrint of d 1 in order to mke the messge from node 1 to nd the cknowledgment from node to 3 rech by time 1. Restr(S) 1 [ t 5 ^ x t]; b [t x + ]; c 3 [t x + 6]; exit []d 1 [3 t 4]; e 3 [t 1]; exit Then, the speciction of ech node will be derived s follows: Node 1 Node Node 3 1 [ t 5 ^ x t]; s 1(m1; x); s 13(m3; x); exit []d[3 t 4]; (s 13(m); exitjjjs 1(m4); exit) r 1(m1; x); b [t x + ]; s 3(m5); exit []r 1(m4); s 3(m4); exit r 13(m3; x); r 3(m4); c 3 [t x + 6]; exit [](r 13(m)jjjr 3(m4)) >> e 3 [t 1]; exit For dening Restr(S), we need the uxiliry function Restr (S), which is the sme s Restr(S) except tht no removl of redundnt messges is considered. The forml denition of Restr (S) ppers in [1]. Now we cn dene Restr(S) s follows: Denition 6 If S []B, then Restr(S) is de- ned inductively s follows: Restr(S) def Restr (f( ))[]Restr (f(b )) where, we ssume tht fb k [Q k (t; y k )] j k Kg is the set of the strting ctions of B i with their time constrints, nd tht f(b i ) is n expression B i whose time constrint of ech strting ction Q k (t; y k ) is replced
7 with Q k (t; y k ) ^ R (t). Here k R k (t) is Presburger formul dened ^ s follows. Rk(t) def f9t 9z l [t t + d pqmx + d qrmx ^ R l (t ; z l )]g q AP (B i) n AP (B (imod)+1 ) l L; r EP (B i) where fr l (t; z l )jl Lg denotes the time constrints of EP (B i ) nd SP (B i ) fpg Asynchronous Prllel For ny synchronous prllel expression jjjb, nd B re executed independently. So ny synchroniztion messges re necessry between nd B. Thus, Restr(S) is dened s follows: Denition 7 If S jjjb, then Restr(S) def Restr( ) jjj Restr(B ) 3..4 Enbling For enbling expression >> B, we cn pply essentilly the sme ide s ction prex. Due to the lck of spce, we omit the detils bout Restr() trnsformtion for the enbling expressions. The detils cn be found in [1] Disbling For ech disbling expression [> B, we mke strong restriction, Restriction, for simplicity. Tht is, for some t, ll ctions in re not executble fter time t, nd ll ctions in B re executble only fter time t. From Restriction, there is no cses tht ctions in nd B re simultneously enbled t dierent nodes. So [> B cn be simulted by inserting messges to notify successful termintion of to ll nodes. To mke this simultion method work,the messges notifying 's termintion hve to rech before t. Exmple 7 The input described below stises Restriction (t 11) nd Restriction 7: S 1 [1 t 4]; b [3 t 8]; c 3 [7 t 1]; exit [> d 3 [1 t]; exit d 1mx 3, d 3mx 4, d 31mx 3, d 3mx 4, d ij mx for other i,j. In order to gurntee tht the notiction of successful termintion sent from node 3 to nodes 1 nd cn rech before time t 11, the time constrint of c 3 must be restricted to 7 t 7, becuse the notiction from node 3 to node my tke d 3mx 4 units of time. Then, the restriction discussed in the previous section is pplied for b nd 1. Restr(S) 1 [1 t 1]; b [3 t 4]; c 3 [7 t 7]; exit[> d 3 [1 t]; exit From this, the protocol entity speciction of ech node will be derived s below: Node 1 1 [1 t 1]; r 31 (m1); exit[> i[t 1]; exit Node b [3 t 4]; r 3 (m1); exit[> i[t 1]; exit Node 3 c 3 [7 t 7]; (s 31 (m1)jjjs 3 (m1)) >> exit [> d 3 [1 t]; exit The denition of Restr(S) is s follows: Denition 8 If S [> B, Restr(S) def Restr(g ( ))[> Restr(B ); where g ( ) represents trnsformtion replcing the time constrint P (t; x) of ech ending ction of with P (t; x) ^ P (t). Here P (t) def ^ ft + d pq mx t g: pep ();qall 3..6 Process Invoction In our speciction lnguge, time is reset to t every moment processes re invoked, voiding ccumultion of time constrints. To simulte this in distributed environments, we mke ll nodes to pretend s if they invoke process simultneously. In order to do so, 1. Fix one node for responsible node, which decides the time to invoke process (the time just before invoking process). In this pper, from Restriction 5, the context of ech process invoction must be the form of ; B or [P (t; x)]; B. So we x the node plce() s the responsible node w.r.t. the process P.. The responsible node noties the invoction time of the process to ll nodes, nd immeditely invokes the process loclly. 3. The other nodes except the responsible node receive the notiction, nd invoke the process whose time constrints re modied to mke the invoction time be virtully equl to tht of the responsible node. Recll tht the ctul locl time is reset to just fter the process invoction of ech node. To implement 3., we modify ech process P without prmeters in service specictions to P (e P ) with just one prmeter e P in protocol specictions (Restriction 4), nd replce every occurrence of t in the right hnd of the process denition of P with t + e P. The prmeter e P represents the dierence between the ctul invoction time nd virtul invoction time. For exmple, P (3) mens the process P with replcing its time constrint, for instnce, t 5, with t Corresponding to ech process invoction of P in the service speciction, we derive protocol speciction such tht (1.)the responsible node sends the current time t P to every other node just before invoking P (), nd (.)the other nodes invoke P (t? t P ) fter receiving t P from the responsible node. The time t? t P corresponds to the ctul communiction dely from the responsible node. Note tht the process P my be clled by nother process Q. In such cse, the vrible t in P (t? t P ) should be djusted to represent the virtul time t which Q hd been invoked. So it should be modied to P (t + e Q? e P ) if this process invoction occurs in the right hnd of the denition of process Q, where
8 t + e Q represents the virtul invoction time of Q. Exmple 8 P : 1 [ t 4 ^ x t]; b [t x + 5]; P []c 1 [5 t]; exit d 1mx 4, d 1mx 3 Node 1 P (e P ) : 1 [ t + e P 4 ^ x t + e P ^ 9t (t t + e P + d 1mx ^ t x + 5)]; s 1 (m1; x); r 1 (m3; t P ); P (t + e P? t P ) >> s (m4); exit[]c 1 [5 t + e P ]; exit Node P (e P ) : r 1 (m1; x); b [t + e P x + 5]; s 1 (m; x); s 1 (m3; t + e P ); P () []r 1 (m4); exit To mke this simultion possible, we check whether the strting ction of ech process cnnot be lte if the notiction from the responsible node would rech in mximum dely. For consistency, we include this checking into Restr(). If the checking is flse, the time constrint of the strting ction becomes \flse." Denition 9 If S P where P : B, Restr(S) is dened inductively s follows: Restr(S) def P where P : h(restr(b)) where h(restr(b)) is n expression obtined by replcing the time constrint Q k (t; x k ) of ech strting ction k of Restr(B) with Q k (t; x k ) ^ Q. Here k Q k is Presburger formul dened s follows : Q def ^ k f9t 9x k [t +d p;plce( k )mx ^ Q(t ; x k )]g p1;:::;n 3.3 Synthesis Algorithm The synthesis lgorithm consists of two prts: 1. For given service speciction S, n ssignment of ech ction to node, nd mximum dely d ij mx for ech pir of nodes, construct S Restr(S).. If S u S, i.e., S nd S re bisimultion equivlent when time is ignored[6], derive protocol entity speciction N ode i of ech node i from S. Otherwise, do not derive nd hlt. In [1], we hve dened trnsformtion T p (B) which derives protocol entity speciction of node p from service speciction described by the behviour expression B. Although we omit the precise denition of T p (B) in this pper becuse of the spce limittion, we summrize our result by the following theorem: Theorem 1 For given service speciction S, let S Restr(S). If S u S, the protocol speciction ft i (S )g i1;;:::;n is v t -correct w.r.t. the service speciction S. 4 Concluding Remrks In this pper, we hve proposed method to synthesize protocol specictions from timed service specictions written in LOTOS/T+. The proposed method enbles us to synthesize protocol specictions from both timed nd structured service speci- ctions. In contrst to [5], our method restricts the time constrints of service specictions, not of the communiction medi, becuse the dely of the medi depends on the physicl lines, so it is more dicult to chnge them thn those of the specictions. Moreover, our correctness criterion gurntees tht the control structure of the derived protocol speciction is full, not prtil, implementtion of tht of the service speciction. Using the sme timing extension s ours, our result should esily pply to other process models such s CCS. The future work is to extend the clss of service specictions nd to estblish frmework for evluting performnce spects of the derived protocol entity specictions. References [1] R. L. Probert nd K. Sleh, \Synthesis of communiction protocols: Survey nd ssessment," IEEE Trns. Comput., vol. 4, pp. 468{475, [] P. M. Chu nd M. T. Liu, \Protocol synthesis in stte trnsition model," in Proc. IEEE COMPSAC '88, pp. 55{51, [3] C. Knt, T. Higshino, nd G. v. Bochmnn, \Deriving protocol specictions from service specictions written in LOTOS," in Proc. of 1th Annul Int'l Phoenix Conf. on Computers nd Communictions (IPCCC'93), pp. 31{318, IEEE, [4] H. Ymguchi, K. Okno, T. Higshino, nd K. Tniguchi, \Synthesis of protocol entities' specictions from service specictions in Petri net model with registers," in Proc. of 15th IEEE Int'l Conf. on Distributed Computing Systems, pp.51{517, [5] A. Khoumsi, G. v. Bochmnn, nd R. Dssouli, \On specifying services nd synthesizing protocols for reltime pplictions," in Protocol Speciction, Testing nd Veriction, XIV, pp. 185{, IFIP, Chpmn & Hll, [6] A. Nkt, T. Higshino, nd K. Tniguchi, \LOTOS enhncement to specify time constrints mong nondjcent ctions using rst order logic," in Forml Description Techniques, VI (FORTE'93), pp. 451{466, IFIP, North-Hollnd, [7] ISO, LOTOS { A Forml Description Technique Bsed on the Temporl Ordering of Observtionl Behviour. IS 887, [8] K. Ysumoto, T. Higshino, nd K. Tniguchi, \Softwre process description using LOTOS nd its enction," in Proc. of 16th IEEE Int'l Conf. on Softwre Engineering (ICSE-16), pp. 169{179, [9] J. E. Hopcroft nd J. D. Ullmn, Introduction to Automt Theory, Lnguges nd Computtion. Addison-Wesley, [1] A. Nkt, T. Higshino, nd K. Tniguchi, \Synthesis of protocol entity specictions from timed nd structured service specictions," I.C.S. Reserch Report 95-ICS-5, Dept. of Informtion nd Computer Sciences, Osk University, 1995.
Roadmap of This Lecture
Reltionl Model Rodmp of This Lecture Structure of Reltionl Dtbses Fundmentl Reltionl-Algebr-Opertions Additionl Reltionl-Algebr-Opertions Extended Reltionl-Algebr-Opertions Null Vlues Modifiction of the
More informationAddition and Subtraction
Addition nd Subtrction Nme: Dte: Definition: rtionl expression A rtionl expression is n lgebric expression in frction form, with polynomils in the numertor nd denomintor such tht t lest one vrible ppers
More information9.3. Regular Languages
9.3. REGULAR LANGUAGES 139 9.3. Regulr Lnguges 9.3.1. Properties of Regulr Lnguges. Recll tht regulr lnguge is the lnguge ssocited to regulr grmmr, i.e., grmmr G = (N, T, P, σ) in which every production
More informationCH 71 COMPLETING THE SQUARE INTRODUCTION FACTORING PERFECT SQUARE TRINOMIALS
CH 7 COMPLETING THE SQUARE INTRODUCTION I t s now time to py our dues regrding the Qudrtic Formul. Wht, you my sk, does this men? It mens tht the formul ws merely given to you once or twice in this course,
More informationUNinhabited aerial vehicles (UAVs) are becoming increasingly
A Process Algebr Genetic Algorithm Sertc Krmn Tl Shim Emilio Frzzoli Abstrct A genetic lgorithm tht utilizes process lgebr for coding of solution chromosomes nd for defining evolutionry bsed opertors is
More informationINF 4130 Exercise set 4
INF 4130 Exercise set 4 Exercise 1 List the order in which we extrct the nodes from the Live Set queue when we do redth first serch of the following grph (tree) with the Live Set implemented s LIFO queue.
More informationA Fuzzy Inventory Model With Lot Size Dependent Carrying / Holding Cost
IOSR Journl of Mthemtics (IOSR-JM e-issn: 78-578,p-ISSN: 9-765X, Volume 7, Issue 6 (Sep. - Oct. 0, PP 06-0 www.iosrournls.org A Fuzzy Inventory Model With Lot Size Dependent Crrying / olding Cost P. Prvthi,
More information3: Inventory management
INSE6300 Ji Yun Yu 3: Inventory mngement Concordi Februry 9, 2016 Supply chin mngement is bout mking sequence of decisions over sequence of time steps, fter mking observtions t ech of these time steps.
More information3/1/2016. Intermediate Microeconomics W3211. Lecture 7: The Endowment Economy. Today s Aims. The Story So Far. An Endowment Economy.
1 Intermedite Microeconomics W3211 Lecture 7: The Endowment Economy Introduction Columbi University, Spring 2016 Mrk Den: mrk.den@columbi.edu 2 The Story So Fr. 3 Tody s Aims 4 Remember: the course hd
More informationCache CPI and DFAs and NFAs. CS230 Tutorial 10
Cche CPI nd DFAs nd NFAs CS230 Tutoril 10 Multi-Level Cche: Clculting CPI When memory ccess is ttempted, wht re the possible results? ccess miss miss CPU L1 Cche L2 Cche Memory L1 cche hit L2 cche hit
More informationChapter 2: Relational Model. Chapter 2: Relational Model
Chpter : Reltionl Model Dtbse System Concepts, 5 th Ed. See www.db-book.com for conditions on re-use Chpter : Reltionl Model Structure of Reltionl Dtbses Fundmentl Reltionl-Algebr-Opertions Additionl Reltionl-Algebr-Opertions
More informationA Closer Look at Bond Risk: Duration
W E B E X T E S I O 4C A Closer Look t Bond Risk: Durtion This Extension explins how to mnge the risk of bond portfolio using the concept of durtion. BOD RISK In our discussion of bond vlution in Chpter
More informationSynchronizing Asynchronous IOCO
Synchronizing Asynchronous IOCO Ned Noroozi 1,2, Rmtin Khosrvi 3, MohmmdRez Mousvi 1, nd Tim Willemse 1 1 Eindhoven University of Technology, Eindhoven, The Netherlnds 2 Fnp Corportion (IT Subsidiry of
More informationA ppendix to. I soquants. Producing at Least Cost. Chapter
A ppendix to Chpter 0 Producing t est Cost This ppendix descries set of useful tools for studying firm s long-run production nd costs. The tools re isoqunts nd isocost lines. I soqunts FIGURE A0. SHOWS
More information164 CHAPTER 2. VECTOR FUNCTIONS
164 CHAPTER. VECTOR FUNCTIONS.4 Curvture.4.1 Definitions nd Exmples The notion of curvture mesures how shrply curve bends. We would expect the curvture to be 0 for stright line, to be very smll for curves
More informationArithmetic and Geometric Sequences
Arithmetic nd Geometric Sequences A sequence is list of numbers or objects, clled terms, in certin order. In n rithmetic sequence, the difference between one term nd the next is lwys the sme. This difference
More informationOptimal firm's policy under lead time- and price-dependent demand: interest of customers rejection policy
Optiml firm's policy under led time- nd price-dependent demnd: interest of customers rejection policy Abduh Syid Albn Université Grenoble Alpes, G-SCOP, F-38000 Grenoble, Frnce bduh-syid.lbn@grenoble-inp.org
More informationDYNAMIC PROGRAMMING REINFORCEMENT LEARNING. COGS 202 : Week 7 Presentation
DYNAMIC PROGRAMMING REINFORCEMENT LEARNING COGS 202 : Week 7 Preenttion OUTLINE Recp (Stte Vlue nd Action Vlue function) Computtion in MDP Dynmic Progrmming (DP) Policy Evlution Policy Improvement Policy
More informationThe Okun curve is non-linear
Economics Letters 70 (00) 53 57 www.elsevier.com/ locte/ econbse The Okun curve is non-liner Mtti Viren * Deprtment of Economics, 004 University of Turku, Turku, Finlnd Received 5 My 999; ccepted 0 April
More informationWhat is Monte Carlo Simulation? Monte Carlo Simulation
Wht is Monte Crlo Simultion? Monte Crlo methods re widely used clss of computtionl lgorithms for simulting the ehvior of vrious physicl nd mthemticl systems, nd for other computtions. Monte Crlo lgorithm
More informationMeasuring Search Trees
Mesuring Serch Trees Christin Bessiere 1, Bruno Znuttini 2, nd Cèsr Fernández 3 1 LIRMM-CNRS, Montpellier, Frnce 2 GREYC, Cen, Frnce 3 Univ. de Lleid, Lleid, Spin Astrct. The SAT nd CSP communities mke
More information(a) by substituting u = x + 10 and applying the result on page 869 on the text, (b) integrating by parts with u = ln(x + 10), dv = dx, v = x, and
Supplementry Questions for HP Chpter 5. Derive the formul ln( + 0) d = ( + 0) ln( + 0) + C in three wys: () by substituting u = + 0 nd pplying the result on pge 869 on the tet, (b) integrting by prts with
More informationChapter 3: The Reinforcement Learning Problem. The Agent'Environment Interface. Getting the Degree of Abstraction Right. The Agent Learns a Policy
Chpter 3: The Reinforcement Lerning Problem The Agent'Environment Interfce Objectives of this chpter: describe the RL problem we will be studying for the reminder of the course present idelized form of
More informationOutline. CSE 326: Data Structures. Priority Queues Leftist Heaps & Skew Heaps. Announcements. New Heap Operation: Merge
CSE 26: Dt Structures Priority Queues Leftist Heps & Skew Heps Outline Announcements Leftist Heps & Skew Heps Reding: Weiss, Ch. 6 Hl Perkins Spring 2 Lectures 6 & 4//2 4//2 2 Announcements Written HW
More informationUNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics BERTRAND VS. COURNOT COMPETITION IN ASYMMETRIC DUOPOLY: THE ROLE OF LICENSING
UNIVERSITY OF NOTTINGHAM Discussion Ppers in Economics Discussion Pper No. 0/0 BERTRAND VS. COURNOT COMPETITION IN ASYMMETRIC DUOPOLY: THE ROLE OF LICENSING by Arijit Mukherjee April 00 DP 0/0 ISSN 160-48
More informationUNIT 7 SINGLE SAMPLING PLANS
UNIT 7 SINGLE SAMPLING PLANS Structure 7. Introduction Objectives 7. Single Smpling Pln 7.3 Operting Chrcteristics (OC) Curve 7.4 Producer s Risk nd Consumer s Risk 7.5 Averge Outgoing Qulity (AOQ) 7.6
More informationCS 188 Introduction to Artificial Intelligence Fall 2018 Note 4
CS 188 Introduction to Artificil Intelligence Fll 2018 Note 4 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Non-Deterministic Serch Picture runner, coming to the end of
More informationBehavioural Differential Equations and Coinduction for Binary Trees
Behviourl Differentil Equtions nd Coinduction for Binry Trees Alexndr Silv nd Jn Rutten,2 Centrum voor Wiskunde en Informtic (CWI) 2 Vrije Universiteit Amsterdm (VUA) {ms,jnr}@cwi.nl Abstrct. We study
More informationResearch Article Existence of Positive Solution to Second-Order Three-Point BVPs on Time Scales
Hindwi Publishing Corportion Boundry Vlue Problems Volume 2009, Article ID 685040, 6 pges doi:10.1155/2009/685040 Reserch Article Existence of Positive Solution to Second-Order hree-point BVPs on ime Scles
More informationMARKET POWER AND MISREPRESENTATION
MARKET POWER AND MISREPRESENTATION MICROECONOMICS Principles nd Anlysis Frnk Cowell Note: the detil in slides mrked * cn only e seen if you run the slideshow July 2017 1 Introduction Presenttion concerns
More informationToday s Outline. One More Operation. Priority Queues. New Operation: Merge. Leftist Heaps. Priority Queues. Admin: Priority Queues
Tody s Outline Priority Queues CSE Dt Structures & Algorithms Ruth Anderson Spring 4// Admin: HW # due this Thursdy / t :9pm Printouts due Fridy in lecture. Priority Queues Leftist Heps Skew Heps 4// One
More informationA portfolio approach to the optimal funding of pensions
Economics Letters 69 (000) 01 06 www.elsevier.com/ locte/ econbse A portfolio pproch to the optiml funding of pensions Jysri Dutt, Sndeep Kpur *, J. Michel Orszg b, b Fculty of Economics University of
More information3. Argumentation Frameworks
3. Argumenttion Frmeworks Argumenttion current hot topic in AI. Historiclly more recent thn other pproches discussed here. Bsic ide: to construct cceptble set(s) of beliefs from given KB: 1 construct rguments
More informationContinuous Optimal Timing
Srlnd University Computer Science, Srbrücken, Germny My 6, 205 Outline Motivtion Preliminries Existing Algorithms Our Algorithm Empiricl Evlution Conclusion Motivtion Probbilistic models unrelible/unpredictble
More informationChapter55. Algebraic expansion and simplification
Chpter55 Algebric expnsion nd simplifiction Contents: A The distributive lw B The product ( + b)(c + d) C Difference of two squres D Perfect squres expnsion E Further expnsion F The binomil expnsion 88
More informationFINANCIAL ANALYSIS I. INTRODUCTION AND METHODOLOGY
Dhk Wter Supply Network Improvement Project (RRP BAN 47254003) FINANCIAL ANALYSIS I. INTRODUCTION AND METHODOLOGY A. Introduction 1. The Asin Development Bnk (ADB) finncil nlysis of the proposed Dhk Wter
More informationProblem Set for Chapter 3: Simple Regression Analysis ECO382 Econometrics Queens College K.Matsuda
Problem Set for Chpter 3 Simple Regression Anlysis ECO382 Econometrics Queens College K.Mtsud Excel Assignments You re required to hnd in these Excel Assignments by the due Mtsud specifies. Legibility
More information)''/?\Xck_
bcbsnc.com Deductible options: $250, $500, $1,000 or $2,500 Deductible options $500, $1,000, $2,500, $3,500 or $5,000 D or (100% coinsurnce is not vilble on the $2,500 deductible option) coinsurnce plns:
More informationMATH 236 ELAC MATH DEPARTMENT FALL 2017 SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
MATH 236 ELAC MATH DEPARTMENT FALL 2017 TEST 1 REVIEW SHORT ANSWER. Write the word or phrse tht best completes ech sttement or nswers the question. 1) The supply nd demnd equtions for certin product re
More informationOption exercise with temptation
Economic Theory 2008) 34: 473 501 DOI 10.1007/s00199-006-0194-3 RESEARCH ARTICLE Jinjun Mio Option exercise with tempttion Received: 25 Jnury 2006 / Revised: 5 December 2006 / Published online: 10 Jnury
More informationInternational Budget Partnership OPEN BUDGET QUESTIONNAIRE POLAND
Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE POLAND September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002
More informationchecks are tax current income.
Humn Short Term Disbility Pln Wht is Disbility Insurnce? An esy explntion is; Disbility Insurnce is protection for your pycheck. Imgine if you were suddenly disbled, unble to work, due to n ccident or
More informationPSAKUIJIR Vol. 4 No. 2 (July-December 2015)
Resonble Concession Period for Build Operte Trnsfer Contrct Projects: A Cse Study of Theun-Hiboun Hydropower Dm Project nd Ntionl Rod No. 14 A Project Pnysith Vorsing * nd Dr.Sounthone Phommsone ** Abstrct
More informationJFE Online Appendix: The QUAD Method
JFE Online Appendix: The QUAD Method Prt of the QUAD technique is the use of qudrture for numericl solution of option pricing problems. Andricopoulos et l. (00, 007 use qudrture s the only computtionl
More informationTime Scales: From Nabla Calculus to Delta Calculus and Vice Versa via Duality
Interntionl Journl of Difference Equtions ISSN 0973-6069, Volume 5, Number 1, pp. 25 40 (2010) http://cmpus.mst.edu/ijde Time Scles: From Nbl Clculus to Delt Clculus nd Vice Vers vi Dulity M. Cristin Cputo
More informationBurrows-Wheeler Transform and FM Index
Burrows-Wheeler Trnsform nd M Index Ben ngmed You re free to use these slides. If you do, plese sign the guestbook (www.lngmed-lb.org/teching-mterils), or emil me (ben.lngmed@gmil.com) nd tell me briefly
More informationThe Market Approach to Valuing Businesses (Second Edition)
BV: Cse Anlysis Completed Trnsction & Guideline Public Comprble MARKET APPROACH The Mrket Approch to Vluing Businesses (Second Edition) Shnnon P. Prtt This mteril is reproduced from The Mrket Approch to
More informationSmart Investment Strategies
Smrt Investment Strtegies Risk-Rewrd Rewrd Strtegy Quntifying Greed How to mke good Portfolio? Entrnce-Exit Exit Strtegy: When to buy? When to sell? 2 Risk vs.. Rewrd Strtegy here is certin mount of risk
More informationName Date. Find the LCM of the numbers using the two methods shown above.
Lest Common Multiple Multiples tht re shred by two or more numbers re clled common multiples. The lest of the common multiples is clled the lest common multiple (LCM). There re severl different wys to
More informationReinforcement Learning. CS 188: Artificial Intelligence Fall Grid World. Markov Decision Processes. What is Markov about MDPs?
CS 188: Artificil Intelligence Fll 2010 Lecture 9: MDP 9/2/2010 Reinforcement Lerning [DEMOS] Bic ide: Receive feedbck in the form of rewrd Agent utility i defined by the rewrd function Mut (lern to) ct
More informationRates of Return of the German PAYG System - How they can be measured and how they will develop
Rtes of Return of the Germn PAYG System - How they cn be mesured nd how they will develop Christin Benit Wilke 97-2005 me Mnnheimer Forschungsinstitut Ökonomie und Demogrphischer Wndel Gebäude L 13, 17_D-68131
More informationControlling a population of identical MDP
Controlling popultion of identicl MDP Nthlie Bertrnd Inri Rennes ongoing work with Miheer Dewskr (CMI), Blise Genest (IRISA) nd Hugo Gimert (LBRI) Trends nd Chllenges in Quntittive Verifiction Mysore,
More informationEffects of Entry Restriction on Free Entry General Competitive Equilibrium. Mitsuo Takase
CAES Working Pper Series Effects of Entry Restriction on Free Entry Generl Competitive Euilirium Mitsuo Tkse Fculty of Economics Fukuok University WP-2018-006 Center for Advnced Economic Study Fukuok University
More informationPSAS: Government transfers what you need to know
PSAS: Government trnsfers wht you need to know Ferury 2018 Overview This summry will provide users with n understnding of the significnt recognition, presenttion nd disclosure requirements of the stndrd.
More informationChapter 4. Profit and Bayesian Optimality
Chpter 4 Profit nd Byesin Optimlity In this chpter we consider the objective of profit. The objective of profit mximiztion dds significnt new chllenge over the previously considered objective of socil
More informationNORTH YORKSHIRE PENSION FUND GOVERNANCE COMPLIANCE STATEMENT
NORTH YORKSHIRE PENSION FUND GOVERNANCE COMPLIANCE STATEMENT TABLE OF CONTENTS Section Pge 1 INTRODUCTION 2 2 GOVERNANCE ARRANGEMENTS 2 3 REPRESENTATION AND MEETINGS 4 4 OPERATIONAL PROCEDRES 5 5 KEY POLICY
More informationAutarky more likely than complete specialization
Autrky more likely thn complete specilition Antonio Quesd Deprtment d Economi, Universitt Rovir i Virgili, Avingud de l Universitt, 4304 Reus, Spin 3th Jnury 00 38.9 Astrct This pper mesures the strength
More informationExhibit A Covered Employee Notification of Rights Materials Regarding Allied Managed Care Incorporated Allied Managed Care MPN MPN ID # 2360
Covered Notifiction of Rights Mterils Regrding Allied Mnged Cre Incorported Allied Mnged Cre MPN This pmphlet contins importnt informtion bout your medicl cre in cse of workrelted injmy or illness You
More informationOPEN BUDGET QUESTIONNAIRE SOUTH AFRICA
Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE SOUTH AFRICA September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC
More information1. Detailed information about the Appellant s and Respondent s personal information including mobile no. and -id are to be furnished.
Revised Form 36 nd Form 36A for filing ppel nd cross objection respectively before income tx ppellte tribunl (Notifiction No. 72 dted 23.10.2018) Bckground CBDT issued drft notifiction vide press relese
More informationDo We Really Need Gaussian Filters for Feature Detection? (Supplementary Material)
Do We Relly Need Gussin Filters for Feture Detection? (Supplementry Mteril) Lee-Kng Liu, Stnley H. Chn nd Truong Nguyen Februry 5, 0 This document is supplementry mteril to the pper submitted to EUSIPCO
More informationOPEN BUDGET QUESTIONNAIRE FRANCE
Interntionl Budget Project OPEN BUDGET QUESTIONNAIRE FRANCE October 2005 Interntionl Budget Project Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002 www.interntionlbudget.org
More informationTechnical Appendix. The Behavior of Growth Mixture Models Under Nonnormality: A Monte Carlo Analysis
Monte Crlo Technicl Appendix 1 Technicl Appendix The Behvior of Growth Mixture Models Under Nonnormlity: A Monte Crlo Anlysis Dniel J. Buer & Ptrick J. Currn 10/11/2002 These results re presented s compnion
More informationOutline. CS 188: Artificial Intelligence Spring Speeding Up Game Tree Search. Minimax Example. Alpha-Beta Pruning. Pruning
CS 188: Artificil Intelligence Spring 2011 Lecture 8: Gme, MDP 2/14/2010 Pieter Abbeel UC Berkeley Mny lide dpted from Dn Klein Outline Zero-um determinitic two plyer gme Minimx Evlution function for non-terminl
More informationAsymptotic Stability of a Rate Control System. with Communication Delays
Asymptotic Stbility of Rte Control System with Communiction Delys Richrd J. L nd Priy Rnjn University of Mrylnd, College Prk {hyongl, priy}@eng.umd.edu 1 Abstrct We study the issue of symptotic stbility
More informationMath F412: Homework 4 Solutions February 20, κ I = s α κ α
All prts of this homework to be completed in Mple should be done in single worksheet. You cn submit either the worksheet by emil or printout of it with your homework. 1. Opre 1.4.1 Let α be not-necessrily
More informationDatabase System Concepts, 5 th Ed. Silberschatz, Korth and Sudarshan See for conditions on re-use
Chpter 2: Reltionl Model Dtbse System Concepts, 5 th Ed. See www.db-book.com for conditions on re-use Bnking Exmple brnch (brnch_nme, brnch_city, ssets) customer (customer_nme, customer_street, customer_city)
More informationAccess your online resources today at
978--07-670- - CmbridgeMths: NSW Syllbus for the Austrlin Curriculum: Yer 0: Stte./. Access your online resources tody t www.cmbridge.edu.u/go. Log in to your existing Cmbridge GO user ccount or crete
More informationA Short Introduction to Abstract Argumentation Frameworks
A Short Introduction to Abstrct Argumenttion Frmeworks Stefn Woltrn Technische Universität Wien Gerhrd Brewk Universität Leipzig November 2009 () Abstrct Argumenttion Frmeworks November 2009 1 / 20 Argumenttion
More informationOPEN BUDGET QUESTIONNAIRE UKRAINE
Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE UKRAINE September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002
More informationMulti-Step Reinforcement Learning: A Unifying Algorithm
Multi-Step Reinforcement Lerning: A Unifying Algorithm Kristopher De Asis, 1 J. Fernndo Hernndez-Grci, 1 G. Zchris Hollnd, 1 Richrd S. Sutton Reinforcement Lerning nd Artificil Intelligence Lbortory, University
More informationThe Saga of Reduced Factorizations of Elements of the Symmetric Group
Topics in Algebric Combintorics LECTURE NOTES April, 00 The Sg of Reduced Fctoriztions of Elements of the Symmetric Group by A. M. Grsi Abstrct These notes cover the contents of series of lectures in Topics
More informationOn-demand, Spot, or Both: Dynamic Resource Allocation for Executing Batch Jobs in the Cloud
On-demnd, Spot, or Both: Dynmic Resource Alloction for Executing Btch Jobs in the Cloud Ishi Menche Microsoft Reserch Ohd Shmir Weizmnn Institute Nvendu Jin Microsoft Reserch Abstrct Cloud computing provides
More informationSTAT 472 Fall 2016 Test 2 November 8, 2016
STAT 47 Fll 016 Test November 8, 016 1. Anne who is (65) buys whole life policy with deth benefit of 00,000 pyble t the end of the yer of deth. The policy hs nnul premiums pyble for life. The premiums
More informationOPEN BUDGET QUESTIONNAIRE
Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE SOUTH KOREA September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002
More informationBERNARD M.BARUCH 597 MADISON AVENUE NEW YORK 22, N. Y.
BERNARD M.BARUCH 597 MADISON AVENUE NEW YORK 22, N. Y. Mrch 11, 1947. Mr. Mrriner S. Eccles, Federl Reserve System, Wshington, D.C. My der Mr. Eccles: Is the enclosed bill stisfctory to you nd hs it ny
More informationOpen Space Allocation and Travel Costs
Open Spce Alloction nd Trvel Costs By Kent Kovcs Deprtment of Agriculturl nd Resource Economics University of Cliforni, Dvis kovcs@priml.ucdvis.edu Pper prepred for presenttion t the Americn Agriculturl
More informationFirst version: September 1997 This version: October On the Relevance of Modeling Volatility for Pricing Purposes
First version: September 1997 This version: October 1999 On the Relevnce of Modeling Voltility for Pricing Purposes Abstrct: Mnuel Moreno 3 Deprtment of Economics nd Business Universitt Pompeu Fbr Crrer
More informationOn the Complexity of Computing the Justification Status of an Argument
On the Complexity of Computing the Justifiction Sttus of n Argument dbi Reserch Seminr, Vienn Wolfgng Dvořák Institute of Informtion Systems, Vienn University of Technology Oct 13, 2011 Supported by the
More informationPSJ Model Guidebook. Prepared: March 2011 Revised: April 2016 Japan Securities Dealers Association PSJ Calculation Statistics Council
PJ Model Guidebook Prepred: Mrch 0 Revised: April 06 Jpn ecurities Delers Assocition PJ Clcultion ttistics Council Tble of Contents Forwrd to the English Lnguge Version... Forwrd to the Jpnese Lnguge Version...
More informationCHAPTER-IV PRE-TEST ESTIMATOR OF REGRESSION COEFFICIENTS: PERFORMANCE UNDER LINEX LOSS FUNCTION
CHAPTER-IV PRE-TEST ESTIMATOR OF REGRESSION COEFFICIENTS: PERFORMANCE UNDER LINEX LOSS FUNCTION 4.1 INTRODUCTION It hs lredy been demonstrted tht the restricted lest squres estimtor is more efficient thn
More informationOPEN BUDGET QUESTIONNAIRE MACEDONIA
Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE MACEDONIA September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002
More informationJOURNAL THE ERGODIC TM CANDLESTICK OSCILLATOR ROBERT KRAUSZ'S. Volume 1, Issue 7
ROBERT KRUSZ'S JOURNL Volume 1, Issue 7 THE ERGODIC TM CNDLESTICK OSCILLTOR S ometimes we re lucky (due to our diligence) nd we find tool tht is useful nd does the jo etter thn previous tools, or nswers
More informationPillar 3 Quantitative Disclosure
Pillr 3 Quntittive Disclosure In complince with the requirements under Bsel Pillr 3 nd the Monetry Authority of Singpore (MAS) Notice 637 Public Disclosure, vrious dditionl quntittive nd qulittive disclosures
More informationCOMPLETE COVER - `ADD ON' TO TRAVEL INSURANCE POLICIES CONFERENCE & EVENT ORGANISERS SCHEDULE
SPECIMEN ONLY COMPLETE COVER - `ADD ON' TO TRAVEL INSURANCE POLICIES CONFERENCE & EVENT ORGANISERS SCHEDULE Policy Numer: Policyholder: Certificte of Insurnce: PPIP(E) Period of Insurnce: Finncil Loss:
More informationPRICING CONVERTIBLE BONDS WITH KNOWN INTEREST RATE. Jong Heon Kim
Kngweon-Kyungki Mth. Jour. 14 2006, No. 2, pp. 185 202 PRICING CONVERTIBLE BONDS WITH KNOWN INTEREST RATE Jong Heon Kim Abstrct. In this pper, using the Blck-Scholes nlysis, we will derive the prtil differentil
More informationTHE FINAL PROOF SUPPORTING THE TURNOVER FORMULA.
THE FINAL PROOF SUPPORTING THE TURNOVER FORMULA. I would like to thnk Aris for his mthemticl contriutions nd his swet which hs enled deeper understnding of the turnover formul to emerge. His contriution
More informationInternational Budget Partnership OPEN BUDGET QUESTIONNAIRE Sri Lanka, September 2009
Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE Sri Lnk, September 2009 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street NE, Suite 510 Wshington, DC 20002 www.interntionlbudget.org
More informationASYMMETRIC SWITCHING COSTS CAN IMPROVE THE PREDICTIVE POWER OF SHY S MODEL
Document de trvil 2012-14 / April 2012 ASYMMETRIC SWITCHIG COSTS CA IMPROVE THE PREDICTIVE POWER OF SHY S MODEL Evens Slies OFCE-Sciences-Po Asymmetric switching costs cn improve the predictive power of
More information1 Manipulation for binary voters
STAT 206A: Soil Choie nd Networks Fll 2010 Mnipultion nd GS Theorem Otoer 21 Leturer: Elhnn Mossel Srie: Kristen Woyh In this leture we over mnipultion y single voter: whether single voter n lie out his
More informationComplete the table below to show the fixed, variable and total costs. In the final column, calculate the profit or loss made by J Kane.
Tsk 1 J Kne sells mchinery to the frm industry. His fixed costs re 10,000 nd ech mchine costs him 400 to buy. He sells them t 600 nd is trying to work out his profit or loss t vrious levels of sles. He
More informationOPEN BUDGET QUESTIONNAIRE
Interntionl Budget Project OPEN BUDGET QUESTIONNAIRE UNITED STATES October 2005 Interntionl Budget Project Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002 www.interntionlbudget.org
More informationFractal Analysis on the Stock Price of C to C Electronic Commerce Enterprise Ming Chen
6th Interntionl Conference on Electronic, Mechnicl, Informtion nd Mngement (EMIM 2016) Frctl Anlysis on the Stock Price of C to C Electronic Commerce Enterprise Ming Chen Soochow University, Suzhou, Chin
More informationWhat Makes a Better Annuity?
Wht Mkes Better Annuity? Json S. Scott, John G. Wtson, nd Wei-Yin Hu My 2009 PRC WP2009-03 Pension Reserch Council Working Pper Pension Reserch Council The Whrton School, University of Pennsylvni 3620
More informationRicardian Model. Mercantilism: 17 th and 18 th Century. Adam Smith s Absolute Income Hypothesis, End of 18 th Century: Major Shift in Paradigm
Mercntilism: th nd th Century Ricrdin Model lesson in Comprtive dvntge Trde ws considered s Zero-Sum Gme It ws viewed mens to ccumulte Gold & Silver Exports were encourged Imports were discourged End of
More informationOPEN BUDGET QUESTIONNAIRE CZECH REPUBLIC
Interntionl Budget Project OPEN BUDGET QUESTIONNAIRE CZECH REPUBLIC October 2005 Interntionl Budget Project Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002 www.interntionlbudget.org
More informationProblem Set 2 Suggested Solutions
4.472 Prolem Set 2 Suggested Solutions Reecc Zrutskie Question : First find the chnge in the cpitl stock, k, tht will occur when the OLG economy moves to the new stedy stte fter the government imposes
More informationThe Morgan Stanley FTSE Growth Optimiser Plan
The Morgn Stnley FTSE Growth Optimiser Pln Offering choice of two FTSE 100 linked growth plns Choose the growth nd risk profile tht meets your investment needs The Morgn Stnley FTSE 100 Growth Optimiser
More informationInequality and the GB2 income distribution
Working Pper Series Inequlity nd the GB2 income distribution Stephen P. Jenkins ECINEQ WP 2007 73 ECINEC 2007-73 July 2007 www.ecineq.org Inequlity nd the GB2 income distribution Stephen P. Jenkins* University
More informationPillar 3 Quantitative Disclosure
Pillr 3 Quntittive Disclosure In complince with the requirements under Bsel Pillr 3 nd the Monetry Authority of Singpore (MAS) Notice 637 Public Disclosure, vrious dditionl quntittive nd qulittive disclosures
More information