Results 1 - 10
of
3,463
Constraint Automata with Synchronization Points
"... One of the most common methods to attain correct software is through its verification against a model. First the software is devel-oped and then a model for this software is created. The software is accepted as correct code when the model is verified. But this is only the case when the model correct ..."
Abstract
- Add to MetaCart
correctly represents the software. In contrast, model-driven software development advocates developing the model first and deriving the software through a sequence of correctness-preserving model transformations. In this report, we describe CASP (Constraint Automata with Synchronization Points): a model
SYNCHRONIZATION POINTS AND ASSOCIATED DYNAMICAL INVARIANTS
"... Abstract. This paper introduces new invariants for multiparameter dynamical systems. This is done by counting the number of points whose orbits intersect at time n under simultaneous iteration of finitely many endomorphisms. We call these points synchronization points. The resulting sequences of cou ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
Abstract. This paper introduces new invariants for multiparameter dynamical systems. This is done by counting the number of points whose orbits intersect at time n under simultaneous iteration of finitely many endomorphisms. We call these points synchronization points. The resulting sequences
Carpooling: the 2 Synchronization Points Shortest Paths Problem ∗
"... hal-00843628, version 1-Carpooling is an appropriate solution to address traffic congestion and to reduce the ecological footprint of the car use. In this paper, we address an essential problem for providing dynamic carpooling: how to compute the shortest driver’s and passenger’s paths. Indeed, thos ..."
Abstract
- Add to MetaCart
, those two paths are synchronized in the sens that they have a common subpath between two points: the location where the passenger is picked up and the one where he is dropped off the car. The passenger path may include time-dependent public transportation parts before or after the common subpath
Symbolic Model Checking: 10^20 States and Beyond
, 1992
"... Many different methods have been devised for automatically verifying finite state systems by examining state-graph models of system behavior. These methods all depend on decision procedures that explicitly represent the state space using a list or a table that grows in proportion to the number of st ..."
Abstract
-
Cited by 758 (41 self)
- Add to MetaCart
, strong and weak observational equivalence of finite transition systems, and language containment for finite w-automata. The fixed point computations for each decision procedure are sometimes complex. but can be concisely expressed in the Mu-Calculus. We illustrate the practicality of our approach
Retiming Synchronous Circuitry
- ALGORITHMICA
, 1991
"... This paper describes a circuit transformation called retiming in which registers are added at some points in a circuit and removed from others in such a way that the functional behavior of the circuit as a whole is preserved. We show that retiming can be used to transform a given synchronous circui ..."
Abstract
-
Cited by 376 (3 self)
- Add to MetaCart
This paper describes a circuit transformation called retiming in which registers are added at some points in a circuit and removed from others in such a way that the functional behavior of the circuit as a whole is preserved. We show that retiming can be used to transform a given synchronous
Tor: The secondgeneration onion router,”
- in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract
-
Cited by 1229 (33 self)
- Add to MetaCart
, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability
Incremental Feature Validation: a Synchronous Point of View
- In Feature Interactions in Telecommunications Systems V
, 1998
"... . In this paper, a synchronous approach is applied to specify and validate telecommunication features. A service is viewed as a reactive system and is fully described in Lustre, an executable specification language. The service properties are stated in the same language and feature validation is car ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
. In this paper, a synchronous approach is applied to specify and validate telecommunication features. A service is viewed as a reactive system and is fully described in Lustre, an executable specification language. The service properties are stated in the same language and feature validation
Using Early Phase Termination To Eliminate Load Imbalances At Barrier Synchronization Points
"... We present a new technique, early phase termination, for eliminating idle processors in parallel computations that use barrier synchronization. This technique simply terminates each parallel phase as soon as there are too few remaining tasks to keep all of the processors busy. Although this techniqu ..."
Abstract
-
Cited by 36 (24 self)
- Add to MetaCart
this technique completely eliminates the idling that would otherwise occur at barrier synchronization points, it may also change the computation and therefore the result that the computation produces. We address this issue by providing probabilistic distortion models that characterize how the use of early phase
Predicting coherence communication by tracking synchronization points at run time.”
- in MICRO,
, 2012
"... Abstract Predicting target processors that a coherence request must be delivered to can improve the miss handling latency in shared memory systems. In directory coherence protocols, directly communicating with the predicted processors avoids costly indirection to the directory. In snooping protocol ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
protocols, prediction relaxes the high bandwidth requirements by replacing broadcast with multicast. In this work, we propose a new run-time coherence target prediction scheme that exploits the inherent correlation between synchronization points in a program and coherence communication. Our workload
Stability analysis of oscillatory systems subject to large delays: a synchronization point of view
"... The behavior of the rightmost characteristic roots of linear time-delay systems as a function of the delay parameter is studied for small values of a gain parameter. The results explain the qualitative behavior of the stability regions in the delay parameter space of oscillatory systems subjected to ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
to large delays, and shed a new light on the corresponding stabilization problem. In particular, for a chain of multiple oscillators the determination of a stabilizing value of the delay parameter is interpreted as a phase synchronization problem. The results are illustrated with the output feedback
Results 1 - 10
of
3,463