Search results for "Web service"

showing 10 items of 100 documents

Building a new CTL model checker using Web services

2013

This Computation Tree Logic (CTL) is widely used to capture compositions of reactive systems. Model checking is particularly well-suited for the automated verification of finite-state systems, both for software and for hardware. A CTL model checker tool allows designers to automatically verify that systems satisfy specifications expressed in the language of CTL logic. In this paper we present a new CTL model checker implemented in client-server paradigm. CTL Designer, the client tool, allows an interactive construction of the CTL models as state-transition graphs. Java and C# APIs are provided for programmatic construction of large models. The server part of our tool embeds the core of the …

Model checkingComputation tree logicbusiness.industryComputer scienceProgramming languagecomputer.software_genreCTL*TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESSoftwareTheoryofComputation_LOGICSANDMEANINGSOFPROGRAMSScalabilityWeb servicebusinessFormal verificationcomputerReactive system2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013)
researchProduct

Verification of JADE Agents Using ATL Model Checking

2015

It is widely accepted that the key to successfully developing a system is to produce a thorough system specification and design. This task requires an appropriate formal method and a suitable tool to determine whether or not an implementation conforms to the specifications. In this paper we present an advanced technique to analyse, design and debug JADE software agents, using Alternating-time Temporal Logic (ATL) which is interpreted over concurrent game structures, considered as natural models for compositions of open systems. In development of the proposed solution, we will use our original ATL model checker. In contrast to previous approaches, our tool permits an interactive or programma…

Model checkingComputer Networks and Communicationsbusiness.industryComputer scienceProgramming languagemedia_common.quotation_subjectJADE (programming language)System requirements specificationFormal methodscomputer.software_genreComputer Science ApplicationsComputational Theory and MathematicsDebuggingSoftware agentEmbedded systemTemporal logicWeb servicebusinesscomputermedia_commoncomputer.programming_languageInternational Journal of Computers Communications & Control
researchProduct

ATL model checking in the cloud

2015

This paper gives an overview of our recent work on implementing a new interactive ATL model checker for verification of open systems. In verification based on model checking, we need to provide a model of the system and also write down the properties (ATL formulas) that we require the system to satisfy. Traditionally, the semantics of ATL is given in terms of concurrent game structures. In contrast to previous approaches, our tool permits an interactive design of the ATL models as state-transition graphs, and is based on client/server architecture. The server part, published as Web service in OpenShift cloud platform, embeds the core of the ATL model checker, and the client provides an intu…

Model checkingSQLProgramming languagebusiness.industrySemantics (computer science)Computer scienceInteractive designCloud computingcomputer.software_genreTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESOperating systemAlgorithm designWeb servicebusinesscomputercomputer.programming_languageGraphical user interface2015 Internet Technologies and Applications (ITA)
researchProduct

Implementing an ATL model checker tool using relational algebra concepts

2014

Alternating-Time Temporal Logic (ATL) is a branching-time temporal logic that naturally describes computations of open systems. An open system interacts with its environment and its behavior depends on the state of the system as well as the behavior of the environment. ATL model-checking is a well-established technique for verifying that a formal model representing such a system satisfies a given property. In this paper we describe a new interactive model checker environment based on algebraic approach. Our tool is implemented in client-server paradigm. The client part allows an interactive construction of ATL models represented by concurrent game structures as directed multi-graphs. The se…

Model checkingSQLTheoretical computer scienceProgramming languageComputer sciencecomputer.internet_protocolRelational algebracomputer.software_genreOpen system (systems theory)Temporal logicWeb servicecomputerServer-sideXMLcomputer.programming_language2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
researchProduct

Formal Modeling and Discrete-Time Analysis of BPEL Web Services

2008

International audience; Web services are increasingly used for building enterprise information systems according to the Service Oriented Architecture (SOA) paradigm. We propose in this paper a tool-equipped methodology allowing the formal modeling and analysis of Web services described in the BPEL language. The discrete-time transition systems modeling the behavior of BPEL descriptions are obtained by an exhaustive simulation based on a formalization of BPEL semantics using the Algebra of Timed Processes (ATP). These models are then analyzed by model checking value-based temporal logic properties using the CADP toolbox. The approach is illustrated with the design of a Web service for GPS na…

Model checking[ INFO.INFO-MO ] Computer Science [cs]/Modeling and SimulationKnowledge representation and reasoningcomputer.internet_protocolComputer science0211 other engineering and technologies[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][ INFO.INFO-SE ] Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologycomputer.software_genre01 natural sciencesACM : D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methodsFormal specificationACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methodsACM : D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking0202 electrical engineering electronic engineering information engineeringTemporal logicEnterprise information systemFormal verification021103 operations researchDatabase010405 organic chemistrybusiness.industryApplied Mathematics020207 software engineeringService-oriented architectureSystems modeling[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation0104 chemical sciencesComputer Science ApplicationsACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checkingBusiness Process Execution LanguageModeling and Simulation020201 artificial intelligence & image processingWeb serviceSoftware engineeringbusinesscomputer
researchProduct

In Silico Insights into the SARS CoV-2 Main Protease Suggest NADH Endogenous Defences in the Control of the Pandemic Coronavirus Infection

2020

COVID-19 is a pandemic health emergency faced by the entire world. The clinical treatment of the severe acute respiratory syndrome (SARS) CoV-2 is currently based on the experimental administration of HIV antiviral drugs, such as lopinavir, ritonavir, and remdesivir (a nucleotide analogue used for Ebola infection). This work proposes a repurposing process using a database containing approximately 8000 known drugs in synergy structure- and ligand-based studies by means of the molecular docking and descriptor-based protocol. The proposed in silico findings identified new potential SARS CoV-2 main protease (MPRO) inhibitors that fit in the catalytic binding site of SARS CoV-2 MPRO. Several sel…

Models Molecular0301 basic medicineAgingmedicine.medical_treatmentcoronaviruslcsh:QR1-502Viral Nonstructural Proteinsmedicine.disease_causelcsh:Microbiology0302 clinical medicineSettore BIO/10 - BiochimicaCoronavirus 3C ProteasesCoronavirusvirus diseasesLopinavirHypothesisMolecular Docking SimulationCysteine EndopeptidasesDrug repositioningInfectious Diseases030220 oncology & carcinogenesisCoronavirus InfectionsOxidation-Reductionmedicine.drugDNA damageIn silicoPneumonia ViralBiologyAntiviral AgentsHIV-proteaseBetacoronavirus03 medical and health sciencesSARS-CoV-2 main proteaseVirologymedicineHumansComputer SimulationProtease InhibitorsPandemicsBinding SitesProteaseSARS-CoV-2Drug RepositioningCOVID-19HIV Protease InhibitorsDRUDIT web servicemolecular dockingNADbiology.organism_classificationVirologySettore CHIM/08 - Chimica FarmaceuticaCOVID-19 Drug Treatmentcoronaviru030104 developmental biologyNADHRitonavirBetacoronavirusDNA Damage
researchProduct

Toward an Integrated System for Surveillance and Behaviour Analysis of Groups and People

2013

Security and INTelligence SYStem is an Italian research project which aims to create an integrated system for the analysis of multi-modal data sources (text, images, video, audio), to assist operators in homeland security applications. Within this project the Scientific Research Unit of the University of Palermo is responsible of the image and video analysis activity. The SRU of Palermo developed a web service based architecture that provides image and video analysis capabilities to the integrated analysis system. The developed architecture uses both state of the art techniques, adapted to cope with the particular problem at hand, and new algorithms to provide the following services: image …

MultimediaComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONHomeland securityPlan (drawing)computer.software_genreComputer securityPhase (combat)Unit (housing)homeland security weapon detection weapon classification image analysis video analysis logo recognition forgery detection information fusionState (computer science)Web serviceArchitecturecomputerCropping
researchProduct

A multimedia approach to the efficient implementation and use of emergency plans

2004

Because of the complexity of emergency procedures, the stressful situations during which they're executed, the emergency plan must be meticulously designed so that safety managers can quickly find needed information. Regardless of the complex procedures it describes and the trying situations where it would be used, the plan's success is always measured by how effective the evacuation is. Thus, safety-conscious organizations continually try to improve their emergency procedures and the way they present them in the emergency plan. Integrating incoming information during an emergency and correlating this information with the plan's procedures is a manual task for many safety managers. The dang…

MultimediaEmerging technologiesComputer scienceControl (management)Mobile computingContext (language use)HypermediaPlan (drawing)Digital librarycomputer.software_genreComputer Science Applicationslaw.inventionHardware and ArchitecturelawSignal ProcessingMedia TechnologyWeb servicecomputerSoftwareIEEE MultiMedia
researchProduct

Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies

2009

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…

National securityDatabases FactualMedical Records Systems ComputerizedComputer scienceOpen grid services architecture (OGSA)Information Storage and RetrievalData securityCryptographycomputer.software_genreEncryptionComputer securityAccess to InformationOntologiesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALHumansElectrical and Electronic EngineeringGridComputer SecurityInternetbusiness.industryAuthorizationGeneral MedicineInformation securityGridComputer Science ApplicationsGrid computingPrivacyScalabilityKey (cryptography)SecurityDatabase Management SystemsbusinessWeb service resource framework (WSRF)computerLENGUAJES Y SISTEMAS INFORMATICOSConfidentialityBiotechnology
researchProduct

Towards integrated operations for ships

2013

Maritime customers will benefit greatly from integrated operations between ship and shore. It requires integrating diverse information services within a variety of communication environments, which is a complex task. The common approach to dealing with complex tasks is to use a divide-and-conquer policy and solve problems independently. Since there are mainly two challenges involved - interoperability among heterogeneous applications and connectivity through difficult maritime networks, to handle them separately has become useful. While interoperability and connectivity solutions work well individually, if we put them together in the maritime context, problems arise. We b services based int…

Network architectureComputer sciencecomputer.internet_protocolDistributed computingInteroperabilityContext (language use)Service-oriented architectureIntegrated operationscomputer.software_genreSoftware deploymentMediationInformation systemWeb servicecomputerImplementation2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct