A Topological Correctness Criterion for Multiplicative Non-Commutative Logic

2004 ◽  
pp. 283-322 ◽  
Author(s):  
Paul-André Melliès
2004 ◽  
Vol 13 (03) ◽  
pp. 289-332 ◽  
Author(s):  
JULIANE DEHNERT ◽  
WIL M. P. VAN DER AALST

This paper presents a methodology to bridge the gap between business process modeling and workflow specification. While the first is concerned with intuitive descriptions that are mainly used for communication, the second is concerned with configuring a process-aware information system, thus requiring a more rigorous language less suitable for communication. Unlike existing approaches the gap is not bridged by providing formal semantics for an informal language. Instead it is assumed that the desired behavior is just a subset of the full behavior obtained using a liberal interpretation of the informal business process modeling language. Using a new correctness criterion (relaxed soundness), it is verified whether a selection of suitable behavior is possible. The methodology consists of five steps and is illustrated using event-driven process chains as a business process modeling language and Petri nets as the workflow specification language.


2013 ◽  
Vol 427-429 ◽  
pp. 1506-1509
Author(s):  
Yong Yan Yu

A robust estimation procedure is necessary to estimate the true model parameters in computer vision. Evaluating the multiple-model in the presence of outliers-robust is a fundamentally different task than the single-model problem.Despite there are many diversity multi-model estimation algorithms, it is difficult to pick an effective and advisably approach.So we present a novel quantitative evaluation of multi-model estimation algorithms, efficiency may be evaluated by either examining the asymptotic efficiency of the algorithms or by running them for a series of data sets of increasing size.Thus we create a specifical testing dataset,and introduce a performance metric, Strongest-Intersection.and using the model-aware correctness criterion. Finally, well show the validity of estimation strategy by the Experimention of line-fitting.


2014 ◽  
Vol 24 (01) ◽  
pp. 61-86 ◽  
Author(s):  
STEFAN HUBER ◽  
MARTIN HELD ◽  
PETER MEERWALD ◽  
ROLAND KWITT

Watermarking techniques for vector graphics dislocate vertices in order to embed imperceptible, yet detectable, statistical features into the input data. The embedding process may result in a change of the topology of the input data, e.g., by introducing self-intersections, which is undesirable or even disastrous for many applications. In this paper we present a watermarking framework for two-dimensional vector graphics that employs conventional watermarking techniques but still provides the guarantee that the topology of the input data is preserved. The geometric part of this framework computes so-called maximum perturbation regions (MPR) of vertices. We propose two efficient algorithms to compute MPRs based on Voronoi diagrams and constrained triangulations. Furthermore, we present two algorithms to conditionally correct the watermarked data in order to increase the watermark embedding capacity and still guarantee topological correctness. While we focus on the watermarking of input formed by straight-line segments, one of our approaches can also be extended to circular arcs. We conclude the paper by demonstrating and analyzing the applicability of our framework in conjunction with two well-known watermarking techniques.


2016 ◽  
Vol 25 (03) ◽  
pp. 1650008 ◽  
Author(s):  
Lígia Maria Soares Passos ◽  
Stéphane Julia

This article presents a method for qualitative and quantitative analysis of WorkFlow nets based on the proof trees of Linear Logic. The qualitative analysis is concerned with the proof of Soundness correctness criterion defined for WorkFlow nets. To prove the Soundness property, a proof tree of Linear Logic is built for each different scenario of the WorkFlow net. The quantitative analysis is concerned with the resource planning for each task of the workflow process and is based on the computation of symbolic date intervals for task execution. In particular, such symbolic date intervals are computed using the proof trees used to prove Soundness property.


Author(s):  
FAROKH B. BASTANI ◽  
ING-RAY CHEN ◽  
TA-WEI TSAO

In this paper we develop a software reliability model for Artificial Intelligence (AI) programs. We show that conventional software reliability models must be modified to incorporate certain special characteristics of AI programs, such as (1) failures due to intrinsic faults, e.g., limitations due to heuristics and other basic AI techniques, (2) fuzzy correctness criterion, i.e., difficulty in accurately classifying the output of some AI programs as correct or incorrect, (3) planning-time versus execution-time tradeoffs, and (4) reliability growth due to an evolving knowledge base. We illustrate the approach by modifying the Musa-Okumoto software reliability growth model to incorporate failures due to intrinsic faults and to accept fuzzy failure data. The utility of the model is exemplified with a robot path-planning problem.


2014 ◽  
Vol 26 (4) ◽  
pp. 655-657 ◽  
Author(s):  
JOACHIM PARROW

Full abstraction, i.e. that a function preserves equivalence from a source to a target, has been used extensively as a correctness criterion for mappings between models of computation. I here show that with fixed equivalences, fully abstract functions almost always exist. Also, with the function and one of the equivalences fixed the other equivalence can almost always be found.


Author(s):  
G. Gopalakrishnan ◽  
E. Brunvand ◽  
N. Michell ◽  
S.M. Nowick

Sign in / Sign up

Export Citation Format

Share Document