A Hierarchy of Behavioral Equivalences in the π-calculus with Noisy Channels
The π-calculus is a process algebra where agents interact by sending communication links to each other via noiseless communication channels. Taking into account the reality of noisy channels, an extension of the π-calculus, called the πN-calculus, has ...
Congruence Formats for Weak Readiness Equivalence and Weak Possible Future Equivalence
Weak equivalences are important behavioral equivalences in the course of specifying and analyzing reactive systems using process algebraic languages. In this paper, we propose a series of weak equivalences named weak parametric readiness equivalences, ...
Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs
Model abstraction plays an important role in model checking of source codes of programs. Slicing execution is a lightweight symbolic execution procedure to extract the models of C programs in an over-approximated way. In this paper, we present an ...
Special Interest Messaging
Hundreds of technical, special interest Internet weblogs are already generating thousands of niche articles worldwide, and many institutions are starting to create internal blogs for team collaboration. As this style of communication becomes more ...
Using the Relational Model to Capture Topological Information of Spaces
Motivated by research on how topology may be a helpful foundation for building information modelling, a relational database version of the notions of chain complex and chain complex morphism is defined and used for storing cw-complexes and their ...
Multiparty Contracts
To implement an interorganizational process between different enterprizes, one needs to agree on the ‘rules of engagement’. These can be specified in terms of a contract that describes the overall intended process and the duties of all parties involved. ...
Some Extensions on Threshold Visual Cryptography Schemes
Droste [CRYPTO’96] proposed a construction of threshold visual cryptography scheme (TVCS) under the visual cryptography model of Naor and Shamir, i.e. the visual cryptography model with the underlying operation OR. In this article, we give three ...
Mum Effect as an Offshore Outsourcing Risk
Mum effect is the risk arising from project members’ reluctance to report negative information. We investigate the cultural factors contributing to this risk in offshore outsourcing. The study was conducted in Thailand with participation from both ...