423 research outputs found
Attempto - From Specifications in Controlled Natural Language towards Executable Specifications
Deriving formal specifications from informal requirements is difficult since
one has to take into account the disparate conceptual worlds of the application
domain and of software development. To bridge the conceptual gap we propose
controlled natural language as a textual view on formal specifications in
logic. The specification language Attempto Controlled English (ACE) is a subset
of natural language that can be accurately and efficiently processed by a
computer, but is expressive enough to allow natural usage. The Attempto system
translates specifications in ACE into discourse representation structures and
into Prolog. The resulting knowledge base can be queried in ACE for
verification, and it can be executed for simulation, prototyping and validation
of the specification.Comment: 15 pages, compressed, uuencoded Postscript, to be presented at EMISA
Workshop 'Naturlichsprachlicher Entwurf von Informationssystemen -
Grundlagen, Methoden, Werkzeuge, Anwendungen', May 28-30, 1996, Ev. Akademie
Tutzin
Specifying Logic Programs in Controlled Natural Language
Writing specifications for computer programs is not easy since one has to
take into account the disparate conceptual worlds of the application domain and
of software development. To bridge this conceptual gap we propose controlled
natural language as a declarative and application-specific specification
language. Controlled natural language is a subset of natural language that can
be accurately and efficiently processed by a computer, but is expressive enough
to allow natural usage by non-specialists. Specifications in controlled natural
language are automatically translated into Prolog clauses, hence become formal
and executable. The translation uses a definite clause grammar (DCG) enhanced
by feature structures. Inter-text references of the specification, e.g.
anaphora, are resolved with the help of discourse representation theory (DRT).
The generated Prolog clauses are added to a knowledge base. We have implemented
a prototypical specification system that successfully processes the
specification of a simple automated teller machine.Comment: 16 pages, compressed, uuencoded Postscript, published in Proceedings
CLNLP 95, COMPULOGNET/ELSNET/EAGLES Workshop on Computational Logic for
Natural Language Processing, Edinburgh, April 3-5, 199
Attempto Controlled English (ACE)
Attempto Controlled English (ACE) allows domain specialists to interactively
formulate requirements specifications in domain concepts. ACE can be accurately
and efficiently processed by a computer, but is expressive enough to allow
natural usage. The Attempto system translates specification texts in ACE into
discourse representation structures and optionally into Prolog. Translated
specification texts are incrementally added to a knowledge base. This knowledge
base can be queried in ACE for verification, and it can be executed for
simulation, prototyping and validation of the specification.Comment: 13 pages, compressed, uuencoded Postscript, to be presented at CLAW
96, The First International Workshop on Controlled Language Applications,
Katholieke Universiteit Leuven, 26-27 March 199
Declarative Specification
Deriving formal specifications from informal requirements is extremely difficult since one has to overcome the conceptual gap between an application domain and the domain of formal specification methods. To reduce this gap we introduce application-specific specification languages, i.e., graphical and textual notations that can be unambiguously mapped to formal specifications in a logic language. We describe a number of realised approaches based on this idea, and evaluate them with respect to their domain specificity vs. generalit
Declarative specifications
Deriving formal specifications from informal requirements is extremely difficult since one has to overcome the conceptual gap between an application domain and the domain of formal specification methods. To reduce this gap we introduce application-specific specification languages, i.e., graphical and textual notations that can be unambiguously mapped to formal specifications in a logic language. We describe a number of realised approaches based on this idea, and evaluate them with respect to their domain specificity vs. generalit
Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors
Quantum Key Distribution with the BB84 protocol has been shown to be
unconditionally secure even using weak coherent pulses instead of single-photon
signals. The distances that can be covered by these methods are limited due to
the loss in the quantum channel (e.g. loss in the optical fiber) and in the
single-photon counters of the receivers. One can argue that the loss in the
detectors cannot be changed by an eavesdropper in order to increase the covered
distance. Here we show that the security analysis of this scenario is not as
easy as is commonly assumed, since already two-photon processes allow
eavesdropping strategies that outperform the known photon-number splitting
attack. For this reason there is, so far, no satisfactory security analysis
available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix
added, references update
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
A Rare Case of Toxic Epidermal Necrolysis with Unexpected Fever Resulting from Dengue Virus
Toxic epidermal necrolysis (TEN), also known as Lyell's syndrome, is a life-threatening disease with common development of large wounds. Thus, affected patients are usually treated in specialized centers. Herein, we present a case of TEN in a patient infected with human immunodeficiency virus with the additional, unexpected diagnosis of dengue fever. In this context, we discuss cause, diagnosis, pathology, and treatment of TEN and highlight the role of rare and unexpected findings, as in this case an additional tropical virus infection. We underpin the importance of an interdisciplinary approach involving dermatologists, ophthalmologists, intensive care physicians, burn specialists and various other departments and emphasize the challenge of TEN treatment, especially if rare pathological findings occur
Measurement of the cosmic ray spectrum above eV using inclined events detected with the Pierre Auger Observatory
A measurement of the cosmic-ray spectrum for energies exceeding
eV is presented, which is based on the analysis of showers
with zenith angles greater than detected with the Pierre Auger
Observatory between 1 January 2004 and 31 December 2013. The measured spectrum
confirms a flux suppression at the highest energies. Above
eV, the "ankle", the flux can be described by a power law with
index followed by
a smooth suppression region. For the energy () at which the
spectral flux has fallen to one-half of its extrapolated value in the absence
of suppression, we find
eV.Comment: Replaced with published version. Added journal reference and DO
- …
