316 research outputs found

    Equational Reasonings in Wireless Network Gossip Protocols

    Get PDF
    Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout large-scale networks. In this paper, we propose a compositional analysis technique to study formal probabilistic models of gossip protocols expressed in a simple probabilistic timed process calculus for wireless sensor networks. We equip the calculus with a simulation theory to compare probabilistic protocols that have similar behaviour up to a certain tolerance. The theory is used to prove a number of algebraic laws which revealed to be very effective to estimate the performances of gossip networks, with and without communication collisions, and randomised gossip networks. Our simulation theory is an asymmetric variant of the weak bisimulation metric that maintains most of the properties of the original definition. However, our asymmetric version is particularly suitable to reason on protocols in which the systems under consideration are not approximately equivalent, as in the case of gossip protocols

    Modelling MAC-Layer Communications in Wireless Systems

    Get PDF
    We present a timed process calculus for modelling wireless networks in which individual stations broadcast and receive messages; moreover the broadcasts are subject to collisions. Based on a reduction semantics for the calculus we define a contextual equivalence to compare the external behaviour of such wireless networks. Further, we construct an extensional LTS (labelled transition system) which models the activities of stations that can be directly observed by the external environment. Standard bisimulations in this LTS provide a sound proof method for proving systems contextually equivalence. We illustrate the usefulness of the proof methodology by a series of examples. Finally we show that this proof method is also complete, for a large class of systems

    Le Corbusier traducido. Infidelidad creativa en el proyecto Curutchet

    Get PDF

    Dwelling or duelling in possibilities: how (Ir)relevant are African feminisms?

    Get PDF
    In its four decades of rebirth, the world has debated (enough) the relevance of feminism, but there is, surprisingly, refreshingly emergent dimensions at the turn of the twenty-first century: feminisms from feminism flowing from Africa. The theories or models of Womanism, Stiwanism, Motherism, and Nego-feminism, with their underlying assumptions and values,were all born at various end times of the twentieth century with a common objective of seeking gender justice. This paper examines the crucial question of how relevant these models are to the global practice of woman as human. What propels their separateness, and why didn‘t they combine to make a more solid stance on the plight of the African woman? In fact, why can‘t they simply identify with the general feminism? Put differently, are they dwelling in the same terrain or are they separable and easily recognisable discourses duelling in possibilities for the woman in Africa in particular and the woman of the globe in general? More specifically, how (ir)relevant are African feminisms?In trying to answer these questions, the paper presents a critical review of the afore-mentioned theories of African feminisms with the goal of providing readers an understanding of what is new in each model, and what is similar or different between the various strands of African feminisms. The paper concludes with the author‘s analysis of the model that holds the best promise or possibilities for African feminism to achieve its seemingly elusive goal of gender equality

    Probabilistic Mobility Models for Mobile and Wireless Networks

    Get PDF
    International audienceIn this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus, broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message from a location, it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of nodes is not arbitrary but guarded by a probabilistic mobility function (PMF), and we also define the notion of a weak bisimulation given a PMF. It is possible to have weak bisimular networks which have different probabilistic connectivity information. We furthermore examine the relation between our weak bisimulation and a minor variant of PCTL* [1]. Finally, we apply our calculus on a small example called the Zeroconf protocol [2]

    On the decidability of linear bounded periodic cyber-physical systems

    Get PDF
    Cyber-Physical Systems (CPSs) are integrations of distributed computing systems with physical processes via a networking with actuators and sensors, where feedback loops among the components allow the physical processes to affect the computations and vice versa. Although CPSs can be found in several complex and sometimes critical real-world domains, their verification and validation often relies on simulation-test systems rather then automatic methodologies to formally verify safety requirements. In this work, we prove the decidability of the reachability problem for discrete-time linear CPSs whose physical process in isolation has a periodic behavior, up to an initial transitory phase

    Regulating Data Exchange in Service Oriented Applications

    Get PDF
    We define a type system for COWS, a formalism for specifying and combining services, while modelling their dynamic behaviour. Our types permit to express policies constraining data exchanges in terms of sets of service partner names attachable to each single datum. Service programmers explicitly write only the annotations necessary to specify the wanted policies for communicable data, while a type inference system (statically) derives the minimal additional annotations that ensure consistency of services initial configuration. Then, the language dynamic semantics only performs very simple checks to authorize or block communication. We prove that the type system and the operational semantics are sound. As a consequence, we have the following data protection property: services always comply with the policies regulating the exchange of data among interacting services. We illustrate our approach through a simplified but realistic scenario for a service-based electronic marketplace
    corecore