This document presents the πRT-calculus, a calculus for modeling mobile real-time processes. It extends the π-calculus with a timeout operator to model real-time aspects. The document covers the syntax and semantics of the π-calculus and πRT-calculus. It also discusses design choices like having a global clock and discrete time. An example of a mobile video streaming system is used to illustrate the πRT-calculus. The document concludes by discussing future work, like developing timed bisimulation and extending to continuous time.
EuroPython 2017 - PyData - Deep Learning your Broadband Network @ HOMEHONGJOO LEE
45 min talk about collecting home network performance measures, analyzing and forecasting time series data, and building anomaly detection system.
In this talk, we will go through the whole process of data mining and knowledge discovery. Firstly we write a script to run speed test periodically and log the metric. Then we parse the log data and convert them into a time series and visualize the data for a certain period.
Next we conduct some data analysis; finding trends, forecasting, and detecting anomalous data. There will be several statistic or deep learning techniques used for the analysis; ARIMA (Autoregressive Integrated Moving Average), LSTM (Long Short Term Memory).
This slide explain complexity of an algorithm. Explain from theory perspective. At the end of slide, I also show the test result to prove the theory. Pleas, read this slide to improve your code quality .
This slide is exported from Ms. Power
Point to PDF.
EuroPython 2017 - PyData - Deep Learning your Broadband Network @ HOMEHONGJOO LEE
45 min talk about collecting home network performance measures, analyzing and forecasting time series data, and building anomaly detection system.
In this talk, we will go through the whole process of data mining and knowledge discovery. Firstly we write a script to run speed test periodically and log the metric. Then we parse the log data and convert them into a time series and visualize the data for a certain period.
Next we conduct some data analysis; finding trends, forecasting, and detecting anomalous data. There will be several statistic or deep learning techniques used for the analysis; ARIMA (Autoregressive Integrated Moving Average), LSTM (Long Short Term Memory).
This slide explain complexity of an algorithm. Explain from theory perspective. At the end of slide, I also show the test result to prove the theory. Pleas, read this slide to improve your code quality .
This slide is exported from Ms. Power
Point to PDF.
Tutorial: The Role of Event-Time Analysis Order in Data StreamingVincenzo Gulisano
Slides for our tutorial, titled “The Role of Event-Time Analysis Order in Data Streaming”, presented at the 14th ACM International Conference on Distributed and Event-Based Systems (DEBS) conference. We have recorded the tutorial, and you can find the videos at the following links:
Part 1: https://youtu.be/SW_WS6ULsdY
Part 2: https://youtu.be/bq3ECNvPwOU
You can find this slides, as well as the code examples, at https://github.com/vincenzo-gulisano/debs2020_tutorial_event_time and at SlideS
Optimization of Continuous Queries in Federated Database and Stream Processin...Zbigniew Jerzak
The constantly increasing number of connected devices and sensors results in increasing volume and velocity of sensor-based streaming data. Traditional approaches for processing high velocity sensor data rely on stream processing engines. However, the increasing complexity of continuous queries executed on top of high velocity data has resulted in growing demand for federated systems composed of data stream processing engines and database engines. One of major challenges for such systems is to devise the optimal query execution plan to maximize the throughput of continuous queries.
In this paper we present a general framework for federated database and stream processing systems, and introduce the design and implementation of a cost-based optimizer for optimizing relational continuous queries in such systems. Our optimizer uses characteristics of continuous queries and source data streams to devise an optimal placement for each operator of a continuous query. This fine level of optimization, combined with the estimation of the feasibility of query plans, allows our optimizer to devise query plans which result in 8 times higher throughput as compared to the baseline approach which uses only stream processing engines. Moreover, our experimental results showed that even for simple queries, a hybrid execution plan can result in 4 times and 1.6 times higher throughput than a pure stream processing engine plan and a pure database engine plan, respectively.
Keynote: Building and Operating A Serverless Streaming Runtime for Apache Bea...Flink Forward
Apache Beam is Flink’s sibling in the Apache family of streaming processing frameworks. The Beam and Flink teams work closely together on advancing what is possible in streaming processing, including Streaming SQL extensions and code interoperability on both platforms.
Beam was originally developed at Google as the amalgamation of its internal batch and streaming frameworks to power the exabyte-scale data processing for Gmail, YouTube and Ads. It now powers a fully-managed, serverless service Google Cloud Dataflow, as well as is available to run in other Public Clouds and on-premises when deployed in portability mode on Apache Flink, Spark, Samza and other runners. Users regularly run distributed data processing jobs on Beam spanning tens of thousands of CPU cores and processing millions of events per second.
In this session, Sergei Sokolenko, Cloud Dataflow product manager, and Reuven Lax, the founding member of the Dataflow and Beam team, will share Google’s learnings from building and operating a global streaming processing infrastructure shared by thousands of customers, including:
safe deployment to dozens of geographic locations,
resource autoscaling to minimize processing costs,
separating compute and state storage for better scaling behavior,
dynamic work rebalancing of work items away from overutilized worker nodes,
offering a throughput-optimized batch processing capability with the same API as streaming,
grouping and joining of 100s of Terabytes in a hybrid in-memory/on-desk file system,
integrating with the Google Cloud security ecosystem, and other lessons.
Customers benefit from these advances through faster execution of jobs, resource savings, and a fully managed data processing environment that runs in the Cloud and removes the need to manage infrastructure.
Automated Parameterization of Performance Models from MeasurementsWeikun Wang
This is a tutorial presented in ICPE 2016 (https://icpe2016.spec.org/). In this tutorial, we present the problem of estimating parameters of performance models from measurements of real systems and discuss algorithms that can support researchers and practitioners in this task. The focus lies on performance models based on queueing systems, where the estimation of request arrival rates and service demands is a required input to the model. In the tutorial, we review existing estimation methods for service demands and present models to characterize time-varying arrival processes. The tutorial also demonstrates the use of relevant tools that automate demand estimation, such as LibRede, FG and M3A.
Workshop slides from the Alt.Net Seattle 2011 workshop. Presented by Wes Dyer and Ryan Riley. Get the slides and the workshop code at http://rxworkshop.codeplex.com/
[EUC2016] FFWD: latency-aware event stream processing via domain-specific loa...Matteo Ferroni
Tools and applications for event stream processing and real-time analytics are getting a huge hype these days on a wide range of application scenarios, from the smallest Internet of Things (IoT) embedded sensor to the most popular Social Network feed. Unfortunately, dealing with this kind of input rises some issues that can easily mine the real-time analysis requirement due to an unexpected overload of the system; this happens as the processing time may strongly depend on the single event content, while the event arrival rate may vary unpredictably over time. In this work, we propose Fast Forward With Degradation (FFWD), a latency-aware load shedding framework that exploits performance degradation techniques to adapt the throughput of the application to the size of the input, allowing the system to have a fast and reliable response time in case of overloading. Moreover, we show how different domain-specific policies can guarantee a reasonable accuracy of the aggregated output metrics.
Full paper: http://ieeexplore.ieee.org/document/7982234/
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...IJERA Editor
Delays deteriorate the control performance and could destabilize the overall system in the theory of discretetime
signals and dynamic systems. Whenever a computer is used in measurement, signal processing or control
applications, the data as seen from the computer and systems involved are naturally discrete-time because a
computer executes program code at discrete points of time. Theory of discrete-time dynamic signals and systems
is useful in design and analysis of control systems, signal filters, state estimators and model estimation from
time-series of process data system identification. In this paper, a new approximated discretization method and
digital design for control systems with delays is proposed. System is transformed to a discrete-time model with
time delays. To implement the digital modeling, we used the z-transfer functions matrix which is a useful model
type of discrete-time systems, being analogous to the Laplace-transform for continuous-time systems. The most
important use of the z-transform is for defining z-transfer functions matrix is employed to obtain an extended
discrete-time. The proposed method can closely approximate the step response of the original continuous timedelayed
control system by choosing various of energy loss level. Illustrative example is simulated to demonstrate
the effectiveness of the developed method.\
ODSC 2019: Sessionisation via stochastic periods for root event identificationKuldeep Jiwani
In todays world majority of information is generated by self sustaining systems like various kinds of bots, crawlers, servers, various online services, etc. This information is flowing on the axis of time and is generated by these actors under some complex logic. For example, a stream of buy/sell order requests by an Order Gateway in financial world, or a stream of web requests by a monitoring / crawling service in the web world, or may be a hacker's bot sitting on internet and attacking various computers. Although we may not be able to know the motive or intention behind these data sources. But via some unsupervised techniques we can try to infer the pattern or correlate the events based on their multiple occurrences on the axis of time. Associating a chain of events in order of time helps in doing a root event analysis. In certain cases a time ordered correlation and root event identification is good enough to automatically identify signatures of various malicious actors and take appropriate corrective actions to stop cyber attacks, stop malicious social campaigns, etc.
Sessionisation is one such unsupervised technique that tries to find the signal in a stream of events associated with a timestamp. In the ideal world it would resolve to finding periods with a mixture of sinusoidal waves. But for the real world this is a much complex activity, as even the systematic events generated by machines over the internet behave in a much erratic manner. So the notion of a period for a signal also changes in the real world. We can no longer associate it with a number, it has to be treated as a random variable, with expected values and associated variance. Hence we need to model "Stochastic periods" and learn their probability distributions in an unsupervised manner.
The main focus of this talk will be to showcase applied data science techniques to discover stochastic periods. There are many ways to obtain periods in data, so the journey would begin by a walk through of existing techniques like FFT (Fast Fourier Transform) then discuss about Gaussian Mixture Models. After highlighting the short comings of these techniques we will succinctly explain one of the most general non-parametric Bayesian approaches to solve this problem. Without going too deep in the complex math, we will get back to applied data science and discuss a much simpler technique that can solve the same problem if certain assumptions are satisfied.
In this talk we will demonstrate some time based pattern we discovered while working on a security analytics use case that uses Sessionisation. In the talk we will demonstrate such patterns based on an open source malware attack datasets that is available publicly.
Key concepts explained in talk: Sessionisation, Bayesian techniques of Machine Learning, Gaussian Mixture Models, Kernel density estimation, FFT, stochastic periods, probabilistic modelling, Bayesian non-parametric methods
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Modern design is crucial in today's digital environment, and this is especially true for SharePoint intranets. The design of these digital hubs is critical to user engagement and productivity enhancement. They are the cornerstone of internal collaboration and interaction within enterprises.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
A calculus of mobile Real-Time processes
1. A calculus of mobile Real-Time processes
A calculus of mobile Real-Time
processes
lotfi.larbaoui@polymtl.ca
16 novembre 2017
2. A calculus of mobile Real-Time processes
Introduction
The π-calculus
General design choices and properties
The πRT-calculus
Example
Conclusion
3. A calculus of mobile Real-Time processes
Introduction
Introduction
The π-calculus
General design choices and properties
The πRT-calculus
Example
Conclusion
4. A calculus of mobile Real-Time processes
Introduction
Modelling Real-time system :
c Building models which faithfully represent complex system is a
non trivial problem and a prerequisite to the application of formal
analysis .d Joseph Sifakis 2001
Process calculi (CCS and pi-calculus etc) :
c A mathematical treatment of communicating and concurrent
entities that could rival the known theories of sequential
programming .d Robin Milner 2010
Real-time process algebra : πRT-calculus
Modeling the real-time aspect of systems in a mobile
environment and reasoning about dynamic temporal behaviour
and dynamic configurations of systems.
5. A calculus of mobile Real-Time processes
Introduction
Background
6. A calculus of mobile Real-Time processes
The π-calculus
Introduction
The π-calculus
General design choices and properties
The πRT-calculus
Example
Conclusion
7. A calculus of mobile Real-Time processes
The π-calculus
Syntax
P ::=
| 0 Inaction
| αi .P Action
| P1 + P2 Choice
| P1|P2 Parallel composition
| (νx).P Scoping
| [x = y]P Match
| A(x1, ..., xn) Agent identifier
| !P replication
Names : x , y , z
The actions αi are : τ Internal , ¯xy Output a name ,
x(y) Input a name ,¯x(y) Output a reference
8. A calculus of mobile Real-Time processes
The π-calculus
Semantics
The semantics of π-calculus is defined by :
1. Reduction binary relations : P → Q
2. Labeled transition : P
α
−→ Q
The inference rules defining the reduction relations and labeled
transition.
The semantics of the reductions use the notion of Structural
congruence
9. A calculus of mobile Real-Time processes
The π-calculus
Structural congruence
10. A calculus of mobile Real-Time processes
The π-calculus
Transition rules
11. A calculus of mobile Real-Time processes
The π-calculus
Transition rules
12. A calculus of mobile Real-Time processes
The π-calculus
Interactions between processes
13. A calculus of mobile Real-Time processes
General design choices and properties
Introduction
The π-calculus
General design choices and properties
The πRT-calculus
Example
Conclusion
14. A calculus of mobile Real-Time processes
General design choices and properties
Model Features
Global clock
Discrete time
Separation of actions and time events : interleaving model
Synchronous time event : Time progresses in a synchronous
fashion
Time transmission : can result in dynamic temporal behaviour
of processes.
15. A calculus of mobile Real-Time processes
General design choices and properties
Model Properties
Maximal progress :
if P
τ
−→ P for some P , then for t > O, P
(t)
−−→ P for no P .
Timelock freeness :
for all agent P and P
α
−→ P for some P and α = τ , then for
t > 0, P
(t)
−−→ P for some P .
Time visibility :
for t > 0, if P
(t)
−−→ P , then for any name x free in P ,
(νx)P
(t)
−−→ (νx)P
16. A calculus of mobile Real-Time processes
General design choices and properties
Model Properties
Time determinacy :
for t > 0, whenever P
(t)
−−→ P and P
(t)
−−→ P , then P ≡ P
Time continuity :
for t > 0 and u > 0 , P
(t+u)
−−−−→ P iff there exists P such that
P
(t)
−−→ P and P
(u)
−−→ P
Action persistency :
for t > 0, if P
(t)
−−→ P and P
α
−→ Q then P
α
−→ Q for some Q
17. A calculus of mobile Real-Time processes
General design choices and properties
Atomic actions and Idling
Non-controllable action (above) and controllable action (below)
18. A calculus of mobile Real-Time processes
The πRT-calculus
Introduction
The π-calculus
General design choices and properties
The πRT-calculus
Example
Conclusion
19. A calculus of mobile Real-Time processes
The πRT-calculus
πRT-calculus
P ::=
| 0 Inaction
| αi .P Action
| P1 + P2 Choice
| P1|P2 Parallel composition
| P
t
Q The timeout operator
| (νx).P Scoping
| [x = y]P Match
| A(x1, ..., xn) Agent identifier
| !P replication
Names : x , y , z . - The actions αi are : τ Internal , ¯xy Output a
name , x(y) Input a name ,¯x(y) is not defined ! ! !.
20. A calculus of mobile Real-Time processes
The πRT-calculus
Semantics
21. A calculus of mobile Real-Time processes
The πRT-calculus
Operational semantics
22. A calculus of mobile Real-Time processes
The πRT-calculus
Operational semantics
23. A calculus of mobile Real-Time processes
Example
Introduction
The π-calculus
General design choices and properties
The πRT-calculus
Example
Conclusion
24. A calculus of mobile Real-Time processes
Example
Network configuration for the mobile streaming video
player
25. A calculus of mobile Real-Time processes
Example
Ports of the video player
Player
def
= attach(t, r).Attached(t, r)
Attached(t, r)
def
= 0
t
Playing(r)
Playing(r)
def
= video.(0
1
.τplay.Playing(r)) + attach(t, r).rel.Attached(t, r)
26. A calculus of mobile Real-Time processes
Example
Ports of the routers
Router(t, rel)
def
= attach t, rel .rel.Router(t, rel)
RouterA
def
= Router(3, rel1)
RouterB
def
= Router(5, rel2)
27. A calculus of mobile Real-Time processes
Example
Port of the video server
Server
def
= video.Server
28. A calculus of mobile Real-Time processes
Example
The whole system is encoded from the user’s point of view and is
as follows :
System
def
= (νvideo)(Server|(νattach, rel1, rel2)
(Player|RouterA|RouterB))
.
29. A calculus of mobile Real-Time processes
Example
The whole system is encoded from the user’s point of view and is
as follows :
System
def
= (νvideo)(Server|(νattach, rel1, rel2)
(Player|RouterA|RouterB))
.
Suppose the player first attaches to router A. Router A transmits
the transmission delay from the server which is 3 time units plus a
release link to the player.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(Attached(3, rel1)|rel1.Router(3, rel1)|RouterB))
.
30. A calculus of mobile Real-Time processes
Example
The whole system is encoded from the user’s point of view and is
as follows :
System
def
= (νvideo)(Server|(νattach, rel1, rel2)
(Player|RouterA|RouterB))
.
Suppose the player first attaches to router A. Router A transmits
the transmission delay from the server which is 3 time units plus a
release link to the player.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(Attached(3, rel1)|rel1.Router(3, rel1)|RouterB))
.
System
(3)
→ System
.
31. A calculus of mobile Real-Time processes
Example
The whole system is encoded from the user’s point of view and is
as follows :
System
def
= (νvideo)(Server|(νattach, rel1, rel2)
(Player|RouterA|RouterB))
.
Suppose the player first attaches to router A. Router A transmits
the transmission delay from the server which is 3 time units plus a
release link to the player.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(Attached(3, rel1)|rel1.Router(3, rel1)|RouterB))
.
System
(3)
→ System
.
where
System
def
= (νvideo)(Server|(νattach, rel1, rel2)
(Playing(rel1)|rel1.Router(3, rel1)|RouterB))
32. A calculus of mobile Real-Time processes
Example
After the transmission delay, the player gets the first video clip,
decodes and processes it for 1 time unit and then plays the clip to
the user.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(0
1
.τplay.Playing(rel1))|
rel1.Router(3, rel1)|RouterB))
.
33. A calculus of mobile Real-Time processes
Example
After the transmission delay, the player gets the first video clip,
decodes and processes it for 1 time unit and then plays the clip to
the user.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(0
1
.τplay.Playing(rel1))|
rel1.Router(3, rel1)|RouterB))
.
(1)
→ (νvideo)(Server|(νattach, rel1, rel2)
(τplay.Playing(rel1))|rel1.Router(3, rel1)|RouterB))
.
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(play.Playing(rel1))|rel1.Router(3, rel1)|RouterB))
play
→ System
34. A calculus of mobile Real-Time processes
Example
The player moves away from router A and attaches to router B.
Router B transmits the new transmission delay from the server
which is now 5 time units plus a release link to the player.
.
35. A calculus of mobile Real-Time processes
Example
The player moves away from router A and attaches to router B.
Router B transmits the new transmission delay from the server
which is now 5 time units plus a release link to the player.
.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(rel1.Attached(5, rel2)|
rel1.Router(3, rel1)|rel2.Router(5, rel2)))
.
36. A calculus of mobile Real-Time processes
Example
The player moves away from router A and attaches to router B.
Router B transmits the new transmission delay from the server
which is now 5 time units plus a release link to the player.
.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(rel1.Attached(5, rel2)|
rel1.Router(3, rel1)|rel2.Router(5, rel2)))
.
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(Attached(5, rel2)|
RouterA|rel2.Router(5, rel2)))
(5)
→ System
System
def
= (νvideo)(Server|(νattach, rel1, rel2)
(Playing(rel2)|RouterA|rel2.Router(5, rel2)))
37. A calculus of mobile Real-Time processes
Example
When the player moves away from router B and back to router A
again :
.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(0
1
.τplay.Playing(rel2))|
RouterA|rel2.Router(5, rel2)))
.
38. A calculus of mobile Real-Time processes
Example
When the player moves away from router B and back to router A
again :
.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(0
1
.τplay.Playing(rel2))|
RouterA|rel2.Router(5, rel2)))
.
(1)
→ (νvideo)(Server|(νattach, rel1, rel2)
(τplay.Playing(rel2))|RouterA|rel2.Router(5, rel2)))
.
39. A calculus of mobile Real-Time processes
Example
When the player moves away from router B and back to router A
again :
.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(0
1
.τplay.Playing(rel2))|
RouterA|rel2.Router(5, rel2)))
.
(1)
→ (νvideo)(Server|(νattach, rel1, rel2)
(τplay.Playing(rel2))|RouterA|rel2.Router(5, rel2)))
.
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(play.Playing(rel2))|RouterA|rel2.Router(5, rel2)))
play
→ System
40. A calculus of mobile Real-Time processes
Example
After the transmission delay, the player can start receiving and
playing the stream :
.
41. A calculus of mobile Real-Time processes
Example
After the transmission delay, the player can start receiving and
playing the stream :
.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(rel2.Attached(3, rel1)|
rel1.Router(3, rel1)|rel2.Router(5, rel2)))
.
42. A calculus of mobile Real-Time processes
Example
After the transmission delay, the player can start receiving and
playing the stream :
.
System
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(rel2.Attached(3, rel1)|
rel1.Router(3, rel1)|rel2.Router(5, rel2)))
.
τ
→ (νvideo)(Server|(νattach, rel1, rel2)
(Attached(3, rel1)|
rel1.Router(3, rel1)|RouterB))
(3)
→ System
43. A calculus of mobile Real-Time processes
Conclusion
Introduction
The π-calculus
General design choices and properties
The πRT-calculus
Example
Conclusion
44. A calculus of mobile Real-Time processes
Conclusion
Conclusion
The πRT-calculus is a temporal extension of a π-calculus by
introducing a timeout operator.
To continue :
Developing timed bisimulation equivalence relation
Extending the π-calculus with continuous time
Defin the broadcast commnication in the πRT-calculus .
This formalism :
is simple real-time process algebra
is not suitable for real-time programming
their mechanisms are too abstract
45. A calculus of mobile Real-Time processes
Conclusion
References
Robin Milner
A Calculus of Communicating Systems
Springer-Verlag, 1980
Davide Sangiorgi,David Walker
The Pi-Calculus : A Theory of Mobile Processes
Cambridge University Press, 2003
Xavier Nicollin, Joseph Sifakis
An Overview and Synthesis on Timed Process Algebras
Proceedings of CAV 91, LNCS 575, 1991.
Jeremy Y. Lee John Zic
On Modeling Real-time Mobile Processes
Australian Computer Science Communications Vol. 24 (2002)