Conference presentation given by Niels Lohmann on September 2, 2008 in Milan, Italy at the Sixth International Conference on Business Process Management (BPM 2008).
Abstract:
With an everyday increase in the number of cars on our roads and highways, we are facing numerous problems, for example:
• Smuggling of cars
• Invalid license plates
• Identification of stolen cars
• Usage of cars in terrorist attacks/illegal activities
In order to address the above issues, we took up the project of developing a prototype, which can perform license plate recognition (LPR). This project, as the name signifies, deals with reading, storing and comparing the license plate numbers retrieved from snapshots of cars to ensure safety in the country and ultimately help to reduce unauthorized vehicles access and crime.
License Plate Recognition (LPR) has been a practical technique in the past decades. It is one of the most important applications for Computer Vision, Patter Recognition and Image Processing in the field of Intelligent Transportation Systems (ITS).
Generally, the LPR system is divided into three steps, license plate locating, license plate character segmentation and license plate recognition. This project discusses a complete license plate recognition system with special emphasis on the Localization Module.In this study, the proposed algorithm is based on extraction of plate region using morphological operations and shape detection algorithms. Segmentation of plate made use of horizontal and vertical smearing and line detection algorithms. Lastly, template matching algorithms were used for character recognition.
The implementation of the project was done in the platforms of Matlab and OpenCV.
The document provides an overview of the food and beverage property market in two London locations - Mayfair and Middlesex Street, East London. In Mayfair, operator demand has driven prime rents up 67% in five years, with Berkeley Street becoming a prime location. Planning approvals are key to unlocking potential sites. Middlesex Street is emerging as a dining destination, attracting operators as rents rise from nearby development. Rents on Widegate Street and Steward Street have reached £55-63 per square foot.
El documento presenta las tablas de una base de datos de una empresa llamada "Donde Fercho" que incluye información de clientes, empleados, facturas, servicios y formularios. La base de datos contiene tablas para clientes, empleados, facturas, servicios e informes.
Jaseela K Ebrahim is seeking a position in clinical research with 9 months of pharmacy experience including dispensing medicines, maintaining inventory, and advising customers. She has a B.Pharm degree with 66% marks and relevant experience as a pharmacist at two hospitals. Her responsibilities included using pharmacy software, filling prescriptions, reordering supplies, and communicating with doctors. She is proficient in C++ and Windows operating systems and completed a certification in clinical research and management. Her academic project involved extracting and evaluating an anti-fungal plant. She is a self-motivated pharmacy graduate looking to contribute to the pharmaceutical sector.
This document outlines an idea for a product that would analyze how different media outlets interpret and manipulate stories to benefit their political agendas and push ideologies. It discusses how both liberal and conservative media contain biases influenced by ownership. Examples of works that parody politics through comedy are provided, noting that comedy can effectively convey political messages. The migrant crisis and how it has been portrayed differently by media is examined, as well as how political agendas are pushed through social media.
If you do only two things on linked in..Jeff Yaniga
The document provides tips for using LinkedIn effectively. It recommends focusing on two key things: having a complete profile with a photo and customizing your LinkedIn URL. It also recommends joining relevant industry and alumni groups to increase visibility and make connections. Group creation and management tips are provided, such as having a descriptive name and logo, promoting the group across different platforms, and adding discussions and content to engage members. Overall, the document emphasizes using LinkedIn as part of an integrated social media and marketing strategy.
Abstract:
With an everyday increase in the number of cars on our roads and highways, we are facing numerous problems, for example:
• Smuggling of cars
• Invalid license plates
• Identification of stolen cars
• Usage of cars in terrorist attacks/illegal activities
In order to address the above issues, we took up the project of developing a prototype, which can perform license plate recognition (LPR). This project, as the name signifies, deals with reading, storing and comparing the license plate numbers retrieved from snapshots of cars to ensure safety in the country and ultimately help to reduce unauthorized vehicles access and crime.
License Plate Recognition (LPR) has been a practical technique in the past decades. It is one of the most important applications for Computer Vision, Patter Recognition and Image Processing in the field of Intelligent Transportation Systems (ITS).
Generally, the LPR system is divided into three steps, license plate locating, license plate character segmentation and license plate recognition. This project discusses a complete license plate recognition system with special emphasis on the Localization Module.In this study, the proposed algorithm is based on extraction of plate region using morphological operations and shape detection algorithms. Segmentation of plate made use of horizontal and vertical smearing and line detection algorithms. Lastly, template matching algorithms were used for character recognition.
The implementation of the project was done in the platforms of Matlab and OpenCV.
The document provides an overview of the food and beverage property market in two London locations - Mayfair and Middlesex Street, East London. In Mayfair, operator demand has driven prime rents up 67% in five years, with Berkeley Street becoming a prime location. Planning approvals are key to unlocking potential sites. Middlesex Street is emerging as a dining destination, attracting operators as rents rise from nearby development. Rents on Widegate Street and Steward Street have reached £55-63 per square foot.
El documento presenta las tablas de una base de datos de una empresa llamada "Donde Fercho" que incluye información de clientes, empleados, facturas, servicios y formularios. La base de datos contiene tablas para clientes, empleados, facturas, servicios e informes.
Jaseela K Ebrahim is seeking a position in clinical research with 9 months of pharmacy experience including dispensing medicines, maintaining inventory, and advising customers. She has a B.Pharm degree with 66% marks and relevant experience as a pharmacist at two hospitals. Her responsibilities included using pharmacy software, filling prescriptions, reordering supplies, and communicating with doctors. She is proficient in C++ and Windows operating systems and completed a certification in clinical research and management. Her academic project involved extracting and evaluating an anti-fungal plant. She is a self-motivated pharmacy graduate looking to contribute to the pharmaceutical sector.
This document outlines an idea for a product that would analyze how different media outlets interpret and manipulate stories to benefit their political agendas and push ideologies. It discusses how both liberal and conservative media contain biases influenced by ownership. Examples of works that parody politics through comedy are provided, noting that comedy can effectively convey political messages. The migrant crisis and how it has been portrayed differently by media is examined, as well as how political agendas are pushed through social media.
If you do only two things on linked in..Jeff Yaniga
The document provides tips for using LinkedIn effectively. It recommends focusing on two key things: having a complete profile with a photo and customizing your LinkedIn URL. It also recommends joining relevant industry and alumni groups to increase visibility and make connections. Group creation and management tips are provided, such as having a descriptive name and logo, promoting the group across different platforms, and adding discussions and content to engage members. Overall, the document emphasizes using LinkedIn as part of an integrated social media and marketing strategy.
Matter is everything around us that has mass and takes up space. The document defines matter as everything around us that has mass and occupies physical space, and encourages observing one's surroundings to identify objects made of matter by considering whether they have mass and take up space.
This document provides instructions for assigning a static IP address to devices on a home network. It explains that assigning each device its own IP address avoids problems when troubleshooting and prevents address conflicts. Then, it lists the 12 step procedure for assigning an IP address to a Windows computer, which includes opening network connections in the control panel, selecting TCP/IP properties, and entering the IP address, subnet mask, default gateway, and DNS server addresses.
The document outlines the steps to test a hypothesis through experimentation. It discusses observing samples, making a hypothesis about which powder will dissolve in water, conducting an experiment by putting the powders in water to see which dissolves, and drawing a conclusion about whether the original hypothesis was correct or not.
Tandem skydiving involves jumping from a plane attached to an instructor. Early parachute designs were invented by Leonardo da Vinci, with the first recorded jump occurring in 1595 in Venice. Safety is high, with only 21 deaths out of 2.2 million jumps. Participants need loose, comfortable clothing and should remove loose jewelry before the jump. Instructors will teach body position, breathing techniques, and how to operate the parachute equipment. Jumps begin on an airplane flight to altitude, followed by exiting and free falling in a stable position before deploying the parachute to guide to a safe landing.
Children who acquire a second language at a young age are more likely to achieve native-like fluency in both pronunciation and grammar compared to older learners. A study by Patkowski examined highly educated immigrants to the US and found that those who began learning English before age 15 achieved near-native mastery, while older learners showed more variability in attainment levels. Similarly, a study by Johnson and Newport found few individual differences in second language ability for learners who began before age 10. However, early intensive exposure to a second language may entail the loss or incomplete development of the child's first language.
Quality, quality concepts
Software Quality Assurance
Software Reviews
Formal Technical Reviews
SQA Group Plan
ISO 9000, 9001
Example
Internal and external attributes
Scalable Conformance Checking of Business ProcessesMarlon Dumas
This document discusses techniques for scalable conformance checking of business process models against event logs. It presents challenges with existing approaches related to scalability for large logs. The research aims to improve scalability while still providing a complete set of differences between the model and log. The approach compresses the model and log into Deterministic Finite Automata and a State Space Partitioning, then uses these compressed structures to efficiently compute optimal alignments and behavioral differences. An evaluation on real-world and artificial datasets demonstrates the approach outperforms traditional trace alignments in scalability for large logs.
The document summarizes information about program repair and semantic repair. It discusses how most software has bugs that are often not fixed for months after being reported. It then describes reasons for program repair including generating patches as better bug reports and automating simple one-line fixes. It notes challenges with repair like weak test cases and large search spaces. It proposes using specifications, dynamic invariants, or test-driven repair as correctness criteria. It characterizes general purpose repair using generate-and-test or specification inference and discusses associated technical challenges. Finally, it discusses interactive and semantics-based repair.
Invited talk held by Karsten Wolf on March 2, 2009 on the 1st Central-European Workshop on Services and their Composition (ZEUS 2009) in Stuttgart, Germany.
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargetingIEEEBEBTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
This document describes a method for interactively manipulating parametric 3D shapes through direct brush strokes on the shape itself, rather than through adjusting individual hyper-parameters. The method works by amending the underlying direct acyclic graph (DAG) of the parametric shape to enable local differentiation of the shape with respect to its hyper-parameters. This allows the user's brush strokes to be interpreted as changes to the hyper-parameters through inverse control, without requiring any additional setup by the shape designer. The method is automatic, flexible, and non-invasive to existing parametric shape engines.
Patching the gap in collaborating on modelsÁbel Hegedüs
EclipseCon France 2017 talk on Model Patches, a new component of the EMF DiffMerge project.
Details: https://www.eclipsecon.org/france2017/session/patching-gap-collaborating-models
Crude-Oil Scheduling Technology: moving from simulation to optimizationBrenno Menezes
Scheduling technology either commercial or homegrown in today’s crude-oil refining industries relies on a complex simulation of scenarios where the user is solely responsible for making many different decisions manually in the search for feasible solutions over some limited time-horizon i.e., trial-and-error heuristics. As a normal outcome, schedulers abandon these solutions and then return to their simpler spreadsheet simulators due to: (i) time-consuming efforts to configure and manage numerous scheduling scenarios, and (ii) requirements of updating premises and situations that are constantly changing. Moving to solutions based in optimization rather than simulation, the lecture describes the future steps in the refactoring of the scheduling technology in PETROBRAS considering in separate the graphic user interface (GUI) and data communication developments (non-modeling related), and the modeling and process engineering related in an automated decision-making with built-in problem representation facilities and integrated data handling features among other techniques in a smart scheduling frontline.
Keynote given at the Asia Pacific Software Engineering Conference (APSEC), December 2020, on Automated Program Repair technologies and their applications.
The document discusses building human-based software estimation models that are accurate, intuitive, and easy to understand. It presents an approach using correlation and scale factors between estimated and actual effort. Experiments on a dataset of 178 samples show that combining correlation and scale factors into a decision tree achieves up to 93.3% accuracy. The resulting model bridges expert and algorithmic estimation methods.
Incremental and Interactive Process Model RepairMarlon Dumas
Paper presentation delivered by Abel Armas-Cervantes at the International Conference on Cooperative Information Systems (CoopIS), on 26 October 2018. The paper presents a technique to repair a given BPMN process model in such a way that it better first a given event log extracted from an information system. The paper is available at http://kodu.ut.ee/~dumas/pubs/coopis2017repair.pdf
This process model repair technique is implemented in the Apromore Business Process Analytics platform -- http://apromore.org
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020Andrzej Jóźwiak
Functional programming returned to the main stream after long years of hiatus. Languages like Haskell, Coq, Agda promise us better code just by using their advanced type systems. Although the dreaded null hides around every corner in Java is it possible to structure our code in a way that illegal states are not representable? Can the type system alone be enough for us to be sure that the code is correct? Do types mean that no tests are required?
During this talk, we will look at examples of code where the types control what code can be written (and there is no other way to do it). We will explore the possibilities to lower the number of unit tests or avoid some of them completely just by using the type system alone.
We will try to find an answer what stronger type systems can give us, what are dependent types and how could they look in Java.
The migration and reengineering of existing variants into a software product line (SPL) is an error-prone and time-consuming activity. Many extractive approaches have been proposed, spanning different activities from feature identification and naming to the synthesis of reusable artefacts. In this paper, we explore how large language model (LLM)-based assistants can support domain analysts and developers. We revisit four illustrative cases of the literature where the challenge is to migrate variants written in different formalism (UML class diagrams, Java, GraphML, statecharts). We systematically report on our experience with ChatGPT-4, describing our strategy to prompt LLMs and documenting positive aspects but also failures. We compare the use of LLMs with state-of-the-art approach, BUT4Reuse. While LLMs offer potential in assisting domain analysts and developers in transitioning software variants into SPLs, their intrinsic stochastic nature and restricted ability to manage large variants or complex structures necessitate a semiautomatic approach, complete with careful review, to counteract inaccuracies.
Matter is everything around us that has mass and takes up space. The document defines matter as everything around us that has mass and occupies physical space, and encourages observing one's surroundings to identify objects made of matter by considering whether they have mass and take up space.
This document provides instructions for assigning a static IP address to devices on a home network. It explains that assigning each device its own IP address avoids problems when troubleshooting and prevents address conflicts. Then, it lists the 12 step procedure for assigning an IP address to a Windows computer, which includes opening network connections in the control panel, selecting TCP/IP properties, and entering the IP address, subnet mask, default gateway, and DNS server addresses.
The document outlines the steps to test a hypothesis through experimentation. It discusses observing samples, making a hypothesis about which powder will dissolve in water, conducting an experiment by putting the powders in water to see which dissolves, and drawing a conclusion about whether the original hypothesis was correct or not.
Tandem skydiving involves jumping from a plane attached to an instructor. Early parachute designs were invented by Leonardo da Vinci, with the first recorded jump occurring in 1595 in Venice. Safety is high, with only 21 deaths out of 2.2 million jumps. Participants need loose, comfortable clothing and should remove loose jewelry before the jump. Instructors will teach body position, breathing techniques, and how to operate the parachute equipment. Jumps begin on an airplane flight to altitude, followed by exiting and free falling in a stable position before deploying the parachute to guide to a safe landing.
Children who acquire a second language at a young age are more likely to achieve native-like fluency in both pronunciation and grammar compared to older learners. A study by Patkowski examined highly educated immigrants to the US and found that those who began learning English before age 15 achieved near-native mastery, while older learners showed more variability in attainment levels. Similarly, a study by Johnson and Newport found few individual differences in second language ability for learners who began before age 10. However, early intensive exposure to a second language may entail the loss or incomplete development of the child's first language.
Quality, quality concepts
Software Quality Assurance
Software Reviews
Formal Technical Reviews
SQA Group Plan
ISO 9000, 9001
Example
Internal and external attributes
Scalable Conformance Checking of Business ProcessesMarlon Dumas
This document discusses techniques for scalable conformance checking of business process models against event logs. It presents challenges with existing approaches related to scalability for large logs. The research aims to improve scalability while still providing a complete set of differences between the model and log. The approach compresses the model and log into Deterministic Finite Automata and a State Space Partitioning, then uses these compressed structures to efficiently compute optimal alignments and behavioral differences. An evaluation on real-world and artificial datasets demonstrates the approach outperforms traditional trace alignments in scalability for large logs.
The document summarizes information about program repair and semantic repair. It discusses how most software has bugs that are often not fixed for months after being reported. It then describes reasons for program repair including generating patches as better bug reports and automating simple one-line fixes. It notes challenges with repair like weak test cases and large search spaces. It proposes using specifications, dynamic invariants, or test-driven repair as correctness criteria. It characterizes general purpose repair using generate-and-test or specification inference and discusses associated technical challenges. Finally, it discusses interactive and semantics-based repair.
Invited talk held by Karsten Wolf on March 2, 2009 on the 1st Central-European Workshop on Services and their Composition (ZEUS 2009) in Stuttgart, Germany.
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Compressed domain video retargetingIEEEBEBTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
This document describes a method for interactively manipulating parametric 3D shapes through direct brush strokes on the shape itself, rather than through adjusting individual hyper-parameters. The method works by amending the underlying direct acyclic graph (DAG) of the parametric shape to enable local differentiation of the shape with respect to its hyper-parameters. This allows the user's brush strokes to be interpreted as changes to the hyper-parameters through inverse control, without requiring any additional setup by the shape designer. The method is automatic, flexible, and non-invasive to existing parametric shape engines.
Patching the gap in collaborating on modelsÁbel Hegedüs
EclipseCon France 2017 talk on Model Patches, a new component of the EMF DiffMerge project.
Details: https://www.eclipsecon.org/france2017/session/patching-gap-collaborating-models
Crude-Oil Scheduling Technology: moving from simulation to optimizationBrenno Menezes
Scheduling technology either commercial or homegrown in today’s crude-oil refining industries relies on a complex simulation of scenarios where the user is solely responsible for making many different decisions manually in the search for feasible solutions over some limited time-horizon i.e., trial-and-error heuristics. As a normal outcome, schedulers abandon these solutions and then return to their simpler spreadsheet simulators due to: (i) time-consuming efforts to configure and manage numerous scheduling scenarios, and (ii) requirements of updating premises and situations that are constantly changing. Moving to solutions based in optimization rather than simulation, the lecture describes the future steps in the refactoring of the scheduling technology in PETROBRAS considering in separate the graphic user interface (GUI) and data communication developments (non-modeling related), and the modeling and process engineering related in an automated decision-making with built-in problem representation facilities and integrated data handling features among other techniques in a smart scheduling frontline.
Keynote given at the Asia Pacific Software Engineering Conference (APSEC), December 2020, on Automated Program Repair technologies and their applications.
The document discusses building human-based software estimation models that are accurate, intuitive, and easy to understand. It presents an approach using correlation and scale factors between estimated and actual effort. Experiments on a dataset of 178 samples show that combining correlation and scale factors into a decision tree achieves up to 93.3% accuracy. The resulting model bridges expert and algorithmic estimation methods.
Incremental and Interactive Process Model RepairMarlon Dumas
Paper presentation delivered by Abel Armas-Cervantes at the International Conference on Cooperative Information Systems (CoopIS), on 26 October 2018. The paper presents a technique to repair a given BPMN process model in such a way that it better first a given event log extracted from an information system. The paper is available at http://kodu.ut.ee/~dumas/pubs/coopis2017repair.pdf
This process model repair technique is implemented in the Apromore Business Process Analytics platform -- http://apromore.org
Do I need tests when I have the compiler - Andrzej Jóźwiak - TomTom Dev Day 2020Andrzej Jóźwiak
Functional programming returned to the main stream after long years of hiatus. Languages like Haskell, Coq, Agda promise us better code just by using their advanced type systems. Although the dreaded null hides around every corner in Java is it possible to structure our code in a way that illegal states are not representable? Can the type system alone be enough for us to be sure that the code is correct? Do types mean that no tests are required?
During this talk, we will look at examples of code where the types control what code can be written (and there is no other way to do it). We will explore the possibilities to lower the number of unit tests or avoid some of them completely just by using the type system alone.
We will try to find an answer what stronger type systems can give us, what are dependent types and how could they look in Java.
The migration and reengineering of existing variants into a software product line (SPL) is an error-prone and time-consuming activity. Many extractive approaches have been proposed, spanning different activities from feature identification and naming to the synthesis of reusable artefacts. In this paper, we explore how large language model (LLM)-based assistants can support domain analysts and developers. We revisit four illustrative cases of the literature where the challenge is to migrate variants written in different formalism (UML class diagrams, Java, GraphML, statecharts). We systematically report on our experience with ChatGPT-4, describing our strategy to prompt LLMs and documenting positive aspects but also failures. We compare the use of LLMs with state-of-the-art approach, BUT4Reuse. While LLMs offer potential in assisting domain analysts and developers in transitioning software variants into SPLs, their intrinsic stochastic nature and restricted ability to manage large variants or complex structures necessitate a semiautomatic approach, complete with careful review, to counteract inaccuracies.
Edge backpropagation for noisy logo recognitionAmir Shokri
The document proposes a new approach called edge-backpropagation (E-BP) to improve the performance of neural networks in logo recognition when images contain spot noise. E-BP introduces weighted errors during backpropagation that give less importance to uniform color regions like spots based on image gradients. Experimental results on 134 logos corrupted with artificial noise show E-BP outperforms standard backpropagation.
The document summarizes a talk on live modeling given by Benoit Combemale at a LangDev meetup at Amazon. Live modeling brings immediate feedback and direct manipulation capabilities to modeling environments. It allows users to see how changes to a model impact its runtime state or execution trace. Live modeling has various uses across different domains and can enhance modeling tools. The talk explored live modeling challenges and approaches from a language engineering perspective, with the goal of integrating these capabilities into domain-specific languages.
Presentation on Research Paper: Exploring and Exploiting Error Tolerance in Physics Based Animation
This paper takes advantage in our human visual perception system to reduce the accuracy and thus computation cost to produce real time physics based animation .
The document discusses optimization of tool path for robots in an assembly environment. It aims to develop new algorithms and techniques to optimize the tool path for increased productivity and efficiency with lower energy costs. This includes formulating the tool path optimization problem as a traveling salesman problem (TSP) and developing insertion and reordering algorithms to find optimal non-intersecting paths between target points visited by the robot tool. The document also covers inverse kinematics techniques to determine robot joint parameters required to reach specified target points.
This document summarizes a talk given about the most influential paper award from ICSE2023 on program repair and auto-coding. It discusses:
1. The 2013 SemFix paper which introduced an automated repair method using symbolic execution, constraint solving, and program synthesis to generate patches without formal specifications.
2. How subsequent work incorporated learning and inference techniques to glean specifications from tests to guide repair when specifications were not available.
3. The impact of machine learning approaches on automated program repair, including learning from large code change datasets to predict edits, and opportunities for continued improvement in localization and accuracy.
SiriusCon 2015 - Breathe Life into Your Designer!melbats
You have your shiny new DSL up and running thanks to the Eclipse Modeling Technologies and you built a powerful tooling with graphical modelers, textual syntaxes or dedicated editors to support it. But how can you see what is going on when a model is executed ? Don't you need to simulate your design in some way ? Wouldn't you want to see your editors being animated directly within your modeling environment based on execution traces or simulator results?
The GEMOC Research Project designed a methodology to bring animation and execution analysis to DSLs. The companion technologies required to put this in action are small dedicated components (all open-source) at a "proof of concept" maturity level extending proven components : Sirius, Eclipse Debug, Xtend making such features within the reach of Eclipse based tooling. The general intent regarding those OSS technologies is to leverage them within different contexts and contribute them to Eclipse once proven strong enough. The method covers a large spectrum of use cases from DSLs with a straightforward execution semantic to a combination of different DSLs with concurrent execution semantic. Any tool provider can leverage both the technologies and the method to provide an executable DSL and animated graphical modelers to its users enabling simulation and debugging at an early phase of the design.
This talk presents the approach, the technologies and demonstrate it through an example: providing Eclipse Debug integration and diagram animation capabilities for Arduino Designer (EPL) : setting breakpoints, stepping forward or backward in the execution, inspecting the variables states... We will walk you through the steps required to develop such features, the choices to make and the trade-offs involved. Expects live demos with simulated blinking leds and a virtual cat robot ! This talks presents also xCapella an industrial use case onwhich the Gemoc methodology was applied.
This talks was presented at SiriusCon 2015 in collaboration with Jérôme Le Noir from Thales.
The Arduino Designer documentation is available on : https://github.com/mbats/arduino/wiki/Documentation
LocFaults, a bounded constraint-based approach to aid for error localizationMohammed Bekkouche
When a program is not conform to its specification, i.e., the program is erroneous, provide useful information for error localization is an important task to debug the program but complex at the same time. The goal is to provide a reduced set of suspicious statements to understand the origin of errors in the program. In our research we propose a new constraint-based approach to support the problem of error localization for which a counterexample is available, i.e., a test case proving the non conformity. From the counterexample, our approach generate a constraint system for each path of the CFG (Control Flow Graph) for which at most k conditional statements are suspected. Then, we calculate Minimal Correction Subsets (MCS) of bounded size for each erroneous path. The removal of one of these sets of constraints yields a Maximal Satisfiable Subset (MSS), a maximal subset of constraints satisfying the postcondition. We export and adapt the generic algorithm proposed by Liffiton and Sakallah to handle programs with numerical statements more efficiently. We present preliminary experimental results that are quite encouraging.
Similar to Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance (20)
Invited presentation given by Niels Lohmann on December 3, 2013 in Potsdam, Germany as invited lecture at the Business Process Compliance course at the Hasso-Plattner-Institute.
Where did I go wrong? Explaining errors in process modelsUniversität Rostock
Workshop presentation given by Niels Lohmann on February 20, 2014 in Potsdam, Germany at the Sixth Central-European Workshop on Services and their Composition (ZEUS 2014).
Conference presentation given by Niels Lohmann on December 6, 2011 in Paphos, Cyprus at the Ninth International Conference on Service-Oriented Computing (ICSOC 2011).
Workshop presentation given by Niels Lohmann on December 5, 2011 in Paphos, Cyprus at the 6th International Workshop on Engineering Service-Oriented Applications (WESOA'11).
Compliance by Design for Artifact-Centric Business ProcessesUniversität Rostock
This document discusses an approach called "compliance by design" for ensuring that artifact-centric business processes are compliant with regulations. It involves:
1) Specifying a business process model, artifacts, agents, locations and goals
2) Translating legal texts into compliance rules
3) Modeling the compliance rules and integrating them with the business process model
4) Using tools to generate a compliant business process model that satisfies both behavioral and compliance requirements.
This approach aims to avoid subsequent proofs of compliance by building compliance into the design from the start. It also allows flexibility to change compliance rules without needing to regenerate the entire process model.
LoLA is an explicit-state model checker for Petri nets that focuses on standard properties and uses many reduction techniques such as stubborn sets, symmetries, and sweep-line heuristics to efficiently analyze large state spaces. It takes Petri nets as input in the form of place/transition nets or high-level algebraic nets and allows users to specify verification tasks involving properties such as boundedness, reachability, and temporal logics. LoLA is open source and has been used in several case studies to generate experimental results tables exploring the impact of basic design decisions.
The document describes various techniques for implementing a Petri net state space search:
1. It discusses how transitions are fired and states are evaluated by marking changed places and checking enabled transitions.
2. State predicates are stored in negation-free normal form to efficiently check state properties.
3. The state space is managed by representing states as bit vectors and organizing them in a decision tree for fast lookup and insertion.
4. Search organization involves firing transitions, finding/inserting states, and backtracking with a search stack and write-only memory approach.
This document discusses integrating the LoLA model checker as a web service for verifying Petri net properties. It lists soundness checks that LoLA can perform, including classical, weak, and relaxed soundness. It provides URLs for editing Petri nets in Oryx and calling the LoLA web service from the University of Rostock service technology site to verify properties by translating nets from PNML to LoLA format and running LoLA as a system call.
Niels Lohmann explores several case studies applying symbolic systems biology techniques:
1) Analyzing biochemical reaction chains using the tool LoLA for fast reachability queries.
2) Finding hazards in Globally Asynchronous Locally Synchronous (GALS) circuits design using Petri nets and partial order reduction.
3) Verifying service choreographies for deadlocks by translating models to open workflow nets and discovering a design flaw.
LoLA is a tool for verifying properties of Petri nets. This document discusses how to:
1. Choose and manage LoLA configurations to optimally verify properties.
2. Ask the right verification questions in a specific, modular way to efficiently verify properties.
3. Optimize Petri net modeling to take advantage of LoLA's reduction techniques and scale verification.
4. Employ scripts and makefiles to automate calling LoLA and analyzing results.
5. Integrate calling LoLA from other tools using UNIX streams for modular verification.
The document summarizes the stubborn set method for state space reduction in Petri nets. It explains that the method works by defining a stubborn set of transitions in each marking that can fire independently of transitions outside the set. This allows reducing the state space by only exploring firings within each stubborn set, while still preserving properties like deadlocks. The proof for deadlock preservation is also outlined.
LoLA is an open source tool for verifying properties of Petri nets through explicit state space generation. It features many state space reduction techniques and can verify standard properties like boundedness, reachability, and LTL/CTL formulas. LoLA was created to generate experimental results tables and explore basic design decisions like having no GUI and generating a dedicated state space for each property. It has been under development since 1998 and is aimed at helping users verify realistic models efficiently.
The document describes the input language for the LoLA model checker. It allows specifying Petri nets and verification tasks in a high-level algebraic style. Key elements include:
1. Defining sorts, operations, and their interpretations to specify the types and functions used.
2. Declaring high-level places and markings as terms over sorts to represent multiple low-level places and tokens.
3. Specifying high-level transitions as procedures with guards and input/output terms to represent multiple low-level transitions.
4. Providing verification tasks as logical formulas involving state predicates to check properties over the unfolded net.
The document discusses applying counterexample guided abstraction refinement (CEGAR) to verifying properties of Petri nets. It summarizes using the Petri net state equation to represent reachable markings as solutions to a system of linear equations. It then describes using CEGAR to iteratively check solutions and refine the abstraction by adding increments when solutions are found to be infeasible. The approach is implemented in a tool called Sara which shows better performance than other tools on verification problems involving large Petri nets and parameterized systems.
This document describes a joint research project between the University of Rostock's Computer Science and Electrical Engineering departments. The project aims to develop tools and formal methods for analyzing systems and synthesizing web services for resource-constrained devices. This will be done by applying the Devices Profile for Web Services (DPWS) standard, which allows using web service technology on embedded systems and sensor networks in a way that is compatible with existing enterprise web services. The goal is to enable web service capabilities on more intelligent devices that increasingly communicate with each other.
Workshop presentation given by Niels Lohmann on February 22, 2011 in Karlsruhe, Germany at the Third Central-European Workshop on Services and their Composition (ZEUS 2011).
This document compares Petri nets and state spaces for modeling and verification. It discusses that state spaces allow modeling global state changes over time, while Petri nets consider asynchronous components and causality of events. The document also describes techniques for efficient state space generation from Petri nets, such as checking enabled transitions with constant time, firing transitions with constant effort, backtracking transitions, and storing markings in a set. Reduction techniques like linear algebra, sweep-line methods, symmetries, and stubborn sets are also covered to reduce the state space.
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...Universität Rostock
Presentation given by Niels Lohmann on September 23, 2005 in Berlin, Germany; Talk given at the diploma defense ceremony at Humboldt-Universität zu Berlin.
Tool demonstration given by Niels Lohmann on September 1, 2006 in Eindhoven, The Netherlands at the Berlin-Eindhoven Service Technology Colloquium 2006 (B.E.S.T. 2006).
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Correcting Deadlocking Service Choreographies Using a Simulation-Based Graph Edit Distance
1. Correcting Choreographiesusing Graph Similarities Niels Lohmann BPM 2008 ▪ Milan ▪ 2 September 2008 http://service-technology.org/bpm2008 UNIVERSITÄT ROSTOCK
2. 2 a deadlock in a choreography How can weavoid this? What wentwrong? Who is toblame? http://thisboyissmooth.wordpress.com/2008/02/12/sistemas-operativos-e-deadlocks/
3. State-of-the-art choreography analysis 3 translate BPEL choreography into formal model check for deadlocks if deadlock found: choose a "scapegoat" participant remove it from the choreography synthesize a corrected version (if possible) retranslate synthesized participant back to BPEL Full tool support available! [WS-FM2007]
4. Problem with that approach 4 the synthesized service is built independently from the scapegoat gives no information what was changed is correct, yet might not cover the original intention
8. Setting 8 given: a service (the scapegoat) a set ofcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
9. Operating Guidelines in a Nutshell 9 automaton annotated with Boolean formulae characterizes all partners of a service [ATPN2007] partner iffsimulated by OG + fulfilling the annotations
10. OG characterizes all possible corrections 10 and 2001 additional candidates ✓ ✗ ✓
11. Setting (refined) 11 given: a service automaton (the scapegoat) an operating guideline characterizing allcandidates find: the candidate that is most similar to the scapegoat …without sequentially checking all candidates
12. Graph edit distance a measure to compare graphs: edit distance= no. of needed actions to achieve graph isomorphism maybe associated with a cost function b a modify b to a a d 0,5 a d add c branch e c d c d e 0,7 delete e branch e 0,3 12
14. Simulation-based graph similarity Idea: find a similarity that respects simulation compare two states and find best transitionsw.r.t. successor states [TACAS2006] a a b c c b d d d 14
15. Simulation-based graph similarity Mismatches are treated with stuttering steps penalize stuttering by label similarity function choose best pairs by maximizing label similarity a a b c c b e d ε f 15
16. Simulation-based edit distance label similarity function defines an edit distance (a,a) ➙keep a (e,d) ➙change e to d (ε,x) ➙insert x (f,ε) ➙delete f values can be derived from semantic Webinformation (!€,!$) or (?receipt,?confirmation) rather high (!login,?invoice) rather low a a b c b c e d ε f 16
17. Simulation and OG matching 17 Simulation is only one part of the OG matching next step: make edit distance aware of formulas ✗
18. Respect formulas 18 instead of comparison with the OG's structure… compare with satisfying assignments of the formula worst-case complexity: O(|QSA|⋅|QOG|⋅2|I|⋅|I|!) assignments edge permutations
19. Experimental results 19 Simulation- and matching-based edit distance implemented in tool RAChEL Dynamic programming exploits structure of the problem Most results within few seconds Exceptions have near-worst-case structure/formulas Repairing Automata forChoreographies by Editing Labels
20. 20 edit actions can be mapped back to original service result can be influenced by adjusting label similarities Fixing the example with Rachel
21. 21 choreographies can be fixed using the edit distance can help to only change little partsof the scapegoat prototype shows that fixing of real-life processesworks(tool + slides at http://service-technology.org/bpm2008) Open questions: Which service to fix? What about cyclic or nondeterministic services? How does the mapping backto BPEL really work? Can we support more elaborate edit actions? Can heuristics help to improve performance? Take home points Thank you! Any questions?
22. 22 [TACAS2006] Oleg Sokolsky, SampathKannan, and Insup Lee. Simulation-based graph similarity. In TACAS 2006, volume 3920 of LNCS, pages 426–440. Springer, 2006. [WS-FM2007] Niels Lohmann, Oliver Kopp, Frank Leymann, and Wolfgang Reisig. Analyzing BPEL4Chor: Verification and participant synthesis. In WS-FM 2007, volume 4937 of LNCS, pages 46–60. Springer, 2008. [ATPN2007] Niels Lohmann, Peter Massuthe, and Karsten Wolf. Operating guidelines for finite-state services. In ICATPN 2007, volume 4546 of LNCS, pages 321-341. Springer, 2007. References