Efficient computation of observer projections using OP-verifiers
نویسندگان
چکیده
This paper proposes a procedure to compute abstractions of Discrete Event System (DES) models with the observer property (OP). The procedure, named OP-Search, is based on the OP-Verifier algorithm which verifies if a given natural projection has the observer property. In case OP fails for a projection in Σr of an automatonM , OP-Search modifiesM by relabelling transitions and incorporating the new events in Σr, in a way that the modified natural projection generates OP-abstractions. Although OP-Search does not guarantee minimal abstracted models, it leads in general to very reasonable solutions and is shown to be of lower time complexity compared to previous work in the literature.
منابع مشابه
Privacy-Preserving Verification of Clinical Research
We treat the problem of privacy-preserving statistics verification in clinical research. We show that given aggregated results from statistical calculations, we can verify their correctness efficiently, without revealing any of the private inputs used for the calculation. Our construction is based on the primitive of Secure Multi-Party Computation from Shamir’s Secret Sharing. Basically, our se...
متن کاملConventional Voxel in Tomographic Reconstruction Based upon Plane-Integral Projections – Use It or Lose It?
Introduction: While the necessity of replacing voxels with blobs in conventional tomographic reconstruction based upon line-integrals is clear, it is not however well-investigated in plane- integral-based reconstruction. The problem is more challenging in convergent-plane projection reconstruction. In this work, we are aiming at utilizing blobs as alternative to voxels. <stron...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملPower of the interactive proof systems with verifiers modeled by semi-quantum two-way finite automata
Interactive proof systems (IP) are very powerful – languages they can accept form exactly PSPACE. They represent also one of the very fundamental concepts of theoretical computing and a model of computation by interactions. One of the key players in IP are verifiers. In the original model of IP whose power is that of PSPACE, the only restriction on verifiers is that they work in randomized poly...
متن کاملSome Conditions for Characterizing Minimum Face in Non-Radial DEA Models with Undesirable Outputs
The problem of utilizing undesirable (bad) outputs in DEA models often need replacing the assumption of free disposability of outputs by weak disposability of outputs. The Kuosmanen technology is the only correct representation of the fully convex technology exhibiting weak disposability of bad and good outputs. Also, there are some specific features of non-radial data envelopment analysis (DEA...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010