• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Verification of relational transducers for electronic commerce (2003)

by M Spielmann
Venue:J. Comput. System Sci
Add To MetaCart

Tools

Sorted by:
Results 11 - 20 of 41
Next 10 →

Web Dynamic

by Mark Levene, Alexandra Poulovassilis, Ra Poulovassilis - Software Focus , 2001
"... The global usage and continuing exponential growth of the World-Wide-Web poses a host of challenges to the research community. In particular, thereis an urgent need to understand and manage the dynamics of the Web, in order to develop new techniques which will make the Web tractable. We provide an o ..."
Abstract - Cited by 16 (2 self) - Add to MetaCart
The global usage and continuing exponential growth of the World-Wide-Web poses a host of challenges to the research community. In particular, thereis an urgent need to understand and manage the dynamics of the Web, in order to develop new techniques which will make the Web tractable. We provide an overview of recent statistics relating to the size of the Web graph and its growth. We then briefly review some of the key areas relating to Webdynamics with reference to the recent literature. Finally, we summarise the talks given in a recent workshop devoted to Webdynamics which was held in the beginning of January 2001 at the University of London. Keywords. Web dynamics, Web graph, information retrieval, collaborative filtering, Web navigation,Website design, data-intensive Web applications, workflow management, e-commerce,mobile computation.
(Show Context)

Citation Context

...larger markets. Event-condition-action (ECA) rules are a significant computational paradigm deployed in a variety of ways in Web applications: specifying and implementing Web-based business processes =-=[1, 3, 26, 70]-=-, encoding user preferences in personalisation and push technology [64, 26], encoding negotiation strategies in Web-based negotiation [37], and change notification [58]. ECA rules have their origin in...

Automatic Verification of Database-Driven Systems: A New Frontier

by Victor Vianu
"... We describe a novel approach to verification of software systems centered around an underlying database. Instead of applying general-purpose techniques with only partial guarantees of success, it identifies restricted but reasonably expressive classes of applications and properties for which sound a ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
We describe a novel approach to verification of software systems centered around an underlying database. Instead of applying general-purpose techniques with only partial guarantees of success, it identifies restricted but reasonably expressive classes of applications and properties for which sound and complete verification can be performed in a fully automatic way. This leverages the emergence of high-level specification tools for database-centered applications that not only allow fast prototyping and improved programmer productivity but, as a side effect, provide convenient targets for automatic verification. We present theoretical and practical results on verification of database-driven systems. The results are quite encouraging and suggest that, unlike arbitrary software systems, significant classes of databasedriven systems may be amenable to automatic verification. This relies on a novel marriage of database and model checking techniques, of relevance to both the database and the computer aided verification communities. 1.
(Show Context)

Citation Context

...in the above formulas, so is quantified universally at the end. This yields the LTL(FO) formula ∀x (G (∃z(pay(x, z) ∧ price(x, z)) B ship(x))) We note that variants of LTL(FO) have been introduced in =-=[40, 3, 64]-=-. The use of globally quantified variables is also similar in spirit to the freeze quantifier defined in the context of LTL extensions with data by Demri and Lazić [32, 33]. 3.3 XML-Based Web Services...

Inferring mixtures of markov chains

by Sudipto Guha, Sampath Kannan - 2004 Black, Paul E. “Markov Chain.” National Institute of Standards and Technology , 2002
"... Abstract. We define the problem of inferring a “mixture of Markov chains ” based on observing a stream of interleaved outputs from these chains. We show a sharp characterization of the inference process. The problems we consider also has applications such as gene finding, intrusion detection, etc., ..."
Abstract - Cited by 15 (0 self) - Add to MetaCart
Abstract. We define the problem of inferring a “mixture of Markov chains ” based on observing a stream of interleaved outputs from these chains. We show a sharp characterization of the inference process. The problems we consider also has applications such as gene finding, intrusion detection, etc., and more generally in analyzing interleaved sequences. 1
(Show Context)

Citation Context

...nd Generalized Hidden Markov Models (GHMMs) are used by gene finding programs such as GENSCAN [5]. – The problem of validation and mining of log-files of transactions arises in ecommerce applications =-=[2, 15]-=-. The user interacts with a server and the only information is available at the server end is a transcript of the interleaved interactions of multiple users . Typically searches/queries/requests are m...

Automatic Verification of Data-Centric Business Processes

by Elio Damaggio, Alin Deutsch, Richard Hull, Victor Vianu , 2011
"... ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

... considered in [44], but in a context restricted to finite domains. More recently, [1] has studied automatic verification in the context of business processes based on Active XML documents. The works =-=[22, 49, 2]-=- are ancestors of [21] from the context of verification of electronic commerce applications. Their models could conceptually (if not naturally) be encoded as artifact systems, but they correspond only...

Comparing Workflow Specification Languages: A Matter of Views

by Serge Abiteboul, Pierre Bourhis, Victor Vianu , 2011
"... We address the problem of comparing the expressiveness of workflow specification formalisms using a notion of view of a workflow. Views allow to compare widely different workflow systems by mapping them to a common representation capturing the observables relevant to the comparison. Using this frame ..."
Abstract - Cited by 9 (4 self) - Add to MetaCart
We address the problem of comparing the expressiveness of workflow specification formalisms using a notion of view of a workflow. Views allow to compare widely different workflow systems by mapping them to a common representation capturing the observables relevant to the comparison. Using this framework, we compare the expressiveness of several workflow specification mechanisms, including automata, temporal constraints, and pre-and-post conditions, with XML and relational databases as underlying datamodels. One surprising result shows the considerable power of static constraints to simulate apparently much richer workflow control mechanisms.
(Show Context)

Citation Context

...flows. Other models in the same spirit include the Vortex workflow framework [28, 18, 27], the OWLS proposal [30, 29] as well as some work on semantic Web services [33]. The article [17] (building on =-=[37, 6]-=-), considers the verification of properties of data-centric workflows specified in LTL-FO, first-order logic extended with linear79 time temporal logic operators. Similar extensions have been previous...

A Quest for Beauty and Wealth (or, Business Processes for Database Researchers)

by Daniel Deutch, Tova Milo , 2011
"... While classic data management focuses on the data itself, research on Business Processes considers also the context in which this data is generated and manipulated, namely the processes, the users, and the goals that this data serves. This allows the analysts a better perspective of the organization ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
While classic data management focuses on the data itself, research on Business Processes considers also the context in which this data is generated and manipulated, namely the processes, the users, and the goals that this data serves. This allows the analysts a better perspective of the organizational needs centered around the data. As such, this research is of fundamental importance. Much of the success of database systems in the last decade is due to the beauty and elegance of the relational model and its declarative query languages, combined with a rich spectrum of underlying evaluation and optimization techniques, and efficient implementations. This, in turn, has lead to an economic wealth for both the users and vendors of database systems. Similar beauty and wealth are sought for in the context of Business Processes. Much like the case for traditional database research, elegant modeling and rich underlying technology are likely to bring economic wealth for the Business Process owners and their users; both can benefit from easy formulation and analysis of the processes. While there have been many important advances in this research in recent years, there is still much to be desired: specifically, there have been many works that focus on the processes behavior (flow), and many that focus on its data, but only very few works have dealt with both. We will discuss here the important advantages of a holistic flow-and-data framework for Business Processes, the progress towards such a framework, and highlight the current gaps and research directions.
(Show Context)

Citation Context

...centered around data. Such models have appeared even before the term Business Processes emerged in research, such as the model of Relational Transducers [5] (and the follow-up work on ASM transducers =-=[64]-=-), that was shown to be very effective in capturing e-commerce applications. In relational 4Ord(user, prod) + : − InOrd(user, prod) P ayedOrd(user, prod) + : − InP ayment(user, prod) UnpaidOrd(user, ...

Complexity and Composition of Synthesized Web Services

by Wenfei Fan, Floris Geerts, Wouter Gelade, Frank Neven, Antonella Poggi , 2008
"... The paper investigates fundamental decision problems and composition synthesis for Web services commonly found in practice. We propose a notion of synthesized Web services (SWS’s) to specify the behaviors of the services. Upon receiving a sequence of input messages, an SWS issues multiple queries to ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
The paper investigates fundamental decision problems and composition synthesis for Web services commonly found in practice. We propose a notion of synthesized Web services (SWS’s) to specify the behaviors of the services. Upon receiving a sequence of input messages, an SWS issues multiple queries to a database and generates actions, in parallel; it produces external messages and database updates by synthesizing the actions parallelly generated. In contrast to previous models for Web services, SWS’s advocate parallel processing and (deterministic) synthesis of actions. We classify SWS’s based on what queries an SWS can issue, how the synthesis of actions is expressed, and whether unbounded input sequences are allowed in a single interaction session. We show that the behaviors of Web services supported by various prior models, data-driven or not, can be specified by different SWS classes. For each of these classes we study the non-emptiness, validation and equivalence problems, and establish matching upper and lower bounds on these problems. We also provide complexity bounds on composition synthesis for these SWS classes, identifying decidable cases.
(Show Context)

Citation Context

...post on servers or to redistribute to lists, requires prior specific permission and/or a fee. PODS’08, June 9–12, 2008, Vancouver, BC, Canada. Copyright 2008 ACM 9781605581088/08/06 ...$5.00. lem =-=[2, 29]-=- and is useful for, e.g., fraud detection. We also want to determine whether two given services are equivalent (the equivalence problem [2, 29]). This allows us to replace a service with an equivalent...

Model Checking for Database Theoreticians

by Moshe Y. Vardi - IN ICDT’05 , 2005
"... Algorithmic verification is one of the most successful applications of automated reasoning in computer science. In algorithmic verification one uses algorithmic techniques to establish the correctness of the system under verification with respect to a given property. Model checking is an algorithmi ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Algorithmic verification is one of the most successful applications of automated reasoning in computer science. In algorithmic verification one uses algorithmic techniques to establish the correctness of the system under verification with respect to a given property. Model checking is an algorithmic-verification technique that is based on a small number of key ideas, tying together graph theory, automata theory, and logic. In this self-contained talk I will describe how this "holy trinity" gave rise to algorithmic-verification tools, and discuss its applicability to database verification.

LTL formalization of BPML semantics and visual notation for linear temporal logic

by Marco Brambilla
"... As the Web becomes a platform for implementing complex B2C and B2B applications, the need arises of extending Web conceptual modeling from data-centric applications to data- and process-centric applications. New primitives must be put in place to implement workflows describing business processes. In ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
As the Web becomes a platform for implementing complex B2C and B2B applications, the need arises of extending Web conceptual modeling from data-centric applications to data- and process-centric applications. New primitives must be put in place to implement workflows describing business processes. In this context, new problems about process safety and verification arise. We study Web sites interacting with users or applications. We provide a formal data-driven model of the application, which can access an underlying database, as well as state information updated as the interaction progresses, and a set of user input. Against this Web application definition, we aim at verifying properties concerning the sequences of events, inputs, states, and actions, resulting from the interaction. In particular, we focus on workflow based properties, describing the execution flow of the tasks within the application. Such properties are expressed in linear or branching-time temporal logics. Since temporal logics properties are difficult to describe by a user, this work presents a visual approach that exploits and extends workflow notations (in particular, BPMN) for describing the rules to be verified. Some results from the same research group involved in this work establish under what conditions automatic verification of
(Show Context)

Citation Context

... research is related to the general area of automatic verification, and particularly reactive systems [22, 21]. Directly relevant to us is Spielmann's work on Abstract State Machine (ASM) transducers =-=[26, 28]-=-, and earlier variations of this work [27]. Similarly to the earlier relational transducers [3] these model database-driven reactive systems that respond to input events by taking some action, and mai...

Querying schemas with access restrictions

by Michael Benedikt, Pierre Bourhis, Clemens Ley - PVLDB
"... We study verification of systems whose transitions consist of accesses to a Web-based data-source. An access is a lookup on a relation within a relational database, fixing values for a set of positions in the relation. For example, a transition can represent access to a Web form, where the user is r ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
We study verification of systems whose transitions consist of accesses to a Web-based data-source. An access is a lookup on a relation within a relational database, fixing values for a set of positions in the relation. For example, a transition can represent access to a Web form, where the user is re-stricted to filling in values for a particular set of fields. We look at verifying properties of a schema describing the possi-ble accesses of such a system. We present a language where one can describe the properties of an access path, and also specify additional restrictions on accesses that are enforced by the schema. Our main property language, AccLTL, is based on a first-order extension of linear-time temporal logic, interpreting access paths as sequences of relational struc-tures. We also present a lower-level automaton model, A-automata, which AccLTL specifications can compile into. We show that AccLTL and A-automata can express static analysis problems related to “querying with limited access patterns ” that have been studied in the database literature in the past, such as whether an access is relevant to an-swering a query, and whether two queries are equivalent in the accessible data they can return. We prove decidability and complexity results for several restrictions and variants of AccLTL, and explain which properties of paths can be expressed in each restriction. 1.
(Show Context)

Citation Context

...vices. Our work is closely related to a line of research on relational transducers and models for datadriven services, beginning with Abiteboul et. al.’s [2], and continuing through work of Spielmann =-=[19]-=-, Deutsch, Su and Vianu (e.g. [12]), Fritz et. al. [14], and Deutsch et. al. [10]. All of these works deal with specification languages for transition systems in which transitions may involve the cons...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University