 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/security.ps.Z, 19921002 1 A Security Flow Control Algorithm and Its Denotational Semantics Correctness Proof Masaaki Mizuno* and David Schmidt* Computing and Information Sciences Dept. Kansas State University Manhattan, KS 66506 USA |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/security.ps.Z, 19921002 1 A Security Flow Control Algorithm and Its Denotational Semantics Correctness Proof Masaaki Mizuno* and David Schmidt* Computing and Information Sciences Dept. Kansas State University Manhattan, KS 66506 USA |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/pods92.ps.Z, 19921014 Real-Time Integrity Constraints (extended abstract) Jan Chomickiy Computing and Information Sciences Kansas State University Manhattan, KS 66506-2302 chomicki@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/pods92.ps.Z, 19921014 Real-Time Integrity Constraints (extended abstract) Jan Chomickiy Computing and Information Sciences Kansas State University Manhattan, KS 66506-2302 chomicki@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/tdd93.ps.Z, 19921014 Temporal Deductive Databases Marianne Baudinet Universit e Libre de Bruxellesy Jan Chomicki Kansas State Universityz Pierre Wolper Universit e de Li egex October 13, 1992 Keywords: query processing, logic programming, temporal logic, constraint logic programming, expressiveness, computational |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/tdd93.ps.Z, 19921014 Temporal Deductive Databases Marianne Baudinet Universit e Libre de Bruxellesy Jan Chomicki Kansas State Universityz Pierre Wolper Universit e de Li egex October 13, 1992 Keywords: query processing, logic programming, temporal logic, constraint logic programming, expressiveness, computational |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/dom93.ps.Z, 19921014 Declarative Definition of Object-Oriented Multidatabase Mappings Jan Chomicki Kansas State Universityy Witold Litwin Universit e de Paris - Dauphinez |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/dom93.ps.Z, 19921014 Declarative Definition of Object-Oriented Multidatabase Mappings Jan Chomicki Kansas State Universityy Witold Litwin Universit e de Paris - Dauphinez |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/tods93.ps.Z, 19921109 Finite Representation of Infinite Query Answers Jan Chomickiy Tomasz Imieli nskiz Kansas State University Rutgers University November 9, 1992 Keywords: query processing, logic programming, Datalog , decidability, safety, computational complexity, non-standard query answers, non-Herbrand models. 1989 CR |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/tods93.ps.Z, 19921109 Finite Representation of Infinite Query Answers Jan Chomickiy Tomasz Imieli nskiz Kansas State University Rutgers University November 9, 1992 Keywords: query processing, logic programming, Datalog , decidability, safety, computational complexity, non-standard query answers, non-Herbrand models. 1989 CR |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/tr93-3.ps, 19930209 Communication Efficient Distributed Shared Memories Masaaki Mizuno Gurdip Singhy Michel Raynalz Mitchell L. Neilsenx |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/tr93-4.ps, 19930209 A Sequentially Consistent Distributed Shared Memory James Z. Zhou Masaaki Mizuno Gurdip Singhy Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/tr93-3.ps, 19930209 Communication Efficient Distributed Shared Memories Masaaki Mizuno Gurdip Singhy Michel Raynalz Mitchell L. Neilsenx |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/tr93-4.ps, 19930209 A Sequentially Consistent Distributed Shared Memory James Z. Zhou Masaaki Mizuno Gurdip Singhy Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/tr92-34.ps, 19930226 Impact of Synchrony and Topological Information on Leader Election Gurdip Singh Department of Computing and Information Sciences, 234 Nichols Hall, Kansas State University, Manhattan, Kansas 66506 email: singh@cis.ksu.edu KSU Technical Report 92-34 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/tr92-34.ps, 19930226 Impact of Synchrony and Topological Information on Leader Election Gurdip Singh Department of Computing and Information Sciences, 234 Nichols Hall, Kansas State University, Manhattan, Kansas 66506 email: singh@cis.ksu.edu KSU Technical Report 92-34 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/tr93-35.ps, 19930226 Efficient Execution of Write-only Transactions Gurdip Singh Department of Computing and Information Sciences, Kansas State University, Manhattan, KS 66506 singh@cis.ksu.edu Techical Report 92-35 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/tr93-35.ps, 19930226 Efficient Execution of Write-only Transactions Gurdip Singh Department of Computing and Information Sciences, Kansas State University, Manhattan, KS 66506 singh@cis.ksu.edu Techical Report 92-35 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/pods90.ps.Z, 19930227 Polynomial Time Query Processing in Temporal Deductive Databases Jan Chomicki Department of Computer Science University of North Carolina Chapel Hill, NC 27599 chomicki@cs.unc.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/pods90.ps.Z, 19930227 Polynomial Time Query Processing in Temporal Deductive Databases Jan Chomicki Department of Computer Science University of North Carolina Chapel Hill, NC 27599 chomicki@cs.unc.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Danvy/stagingCPS-popl93.ps.Z, 19930301 Separating Stages in the Continuation-Passing Style Transformation Julia L. Lawall Department of Computer Science Indiana University jll@cs.indiana.edu Olivier Danvy Department of Computing and Information Sciences Kansas State University y danvy@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Danvy/cps-sa.ps.Z, 19930301 CPS Transformation after Strictness Analysis Olivier Danvy and John Hatcliff Kansas State University Strictness analysis is a common component of compilers for call-by-name functional languages; the continuation-passing-style (CPS) transformation is a common component of compilers for call-byvalue |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Danvy/tutorial-PE.ps.Z, 19930301 Partial Evaluation: Principles and Perspectives Charles Consel Pacific Software Research Center Department of Computer Science and Engineering Oregon Graduate Institute of Science & Technology consel@cse.ogi.edu Olivier Danvy School of Computer Science Carnegie Mellon Universityy |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Danvy/stagingCPS-popl93.ps.Z, 19930301 Separating Stages in the Continuation-Passing Style Transformation Julia L. Lawall Department of Computer Science Indiana University jll@cs.indiana.edu Olivier Danvy Department of Computing and Information Sciences Kansas State University y danvy@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Danvy/rc.ps.Z, 19930301 Representing Control A Study of the CPS transformation Olivier Danvy Kansas State University y (danvy@cis.ksu.edu) Andrzej Filinski Carnegie Mellon University z (Andrzej.Filinski@cs.cmu.edu) February 1991; Revised June 1992 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Danvy/rc.ps.Z, 19930301 Representing Control A Study of the CPS transformation Olivier Danvy Kansas State University y (danvy@cis.ksu.edu) Andrzej Filinski Carnegie Mellon University z (Andrzej.Filinski@cs.cmu.edu) February 1991; Revised June 1992 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Danvy/thunks-wsa92.ps.Z, 19930301 Thunks (continued) Olivier Danvy, John Hatcliff Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506, USA e-mail: (danvy, hatcliff )@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Danvy/thunks-wsa92.ps.Z, 19930301 Thunks (continued) Olivier Danvy, John Hatcliff Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506, USA e-mail: (danvy, hatcliff )@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Danvy/tutorial-PE.ps.Z, 19930301 Partial Evaluation: Principles and Perspectives Charles Consel Pacific Software Research Center Department of Computer Science and Engineering Oregon Graduate Institute of Science & Technology consel@cse.ogi.edu Olivier Danvy School of Computer Science Carnegie Mellon Universityy |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Danvy/cps-sa.ps.Z, 19930301 CPS Transformation after Strictness Analysis Olivier Danvy and John Hatcliff Kansas State University Strictness analysis is a common component of compilers for call-by-name functional languages; the continuation-passing-style (CPS) transformation is a common component of compilers for call-byvalue |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Ravindran/conc.ps, 19930304 Extraction of Logical Concurrency in Distributed Applications K. Ravindran && A. Thenmozhi Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Ravindran/conc.ps, 19930304 Extraction of Logical Concurrency in Distributed Applications K. Ravindran && A. Thenmozhi Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Ravindran/cmp_eff.ps, 19930308 Structural Complexity and Execution Efficiency of Distributed Application Protocols K. Ravindran && X. T. Lin Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Ravindran/cmp_eff.ps, 19930308 Structural Complexity and Execution Efficiency of Distributed Application Protocols K. Ravindran && X. T. Lin Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Danvy/compiling-monads.ps.Z, 19930725 Compiling Monads Olivier Danvy, J urgen Koslowski, and Karoline Malmkjaer Department of Computing and Information Sciences Kansas State University y (danvy, koslowj, karoline)@cis.ksu.edu December 1991 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Danvy/compiling-monads.ps.Z, 19930725 Compiling Monads Olivier Danvy, J urgen Koslowski, and Karoline Malmkjaer Department of Computing and Information Sciences Kansas State University y (danvy, koslowj, karoline)@cis.ksu.edu December 1991 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/corr.ps.Z, 19931012 A Categorical Interpretation of Landin's Correspondence Principle Anindya Banerjee and David A. Schmidt Department of Computing and Information Sciences Kansas State University (banerjee, schmidt)@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/corr.ps.Z, 19931012 A Categorical Interpretation of Landin's Correspondence Principle Anindya Banerjee and David A. Schmidt Department of Computing and Information Sciences Kansas State University (banerjee, schmidt)@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hatcliff/thunks-tr93-15.ps.Z, 19931103 Thunks and the >=-calculus John Hatcliff y (hatcliff@cis.ksu.edu) Olivier Danvy z (danvy@daimi.aau.dk) September 2, 1993 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Danvy/thunks-tr93-15.ps.Z, 19931103 Thunks and the >=-calculus John Hatcliff y (hatcliff@cis.ksu.edu) Olivier Danvy z (danvy@daimi.aau.dk) September 2, 1993 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Danvy/thunks-tr93-15.ps.Z, 19931103 Thunks and the >=-calculus John Hatcliff y (hatcliff@cis.ksu.edu) Olivier Danvy z (danvy@daimi.aau.dk) September 2, 1993 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hatcliff/thunks-tr93-15.ps.Z, 19931103 Thunks and the >=-calculus John Hatcliff y (hatcliff@cis.ksu.edu) Olivier Danvy z (danvy@daimi.aau.dk) September 2, 1993 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hatcliff/mfps93.ps.Z, 19931110 On the Transformation between Direct and Continuation Semantics Olivier Danvy and John Hatcliff Aarhus University and Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hatcliff/mfps93.ps.Z, 19931110 On the Transformation between Direct and Continuation Semantics Olivier Danvy and John Hatcliff Aarhus University and Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hatcliff/thunks-wsa92.ps.Z, 19931110 Thunks (continued) Olivier Danvy, John Hatcliff Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506, USA e-mail: (danvy, hatcliff )@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hatcliff/cps-sa-tr92-31.ps.Z, 19931110 CPS Transformation after Strictness Analysis Olivier Danvy and John Hatcliff Kansas State University Strictness analysis is a common component of compilers for call-by-name functional languages; the continuation-passing-style (CPS) transformation is a common component of compilers for call-byvalue |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hatcliff/thunks-wsa92.ps.Z, 19931110 Thunks (continued) Olivier Danvy, John Hatcliff Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506, USA e-mail: (danvy, hatcliff )@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hatcliff/cps-sa-tr92-31.ps.Z, 19931110 CPS Transformation after Strictness Analysis Olivier Danvy and John Hatcliff Kansas State University Strictness analysis is a common component of compilers for call-by-name functional languages; the continuation-passing-style (CPS) transformation is a common component of compilers for call-byvalue |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/subst.ps.gz, 19940331 Substitution Revisited1 Allen Stoughton Computer Science Subject Group School of Mathematical and Physical Sciences University of Sussex Falmer, Brighton BN1 9QH, England |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/ppcf.ps.gz, 19940331 Parallel PCF has a Unique Extensional Model Allen Stoughton Computer Science and Artificial Intelligence School of Cognitive and Computing Sciences University of Sussex Falmer, Brighton BN1 9QH, England |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/subst.ps.gz, 19940331 Substitution Revisited1 Allen Stoughton Computer Science Subject Group School of Mathematical and Physical Sciences University of Sussex Falmer, Brighton BN1 9QH, England |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/within.ps.gz, 19940331 Studying the Fully Abstract Model of PCF within its Continuous Function Model 1 Achim Jung2 and Allen Stoughton3 Abstract. We give a concrete presentation of the inequationally fully abstract model of PCF as a continuous projection of the inductively reachable subalgebra of PCF's continuous function |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/within.ps.gz, 19940331 Studying the Fully Abstract Model of PCF within its Continuous Function Model 1 Achim Jung2 and Allen Stoughton3 Abstract. We give a concrete presentation of the inequationally fully abstract model of PCF as a continuous projection of the inductively reachable subalgebra of PCF's continuous function |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/efa.ps.gz, 19940331 Equationally Fully Abstract Models of PCF 1 Allen Stoughton Computer Science and Artificial Intelligence School of Cognitive and Computing Sciences University of Sussex Falmer, Brighton BN1 9QH, England 1 Introduction In Plotkin's applied typed lambda calculus PCF it is natural to consider one |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/por.ps.gz, 19940331 Interdefinability of Parallel Operations in PCF 1 Allen Stoughton Computer Science and Artificial Intelligence School of Cognitive and Computing Sciences University of Sussex Falmer, Brighton BN1 9QH, England |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/efa.ps.gz, 19940331 Equationally Fully Abstract Models of PCF 1 Allen Stoughton Computer Science and Artificial Intelligence School of Cognitive and Computing Sciences University of Sussex Falmer, Brighton BN1 9QH, England 1 Introduction In Plotkin's applied typed lambda calculus PCF it is natural to consider one |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/ppcf.ps.gz, 19940331 Parallel PCF has a Unique Extensional Model Allen Stoughton Computer Science and Artificial Intelligence School of Cognitive and Computing Sciences University of Sussex Falmer, Brighton BN1 9QH, England |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/por.ps.gz, 19940331 Interdefinability of Parallel Operations in PCF 1 Allen Stoughton Computer Science and Artificial Intelligence School of Cognitive and Computing Sciences University of Sussex Falmer, Brighton BN1 9QH, England |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/famopl.ps.gz, 19940401 Fully Abstract Models of Programming Languages Allen Stoughton School of Mathematical and Physical Sciences University of Sussex The preface and first chapter of a monograph that was published in 1988 in Pitman's Research Notes in Theoretical Computer Science series. Preface This monograph presents a |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/famopl.ps.gz, 19940401 Fully Abstract Models of Programming Languages Allen Stoughton School of Mathematical and Physical Sciences University of Sussex The preface and first chapter of a monograph that was published in 1988 in Pitman's Research Notes in Theoretical Computer Science series. Preface This monograph presents a |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/proto.ps.Z, 19940617 Action Semantics-Directed Prototyping Kyung-Goo Doh The University of Aizu David A. Schmidt Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/mfps94/program.ps.Z, 19940617 Tenth Workshop on the Mathematical Foundations of Programming Semantics Kansas State University March 20-23 1994 General Chairmen: Michael Mislove, Tulane University David Schmidt, Kansas State University Local Arrangements: David Schmidt, Kansas State University Maria Zamfir-Bleyberg, Kansas State |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/proto.ps.Z, 19940617 Action Semantics-Directed Prototyping Kyung-Goo Doh The University of Aizu David A. Schmidt Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/mfps94/program.ps.Z, 19940617 Tenth Workshop on the Mathematical Foundations of Programming Semantics Kansas State University March 20-23 1994 General Chairmen: Michael Mislove, Tulane University David Schmidt, Kansas State University Local Arrangements: David Schmidt, Kansas State University Maria Zamfir-Bleyberg, Kansas State |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/facets.ps.Z, 19940617 The Facets of Action Semantics: Some Principles and Applications (Extended Abstract) Kyung-Goo Doh The University of Aizu David A. Schmidt Kansas State Universityy |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/env.stack.ps.Z, 19940620 Stackability in the Typed Call-By-Value Lambda Calculus Anindya Banerjee and David A. Schmidt Department of Computing and Information Sciences Kansas State University y fbanerjee, schmidtg@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/text/contents.ps, 19940621 Contents Series Foreword ix Preface xi 1 The Programming Language Core 1 1.1 A Core Imperative Language 1 1.2 Typing Rules 3 1.3 Induction and Recursion 6 1.4 Unicity of Typing 8 1.5 The Typing Rules Define the Language 10 1.6 The Semantics of the Core Language 12 1.7 Soundness of the Typing Rules 17 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/text/preface.ps, 19940621 Preface Although few programmers ever design a programming language, all programmers should understand the structuring techniques that a designer uses. Working from developments in lambda calculus and type theory, this textbook presents one such set of techniques. The book uses the techniques in a |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/text/preface.ps, 19940621 Preface Although few programmers ever design a programming language, all programmers should understand the structuring techniques that a designer uses. Working from developments in lambda calculus and type theory, this textbook presents one such set of techniques. The book uses the techniques in a |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/text/contents.ps, 19940621 Contents Series Foreword ix Preface xi 1 The Programming Language Core 1 1.1 A Core Imperative Language 1 1.2 Typing Rules 3 1.3 Induction and Recursion 6 1.4 Unicity of Typing 8 1.5 The Typing Rules Define the Language 10 1.6 The Semantics of the Core Language 12 1.7 Soundness of the Typing Rules 17 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hatcliff/thesis.ps.Z, 19940726 The Structure of Continuation-Passing Styles by John Mark Hatcliff B.A., Mount Vernon Nazarene College, 1988 M.Sc., Queen's University, 1991 A DISSERTATION submitted in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY Department of Computing and Information Sciences College of |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hatcliff/thesis.ps.Z, 19940726 The Structure of Continuation-Passing Styles by John Mark Hatcliff B.A., Mount Vernon Nazarene College, 1988 M.Sc., Queen's University, 1991 A DISSERTATION submitted in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY Department of Computing and Information Sciences College of |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Ravindran/mcast_sw.ps, 19940809 Design of Multicast Packet Switches for High Speed Multi-service Networks K. Ravindran Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Ravindran/mcast_sw.ps, 19940809 Design of Multicast Packet Switches for High Speed Multi-service Networks K. Ravindran Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/ilps94.ps.Z, 19940906 Datalog with Integer Periodicity Constraints David Toman, Jan Chomicki, and David S. Rogers Dept. of Comp. and Info. Sci. Kansas State University, Manhattan, KS{66506 fdavid,chomicki,rogersg@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/ilps94.ps.Z, 19940906 Datalog with Integer Periodicity Constraints David Toman, Jan Chomicki, and David S. Rogers Dept. of Comp. and Info. Sci. Kansas State University, Manhattan, KS{66506 fdavid,chomicki,rogersg@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/jlp94.ps.Z, 19940909 J. LOGIC PROGRAMMING 1993:12:1{199 1 DEPTH-BOUNDED BOTTOM-UP EVALUATION OF LOGIC PROGRAMS JAN CHOMICKI > We present here a depth-bounded bottom-up evaluation algorithm for logic programs. We show that it is sound, complete, and terminating for finiteanswer queries if the programs are syntactically |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/jlp94.ps.Z, 19940909 J. LOGIC PROGRAMMING 1993:12:1{199 1 DEPTH-BOUNDED BOTTOM-UP EVALUATION OF LOGIC PROGRAMS JAN CHOMICKI > We present here a depth-bounded bottom-up evaluation algorithm for logic programs. We show that it is sound, complete, and terminating for finiteanswer queries if the programs are syntactically |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/ipl90.ps.Z, 19941001 Generalized Closed World Assumption is 0 2-complete Jan Chomicki y V.S. Subrahmanian Dept. of Computer Science Dept.of Computer Science University of North Carolina University of Maryland Chapel Hill, NC 27599 College Park, MD 20742 chomicki@cs.unc.edu vs@mimsy.umd.edu October 1, 1994 Keywords: logic |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/ipl90.ps.Z, 19941001 Generalized Closed World Assumption is 0 2-complete Jan Chomicki y V.S. Subrahmanian Dept. of Computer Science Dept.of Computer Science University of North Carolina University of Maryland Chapel Hill, NC 27599 College Park, MD 20742 chomicki@cs.unc.edu vs@mimsy.umd.edu October 1, 1994 Keywords: logic |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/ieee94.ps.Z, 19941003 Temporal Integrity Constraints in Relational Databases Jan Chomicki Computing and Information Sciences Kansas State University Manhattan, KS 66506 chomicki@cis.ksu.edu 1 Introduction As historical databases become more widely used in practice , the need arises to address database integrity issues |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/ieee94.ps.Z, 19941003 Temporal Integrity Constraints in Relational Databases Jan Chomicki Computing and Information Sciences Kansas State University Manhattan, KS 66506 chomicki@cis.ksu.edu 1 Introduction As historical databases become more widely used in practice , the need arises to address database integrity issues |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/icdt95.ps.Z, 19941021 Constraint-Generating Dependencies Marianne Baudinet,1 Jan Chomicki,2 and Pierre Wolper3 1 Universit e Libre de Bruxelles, Informatique, 50 Avenue F.D. Roosevelt, C.P. 165, 1050 Brussels, Belgium Email: mb@cs.ulb.ac.be 2 Kansas State University, Dept of Computing and Information Sciences, 234 Nichols |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/icdt95.ps.Z, 19941021 Constraint-Generating Dependencies Marianne Baudinet,1 Jan Chomicki,2 and Pierre Wolper3 1 Universit e Libre de Bruxelles, Informatique, 50 Avenue F.D. Roosevelt, C.P. 165, 1050 Brussels, Belgium Email: mb@cs.ulb.ac.be 2 Kansas State University, Dept of Computing and Information Sciences, 234 Nichols |
 | ftp://ftp.cis.ksu.edu/pub/CIS/GradInfo/guide.to.PhD.ps, 19941107 A Guide to PhD Studies and Research Computing and Information Sciences Dept. Kansas State University Manhattan, Kansas Preface Several years ago, I chanced upon an internal report distributed by the Artificial Intelligence Department at Edinburgh University. The report, called The Researcher's Bible*, |
 | ftp://ftp.cis.ksu.edu/pub/CIS/GradInfo/MS.manual.old.ps, 19941107 GUIDELINES FOR THE MASTER OF SCIENCE DEGREE IN THE DEPARTMENT OF COMPUTING AND INFORMATION SCIENCES KANSAS STATE UNIVERSITY SEPTEMBER 1992 GRADUATE STUDIES COMMITTEE Dr. Jan Chomicki Dr. William J. Hankley Dr. David A. Schmidt Head - 2 - I. INTRODUCTION These guidelines describe departmental and |
 | ftp://ftp.cis.ksu.edu/pub/techreports/GradInfo/guide.to.PhD.ps, 19941107 A Guide to PhD Studies and Research Computing and Information Sciences Dept. Kansas State University Manhattan, Kansas Preface Several years ago, I chanced upon an internal report distributed by the Artificial Intelligence Department at Edinburgh University. The report, called The Researcher's Bible*, |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howell/papers/iit.ps.Z, 19950120 On Non-Preemptive Scheduling of Recurring Tasks Using Inserted Idle Times Rodney R. Howell Muralidhar K. Venkatrao Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 USA This author's current address is: Microsoft Corporation, One Microsoft Way, Redmond, WA |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howell/papers/iit.ps.Z, 19950120 On Non-Preemptive Scheduling of Recurring Tasks Using Inserted Idle Times Rodney R. Howell Muralidhar K. Venkatrao Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 USA This author's current address is: Microsoft Corporation, One Microsoft Way, Redmond, WA |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howell/papers/ov.ps.Z, 19950120 Optimal Scheduling and Handling Potential Overload Rodney R. Howell Dept. of Computing and Information Sciences Kansas State University Manhattan, KS 66506 U.S.A. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howell/papers/ov.ps.Z, 19950120 Optimal Scheduling and Handling Potential Overload Rodney R. Howell Dept. of Computing and Information Sciences Kansas State University Manhattan, KS 66506 U.S.A. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/ictl94.ps.Z, 19950125 Temporal Query Languages: a Survey Jan Chomickiy January 24, 1995 Category: Survey Area: Temporal Databases |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/ictl94.ps.Z, 19950125 Temporal Query Languages: a Survey Jan Chomickiy January 24, 1995 Category: Survey Area: Temporal Databases |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/tkde95.ps.Z, 19950210 1 Implementing Temporal Integrity Constraints Using an Active DBMS Jan Chomicki and David Toman |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/tkde95.ps.Z, 19950210 1 Implementing Temporal Integrity Constraints Using an Active DBMS Jan Chomicki and David Toman |
 | ftp://ftp.cis.ksu.edu/pub/CIS/GradInfo/MS.manual.ps, 19950213 GUIDELINES FOR THE MASTER OF SCIENCE DEGREE IN THE DEPARTMENT OF COMPUTING AND INFORMATION SCIENCES KANSAS STATE UNIVERSITY January 1995 GRADUATE STUDIES COMMITTEE Dr. Rodney Howell Dr. Masaaki Mizuno Dr. David A. Schmidt Head - 2 - I. INTRODUCTION These guidelines describe departmental and university |
 | ftp://ftp.cis.ksu.edu/pub/techreports/GradInfo/MS.manual.ps, 19950213 GUIDELINES FOR THE MASTER OF SCIENCE DEGREE IN THE DEPARTMENT OF COMPUTING AND INFORMATION SCIENCES KANSAS STATE UNIVERSITY January 1995 GRADUATE STUDIES COMMITTEE Dr. Rodney Howell Dr. Masaaki Mizuno Dr. David A. Schmidt Head - 2 - I. INTRODUCTION These guidelines describe departmental and university |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/pods95.ps.Z, 19950314 Measuring Infinite Relations (Extended Abstract) Jan Chomicki Kansas State University chomicki@cis.ksu.edu Gabriel Kuper ECRC kuper@ecrc.de |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/pods95.ps.Z, 19950314 Measuring Infinite Relations (Extended Abstract) Jan Chomicki Kansas State University chomicki@cis.ksu.edu Gabriel Kuper ECRC kuper@ecrc.de |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/atlantique94.ps.Z, 19950420 Stackability in the Simply-Typed Call-By-Value Lambda Calculus Anindya Banerjee and David A. Schmidt y Department of Computing and Information Sciences Kansas State University z fbanerjee, schmidtg@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/atlantique94.ps.Z, 19950420 Stackability in the Simply-Typed Call-By-Value Lambda Calculus Anindya Banerjee and David A. Schmidt y Department of Computing and Information Sciences Kansas State University z fbanerjee, schmidtg@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/tods95.ps.Z, 19950522 Efficient Checking of Temporal Integrity Constraints Using Bounded History Encoding Jan Chomicki Computing and Information Sciences Kansas State University Manhattan, KS 66506 chomicki@cis.ksu.edu May 22, 1995 Keywords: database integrity, integrity constraints, temporal logic, temporal databases, |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Chomicki/pods93.ps.Z, 19950522 On the Feasibility of Checking Temporal Integrity Constraints Jan Chomickiy Kansas State University Damian Niwi nskiz Warsaw University May 22, 1995 Keywords: integrity constraints, temporal logic, decidability, computational complexity, temporal databases. 1989 CR Classification: F.2.2, F.4.1, H.2.3. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/tods95.ps.Z, 19950522 Efficient Checking of Temporal Integrity Constraints Using Bounded History Encoding Jan Chomicki Computing and Information Sciences Kansas State University Manhattan, KS 66506 chomicki@cis.ksu.edu May 22, 1995 Keywords: database integrity, integrity constraints, temporal logic, temporal databases, |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Chomicki/pods93.ps.Z, 19950522 On the Feasibility of Checking Temporal Integrity Constraints Jan Chomickiy Kansas State University Damian Niwi nskiz Warsaw University May 22, 1995 Keywords: integrity constraints, temporal logic, decidability, computational complexity, temporal databases. 1989 CR Classification: F.2.2, F.4.1, H.2.3. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Students/realizer/TR95-4.ps.Z, 19950604 Implementation of Intuitionistic Type Theory and Realizability Theory Yuki Komagata and David A. Schmidt Department of Computing and Information Sciences Kansas State University Manhattan, Kansas Technical Report Number: TR-CS-95-4 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Students/realizer/TR95-4.ps.Z, 19950604 Implementation of Intuitionistic Type Theory and Realizability Theory Yuki Komagata and David A. Schmidt Department of Computing and Information Sciences Kansas State University Manhattan, Kansas Technical Report Number: TR-CS-95-4 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/SAS95.ps.Z, 19950706 Natural-Semantics-Based Abstract Interpretation (Preliminary Version) David A. Schmidt Department of Computing and Information Sciences Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/SAS95.ps.Z, 19950706 Natural-Semantics-Based Abstract Interpretation (Preliminary Version) David A. Schmidt Department of Computing and Information Sciences Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/failure.ps, 19950712 Leader Election in the Presence of Link Failures Gurdip Singh Department of Computing and Information Sciences, Kansas State University, Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/bfs.ps, 19950712 Adaptive Breadth-First Search Protocols Gurdip Singh Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/mst.ps, 19950712 A Highly Asynchronous Minimum Spanning Tree Protocol Gurdip Singh Department of Computing and Information Sciences, 234 Nichols Hall, Kansas State University, Manhattan, Kansas 66506 Arthur J. Bernstein Department of Computer Science SUNY at Stony Brook Stony Brook, Long Island, NY 11794. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/mst.ps, 19950712 A Highly Asynchronous Minimum Spanning Tree Protocol Gurdip Singh Department of Computing and Information Sciences, 234 Nichols Hall, Kansas State University, Manhattan, Kansas 66506 Arthur J. Bernstein Department of Computer Science SUNY at Stony Brook Stony Brook, Long Island, NY 11794. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/complete.ps, 19950712 Leader Election in Complete Networks Gurdip Singh Department of Computing and Information Sciences, 234 Nichols Hall, Kansas State University, Manhattan, Kansas 66506 email: singh@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/failure.ps, 19950712 Leader Election in the Presence of Link Failures Gurdip Singh Department of Computing and Information Sciences, Kansas State University, Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/complete.ps, 19950712 Leader Election in Complete Networks Gurdip Singh Department of Computing and Information Sciences, 234 Nichols Hall, Kansas State University, Manhattan, Kansas 66506 email: singh@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/bfs.ps, 19950712 Adaptive Breadth-First Search Protocols Gurdip Singh Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/vita.ps, 19950714 August 1995 Curriculum Vitae David A. Schmidt Computing and Info. Sciences Department Kansas State University Manhattan, Kansas 66506 U.S.A. Phone: 913-532-6350 Fax: 913-532-7353 Internet: schmidt@cis.ksu.edu WWW URL: http://www.cis.ksu.edu/ schmidt/home.html Born: May 10, 1953, Colby, Kansas Degrees: |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/vita.ps, 19950714 August 1995 Curriculum Vitae David A. Schmidt Computing and Info. Sciences Department Kansas State University Manhattan, Kansas 66506 U.S.A. Phone: 913-532-6350 Fax: 913-532-7353 Internet: schmidt@cis.ksu.edu WWW URL: http://www.cis.ksu.edu/ schmidt/home.html Born: May 10, 1953, Colby, Kansas Degrees: |
 | ftp://ftp.cis.ksu.edu/pub/CIS/GradInfo/PhD.manual.old.ps, 19950717 GUIDELINES FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE DEPARTMENT OF COMPUTING AND INFORMATION SCIENCES KANSAS STATE UNIVERSITY February 1992 GRADUATE STUDIES COMMITTEE Dr. Austin Melton - Chair Dr. William Hankley Dr. Jan Chomicki - 2 - 1. INTRODUCTION 1a. This document describes requirements and |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/thesis.ps, 19950822 DATA FLOW ANALYSIS FOR VERIFYING CORRECTNESS PROPERTIES OF CONCURRENT PROGRAMS A Dissertation Presented by MATTHEW B. DWYER Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY September 1995 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/thesis.ps, 19950822 DATA FLOW ANALYSIS FOR VERIFYING CORRECTNESS PROPERTIES OF CONCURRENT PROGRAMS A Dissertation Presented by MATTHEW B. DWYER Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY September 1995 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec2.ps, 19950824 Network: - a set of entities connected by communication links * telephone networks * internet * hardware circuits * U.S postal service Why Networks * allow communication * sharing of resources * increased reliability Components of a Network * host machine/entities * communication system - transmission |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/lec3.ps, 19950829 Protocol: Message format/encoding -control field -data field Formatting methods - Bit oriented - character oriented - byte-count oriented Train Example: Finite State Machine Model FSM = (I, O, S, T, L, so) I = set of input actions O = set of output actions S = set of states so = initial state T: S * I ! |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec4.ps, 19950830 S: Repeat get D from network layer send D to R ackd := false while not ackd do receive M from R if M = nack then send D to R if M = ack then ack := true R: Repeat receive D from S if error(D) then send nack to S else send ack to S; deliver D to network layer data in array Sdata S: ns := 1 R ! |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec5.ps, 19950905 1 2 3 4 5 rec_user rec_user -d0 -d1 1 2 3 4 5 send_user +d1 +d0 send_user timeout timeout +ack1 +ack0 -ack0 +d0 -ack1 +d1 Figure 1: 1 ns := 1 R ! (Sdata,ns); ns = ns + 1 2 R nack(s); if s > na then na := s 2 timeout ! ns := na 2 nr := 1; S (D,x) ! if x = nr then Rdata = D; nr := nr + 1 S ! |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/compact.ps, 19950905 A Compact Petri Net Representation and Its Implications for Analysis * Matthew B. Dwyer Lori A. Clarke y dwyer@cis.ksu.edu clarke@cs.umass.edu Department of Computing and Information Sciences Nichols Hall Kansas State University Manhattan, KS 66506 (913)532-6350 yDepartment of Computer Science |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/complete-ea.ps, 19950905 Data Flow Analysis Frameworks for Concurrent Programs (Extended Abstract) Matthew B. Dwyer Department of Computing and Information Sciences Nichols Hall Kansas State University Manhattan, KS 66506 dwyer@cis.ksu.edu (913)532-6350 before 8/1/95: Department of Computer Science Lederle Graduate Research |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/dfa-dssa.ps, 19950905 A Flexible Architecture for Building Data Flow Analyzers 1 Matthew B. Dwyer Lori A. Clarke y dwyer@cis.ksu.edu clarke@cs.umass.edu Department of Computing and Information Sciences Nichols Hall Kansas State University Manhattan, KS 66506 (913)532-6350 yDepartment of Computer Science University of |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/compact.ps, 19950905 A Compact Petri Net Representation and Its Implications for Analysis * Matthew B. Dwyer Lori A. Clarke y dwyer@cis.ksu.edu clarke@cs.umass.edu Department of Computing and Information Sciences Nichols Hall Kansas State University Manhattan, KS 66506 (913)532-6350 yDepartment of Computer Science |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/complete.ps, 19950905 Data Flow Analysis Frameworks for Concurrent Programs 1 Matthew B. Dwyer dwyer@cis.ksu.edu Department of Computing and Information Sciences Nichols Hall Kansas State University Manhattan, KS 66506 (913)532-6350 1This work was supported by the Advanced Research Projects Agency under Grant |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/complete-ea.ps, 19950905 Data Flow Analysis Frameworks for Concurrent Programs (Extended Abstract) Matthew B. Dwyer Department of Computing and Information Sciences Nichols Hall Kansas State University Manhattan, KS 66506 dwyer@cis.ksu.edu (913)532-6350 before 8/1/95: Department of Computer Science Lederle Graduate Research |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/dfa-dssa.ps, 19950905 A Flexible Architecture for Building Data Flow Analyzers 1 Matthew B. Dwyer Lori A. Clarke y dwyer@cis.ksu.edu clarke@cs.umass.edu Department of Computing and Information Sciences Nichols Hall Kansas State University Manhattan, KS 66506 (913)532-6350 yDepartment of Computer Science University of |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/complete.ps, 19950905 Data Flow Analysis Frameworks for Concurrent Programs 1 Matthew B. Dwyer dwyer@cis.ksu.edu Department of Computing and Information Sciences Nichols Hall Kansas State University Manhattan, KS 66506 (913)532-6350 1This work was supported by the Advanced Research Projects Agency under Grant |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec6.ps, 19950907 Sliding Window Protocol: S:ns := 1; na := 1 *,ns); ns++ 2R ack(s) !if s>na then na:=s 2timeout !ns:=na ]R:nr:=1 *=D; nr++ S!ack(nr) 1 Selective Retransmission S:ns:=1; na:=1 *,ns); ns++ 2R nack(s) !R!(Sdata,s); na:=s |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/parallel.ps, 19950912 Protocol Design by Parallel Composition* Gurdip Singh Department of Computing and Information Sciences 234 Nichols Hall, Kansas State University Manhattan, Kansas 66506 Arthur J. Bernstein Department of Computer Science SUNY at Stony Brook Stony Brook, Long Island, NY 11794. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/parallel.ps, 19950912 Protocol Design by Parallel Composition* Gurdip Singh Department of Computing and Information Sciences 234 Nichols Hall, Kansas State University Manhattan, Kansas 66506 Arthur J. Bernstein Department of Computer Science SUNY at Stony Brook Stony Brook, Long Island, NY 11794. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec7.ps, 19950912 High-Level Data Link Control Protocol (HDLC protocol) -several possible modes Frame types: 1. Information frames 2. Supervisory frames 3. Unnumbered frames Information frames |Flag |Address| Control|Info |FCS |Flag| 8 8 8 16 8 flag = 01111110 control field: |0 | N(S) |P/F| N(R) | 1 Supervisory frame |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/shared.ps, 19950912 A Compositional Approach for Designing Protocols* Gurdip Singh Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/shared.ps, 19950912 A Compositional Approach for Designing Protocols* Gurdip Singh Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec8.ps, 19950913 - S' is reachable from S in P if there exists an execution sequence s1; s2; :::; sn, where S = s1 and S' = sn - S is a reachable state of protocol P if S is reachable from the initial state in P - State(P) = set of reachable states of P - Unspecified reception: S = (u,v,x,y) is an unspecified reception |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/assign1.ps, 19950914 CIS 725: Advanced Computer Networks, Fall 95 Homework Assignment 1, Due lecture 12, 30 points (10%) 1. In the class, we discussed the half-duplex sliding window protocol (which handles message loss). Modify this protocol to handle full-duplex transmission. Assume that there exists two terminals, A and |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/assign1.ps, 19950914 CIS 725: Advanced Computer Networks, Fall 95 Homework Assignment 1, Due lecture 12, 30 points (10%) 1. In the class, we discussed the half-duplex sliding window protocol (which handles message loss). Modify this protocol to handle full-duplex transmission. Assume that there exists two terminals, A and |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/lec12.ps, 19950928 CREQ1 -REQ1 CCONF1 +REQ1 CIND2 CRES2 +ACK1 -ACK1 CRES1 CIND1 CREQ2 -REQ2 +REQ2 +ACK2 CCONF2 -ACK2 Figure 1: 1 CREQ1 -REQ1 +ACK1 CCONF DREQ1 DREQ1 DREQ1 DREQ1 DREQ1 -D +REQ1 CIND2 CRES2 -ACK1 +D -DIIND2 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/lec13.ps, 19951002 Medium Access Control (MAC) sublayer - between physical and data link layer - broadcast/multiaccess channels - N independent stations * each generates traffic independently * if two transmit at the same time both frames are garbled Pure ALOHA - A station transmits whenever it wants - sender detects |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Ravindran/sync.ps, 19951004 Transport-oriented Service Models for Synchronization of Multimedia Data Streams K. Ravindran Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu Technical Report TR:93-8 January 1993 (revised in December 1994, August 1995) |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Ravindran/sync.ps, 19951004 Transport-oriented Service Models for Synchronization of Multimedia Data Streams K. Ravindran Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu Technical Report TR:93-8 January 1993 (revised in December 1994, August 1995) |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/prog-assign.ps, 19951005 CIS 725: Advanced Computer Networks Programming Assignment 1 (75 points) The goal of this assignment is to develop a protocol for the Agreement problem. In the Agreement problem, each process i in the network has two variables ini and outi. At the beginning of the protocol, process i assigns a value to |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/prog-assign.ps, 19951005 CIS 725: Advanced Computer Networks Programming Assignment 1 (75 points) The goal of this assignment is to develop a protocol for the Agreement problem. In the Agreement problem, each process i in the network has two variables ini and outi. At the beginning of the protocol, process i assigns a value to |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec15.ps, 19951010 Protocol Validation: -check whether protocol specification meets the service specification Reachability analysis: - generate all reachable states analyze() f if (W is empty) return q = element from W add q to A if (q = error state) report error else f for each successor state s of q if (s 62 (A |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec16.ps, 19951018 B / lambda A/ 0 A/ 0 B / 1 A/ 1 A/ 0 B / 1 A/ 1 B / 0 B / 1 1 2 3 4 Figure 1: Transition tour: B A B A B A A A A A A A B B General algorithm To test transition (s1,s2): (1) apply reset to M (2) Find shortest path to s1 and apply input of the path (3) Apply input for transition (s1,s2) (4) check if state |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/lec19.ps, 19951023 End-to-End flow control Routing - Datagram routing * each packet is routing independently * unordered, unreliable - Virtual Circuit routing * set up a path for each connection * all messages are sent over this path * ordered, reliable 1 Routing table next hop information At each node i, for each |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/multiphase.ps, 19951024 On the Construction of Multiphase Communicating Protocols* Gurdip Singh and Madhavi Sammeta Department of Computing and Information Sciences 234 Nichols Hall, Kansas State University Manhattan, Kansas 66506 email: fsingh, sammetag@cis.ksu.edu October 24, 1995 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/multiphase.ps, 19951024 On the Construction of Multiphase Communicating Protocols* Gurdip Singh and Madhavi Sammeta Department of Computing and Information Sciences 234 Nichols Hall, Kansas State University Manhattan, Kansas 66506 email: fsingh, sammetag@cis.ksu.edu October 24, 1995 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Ravindran/repl.ps, 19951031 Replication Protocol Structures for Fault-tolerant Remote Procedure Calls K. Ravindran && Shanthi Pichai Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi, shanthi@cis.ksu.edu S. T. Chanson Department of Computer Science University of British |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Ravindran/perf.ps, 19951031 Performance Engineering of End-systems for High Bandwidth Multimedia Communications K. Ravindran && K. Bhat Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu 15th October 1995 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Ravindran/repl.ps, 19951031 Replication Protocol Structures for Fault-tolerant Remote Procedure Calls K. Ravindran && Shanthi Pichai Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi, shanthi@cis.ksu.edu S. T. Chanson Department of Computer Science University of British |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Ravindran/perf.ps, 19951031 Performance Engineering of End-systems for High Bandwidth Multimedia Communications K. Ravindran && K. Bhat Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu 15th October 1995 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec22.ps, 19951101 Dij;k = distance of i to j via neighbor k a b c d e 2 1 2 2 4 1 a c d a c d e 2 4 5 1 6 5 6 4 2 7 3 3 Distance Table for b Routing Table a a 2 c c 1 d d 2 e c 3 Figure 1: Bellman-Ford Algorithm Protocol at node i On receiving distance table from j Update column i of the distance table as follows: For |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/CRC.chapter.ps.Z, 19951101 Programming Language Semantics David A. Schmidt Department of Computing and Information Sciences Kansas State University October 24, 1995 A programming language possesses two fundamental features: syntax and semantics. Syntax refers to the appearance of the well-formed programs of the language, and |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/CRC.chapter.ps.Z, 19951101 Programming Language Semantics David A. Schmidt Department of Computing and Information Sciences Kansas State University October 24, 1995 A programming language possesses two fundamental features: syntax and semantics. Syntax refers to the appearance of the well-formed programs of the language, and |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec23.ps, 19951106 The following gives the computation of routes using the Bellman-Ford algorithm for the example discussed in the class. As indicated in the class, in the distance table, each row corresponds to a destination and each column corresponds to a neighbor. In the routing table, a row corresponds to a |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/tr95-11.ps, 19951109 Lock Based Self-Stabilizing Distributed Mutual Exclusion Algorithms Masaaki Mizuno * Mikhail Nesterenko Hirotsugu Kakugawa Dept. of Comp. and Info. Sciences Dept. of Elect. Engineering Kansas State University Hiroshima University Manhattan, Kansas 66506 Higashi-Hiroshima, Japan |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/tr95-11.ps, 19951109 Lock Based Self-Stabilizing Distributed Mutual Exclusion Algorithms Masaaki Mizuno * Mikhail Nesterenko Hirotsugu Kakugawa Dept. of Comp. and Info. Sciences Dept. of Elect. Engineering Kansas State University Hiroshima University Manhattan, Kansas 66506 Higashi-Hiroshima, Japan |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/tr95-12.ps, 19951110 A Timestamp Based Transformation of Self-Stabilizing Programs for Distributed Computing Environments Masaaki Mizuno* Hirotsugu Kakugawa Dept. of Comp. and Info. Sciences Dept. of Elect. Engineering Kansas State University Hiroshima University Manhattan, KS 66506 Higashi-Hiroshima, Japan |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/tr95-12.ps, 19951110 A Timestamp Based Transformation of Self-Stabilizing Programs for Distributed Computing Environments Masaaki Mizuno* Hirotsugu Kakugawa Dept. of Comp. and Info. Sciences Dept. of Elect. Engineering Kansas State University Hiroshima University Manhattan, KS 66506 Higashi-Hiroshima, Japan |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/lec25.ps, 19951113 Techniques to deal with congestion 1. Buffer reservation - possible with virtual circuit communication - reserve buffers when establishing the circuit - prevents congestion 2. Packet discarding - no reservation - discard packets if buffers are full - how to allocate buffers to various lines allocate one |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/scp.ps.Z, 19951120 Stackability in the Simply-Typed Call-By-Value Lambda Calculus Anindya Banerjee yand David A. Schmidt z Department of Computing and Information Sciences Kansas State University x fbanerjee, schmidtg@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/scp.ps.Z, 19951120 Stackability in the Simply-Typed Call-By-Value Lambda Calculus Anindya Banerjee yand David A. Schmidt z Department of Computing and Information Sciences Kansas State University x fbanerjee, schmidtg@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Unger/tr95-6.ps, 19951122 Time Passive Property in Linear Past Temporal Logic Robert J. Zhang Elizabeth A. Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-95-6 August, 1995 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Unger/tr95-6.ps, 19951122 Time Passive Property in Linear Past Temporal Logic Robert J. Zhang Elizabeth A. Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-95-6 August, 1995 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Unger/tr95-13.ps, 19951127 String Constraints in Logic Programming Robert J. Zhang Elizabeth A. Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-95-13 November 14, 1995 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Unger/tr95-13.ps, 19951127 String Constraints in Logic Programming Robert J. Zhang Elizabeth A. Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-95-13 November 14, 1995 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/examples.ps, 19951211 1. Consider two stations A and B which are 100 miles apart and connected by a 100 Mbits/sec link. The round trip delay (approx) = 2 100 1600=(3 108) = 1ms In 1ms, 100 106 10 3 = 105 bits of data can be transmitted. If packet size is 1000 bits then, a window size of at least 105=1000 = 100 is need to |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/examples.ps, 19951211 1. Consider two stations A and B which are 100 miles apart and connected by a 100 Mbits/sec link. The round trip delay (approx) = 2 100 1600=(3 108) = 1ms In 1ms, 100 106 10 3 = 105 bits of data can be transmitted. If packet size is 1000 bits then, a window size of at least 105=1000 = 100 is need to |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Students/papers-int.ps.Z, 19951213 Point vs. Interval-based Query Languages for Temporal Databases (extended abstract) David Toman |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Students/papers-int.ps.Z, 19951213 Point vs. Interval-based Query Languages for Temporal Databases (extended abstract) David Toman |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/icse18.copyright.ps, 19951215 A Flexible Architecture for Building Data Flow Analyzers * Matthew B. Dwyer Lori A. Clarke Dept. of Computing and Info. Sciences Dept. of Computer Science Kansas State University University of Massachusetts Manhattan, KS 66506 Amherst, MA 01003 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/icse18.copyright.ps, 19951215 A Flexible Architecture for Building Data Flow Analyzers * Matthew B. Dwyer Lori A. Clarke Dept. of Computing and Info. Sciences Dept. of Computer Science Kansas State University University of Massachusetts Manhattan, KS 66506 Amherst, MA 01003 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Ravindran/mcast.ps, 19951229 Network Abstractions and Resource Allocation Models for Data Multicasting in Multi-service Networks K. Ravindran Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Ravindran/mcast.ps, 19951229 Network Abstractions and Resource Allocation Models for Data Multicasting in Multi-service Networks K. Ravindran Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA. E-mail: ravi@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howard/sorting.ps.Z, 19960118 Another Iteration on Darlington's A Synthesis of Several Sorting Algorithms" Brian Howard Kansas State University Draft: October 18, 1994 In A Synthesis of Several Sorting Algorithms" , Darlington showed how to use program transformation techniques to develop versions of six well-known sorting |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howard/inproret.ps.Z, 19960118 Inductive, Projective, and Retractive Types Brian T. Howard Institute for Research in Cognitive Science University of Pennsylvania bhoward@saul.cis.upenn.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howard/icfp.ps.Z, 19960118 Inductive, Coinductive, and Pointed Types Brian T. Howard Department of Computer and Information Sciences Kansas State University bhoward@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howard/icfp.ps.Z, 19960118 Inductive, Coinductive, and Pointed Types Brian T. Howard Department of Computer and Information Sciences Kansas State University bhoward@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howard/fcc.ps.Z, 19960118 Fixpoint Computations and Coiteration (Extended Abstract) Brian T. Howard Department of Computer and Information Sciences Kansas State University bhoward@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howard/inproret.ps.Z, 19960118 Inductive, Projective, and Retractive Types Brian T. Howard Institute for Research in Cognitive Science University of Pennsylvania bhoward@saul.cis.upenn.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howard/sudiss.ps.Z, 19960118 Fixed Points and Extensionality in Typed Functional Programming Languages Brian T. Howard Computer Science Department Stanford University October 19, 1992 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howard/lispfp90.ps.Z, 19960118 Operational and Axiomatic Semantics of PCF Brian T. Howard John C. Mitchelly Department of Computer Science Stanford University fbhoward,jcmg@cs.stanford.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howard/lispfp90.ps.Z, 19960118 Operational and Axiomatic Semantics of PCF Brian T. Howard John C. Mitchelly Department of Computer Science Stanford University fbhoward,jcmg@cs.stanford.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howard/fcc.ps.Z, 19960118 Fixpoint Computations and Coiteration (Extended Abstract) Brian T. Howard Department of Computer and Information Sciences Kansas State University bhoward@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howard/sudiss.ps.Z, 19960118 Fixed Points and Extensionality in Typed Functional Programming Languages Brian T. Howard Computer Science Department Stanford University October 19, 1992 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howard/sorting.ps.Z, 19960118 Another Iteration on Darlington's A Synthesis of Several Sorting Algorithms" Brian Howard Kansas State University Draft: October 18, 1994 In A Synthesis of Several Sorting Algorithms" , Darlington showed how to use program transformation techniques to develop versions of six well-known sorting |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/Cover.ps, 19960123 PROGRAM SPECIFICATION VERIFICATION @ 1991 William Hankley Department of Computing & Information Sciences Kansas State University Manhattan, KS 66502 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/Chap1.ps, 19960123 Chapter 1 Introduction Page 1 Specification and Verification 1991 1. Introduction The subjects of this book are formal specifications of programs and formal verification of specifications and programs. This chapter introduces these concepts and it explains how specification and verification are related |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/Cover.ps, 19960123 PROGRAM SPECIFICATION VERIFICATION @ 1991 William Hankley Department of Computing & Information Sciences Kansas State University Manhattan, KS 66502 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/771syllabus.ps, 19960123 PROGRAMMING SCIENCE CIS 771 Spring 1996 Subtitle: Formal Specification of Programs and Components and Verification of Properties of Specifications Line: #32430, T/TH 2:05-3:20 pm, Jan. 23 - May 9, Durland 154 Instructor: Dr. William Hankley email: hankley@cis.ksu.edu www: |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/cover.ps, 19960123 PROGRAM SPECIFICATION VERIFICATION @ 1991 William Hankley Department of Computing & Information Sciences Kansas State University Manhattan, KS 66502 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/Chap1.ps, 19960123 Chapter 1 Introduction Page 1 Specification and Verification 1991 1. Introduction The subjects of this book are formal specifications of programs and formal verification of specifications and programs. This chapter introduces these concepts and it explains how specification and verification are related |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/TOC.ps, 19960125 Table of Contents Page i Specification and Verification 1991 Table of Contents Page i Note: Page numbers are not consequtive; there are page jumps between chapters. 1. Introduction 1 1.1 About Specifications 1.2 About Verification 1.3 Relationship to Software Development 2. Non-Procedural Languages 20 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/Chap2.ps, 19960125 Chapter 2 Non-Procedural Languages Page 20 Specification and Verification 1991 2. Non-Procedural Languages This chapter presents background concepts that will be useful in later chapers on developing formal specifications. This chapter presents introductions to three nonprocedural languages -- Prolog, |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/Chap2.ps, 19960125 Chapter 2 Non-Procedural Languages Page 20 Specification and Verification 1991 2. Non-Procedural Languages This chapter presents background concepts that will be useful in later chapers on developing formal specifications. This chapter presents introductions to three nonprocedural languages -- Prolog, |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/TOC.ps, 19960125 Table of Contents Page i Specification and Verification 1991 Table of Contents Page i Note: Page numbers are not consequtive; there are page jumps between chapters. 1. Introduction 1 1.1 About Specifications 1.2 About Verification 1.3 Relationship to Software Development 2. Non-Procedural Languages 20 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/TOC.ps, 19960125 Table of Contents Page i Specification and Verification 1991 Table of Contents Page i Note: Page numbers are not consequtive; there are page jumps between chapters. 1. Introduction 1 1.1 About Specifications 1.2 About Verification 1.3 Relationship to Software Development 2. Non-Procedural Languages 20 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/chap2.ps, 19960125 Chapter 2 Non-Procedural Languages Page 20 Specification and Verification 1991 2. Non-Procedural Languages This chapter presents background concepts that will be useful in later chapers on developing formal specifications. This chapter presents introductions to three nonprocedural languages -- Prolog, |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture1.ps.gz, 19960130 Verification and Validation CIS 841 (NTU SE 750-KS) Instructor: Matthew Dwyer Phone: (913) 532-6350 FAX: (913) 532-7353 Email: dwyer@cis.ksu.edu WWW: http://www.cis.ksu.edu/~dwyer Office: Nichols 324e Hours: T, TH 2:00-3:00 Prerequisites CIS 740 -- Graduate Software Engineering Should be familiar with : |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/lecture2.ps.gz, 19960130 Last Time ... We talked about class setup setting the context for our study This time finish up the introductory material begin the theoretical foundations Relations A RELATION, R, over a set, S = {s t } is a set of ordered n-tuples R = {r i }, where r i = (s i,1 , s i,2 , ... , s i,n A Binary relation |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture3.ps.gz, 19960130 Last Time ... We ... finished up the intro started reviewing mathematical background This time ... finish up the mathematical background a few basic definitions start talking about program models You should ... have read the Adrion et. al. article surveys basic concepts covered in this course defines a |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture4.ps.gz, 19960201 Last Time ... We ...finish up the mathematical background a few basic definitions This time ... start talking about program models For next time ... Read the specification papers Think of some interesting partial program behaviors produce some example behaviors try to generalize Play around with regular |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Unger/tr96-1.ps, 19960202 Calendar Algebra Robert J. Zhang Elizabeth Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-96-1 January, 1996 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Unger/tr95-14.ps, 19960202 Introduction to Database Integrity Robert J. Zhang Elizabeth A. Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-95-14 December, 1995 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Unger/tr96-1.ps, 19960202 Calendar Algebra Robert J. Zhang Elizabeth Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-96-1 January, 1996 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Unger/tr95-14.ps, 19960202 Introduction to Database Integrity Robert J. Zhang Elizabeth A. Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-95-14 December, 1995 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture8.ps.gz, 19960215 Last Time ... I talked about Weakening Traces A Regular Expression Formalism This time I'll talk about More About Regular Expression Formalism Example Specifications Assignment 1 Writing Specifications Scope Syntax Semantics Style Scope of a Specification What does this specification talk about |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture7.ps.gz, 19960215 Last Time ... I talked about Specification formalisms Properties of specifications Trace specifications This time I'll talk about Weakening Traces A Regular Expression Formalism Assignment 1 Weakening Traces Traces capture program behavior by defining Legal sequences of calls defining correct Values of |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture9.ps.gz, 19960219 Last Time ... I talked more about our regular expression formalism a number of example specifications Today more details about Assignment 1 start on the next part of the course The First Assignment Model Building Specification Writing Exploring Different Approaches The Application We have a program |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/Chap3.ps, 19960220 Chapter 3 Base Data Types Page 60 Specification and Verification 1991 3. Base Data Types This chapter introduces data types that are used in the following chapters to compose specifications. These are called base types because they are used to compose specifications for other more complex structures. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/Chap3.ps, 19960220 Chapter 3 Base Data Types Page 60 Specification and Verification 1991 3. Base Data Types This chapter introduces data types that are used in the following chapters to compose specifications. These are called base types because they are used to compose specifications for other more complex structures. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/chap3.ps, 19960220 Chapter 3 Base Data Types Page 60 Specification and Verification 1991 3. Base Data Types This chapter introduces data types that are used in the following chapters to compose specifications. These are called base types because they are used to compose specifications for other more complex structures. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture10.ps.gz, 19960221 Last Time ... I talked about Assignment 1 about Fagan-style inspections Today we'll look at inspection checklists weaknesses of inspections focusing inspections building our own inspections Heads Up In this lecture we're going to look at checklists It would be helpful for you to have them Appendix A of |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture6.ps.gz, 19960221 Last Time ... We finished up our discussion of program models. Today I ll discuss ... Specifications Trace specifications Path expressions a few example specifications Specifications define intent provide a contract between producer and consumer user and requirements analyst designer and designer |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/assign1.ps, 19960224 CIS 841 Assignment 1 Spring 1996 Feb. 19, 1996 The first project requires you to apply concepts related to program models and software specification to a rather simple application. The Application The application is very simple; it reads a list of integers and prints out those values that lie below a |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/assign1.ps, 19960224 CIS 841 Assignment 1 Spring 1996 Feb. 19, 1996 The first project requires you to apply concepts related to program models and software specification to a rather simple application. The Application The application is very simple; it reads a list of integers and prints out those values that lie below a |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/text/errata.ps, 19960228 Errata for ``The Structure of Typed Programming Languages'' 27 February 1996 Page xiii, Line -12: ``Hemerik and Barendregt 1990'' should be ``Barendregt and Hemerik 1990''. Page xiii, Line -11: ``Tennent 1977'' should be ``Tennent 1977a''. Page 4, Figure 1.3: Several of the tree arcs should be shifted |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/text/errata.ps, 19960228 Errata for ``The Structure of Typed Programming Languages'' 27 February 1996 Page xiii, Line -12: ``Hemerik and Barendregt 1990'' should be ``Barendregt and Hemerik 1990''. Page xiii, Line -11: ``Tennent 1977'' should be ``Tennent 1977a''. Page 4, Figure 1.3: Several of the tree arcs should be shifted |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture13.ps.gz, 19960301 Last Time Talked about how to formulate a flow analysis uninitialized variable analysis This time finish talking about data flow frameworks discuss flow analysis for verifying QRE specifications Flow Analysis for Verification Recall that we had two different comparisons L(CFG) and L(Spec) are disjoint |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture13.lw.ps, 19960303 Last Time Talked about how to formulate a flow analysis uninitialized variable analysis This time finish talking about data flow frameworks discuss flow analysis for verifying QRE specifications Flow Analysis for Verification Recall that we had two different comparisons L(CFG) and L(Spec) are disjoint |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture12.lw.ps, 19960303 Capturing the effect of program statements How does a statement effect the information of interest e.g., for Avail an assignment to x := y+2 makes the expression y+2 available Transfer functions Functions are defined over the set of facts Transform the facts seen on input to a new set of facts available |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture11.lw.ps, 19960303 Last Time ... We talked about phased inspections checklists (we ll come back to this) This time we ll talk about automated static analysis flow analysis Static Analysis Ultimately, we want assurances about the behavior of a program when executed Recall, behaviors can be thought of as state sequences |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture14a.ps.gz, 19960307 Symbolic Evaluation (Symbolic Execution) Creates a functional representation of a path (executable component) For a path Pi D is the domain for path Pi C is the computation for path Pi Functional Representation of an Executable Component P : X fi Y P is composed of partial functions |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture15.ps.gz, 19960307 Inter-Procedural Analysis We use packages/subprograms to create abstractions data abstractions control abstractions Abstractions hide detailed execution behavior Good design minimizes cross-boundary information flow An accurate analysis of execution behavior MUST cut across abstraction boundaries Same |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture14b.ps.gz, 19960307 Last Time ... Looked at a ... symbolic execution more precise than flow analysis more expensive than flow analysis Today ... finish up global symbolic evaluation inter-procedural analyses Alternative Approaches to Symbolic Evaluation Dynamic Symbolic Execution Data dependent Global Symbolic Evaluation |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/tpn.ps, 19960307 A Compact Petri Net Representation and Its Implications for Analysis * KSU CIS TR 95-9 Matthew B. Dwyer Lori A. Clarke dwyer@cis.ksu.edu clarke@cs.umass.edu Dept. of Computing and Info. Sciences Dept. of Computer Science Kansas State University University of Massachusetts Manhattan, KS 66506 Amherst, MA |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/tpn.ps, 19960307 A Compact Petri Net Representation and Its Implications for Analysis * KSU CIS TR 95-9 Matthew B. Dwyer Lori A. Clarke dwyer@cis.ksu.edu clarke@cs.umass.edu Dept. of Computing and Info. Sciences Dept. of Computer Science Kansas State University University of Massachusetts Manhattan, KS 66506 Amherst, MA |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture16a.ps.gz, 19960313 1 Last Time ... We finished up static analysis symbolic evaluation inter-procedural analysis Today we start on the next part of the course dynamic analysis assertion checking As we talk about this think about how to classify symbolic evaluation Announcements Assignment 2 part A is online part B is hot |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture16b.ps.gz, 19960313 Assertions A dynamic testing capability self-checking software Insert specifications about the intent of a system During execution, monitor if the assertion is violated If violated then perform some action: display information to help find the source of the error 1 Exceptions versus Assertions |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture18b.ps, 19960320 Operand mutations Constant replacement e.g., x := x + 5; would replace 5 with each constant of the appropriate type that appears in the program Scalar variable replacement e.g., x := x + 5; would replace x with each scalar variable of the appropriate type that appears in the program Operand mutations |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture17.ps, 19960320 Last Time ... I talked about dynamic analyses about assertion checking Today we'll finish up assertion checking I'll outline our coverage of testing Approaches to Testing + Fault-based Testing + Coverage-based Testing + Specification-based Testing - Transaction/Thread/Use-case Testing Transaction |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture18a.ps, 19960320 Last Time ... finished up dynamic assertion methods APP is available via ftp I've installed it locally layed out our plan for covering testing This time ... discuss assignment #1 solutions discuss assignment #2 part B mutation testing Assignment #1 In general people did a pretty good job most people |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/Chap5.ps, 19960402 Chapter 5 Predicates and Assertions Page 100 Specification and Verification 1991 5. Predicates and Assertions This chapter presents a semi-formal definition of predicates and assertions. Predicates are Boolean expressions. They are similar to the Boolean expressions used in programming languages, but |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/Chap5.ps, 19960402 Chapter 5 Predicates and Assertions Page 100 Specification and Verification 1991 5. Predicates and Assertions This chapter presents a semi-formal definition of predicates and assertions. Predicates are Boolean expressions. They are similar to the Boolean expressions used in programming languages, but |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/Chap6.ps, 19960402 Chapter 6 Specification of Package Modules Page 120 Specification and Verification 1991 6. Specification of Package Modules This chapter presents concepts and examples of model-based specifications of package modules using a syntax style based on that of Ada package specifications. A package is the Ada |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/Chap4.ps, 19960402 Chapter 4 Formal Definitions Page 80 Specification and Verification 1991 4. Formal Definitions This chapter presents three techniques for formal definitions -- axiomatic, algebraic, and model-based. The purpose of this chapter is for you to develop some beginning skill in writing algebraic and |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/Chap4.ps, 19960402 Chapter 4 Formal Definitions Page 80 Specification and Verification 1991 4. Formal Definitions This chapter presents three techniques for formal definitions -- axiomatic, algebraic, and model-based. The purpose of this chapter is for you to develop some beginning skill in writing algebraic and |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/Chap6.ps, 19960402 Chapter 6 Specification of Package Modules Page 120 Specification and Verification 1991 6. Specification of Package Modules This chapter presents concepts and examples of model-based specifications of package modules using a syntax style based on that of Ada package specifications. A package is the Ada |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/Chap6.ps, 19960402 Chapter 6 Specification of Package Modules Page 120 Specification and Verification 1991 6. Specification of Package Modules This chapter presents concepts and examples of model-based specifications of package modules using a syntax style based on that of Ada package specifications. A package is the Ada |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/lecture20.ps.gz, 19960405 Last Time ... Previously discussed mutation testing Today highlights of mutation testing PIE validity of testing assumptions Using Mutation Testing You've developed a program You've developed a set of test cases for the program All of the test cases pass There are two possible situations the program is |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/lomapsabs.ps.Z, 19960407
|
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/lecture21.ps.gz, 19960408 Last Time ... Finished up our discussion of mutation testing Talked about PIE and coupling effect Today, we ll start on two other forms of structural testing Structural Test Data Selection fault-based e.g., mutation testing coverage based domain based Domain Testing Values of input variables partition |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/boston.ps.Z, 19960411 Challenges to Programming Language Semantics David A. Schmidt Kansas State University 1 Complementary Semantics Definitions and Abstract Interpretation The development and initial successes of Scott-Strachey denotational semantics in the 1970s gave hope to those who desired a canonical definition format |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/boston.ps.Z, 19960411 Challenges to Programming Language Semantics David A. Schmidt Kansas State University 1 Complementary Semantics Definitions and Abstract Interpretation The development and initial successes of Scott-Strachey denotational semantics in the 1970s gave hope to those who desired a canonical definition format |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/lecture23.ps.gz, 19960415 Last Time ... data flow coverage Today inter-procedural data flow testing assignment 3 part A specification-based testing Is it Better Some Data for 14 mathematical programs random : 35 test cases, 93.7% bugs found branch : 3.8 test cases, 91.6% bugs found all-uses : 11.3 test cases, 96.3% bugs found |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture19.ps, 19960416 Operand mutations Constant replacement e.g., x := x + 5; would replace 5 with each constant of the appropriate type that appears in the program Scalar variable replacement e.g., x := x + 5; would replace x with each scalar variable of the appropriate type that appears in the program Operand mutations |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/Chap7.ps, 19960426 Chapter 7 Verification Page 135 Specification and Verification 1991 7. Verification This chapter opens a new direction of study. Verification is companion to specifications. Verification is a demonstration that two assertions are consistent (that is, they are in agreement). Three applications of |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/771/Chap7.ps, 19960426 Chapter 7 Verification Page 135 Specification and Verification 1991 7. Verification This chapter opens a new direction of study. Verification is companion to specifications. Verification is a demonstration that two assertions are consistent (that is, they are in agreement). Three applications of |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/771/Chap7.ps, 19960426 Chapter 7 Verification Page 135 Specification and Verification 1991 7. Verification This chapter opens a new direction of study. Verification is companion to specifications. Verification is a demonstration that two assertions are consistent (that is, they are in agreement). Three applications of |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/inter-task.ps, 19960506 task T2 is begin accept a; s4; end T2; task T1 is begin s1; T1.a; s2; s3; end T1; |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/possible.ps, 19960506 task T1 is begin s1; T1.a; s2; s3; end T1; task T2 is begin accept a; s4; end T2; (-,a) (s1,-) (T2.a,-) (s1,a) (T2.a,a) (s2,s4) (s3,s4) (s2,-) (-,s4) (s3,-) |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/asynch-task.ps, 19960506 task T2 is begin accept a; s4; end T2; task T1 is begin s1; T1.a; s2; s3; end T1; |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/asynch-task.ps, 19960506 task T2 is begin accept a; s4; end T2; task T1 is begin s1; T1.a; s2; s3; end T1; |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/possible.ps, 19960506 task T1 is begin s1; T1.a; s2; s3; end T1; task T2 is begin accept a; s4; end T2; (-,a) (s1,-) (T2.a,-) (s1,a) (T2.a,a) (s2,s4) (s3,s4) (s2,-) (-,s4) (s3,-) |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/task-cfgs.ps, 19960506 task T1 is begin s1; T1.a; s2; s3; end T1; task T2 is begin accept a; s4; end T2; |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/cis841/task-cfgs.ps, 19960506 task T1 is begin s1; T1.a; s2; s3; end T1; task T2 is begin accept a; s4; end T2; |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/inter-task.ps, 19960506 task T2 is begin accept a; s4; end T2; task T1 is begin s1; T1.a; s2; s3; end T1; |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis841/lecture30.ps.gz, 19960510 Last Time ... we talked about ... static analysis of concurrent software coverage criteria for concurrent software Today recap of course material preparation for the final details about the final Learning Objectives Understand fundamental concepts What, why, how Understand variation in V&V techniques |
 | ftp://ftp.cis.ksu.edu/pub/CIS/GradInfo/PhD.manual.ps, 19960517 GUIDELINES FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE DEPARTMENT OF COMPUTING AND INFORMATION SCIENCES KANSAS STATE UNIVERSITY May 1996 GRADUATE STUDIES COMMITTEE Dr. Rodney Howell - Chair Dr. Masaaki Mizuno Dr. Allen Stoughton Dr. David Gustafson - 2 - 1. INTRODUCTION 1a. This document describes |
 | ftp://ftp.cis.ksu.edu/pub/techreports/GradInfo/PhD.manual.ps, 19960517 GUIDELINES FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE DEPARTMENT OF COMPUTING AND INFORMATION SCIENCES KANSAS STATE UNIVERSITY May 1996 GRADUATE STUDIES COMMITTEE Dr. Rodney Howell - Chair Dr. Masaaki Mizuno Dr. Allen Stoughton Dr. David Gustafson - 2 - 1. INTRODUCTION 1a. This document describes |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/aics.ps, 19960524 An Application-Independent Concurrency Skeleton in Ada-95 Matthew B. Dwyer Matthew J. Craig Eric Runquist Department of Computing and Information Sciences Kansas State University TR 96-7 May 24, 1996 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/aics.ps, 19960524 An Application-Independent Concurrency Skeleton in Ada-95 Matthew B. Dwyer Matthew J. Craig Eric Runquist Department of Computing and Information Sciences Kansas State University TR 96-7 May 24, 1996 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/GradInfo/application-form.ps, 19960710 Directions for Applying for Graduate Programs (July 1996) Name: ___________________________________________________________________________________ (Please print) Family Name First Name Initial Submit complete application materials to: Graduate Studies Department of Computing & Information Sciences 234 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/GradInfo/application-form.ps, 19960710 Directions for Applying for Graduate Programs (July 1996) Name: ___________________________________________________________________________________ (Please print) Family Name First Name Initial Submit complete application materials to: Graduate Studies Department of Computing & Information Sciences 234 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/pdcs96.ps, 19960711 A Complete Set of Satisfaction Rules for Property Detection in Distributed Computations Michel Hurfin Masaaki Mizuno y IRISA Dept. of Comp. and Info. Sciences Campus Universitaire de Beaulieu Kansas State University 35042 Rennes Cedex, France Manhattan, KS 66506 hurfin@irisa.fr masaaki@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/pdcs96.ps, 19960711 A Complete Set of Satisfaction Rules for Property Detection in Distributed Computations Michel Hurfin Masaaki Mizuno y IRISA Dept. of Comp. and Info. Sciences Campus Universitaire de Beaulieu Kansas State University 35042 Rennes Cedex, France Manhattan, KS 66506 hurfin@irisa.fr masaaki@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/k_coterie94.ps, 19960729 Nondominated K-Coteries for Multiple Mutual Exclusion Mitchell L. Neilsen Masaaki Mizuno * Computer Science Dept. Dept. of Comp. and Info. Science Oklahoma State University Kansas State University Stillwater, OK 74078 Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/k_coterie94.ps, 19960729 Nondominated K-Coteries for Multiple Mutual Exclusion Mitchell L. Neilsen Masaaki Mizuno * Computer Science Dept. Dept. of Comp. and Info. Science Oklahoma State University Kansas State University Stillwater, OK 74078 Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/flow87.ps, 19960806 INFORMATION FLOW CONTROL IN A DISTRIBUTED OBJECT-ORIENTED SYSTEM WITH STATICALLY BOUND OBJECT VARIABLES1 Masaaki Mizuno and Arthur E. Oldehoeft Department of Computer Science Iowa State University Ames, Iowa 50011 A. INTRODUCTION The modular approach to the design of computer systems has been the |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/mwrw94.ps, 19960806 An MWRW based Strict Two Phase Lock Scheduler Masaaki Mizuno James Z. Zhou Gurdip Singhy Dept. of Computing and Info. Sciences Kansas State University Manhattan, KS 66506. View serializability (VSR) is a correctness criterion in database systems. However, testing whether a history is VSR is an NP |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/opti95.ps, 19960806 An Optimistic Protocol for a Linearizable Distributed Shared Memory System Masaaki Mizuno Dept. of Comp. and Info. Sciences, Kansas State University, Manhattan, KS 66506, USA Mitchell L. Neilsen Computer Science Department, Oklahoma State University, Stillwater, OK 74078, USA Michel Raynaly IRISA, |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/flow89.ps, 19960806 A LEAST FIXED POINT APPROACH TO INTER-PROCEDURAL INFORMATION FLOW CONTROL Masaaki Mizuno Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 masaaki@ksuvax1.cis.ksu.edu 1. Introduction Information flow control regulates the flow of information between |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/logrel.ps.gz, 19960806 Mechanizing Logical Relations Allen Stoughtony Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA E-mail: allen@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/consensus91.ps, 19960806 Decentralized Consensus Protocols Mitchell L. Neilsen Masaaki Mizuno Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/porgi.ps.gz, 19960806 Porgi: a Proof-Or-Refutation Generator for Intuitionistic propositional logic Allen Stoughtony Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA allen@cis.ksu.edu http://www.cis.ksu.edu/~allen/home.html |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/consensus91.ps, 19960806 Decentralized Consensus Protocols Mitchell L. Neilsen Masaaki Mizuno Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/conc_measure92.ps, 19960806 Synchronization and Concurrency Measures for Distributed Computations Michel Raynal Masaaki Mizuno Mitchell L. Neilsen IRISA Dept. of Computing and Info. Sciences Campus de Beaulieu Kansas State University 35042 Rennes-C edex, FRANCE Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/coterie_join92.ps, 19960806 Coterie Join Algorithm Mitchell L. Neilsen Masaaki Mizuno Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/analysis_coterie92.ps, 19960806 Measures of Node Importance for Quorum Structures Mitchell L. Neilsen Masaaki Mizuno Computer Science Department Dept. of Comp. and Info. Sci. Oklahoma State University Kansas State University Stillwater, Oklahoma 74078 Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/token_mx91.ps, 19960806 A Token Based Distributed Mutual Exclusion Algorithm based on Quorum Agreements Masaaki Mizuno* Mitchell L. Neilsen Raghavendra Rao Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/secure_quorum.ps, 19960806 A SECURE QUORUM PROTOCOL Masaaki Mizunoy Mitchell L. Neilsen Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 In a distributed database system, several copies (replicas) of a data object may be maintained at different sites to improve fault tolerance |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/logrel.ps.gz, 19960806 Mechanizing Logical Relations Allen Stoughtony Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA E-mail: allen@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/flow87.ps, 19960806 INFORMATION FLOW CONTROL IN A DISTRIBUTED OBJECT-ORIENTED SYSTEM WITH STATICALLY BOUND OBJECT VARIABLES1 Masaaki Mizuno and Arthur E. Oldehoeft Department of Computer Science Iowa State University Ames, Iowa 50011 A. INTRODUCTION The modular approach to the design of computer systems has been the |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/mwrw94.ps, 19960806 An MWRW based Strict Two Phase Lock Scheduler Masaaki Mizuno James Z. Zhou Gurdip Singhy Dept. of Computing and Info. Sciences Kansas State University Manhattan, KS 66506. View serializability (VSR) is a correctness criterion in database systems. However, testing whether a history is VSR is an NP |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/coterie_join92.ps, 19960806 Coterie Join Algorithm Mitchell L. Neilsen Masaaki Mizuno Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/porgi.ps.gz, 19960806 Porgi: a Proof-Or-Refutation Generator for Intuitionistic propositional logic Allen Stoughtony Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA allen@cis.ksu.edu http://www.cis.ksu.edu/~allen/home.html |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/analysis_coterie92.ps, 19960806 Measures of Node Importance for Quorum Structures Mitchell L. Neilsen Masaaki Mizuno Computer Science Department Dept. of Comp. and Info. Sci. Oklahoma State University Kansas State University Stillwater, Oklahoma 74078 Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/sc_theory95.ps, 19960806 Sequential Consistency in Distributed Systems Masaaki Mizuno1 Michel Raynal2 James Z. Zhou1 1 Dept. of Computing and Info. Sciences, Kansas State University, Manhattan, KS 66506. 2 IRISA, Campus de Beaulieu, 35042 Rennes Cedex, France |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/secure_quorum.ps, 19960806 A SECURE QUORUM PROTOCOL Masaaki Mizunoy Mitchell L. Neilsen Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 In a distributed database system, several copies (replicas) of a data object may be maintained at different sites to improve fault tolerance |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/opti95.ps, 19960806 An Optimistic Protocol for a Linearizable Distributed Shared Memory System Masaaki Mizuno Dept. of Comp. and Info. Sciences, Kansas State University, Manhattan, KS 66506, USA Mitchell L. Neilsen Computer Science Department, Oklahoma State University, Stillwater, OK 74078, USA Michel Raynaly IRISA, |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/conc_measure92.ps, 19960806 Synchronization and Concurrency Measures for Distributed Computations Michel Raynal Masaaki Mizuno Mitchell L. Neilsen IRISA Dept. of Computing and Info. Sciences Campus de Beaulieu Kansas State University 35042 Rennes-C edex, FRANCE Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/token_mx91.ps, 19960806 A Token Based Distributed Mutual Exclusion Algorithm based on Quorum Agreements Masaaki Mizuno* Mitchell L. Neilsen Raghavendra Rao Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/icdcs96.ps, 19960806 Lock Based Self-Stabilizing Distributed Mutual Exclusion Algorithms Masaaki Mizuno Mikhail Nesterenko Hirotsugu Kakugaway Dept. of Comp. and Info. Sciences Dept. of Elect. Engineering Kansas State University Hiroshima University Manhattan, Kansas 66506 Higashi-Hiroshima, Japan |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/sc_theory95.ps, 19960806 Sequential Consistency in Distributed Systems Masaaki Mizuno1 Michel Raynal2 James Z. Zhou1 1 Dept. of Computing and Info. Sciences, Kansas State University, Manhattan, KS 66506. 2 IRISA, Campus de Beaulieu, 35042 Rennes Cedex, France |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/dag91.ps, 19960806 A Dag-Based Algorithm for Distributed Mutual Exclusion Mitchell L. Neilsen Masaaki Mizuno Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/icdcs96.ps, 19960806 Lock Based Self-Stabilizing Distributed Mutual Exclusion Algorithms Masaaki Mizuno Mikhail Nesterenko Hirotsugu Kakugaway Dept. of Comp. and Info. Sciences Dept. of Elect. Engineering Kansas State University Hiroshima University Manhattan, Kansas 66506 Higashi-Hiroshima, Japan |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/flow89.ps, 19960806 A LEAST FIXED POINT APPROACH TO INTER-PROCEDURAL INFORMATION FLOW CONTROL Masaaki Mizuno Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 masaaki@ksuvax1.cis.ksu.edu 1. Introduction Information flow control regulates the flow of information between |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/dag91.ps, 19960806 A Dag-Based Algorithm for Distributed Mutual Exclusion Mitchell L. Neilsen Masaaki Mizuno Department of Computing and Information Sciences Kansas State University Manhattan, Kansas 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/coordabs.ps, 19960808 High-Level Coordination Abstractions in Stock Languages CIS TR 96-9 Matthew B. Dwyer Matthew J. Craig Department of Computing and Information Sciences Kansas State University 234 Nichols Hall Manhattan, KS 66506 (913) 532-6350 dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/coordabs.ps, 19960808 High-Level Coordination Abstractions in Stock Languages CIS TR 96-9 Matthew B. Dwyer Matthew J. Craig Department of Computing and Information Sciences Kansas State University 234 Nichols Hall Manhattan, KS 66506 (913) 532-6350 dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/cis842/lecture1.ps.gz, 19960821 CIS 842 Specification and Verification of Reactive Systems Matthew B. Dwyer Office: 324e Nichols Hall Email: dwyer@cis.ksu.edu Web: http://www.cis.ksu.edu/ dwyer Phone: (913)532-6350 FAX: (913)532-7353 Hours: MW 2:30-3:30,Thu 2-3 Requirements You'll need WWW access to get to the class web pages You'll |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/ln.ps, 19960904 Lecture Notes for Logical Foundations of Programming CIS 301 MICHAEL HUTH Department of Computing and Information Sciences Kansas State University Fall 1996 September 3, 1996 ii Contents 1 Propositional Logic 3 1.1 Natural Deduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1.1 Declarative |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Unger/tr96-8.ps, 19960923 Event Specification and Detection Robert J. Zhang Elizabeth A. Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-96-8 June, 1996 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Unger/tr96-8.ps, 19960923 Event Specification and Detection Robert J. Zhang Elizabeth A. Unger Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 {jzhang, beth}@cis.ksu.edu TR CS-96-8 June, 1996 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/FALL96/README.ps, 19961002 A SIMPLE FILE TRANSFER PROTOCOL This program transfers a text file from the Sender to the Receiver using UDP. In order to simulate a lossy channel, there is a Channel process which discards packets at random. The following diagram shows the processes in the Simple File Transfer Protocol. The Sender |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/leno1.ps, 19961006 Chapter 2 Predicate Logic 2.1 The Need for a Richer Logic In the first chapter we developed propositional logic by examining it from three different angles: its proof theory (the natural deduction calculus), its syntax (the tree-like nature of formulas) and its semantics (what these formulas actually |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/boston2.ps.Z, 19961007 On the Need for a Popular Formal Semantics David A. Schmidt Kansas State University Classical music faces a dilemma: as its practitioners specialize into new realms, the field's present-day popularity rests upon the tried-and-true war horses from centuries ago. Among the general populace, there is |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/boston2.ps.Z, 19961007 On the Need for a Popular Formal Semantics David A. Schmidt Kansas State University Classical music faces a dilemma: as its practitioners specialize into new realms, the field's present-day popularity rests upon the tried-and-true war horses from centuries ago. Among the general populace, there is |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/flpd.ps, 19961018 A FUZZY LOWER POWERDOMAIN MICHAEL HUTH Department of Computing and Information Sciences, Kansas State University, Manhattan, KS 66506, USA The power set of a domain D can be seen as the function space D ! 2 of all functions in the pointwise order. One computational version thereof is the lifted lower |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/flpd.ps, 19961018 A FUZZY LOWER POWERDOMAIN MICHAEL HUTH Department of Computing and Information Sciences, Kansas State University, Manhattan, KS 66506, USA The power set of a domain D can be seen as the function space D ! 2 of all functions in the pointwise order. One computational version thereof is the lifted lower |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/leno2.ps, 19961021 2.3. SEMANTICS OF PREDICATE LOGIC 75 is as follows. Let I be an interpretation satisfying 8x (P (x) ! Q(x)). We need to show that I satisfies (8x P (x)) ! (8x Q(x)) as well. Inspecting the definition of I j= 1 ! 2 we see that we are done if not every element of our model satisfies P . Otherwise, every |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Stoughton/kripke/kripke.ps.gz, 19961022 Kripke: a Countermodel Checker for Intuitionistic Propositional Logic Christian Haack Department of Computing and Information Sciences Kansas State University 234 Nichols Hall Manhattan, Kansas 66506, U.S.A. haack@cis.ksu.edu October 22, 1996 The file kripke.sml" contains an ML-program that generates a |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Stoughton/kripke/kripke.ps.gz, 19961022 Kripke: a Countermodel Checker for Intuitionistic Propositional Logic Christian Haack Department of Computing and Information Sciences Kansas State University 234 Nichols Hall Manhattan, Kansas 66506, U.S.A. haack@cis.ksu.edu October 22, 1996 The file kripke.sml" contains an ML-program that generates a |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/lomaps96.ps.Z, 19961104
|
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/lomaps96.ps.Z, 19961104
|
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/boston3.ps.Z, 19961112 On the Need for a Popular Formal Semantics David A. Schmidt Kansas State University Computing and Information Sciences Department Manhattan, KS 66506 USA The technology transfer from semantics research to mainstream computing has been hampered by specialization of techniques at the expense of |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/boston3.ps.Z, 19961112 On the Need for a Popular Formal Semantics David A. Schmidt Kansas State University Computing and Information Sciences Department Manhattan, KS 66506 USA The technology transfer from semantics research to mainstream computing has been hampered by specialization of techniques at the expense of |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Plexousakis/tr9617.ps, 19961223 Accommodating Integrity Constraints During Database Design * Dimitris Plexousakis Department of Computing and Information Sciences Kansas State University, Manhattan, KS 66506. E-mail: dimitris@cis.ksu.edu John Mylopoulos Department of Computer Science University of Toronto, Toronto, Ont. M5S 1A4, |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Plexousakis/tr9617.ps, 19961223 Accommodating Integrity Constraints During Database Design * Dimitris Plexousakis Department of Computing and Information Sciences Kansas State University, Manhattan, KS 66506. E-mail: dimitris@cis.ksu.edu John Mylopoulos Department of Computer Science University of Toronto, Toronto, Ont. M5S 1A4, |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/qspm.ps, 19970115 Quantitative Semantics and Possibility Measures Reinhold Heckmann and Michael Huth FB 14 { Informatik, Universit at des Saarlandes Geb. 45, Postfach 151150, D-66041 Saarbr ucken, Germany heckmann@cs.uni-sb.de and Department of Computing and Information Sciences Kansas State University, Manhattan, |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/qspm.ps, 19970115 Quantitative Semantics and Possibility Measures Reinhold Heckmann and Michael Huth FB 14 { Informatik, Universit at des Saarlandes Geb. 45, Postfach 151150, D-66041 Saarbr ucken, Germany heckmann@cs.uni-sb.de and Department of Computing and Information Sciences Kansas State University, Manhattan, |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/ex3.ps, 19970117 Exam #3, CIS 301 December 18, 1996 1. Let OE be the formula 8x8y9z (R(x; y) ! R(y; z)) where R is a predicate symbol of two arguments. (a) Let A = fa; b; c; dg and RI = f(b; c); (b; b); (b; a)g. Do we have I j= OE Justify your answer whatever it will be! (b) Let A0 = fa; b; cg and RI0 = f(b; c); (a; b); |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/ex1.ps, 19970117 Exam #1, CIS 301 September 30, 1996 This is on open book exam. You may use any material you wish to use, except any electronic devices (especially those containing theorem proving software!). 1. Find proofs for the following sequents: (i) ` P ! (Q ! P ) (ii) :P ` P ! Q (iv) R; P ! (R ! Q) ` P ! (Q ^ R) |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/ex1.ps, 19970117 Exam #1, CIS 301 September 30, 1996 This is on open book exam. You may use any material you wish to use, except any electronic devices (especially those containing theorem proving software!). 1. Find proofs for the following sequents: (i) ` P ! (Q ! P ) (ii) :P ` P ! Q (iv) R; P ! (R ! Q) ` P ! (Q ^ R) |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/ex3.ps, 19970117 Exam #3, CIS 301 December 18, 1996 1. Let OE be the formula 8x8y9z (R(x; y) ! R(y; z)) where R is a predicate symbol of two arguments. (a) Let A = fa; b; c; dg and RI = f(b; c); (b; b); (b; a)g. Do we have I j= OE Justify your answer whatever it will be! (b) Let A0 = fa; b; cg and RI0 = f(b; c); (a; b); |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/ex2.ps, 19970117 Exam #2, CIS 301 November 6, 1996 This is an open book exam. If you have questions about the phrasing of the problems below, please ask! I will try to clarify any ambiguities arising. Make sure that you begin working on a problem only after you have fully understood what exactly you are supposed to do. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/ex2.ps, 19970117 Exam #2, CIS 301 November 6, 1996 This is an open book exam. If you have questions about the phrasing of the problems below, please ask! I will try to clarify any ambiguities arising. Make sure that you begin working on a problem only after you have fully understood what exactly you are supposed to do. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw1.ps, 19970129 Homework #1, CIS 301, Spring 1997 Instructor: MICHAEL HUTH Due Date: February 5, 1997; before class This assignment has 10 problems worth one point each (= total of 10 points). 1. Use :, !, ^ and _ to express the following declarative phrases in symbolic logic; in each case state what your respective |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/hw1.ps, 19970129 Homework #1, CIS 301, Spring 1997 Instructor: MICHAEL HUTH Due Date: February 5, 1997; before class This assignment has 10 problems worth one point each (= total of 10 points). 1. Use :, !, ^ and _ to express the following declarative phrases in symbolic logic; in each case state what your respective |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw2.ps, 19970207 Homework #2, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Wednesday, Feb 12, 1997; before class Find proofs for the following sequents (each proof is worth two points): 1. P _ Q ` R ! ((P _ Q) ^ R) 2. (P ^ Q) _ (P ^ R) ` P ^ (Q _ R) 3. ` (P ! Q) ! ((R ! S) ! (P ^ R ! Q ^ S)); here you might |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw3.ps, 19970212 Homework #3, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Wednesday, Feb 19, 1997; before class 1. (0:5 points each) Given the following formulas draw their corresponding parse tree: (a) Q (b) ((S _ (:P )) ! (:P )) (c) (S _ ((:P ) ! (:P ))) (d) (((S ! (R _ L)) _ ((:Q) ^ R)) ! ((:(P ! S)) ! |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/pdpm.ps, 19970214 MFPS X111 (1997) pages A Powerdomain of Possibility Measures Michael Huth Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA E. N. T. C. S. Elsevier Science B. V. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/pdpm.ps, 19970214 MFPS X111 (1997) pages A Powerdomain of Possibility Measures Michael Huth Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA E. N. T. C. S. Elsevier Science B. V. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw4.ps, 19970215 Homework #4, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Wednesday, Feb 26, 1997; before class Announcement: The revised line schedule states that our Final Exam will be on Friday, May 16, from 4:10 PM until 6:00 PM in N122 (our usual class room). Our First Exam (open book) will be on |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/ex971.ps, 19970226 Exam #1, CIS 301, Spring 1997 Instructor: MICHAEL HUTH This is an open book exam. You have 50 minutes for solving these problems. 1. Use :, !, ^ and _ to express the following declarative phrases in propositional logic; in each case state what your respective propositional atoms P , Q, etc. mean: (a) If |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/ex971.ps, 19970226 Exam #1, CIS 301, Spring 1997 Instructor: MICHAEL HUTH This is an open book exam. You have 50 minutes for solving these problems. 1. Use :, !, ^ and _ to express the following declarative phrases in propositional logic; in each case state what your respective propositional atoms P , Q, etc. mean: (a) If |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/wdag96.ps, 19970305 A Timestamp Based Transformation of Self-Stabilizing Programs for Distributed Computing Environments Masaaki Mizuno1 and Hirotsugu Kakugawa2 1 Dept. of Comp. and Info. Sci. Kansas State University, Manhattan, KS 66506 2 Dept. of Elect. Engineering, Hiroshima University, Higashi-Hiroshima, Japan |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/wdag96.ps, 19970305 A Timestamp Based Transformation of Self-Stabilizing Programs for Distributed Computing Environments Masaaki Mizuno1 and Hirotsugu Kakugawa2 1 Dept. of Comp. and Info. Sci. Kansas State University, Manhattan, KS 66506 2 Dept. of Elect. Engineering, Hiroshima University, Higashi-Hiroshima, Japan |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw5.ps, 19970310 Homework #5, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Wednesday, March 19, 1997; before class Announcement: There will be no class on Wednesday, March 12, and on Friday, March 14. 1. Let m; h; b; a be constants. Further, let F; M;H; S; B be predicate symbols, each with two arguments. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Students/HoweMethod.ps, 19970312 A formal generalization of Howe's method Sergey V. Kotov Report TR-CS-97-3 Kansas State University Department of Computing and Information Sciences Nichols Hall kotov@cis.ksu.edu March 10, 1997 This work is supported by NSF Grant CCR-9302962 1 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Students/HoweMethod.ps, 19970312 A formal generalization of Howe's method Sergey V. Kotov Report TR-CS-97-3 Kansas State University Department of Computing and Information Sciences Nichols Hall kotov@cis.ksu.edu March 10, 1997 This work is supported by NSF Grant CCR-9302962 1 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/qamc.ps, 19970320 Quantitative Analysis and Model Checking Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA huth@cis.ksu.edu Marta Kwiatkowska School of Computer Science University of Birmingham, Edgbaston, B15 2TT, United Kingdom mzk@cs.bham.ac.uk |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/lics97.ps, 19970320 Quantitative Analysis and Model Checking Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA huth@cis.ksu.edu Marta Kwiatkowska School of Computer Science University of Birmingham, Edgbaston, B15 2TT, United Kingdom mzk@cs.bham.ac.uk |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/lics97.ps, 19970320 Quantitative Analysis and Model Checking Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA huth@cis.ksu.edu Marta Kwiatkowska School of Computer Science University of Birmingham, Edgbaston, B15 2TT, United Kingdom mzk@cs.bham.ac.uk |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/afps.ps, 19970320 On the Approximation of Denotational Mu-Semantics Michael Huth Department of Computing and Information Sciences Kansas State University March 19, 1997 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/qamc.ps, 19970320 Quantitative Analysis and Model Checking Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA huth@cis.ksu.edu Marta Kwiatkowska School of Computer Science University of Birmingham, Edgbaston, B15 2TT, United Kingdom mzk@cs.bham.ac.uk |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/afps.ps, 19970320 On the Approximation of Denotational Mu-Semantics Michael Huth Department of Computing and Information Sciences Kansas State University March 19, 1997 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Hankley/Clark.ps, 19970401 April 1, 1997 page 1 A Theory of Types for Natural Language Processing |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Hankley/Clark.ps, 19970401 April 1, 1997 page 1 A Theory of Types for Natural Language Processing |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw7.ps, 19970402 Homework #7, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Wednesday, April 9, 1997; before class Let zero and one be constants, + and two function symbols with two arguments. Additionally, we consider a predicate symbols P with one argument and predicate symbols <, and = with two arguments. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/hw6.ps, 19970402 Homework #6, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Wednesday, April 2, 1997; before class Announcement: Have a nice Spring Break! 1. Consider the parsetree of the predicate logic formula OE in the Figure on the back. (a) Specify the free and bound occurrences of variables in OE. (b) |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/hw7.ps, 19970402 Homework #7, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Wednesday, April 9, 1997; before class Let zero and one be constants, + and two function symbols with two arguments. Additionally, we consider a predicate symbols P with one argument and predicate symbols <, and = with two arguments. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw6.ps, 19970402 Homework #6, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Wednesday, April 2, 1997; before class Announcement: Have a nice Spring Break! 1. Consider the parsetree of the predicate logic formula OE in the Figure on the back. (a) Specify the free and bound occurrences of variables in OE. (b) |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/fpags.ps, 19970410 A Framework for Parallel Adaptive Grid Simulations * KSU CIS TR 97-5 Matthew B. Dwyer and Virgil Wallentine Department of Computing and Information Sciences Kansas State University 234 Nichols Hall Manhattan, KS 66506 (913) 532-6350 dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/tr96-12.ps, 19970410 A Protocol for Weak Virtual Synchrony Yiwei Chiao Masaaki Mizuno Hemang Nadkarni Dept. of Computing and Info. Sciences Kansas State University Manhattan, KS 66506. |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/tr96-12.ps, 19970410 A Protocol for Weak Virtual Synchrony Yiwei Chiao Masaaki Mizuno Hemang Nadkarni Dept. of Computing and Info. Sciences Kansas State University Manhattan, KS 66506. |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/fpags.ps, 19970410 A Framework for Parallel Adaptive Grid Simulations * KSU CIS TR 97-5 Matthew B. Dwyer and Virgil Wallentine Department of Computing and Information Sciences Kansas State University 234 Nichols Hall Manhattan, KS 66506 (913) 532-6350 dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw8.ps, 19970414 Homework #8, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Monday, April 21, 1997; before class 1. (2 points each) Prove the following sequents in predicate logic, where P and Q are predicates with one argument: (a) 8x (P (x) ^ Q(x)) ` 8x (P (x) ! Q(x)) (b) 9x (:P (x) ^ :Q(x)) ` 9x (:(P (x) ^ |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/hw8.ps, 19970414 Homework #8, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Monday, April 21, 1997; before class 1. (2 points each) Prove the following sequents in predicate logic, where P and Q are predicates with one argument: (a) 8x (P (x) ^ Q(x)) ` 8x (P (x) ! Q(x)) (b) 9x (:P (x) ^ :Q(x)) ` 9x (:(P (x) ^ |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/hw9.ps, 19970428 Homework #9, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Monday, April 28, 1997; before class We let Atoms = fP; Q; R; S; Tg be the set of propositional atoms for all systems of this set of exercises. 1. (0.5 points each) Please specify which formulas below are valid CTL formulas and draw a |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/ann.ps, 19970428 Final Announcements for CIS 301, Spring 1997 Instructor: Michael Huth 1. The deadline for HW#9 has been extended to Friday, May 3, before class. 2. The figure for HW#9 does not tell you which state is s0; this should be the top state with L(s0) = fR; Tg. To streamline the grading process let us say that |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/ann.ps, 19970428 Final Announcements for CIS 301, Spring 1997 Instructor: Michael Huth 1. The deadline for HW#9 has been extended to Friday, May 3, before class. 2. The figure for HW#9 does not tell you which state is s0; this should be the top state with L(s0) = fR; Tg. To streamline the grading process let us say that |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/hw9.ps, 19970428 Homework #9, CIS 301, Spring 1997 Instructor: Michael Huth Due Date: Monday, April 28, 1997; before class We let Atoms = fP; Q; R; S; Tg be the set of propositional atoms for all systems of this set of exercises. 1. (0.5 points each) Please specify which formulas below are valid CTL formulas and draw a |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/ex972.ps, 19970429 Exam #2, CIS 301, Spring 1997 Instructor: MICHAEL HUTH April 29, 1997 1. Let ffl be a constant symbol. Let head, reverse, and tail be function symbols with one argument; let be a function symbol with two arguments. Further, let = and <= be predicate symbols with two arguments. We interpret these symbols |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/ex972.ps, 19970429 Exam #2, CIS 301, Spring 1997 Instructor: MICHAEL HUTH April 29, 1997 1. Let ffl be a constant symbol. Let head, reverse, and tail be function symbols with one argument; let be a function symbol with two arguments. Further, let = and <= be predicate symbols with two arguments. We interpret these symbols |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/ooca.ps, 19970606 Object-Oriented Coordination Abstractions for Parallel Software * Matthew B. Dwyer and Virgil Wallentine Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 Abstract Abstraction is a fundamental concept in software engineering. In this paper, we describe how |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/ooca.ps, 19970606 Object-Oriented Coordination Abstractions for Parallel Software * Matthew B. Dwyer and Virgil Wallentine Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 Abstract Abstraction is a fundamental concept in software engineering. In this paper, we describe how |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/mcgui.ps, 19970609 Model Checking Graphical User Interfaces Using Abstractions* Matthew B. Dwyer, Vicki Carr, Laura Hines Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/mcgui.ps, 19970609 Model Checking Graphical User Interfaces Using Abstractions* Matthew B. Dwyer, Vicki Carr, Laura Hines Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/wss97.ps, 19970613 Development of Self-Stabilizing Distributed Algorithms using Transformation: Case Studies Hirotsugu Kakugawa 1 Masaaki Mizuno2 Mikhail Nesterenko2 1 Research Institute for Information Science and Education, Hiroshima University, Higashi-Hiroshima, Japan. E-mail: kakugawa@se.hiroshima-u.ac.jp 2 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/wss97.ps, 19970613 Development of Self-Stabilizing Distributed Algorithms using Transformation: Case Studies Hirotsugu Kakugawa 1 Masaaki Mizuno2 Mikhail Nesterenko2 1 Research Institute for Information Science and Education, Hiroshima University, Higashi-Hiroshima, Japan. E-mail: kakugawa@se.hiroshima-u.ac.jp 2 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/wjse97-poster.ps, 19970620 A Framework for Parallel Adaptive Grid Simulations (POSTER) * Matthew B. Dwyer and Virgil Wallentine Department of Computing and Information Sciences Kansas State University dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/wjse97-poster.ps, 19970620 A Framework for Parallel Adaptive Grid Simulations (POSTER) * Matthew B. Dwyer and Virgil Wallentine Department of Computing and Information Sciences Kansas State University dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Zamfir-Bleyberg/nlksu.ps, 19970626 SENSE TYPED >=-CALCULUS FOR NATURAL LANGUAGE PROCESING Maria Zamfir Bleyberg Clark Sexton Bill Hankley Computing and Information Sciences Department Kansas State University Manhattan, KS, 66506 fmaria,sexton,hankleyg@cis.ksu.edu June 26, 1997 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Zamfir-Bleyberg/nlksu.ps, 19970626 SENSE TYPED >=-CALCULUS FOR NATURAL LANGUAGE PROCESING Maria Zamfir Bleyberg Clark Sexton Bill Hankley Computing and Information Sciences Department Kansas State University Manhattan, KS, 66506 fmaria,sexton,hankleyg@cis.ksu.edu June 26, 1997 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/ta.ps, 19970717 Quantitative Semantics, Topology, and Possibility Measures Reinhold Heckmann FB 14 { Informatik, Universit at des Saarlandes, Postfach 151150, D-66041 Saarbr ucken, Germany Michael Huth Department of Computing and Information Sciences, Kansas State University, Manhattan, KS 66506, USA |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/ta.ps, 19970717 Quantitative Semantics, Topology, and Possibility Measures Reinhold Heckmann FB 14 { Informatik, Universit at des Saarlandes, Postfach 151150, D-66041 Saarbr ucken, Germany Michael Huth Department of Computing and Information Sciences, Kansas State University, Manhattan, KS 66506, USA |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/csl.ps, 19970723 A Duality Theory for Quantitative Semantics Reinhold Heckmann FB 14 Informatik, Universit at des Saarlandes Geb. 45, Postfach 151150, D-66041 Saarbr ucken, Germany heckmann@cs.uni-sb.de Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/csl.ps, 19970723 A Duality Theory for Quantitative Semantics Reinhold Heckmann FB 14 Informatik, Universit at des Saarlandes Geb. 45, Postfach 151150, D-66041 Saarbr ucken, Germany heckmann@cs.uni-sb.de Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/cpe97.ps, 19970725 A Framework for Parallel Adaptive Grid Simulations * Matthew B. Dwyer and Virgil Wallentine Department of Computing and Information Sciences Kansas State University 234 Nichols Hall Manhattan, KS 66506 (913) 532-6350 dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/cpe97.ps, 19970725 A Framework for Parallel Adaptive Grid Simulations * Matthew B. Dwyer and Virgil Wallentine Department of Computing and Information Sciences Kansas State University 234 Nichols Hall Manhattan, KS 66506 (913) 532-6350 dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/aapf.ps, 19970829 Automated Analysis of Software Frameworks (Position Paper) Matthew B. Dwyer Dept. of Computing and Information Science Kansas State University 234 Nichols Hall Manhattan, KS 66506 USA Tel: (913) 532-6350 Fax: (913) 532-7353 Email: dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/aapf.ps, 19970829 Automated Analysis of Software Frameworks (Position Paper) Matthew B. Dwyer Dept. of Computing and Information Science Kansas State University 234 Nichols Hall Manhattan, KS 66506 USA Tel: (913) 532-6350 Fax: (913) 532-7353 Email: dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/spatterns.ps, 19970905 Property Specification Patterns for Finite-State Verification Matthew B. Dwyer Kansas State Universityy George S. Avrunin University of Massachusettsz James C. Corbett University of Hawaiix |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/driving.ps.Z, 19970906 Partial Evaluation of Higher-Order Natural-Semantics Derivations Husain I. Ibraheem and David A. Schmidt Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/driving.ps.Z, 19970906 Partial Evaluation of Higher-Order Natural-Semantics Derivations Husain I. Ibraheem and David A. Schmidt Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/modular.ps, 19970914 Modular Flow Analysis for Concurrent Software Matthew B. Dwyer Department of Computing and Information Sciences Kansas State University dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/modflow.ps, 19970914 Modular Flow Analysis for Concurrent Software Matthew B. Dwyer Department of Computing and Information Sciences Kansas State University dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/modflow.ps, 19970914 Modular Flow Analysis for Concurrent Software Matthew B. Dwyer Department of Computing and Information Sciences Kansas State University dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/modular.ps, 19970914 Modular Flow Analysis for Concurrent Software Matthew B. Dwyer Department of Computing and Information Sciences Kansas State University dwyer@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Singh/FALL97/README.ps, 19970918 A SIMPLE FILE TRANSFER PROTOCOL This program transfers a text file from the Sender to the Receiver using UDP. In order to simulate a lossy channel, there is a Channel process which discards packets at random. The following diagram shows the processes in the Simple File Transfer Protocol. The Sender |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Singh/FALL97/README.ps, 19970918 A SIMPLE FILE TRANSFER PROTOCOL This program transfers a text file from the Sender to the Receiver using UDP. In order to simulate a lossy channel, there is a Channel process which discards packets at random. The following diagram shows the processes in the Simple File Transfer Protocol. The Sender |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/filter.ps.Z, 19970919 Limiting State Explosion with Filter-Based Refinement Matthew B. Dwyer and David A. Schmidt Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/tr97-14.ps, 19970924 A Transformation of Self-Stabilizing Serial Model Programs for Asynchronous Parallel Computing Environments Masaaki Mizuno Mikhail Nesterenko Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA fmasaaki,mikhailg@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/pdcs97.ps, 19971002 A Protocol for Weak Virtual Synchrony Yiwei Chiao Masaaki Mizuno Hemang Nadkarni Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Dwyer/papers/pefsv.ps, 19971002 Using Partial Evaluation to Enable Verification of Concurrent Software Matthew Dwyer John Hatcliffy Muhammad Nandaz |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/pefsv.ps, 19971002 Using Partial Evaluation to Enable Verification of Concurrent Software Matthew Dwyer John Hatcliffy Muhammad Nandaz |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/pdcs97.ps, 19971002 A Protocol for Weak Virtual Synchrony Yiwei Chiao Masaaki Mizuno Hemang Nadkarni Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/pctl.ps, 19971009 Comparing CTL and PCTL on Labeled Markov Chains Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA huth@cis.ksu.edu Marta Kwiatkowska School of Computer Science University of Birmingham, Edgbaston, B15 2TT, United Kingdom mzk@cs.bham.ac.uk |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/pctl.ps, 19971009 Comparing CTL and PCTL on Labeled Markov Chains Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA huth@cis.ksu.edu Marta Kwiatkowska School of Computer Science University of Birmingham, Edgbaston, B15 2TT, United Kingdom mzk@cs.bham.ac.uk |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/dfa.ps.Z, 19971021 Data Flow Analysis is Model Checking of Abstract Interpretations David A. Schmidt Computing and Information Sciences Department Kansas State University0 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/dfa.ps.Z, 19971021 Data Flow Analysis is Model Checking of Abstract Interpretations David A. Schmidt Computing and Information Sciences Department Kansas State University0 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Zamfir-Bleyberg/mamdb.ps, 19971030 A CATEGORICAL VIEW OF DATABASES Maria Zamfir Bleyberg Computing and Information Sciences Department Kansas State University, Manhattan, KS 66506-2302, USA |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Zamfir-Bleyberg/mamdb.ps, 19971030 A CATEGORICAL VIEW OF DATABASES Maria Zamfir Bleyberg Computing and Information Sciences Department Kansas State University, Manhattan, KS 66506-2302, USA |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Huth/idmm.ps, 19971121 The Interval Domain: A Matchmaker for aCTL and aPCTL Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA huth@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Huth/idmm.ps, 19971121 The Interval Domain: A Matchmaker for aCTL and aPCTL Michael Huth Department of Computing and Information Sciences Kansas State University, Manhattan, KS66506, USA huth@cis.ksu.edu |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Dwyer/papers/spatterns.ps, 19971123 Property Specification Patterns for Finite-State Verification Matthew B. Dwyer Kansas State University Department of Computing and Information Sciences 234 Nichols Hall Manhattan, KS 66506-2302 dwyer@cis.ksu.edu George S. Avrunin University of Massachusetts Department of Mathematics and Statistics Box |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Howell/papers/ssbv.ps.gz, 19980109 Finite-State Self-Stabilizing Protocols in Message-Passing Systems Rodney R. Howell Mikhail Nesterenko Masaaki Mizuno Dept. of Computing and Information Sciences Kansas State University Manhattan, KS 66506 January 9, 1998 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Howell/papers/ssbv.ps.gz, 19980109 Finite-State Self-Stabilizing Protocols in Message-Passing Systems Rodney R. Howell Mikhail Nesterenko Masaaki Mizuno Dept. of Computing and Information Sciences Kansas State University Manhattan, KS 66506 January 9, 1998 |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Mizuno/tr98-1.ps, 19980114 Finite-State Self-Stabilizing Protocols in Message-Passing Systems Rodney R. Howell Mikhail Nesterenko Masaaki Mizuno Dept. of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/tr98-1.ps, 19980114 Finite-State Self-Stabilizing Protocols in Message-Passing Systems Rodney R. Howell Mikhail Nesterenko Masaaki Mizuno Dept. of Computing and Information Sciences Kansas State University Manhattan, KS 66506 |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Schmidt/papers/aiosh.ps.Z, 19980122 Trace-Based Abstract Interpretation of Operational Semantics David A. Schmidt Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/CIS/Schmidt/papers/aiosh.ps.Z, 19980122 Trace-Based Abstract Interpretation of Operational Semantics David A. Schmidt Kansas State University |
 | ftp://ftp.cis.ksu.edu/pub/techreports/Mizuno/tr97-14.ps, 19980128 A Transformation of Self-Stabilizing Serial Model Programs for Asynchronous Parallel Computing Environments Masaaki Mizuno Mikhail Nesterenko Department of Computing and Information Sciences Kansas State University Manhattan, KS 66506, USA fmasaaki,mikhailg@cis.ksu.edu |