2003/2/23conversation pattern figures1 Figures in connection with Conversation Patterns November 19, 2002.

Slides:



Advertisements
Similar presentations
1 University of Pennsylvania Grigoris Karvounarakis February 2004 Conversation Specification: A New Approach to Design and Analysis of E- Service Composition.
Advertisements

IP Multimedia Subsystem (IMS) 江培文. Agenda Background IMS Definition IMS Architecture IMS Entities IMS-CS Interworking.
Programming the TM qa  (,q) (,q) q1q1 0q1q1 R q1q1 1q1q1 R q1q1  h  Qa  (,q) (,q) q1q1 0q2q2  q1q1 1q3q3  q1q1  h  q2q2 0q4q4 R q2q2 1q4q4.
1 Homework #6 (Models of Computation, Spring, 2001) Due: Section 1; March 29 Section 2; March Let L be the language of the following grammar G 1.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
Key to Homework #2 1. What is the language of L-system G = ({a, b, c}, h, acb ), where the rewriting rule h is defined as follows: h (a) = aa h (b) = cb.
Fall 2006Costas Busch - RPI1 Non-Deterministic Finite Automata.
CSC 361Finite Automata1. CSC 361Finite Automata2 Formal Specification of Languages Generators Grammars Context-free Regular Regular Expressions Recognizers.
Costas Busch - LSU1 Non-Deterministic Finite Automata.
Conversation Specification: A New Approach to Design and Specification of E-Service Composition T. Bultan X. Fu R. Hull J. Su University of California.
Finite State Machines Data Structures and Algorithms for Information Processing 1.
Finite-State Machines with No Output
1 Controlling My Office Temperature Let’s model when I’m happy with my office temperature. –Duncan Hall office thermostats are attached to count-down dial.
::ICS 804:: Theory of Computation - Ibrahim Otieno SCI/ICT Building Rm. G15.
Compiler Phases: Source program Lexical analyzer Syntax analyzer Semantic analyzer Machine-independent code improvement Target code generation Machine-specific.
Process Composition. Web Services: CSP/Pi-Calculus/Mealy 2 Process Composition Hierarchies Control: Centralized control: e.g., RPC/WSDL Mediated or orchestrated.
1 CD5560 FABER Formal Languages, Automata and Models of Computation Lecture 3 Mälardalen University 2010.
Review: Compiler Phases: Source program Lexical analyzer Syntax analyzer Semantic analyzer Intermediate code generator Code optimizer Code generator Symbol.
Copyright © Curt Hill Finite State Automata Again This Time No Output.
UNIT - I Formal Language and Regular Expressions: Languages Definition regular expressions Regular sets identity rules. Finite Automata: DFA NFA NFA with.
Automated Composition and Analysis. Web Services: Design and Analysis2 Automated Composition Given a specification of the composite service, find individual.
Lecture 16: Modeling Computation Languages and Grammars Finite-State Machines with Output Finite-State Machines with No Output.
Lecture 04: Theory of Automata:08 Transition Graphs.
1 Section 13.1 Turing Machines A Turing machine (TM) is a simple computer that has an infinite amount of storage in the form of cells on an infinite tape.
1 Turing Machines and Equivalent Models Section 13.1 Turing Machines.
using Deterministic Finite Automata & Nondeterministic Finite Automata
98 Nondeterministic Automata vs Deterministic Automata We learned that NFA is a convenient model for showing the relationships among regular grammars,
Chapter 5 Finite Automata Finite State Automata n Capable of recognizing numerous symbol patterns, the class of regular languages n Suitable for.
1 Chapter 3 Regular Languages.  2 3.1: Regular Expressions (1)   Regular Expression (RE):   E is a regular expression over  if E is one of:
1 Section 11.2 Finite Automata Can a machine(i.e., algorithm) recognize a regular language? Yes! Deterministic Finite Automata A deterministic finite automaton.
1 Chapter Pushdown Automata. 2 Section 12.2 Pushdown Automata A pushdown automaton (PDA) is a finite automaton with a stack that has stack operations.
Transparency No. 1 Formal Language and Automata Theory Homework 6.
1 Turing Machines. 2 The Language Hierarchy Regular Languages Context-Free Languages ? ?
Modeling Arithmetic, Computation, and Languages Mathematical Structures for Computer Science Chapter 8 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesAlgebraic.
WELCOME TO A JOURNEY TO CS419 Dr. Hussien Sharaf Dr. Mohammad Nassef Department of Computer Science, Faculty of Computers and Information, Cairo University.
Lecture # 21.
Computability Joke. Context-free grammars Parsing. Chomsky
Pushdown Automata.
Kleene’s Theorem and NFA
Transition Graphs.
Finite State Machines Dr K R Bond 2009
Finite-State Machines (FSMs)
Nondeterministic Finite Automata (NFA)
PDA’s - A new format for FAs
Finite-State Machines (FSMs)
CS314 – Section 5 Recitation 3
Pushdown Automata.
Chapter 7 PUSHDOWN AUTOMATA.
Pushdown Automata.
OTHER MODELS OF TURING MACHINES
Recognizer for a Language
Jaya Krishna, M.Tech, Assistant Professor
Chapter 2 FINITE AUTOMATA.
Context-Free Languages
A HIERARCHY OF FORMAL LANGUAGES AND AUTOMATA
Review: Compiler Phases:
Non-Deterministic Finite Automata
Chapter 14: Activity Diagrams
Intro to Data Structures
Midterm (Models of Computation, Fall, 2000)
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
ReCap Chomsky Normal Form, Theorem regarding CNF, examples of converting CFG to be in CNF, Example of an FA corresponding to Regular CFG, Left most and.
3GPP and SIP-AAA requirements
CSC312 Automata Theory Transition Graphs Lecture # 9
Recap lecture 37 New format for FAs, input TAPE, START, ACCEPT , REJECT, READ states Examples of New Format of FAs, PUSHDOWN STACK , PUSH and POP states,
Recap lecture 11 Proof of Kleene’s theorem part II (method with different steps), particular examples of TGs to determine corresponding REs.
NFAs and Transition Graphs
CSC312 Automata Theory Kleene’s Theorem Lecture # 12
LECTURE # 07.
Presentation transcript:

2003/2/23conversation pattern figures1 Figures in connection with Conversation Patterns November 19, 2002

2003/2/23conversation pattern figures2 Do until halt nondeterministic choice: read an input; send an output to some other peer; halt; end choice input queue A single peer... To other e-services

2003/2/23conversation pattern figures3 Peer 1 Peer 2 Peer n Watcher A representative e-composition, with watcher ……

2003/2/23conversation pattern figures4 Peer1 Peer2 Peer3 Peer4 Peer5 Watcher A representative e-composition, with watcher

2003/2/23conversation pattern figures5 Do until halt nondeterministic choice: read input letter and record; send output letter to some other peer and record; halt; end choice input queue A single peer Peer1 Peer2 Peer3 Peer4 Peer5 Watcher A representative e-composition, with watcher...

2003/2/23conversation pattern figures6 store ware- house2 bank ware- house1 o rder 1 okok r eceipt 1 o rder 2 r eceipt 2 b ill 2 p ayment 2 b ill 1 p ayment 1 a uthorize

2003/2/23conversation pattern figures7 “ warehouse ” example store ware- house2 bank ware- house1 o rder 1 okok r eceipt 1 o rder 2 r eceipt 2 b ill 2 p ayment 2 b ill 1 p ayment 1 a uthorize The language recognized (where shuff indicates the shuffle operator) a k shuff( ( o 1 (shuff( r 1, p 1 b 1 ) )*, ( o 2 (shuff( r 2, p 2 b 2 ) )* ) a| |k |o 1 |o 2 r2|r2| r1|r1| |o 1 r1|r1| r2|r2| Mealy peer implementation for store |a k| |p 1 |p 2 b2|b2| b1|b1| |p 1 b1|b1| b2|b2| Mealy peer implementation for bank o1|o1| Mealy peer implementation for warehouse1, assuming the inner shuffle operators |r 1 |b 1 p1|p1| p1|p1| |r 1 |b 1 ε|ε o1|o1| |b 1 p1|p1| |r 1 Mealy peer implementation for warehouse1, assuming no inner shuffle operator (i.e., accepted word is... (o 1 b 1 p 1 r 1 )*... Note: for my Mealy machines, an edge label “ w|v ” means that to traverse this edge the machine must read word w from input and produce word v as output (the channel used for v is not shown). If w or v are empty word, then it may be shown or left blank. Note that in the Mealy peer implementations, the channel name and the message name are identical. So we write, e.g., “ |a ” rather than “ |a:a ”

2003/2/23conversation pattern figures8 ?a?a !k!k !o1!o1 !o2!o2 ?r2?r2 ?r1?r1 !o2!o2 !o1!o1 ?r1?r1 ?r2?r2 Store !a!a ?k?k !p1!p1 !p2!p2 ?b2?b2 ?b1?b1 !p2!p2 !p1!p1 ?b1?b1 ?b2?b2 Bank ?o1?o1 Warehouse1 !r1!r1 !b1!b1 ?p1?p1 ?p1?p1 !r1!r1 !r1!r1 !b1!b1  Note that in the Mealy peer implementations, the channel name and the message name are identical. So we write, e.g., “ |a ” rather than “ |a:a ”

2003/2/23conversation pattern figures9 XY Z a b e-composition whose CPL is { w | |  a (w)| = |  b (w)|, and for each prefix v of w, |  a (v)|  |  b (v)| } assuming that the following Mealy peers are used. |a a|b b| for Xfor Yfor Z Note: The resulting CPL is context-free but not regular. This is easily extended to create a machine that accepts a CPL that is context-sensitive but not context free (essentially a n b n c n ), In the paper, let ’ s present the above example and use it to illustrate notion of “ pre-pone ”. The above example is easily generalized to get the a n b n c n case.

2003/2/23conversation pattern figures10 simplified “ warehouse ” example store bank ware- house o rder okok r eceipt b ill p ayment a uthorize The language recognized (where shuff indicates the shuffle operator) a k ( o (shuff( r, p b ) )*) o r b p p r r b ε a fsa accepting the CPL for simplified warehouse example (I think) (Don ’ t need to use pre-pone in this particular case, I think) (can construct Mealy peers from this, but I ran out of time...)

2003/2/23conversation pattern figures11 p1p1 p2p2 c 1  p 1,p 2,  a  ?b?b !a!a p1p1 !b!b p2p2 ?a?a c 2  p 2,p 1,  b 

2003/2/23conversation pattern figures12 |a for X for Y for Z Intuition: X produces a bunch of a ’ s and then one b Y produces one c for each a Z is happy to consume the c ’ s, but it *must* consume the b first. so, to make an accepting execution of the e-composition, Y must “ wait ” until X has produced the b, before it can start to send c ’ s to Z. A Mealy e-composition accepting a n bc n (I think) |c a| |b c| b| X Y Z a c b

2003/2/23conversation pattern figures13 !a!a p1p1 !b!b !c!c ?a?a p2p2 ?c?c ?b?b p3p3 p1p1 p2p2 p3p3 c1c1 c2c2 c3c3 c 1  p 1,p 2,  a  c 2  p 1,p 3,  b  c 3  p 2,p 3,  c 

2003/2/23conversation pattern figures14 S-CSCF Service Call Session Control Function MRFC Media Resource Function Controller AppServer Application Server HSS Home Subscriber Service High-level architecture of proposed 3GPP IP Multimedia Core Network Subsystem (IMS)

2003/2/23conversation pattern figures15 Policy Administration Point Policy Repository Policy Decision Point Policy Enforcement Point Policy-enabled Application or Service Network Resources Policy Execution Point Relevant Data i.e., the Rules Engine Policy Management Infrastructure Policy-enabled Resources Typical reference architecture for policy enablement