The contents of this volume are application oriented. The volume contains a de tailed presentation of 19 applications of CP-nets, covering a broad range of ap plication areas. Most of the projects have been carried out in an industrial set ting. The volume presents the most important ideas and experiences from the projects, in a way which is useful also for readers who do not yet have personal experience with the construction and analysis of large CPN models. The volume demonstrates the feasibility of using CP-nets and the CPN tools for industrial projects. The presentation of the projects is…mehr
The contents of this volume are application oriented. The volume contains a de tailed presentation of 19 applications of CP-nets, covering a broad range of ap plication areas. Most of the projects have been carried out in an industrial set ting. The volume presents the most important ideas and experiences from the projects, in a way which is useful also for readers who do not yet have personal experience with the construction and analysis of large CPN models. The volume demonstrates the feasibility of using CP-nets and the CPN tools for industrial projects. The presentation of the projects is based upon material provided by the per sons who have accomplished the individual projects. At the beginning of each chapter, we list their names and we say where the original material has been published. The original material often contains more elaborate information, e.g., about details of the modelled system and related work. I have edited the material provided by the original authors. I have modified some of the CP-nets, e.g., to improve the layout and use more mnemonic names. In some cases, I have also changed a few net components, e.g., merged two tran sitions or introduced a Standard ML function for operations that are used in many arc expressions. These modifications make the CP-nets more appropriate as study material, but they do not change the essential behaviour of the CPN models.
Produktdetails
Produktdetails
Monographs in Theoretical Computer Science. An EATCS Series
1 Security System.- 1.1 Introduction to Security System.- 1.2 CPN Model of Security System.- 1.3 Simulation of Security System.- 1.4 Occurrence Graph Analysis of Security System.- 1.5 Implementation of Security System.- 1.6 Conclusions for Security System Project.- 2 UPC Algorithms in ATM Networks.- 2.1 Introduction to UPC Algorithms.- 2.2 CPN Model of UPC Algorithms.- 2.3 CPN Model of Traffic Sources.- 2.4 Simulation of UPC Algorithms.- 2.5 Conclusions for UPC Algorithms Project.- 3 Audio/Video System.- 3.1 Introduction to Audio/Video System.- 3.2 CPN Model of Audio/Video System.- 3.3 Simulation of Audio/Video System.- 3.4 Occurrence Graph Analysis of Audio/Video System.- 3.5 Conclusions for Audio/Video Project.- 4 Transaction Processing and Interconnect Fabric.- 4.1 Introduction to Transaction Processing.- 4.2 CPN Model of Transaction Processing.- 4.3 Introduction to Interconnect Fabric.- 4.4 CPN Model of Interconnect Fabric.- 4.5 Conclusions for Transactions and Interconnect Project.- 5 Mutual Exclusion Algorithm.- 5.1 Introduction to Mutual Exclusion Algorithm.- 5.2 CPN Model of Mutual Exclusion Algorithm.- 5.3 Occurrence Graph Analysis of Mutual Exclusion Algorithm.- 5.4 Conclusions for Mutual Exclusion Algorithm Project.- 6 ISDN Supplementary Services.- 6.1 Introduction to ISDN Supplementary Services.- 6.2 CPN Model of ISDN Supplementary Services.- 6.3 Validation of ISDN Supplementary Services.- 6.4 Conclusions for ISDN Supplementary Services Project.- 7 Intelligent Network.- 7.1 Introduction to Intelligent Network.- 7.2 CPN Model of Intelligent Network.- 7.3 Conclusions for Intelligent Network Project.- 8 Communications Gateway.- 8.1 Introduction to Communications Gateway.- 8.2 CPN Model of Communications Gateway.- 8.3 Conclusions for Communications Gateway Project.- 9 BRI Protocol in ISDN Networks.- 9.1 Introduction to BRI Protocol.- 9.2 CPN Model of BRI Protocol.- 9.3 Conclusions for BRI Protocol Project.- 10 VLSI Chip.- 10.1 Introduction to VLSI Chip.- 10.2 CPN Model of VLSI Chip.- 10.3 Conclusions for VLSI Chip Project.- 11 Arbiter Cascade.- 11.1 Introduction to Arbiter Cascade.- 11.2 CPN Model of Arbiter Cascade.- 11.3 Conclusions for Arbiter Cascade Project.- 12 Document Storage System.- 12.1 Introduction to Document Storage System.- 12.2 CPN Model of Document Storage System.- 12.3 Simulation of Document Storage System.- 12.4 Conclusions for Document Storage Project.- 13 Distributed Program Execution.- 13.1 Introduction to Distributed Program Execution.- 13.2 CPN Model of Distributed Program Execution.- 13.3 Verification of Distributed Program Execution.- 13.4 Conclusions for Distributed Program Execution Project.- 14 Electronic Funds Transfer System.- 14.1 Introduction to SADT.- 14.2 Introduction to Electronic Funds Transfer System.- 14.3 CPN Model of Electronic Funds Transfer System.- 14.4 Conclusions for Electronic Funds Transfer Project.- 15 Bank Courier Network.- 15.1 Introduction to Bank Courier Network.- 15.2 CPN Model of Bank Courier Network.- 15.3 Conclusions for Bank Courier Network Project.- 16 Network Management System.- 16.1 Introduction to Network Management System.- 16.2 CPN Model of Network Management System.- 16.3 Validation of Network Management System.- 16.4 Conclusions for Network Management Project.- 17 Naval Vessel.- 17.1 Introduction to Naval Vessel.- 17.2 CPN Model of Naval Vessel.- 17.3 Simulation of Naval Vessel.- 17.4 Conclusions for Naval Vessel Project.- 18 Chemical Production System.- 18.1 Introduction to Chemical Production System.- 18.2 CPN Model of Chemical Production System.- 18.3 Validation of Chemical Production System.- 18.4 Conclusions for Chemical Production Project.- 19 Nuclear Waste Management Programme.- 19.1 Introduction to Nuclear Waste Management Programme.- 19.2 CPN Model of Nuclear Waste Management Programme.- 19.3 Simulation of Nuclear Waste Management Programme.- 19.4 Conclusions for Nuclear Waste Management Project.- References.
1 Security System.- 1.1 Introduction to Security System.- 1.2 CPN Model of Security System.- 1.3 Simulation of Security System.- 1.4 Occurrence Graph Analysis of Security System.- 1.5 Implementation of Security System.- 1.6 Conclusions for Security System Project.- 2 UPC Algorithms in ATM Networks.- 2.1 Introduction to UPC Algorithms.- 2.2 CPN Model of UPC Algorithms.- 2.3 CPN Model of Traffic Sources.- 2.4 Simulation of UPC Algorithms.- 2.5 Conclusions for UPC Algorithms Project.- 3 Audio/Video System.- 3.1 Introduction to Audio/Video System.- 3.2 CPN Model of Audio/Video System.- 3.3 Simulation of Audio/Video System.- 3.4 Occurrence Graph Analysis of Audio/Video System.- 3.5 Conclusions for Audio/Video Project.- 4 Transaction Processing and Interconnect Fabric.- 4.1 Introduction to Transaction Processing.- 4.2 CPN Model of Transaction Processing.- 4.3 Introduction to Interconnect Fabric.- 4.4 CPN Model of Interconnect Fabric.- 4.5 Conclusions for Transactions and Interconnect Project.- 5 Mutual Exclusion Algorithm.- 5.1 Introduction to Mutual Exclusion Algorithm.- 5.2 CPN Model of Mutual Exclusion Algorithm.- 5.3 Occurrence Graph Analysis of Mutual Exclusion Algorithm.- 5.4 Conclusions for Mutual Exclusion Algorithm Project.- 6 ISDN Supplementary Services.- 6.1 Introduction to ISDN Supplementary Services.- 6.2 CPN Model of ISDN Supplementary Services.- 6.3 Validation of ISDN Supplementary Services.- 6.4 Conclusions for ISDN Supplementary Services Project.- 7 Intelligent Network.- 7.1 Introduction to Intelligent Network.- 7.2 CPN Model of Intelligent Network.- 7.3 Conclusions for Intelligent Network Project.- 8 Communications Gateway.- 8.1 Introduction to Communications Gateway.- 8.2 CPN Model of Communications Gateway.- 8.3 Conclusions for Communications Gateway Project.- 9 BRI Protocol in ISDN Networks.- 9.1 Introduction to BRI Protocol.- 9.2 CPN Model of BRI Protocol.- 9.3 Conclusions for BRI Protocol Project.- 10 VLSI Chip.- 10.1 Introduction to VLSI Chip.- 10.2 CPN Model of VLSI Chip.- 10.3 Conclusions for VLSI Chip Project.- 11 Arbiter Cascade.- 11.1 Introduction to Arbiter Cascade.- 11.2 CPN Model of Arbiter Cascade.- 11.3 Conclusions for Arbiter Cascade Project.- 12 Document Storage System.- 12.1 Introduction to Document Storage System.- 12.2 CPN Model of Document Storage System.- 12.3 Simulation of Document Storage System.- 12.4 Conclusions for Document Storage Project.- 13 Distributed Program Execution.- 13.1 Introduction to Distributed Program Execution.- 13.2 CPN Model of Distributed Program Execution.- 13.3 Verification of Distributed Program Execution.- 13.4 Conclusions for Distributed Program Execution Project.- 14 Electronic Funds Transfer System.- 14.1 Introduction to SADT.- 14.2 Introduction to Electronic Funds Transfer System.- 14.3 CPN Model of Electronic Funds Transfer System.- 14.4 Conclusions for Electronic Funds Transfer Project.- 15 Bank Courier Network.- 15.1 Introduction to Bank Courier Network.- 15.2 CPN Model of Bank Courier Network.- 15.3 Conclusions for Bank Courier Network Project.- 16 Network Management System.- 16.1 Introduction to Network Management System.- 16.2 CPN Model of Network Management System.- 16.3 Validation of Network Management System.- 16.4 Conclusions for Network Management Project.- 17 Naval Vessel.- 17.1 Introduction to Naval Vessel.- 17.2 CPN Model of Naval Vessel.- 17.3 Simulation of Naval Vessel.- 17.4 Conclusions for Naval Vessel Project.- 18 Chemical Production System.- 18.1 Introduction to Chemical Production System.- 18.2 CPN Model of Chemical Production System.- 18.3 Validation of Chemical Production System.- 18.4 Conclusions for Chemical Production Project.- 19 Nuclear Waste Management Programme.- 19.1 Introduction to Nuclear Waste Management Programme.- 19.2 CPN Model of Nuclear Waste Management Programme.- 19.3 Simulation of Nuclear Waste Management Programme.- 19.4 Conclusions for Nuclear Waste Management Project.- References.
Rezensionen
From the reviews: "A colored Petri net (CPN) is a concurrent and typed enhancement of a state machine. This book is a comprehensive treatise on CPNs. ... The book is well edited ... . structure and presentation are very well conceived: it can be read as a tutorial for CPNs, as an advanced guide for CPTools, or as a reference for CPN formalism." (A. Squassabia, ACM Computing Reviews, August, 2010)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497