Academic literature on the topic 'Mutual exclusion constraints'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mutual exclusion constraints.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mutual exclusion constraints"

1

Giua, A., F. Dicesare, and M. Silva. "Petri Net Supervisors for Generalized Mutual Exclusion Constraints." IFAC Proceedings Volumes 26, no. 2 (July 1993): 379–82. http://dx.doi.org/10.1016/s1474-6670(17)48493-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barbara, Daniel, Hector Garcia-Molina, and Annemarie Spauster. "Increasing availability under mutual exclusion constraints with dynamic vote reassignment." ACM Transactions on Computer Systems 7, no. 4 (November 1989): 394–426. http://dx.doi.org/10.1145/75104.75107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ma, Ziyue, Zhiwu Li, and Alessandro Giua. "Petri net controllers for Generalized Mutual Exclusion Constraints with floor operators." Automatica 74 (December 2016): 238–46. http://dx.doi.org/10.1016/j.automatica.2016.07.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Ziyue, Zhiwu Li, and Alessandro Giua. "Design of Optimal Petri Net Controllers for Disjunctive Generalized Mutual Exclusion Constraints." IEEE Transactions on Automatic Control 60, no. 7 (July 2015): 1774–85. http://dx.doi.org/10.1109/tac.2015.2389313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abbott, Barbara. "THE HUMAN SEMANTIC POTENTIAL: SPATIAL LANGUAGE AND CONSTRAINED CONNECTIONISM.Terry Regier. Cambridge, MA: MIT Press, 1996. Pp. xvi + 220. $37.50 paper." Studies in Second Language Acquisition 19, no. 4 (December 1997): 517–18. http://dx.doi.org/10.1017/s027226319722406x.

Full text
Abstract:
The semantic potential referred to in the title of this book is the ability of humans to learn the (closed-class) terms for basic spatial relations, such as (for English) onto, above, and through. Regier presents a modified connectionist model of this ability designed to address three questions: (a) What kind of system can learn spatial terms? (b) How can this system function without negative evidence? and (c) What are the universal constraints on learnable spatial terms? The answers suggested to these questions are: (a) a modified connectionist network—one which incorporates structural constraints motivated by human physiology; (b) the assumption of mutual exclusion, that is, that different terms have mutually exclusive denotations; and (c) the structural constraints that are incorporated into the network.
APA, Harvard, Vancouver, ISO, and other styles
6

ZhiWu Li, MingMing Yan, and MengChu Zhou. "Synthesis of Structurally Simple Supervisors Enforcing Generalized Mutual Exclusion Constraints in Petri Nets." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 3 (May 2010): 330–40. http://dx.doi.org/10.1109/tsmcc.2009.2037824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fujita, Kohei, and Toshimitsu Ushio. "Optimal Control of Colored Timed Petri Nets Under Generalized Mutual Exclusion Temporal Constraints." IEEE Access 10 (2022): 110849–61. http://dx.doi.org/10.1109/access.2022.3216043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gharbi, Atef, Hamza Gharsellaoui, and Mohamed Khalgui. "Real-Time Reconfigurations of Embedded Control Systems." International Journal of System Dynamics Applications 5, no. 3 (July 2016): 71–93. http://dx.doi.org/10.4018/ijsda.2016070104.

Full text
Abstract:
This paper deals with the study of the reconfiguration of embedded control systems with safety following component-based approaches from the functional level to the operational level. The authors define the architecture of the Reconfiguration Agent which is modelled by nested state machines to apply local reconfigurations. They propose in this journal paper technical solutions to implement the whole agent-based architecture, by defining UML meta-models for both Control Components and also agents. To guarantee safety reconfigurations of tasks at run-time, they define service and reconfiguration processes for tasks and use the semaphore concept to ensure safety mutual exclusions. As a method to ensure the scheduling between periodic tasks with precedence and mutual exclusion constraints, the authors apply the priority ceiling protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Y., B. W. Wah, and C. Hsu. "Temporal Planning using Subgoal Partitioning and Resolution in SGPlan." Journal of Artificial Intelligence Research 26 (August 6, 2006): 323–69. http://dx.doi.org/10.1613/jair.1918.

Full text
Abstract:
In this paper, we present the partitioning of mutual-exclusion (mutex) constraints in temporal planning problems and its implementation in the SGPlan4 planner. Based on the strong locality of mutex constraints observed in many benchmarks of the Fourth International Planning Competition (IPC4), we propose to partition the constraints of a planning problem into groups based on their subgoals. Constraint partitioning leads to significantly easier subproblems that are similar to the original problem and that can be efficiently solved by the same planner with some modifications to its objective function. We present a partition-and-resolve strategy that looks for locally optimal subplans in constraint-partitioned temporal planning subproblems and that resolves those inconsistent global constraints across the subproblems. We also discuss some implementation details of SGPlan4, which include the resolution of violated global constraints, techniques for handling producible resources, landmark analysis, path finding and optimization, search-space reduction, and modifications of Metric-FF when used as a basic planner in SGPlan4. Last, we show results on the sensitivity of each of these techniques in quality-time trade-offs and experimentally demonstrate that SGPlan4 is effective for solving the IPC3 and IPC4 benchmarks.
APA, Harvard, Vancouver, ISO, and other styles
10

Jiliang Luo, Weimin Wu, Hongye Su, and Jian Chu. "Supervisor Synthesis for Enforcing a Class of Generalized Mutual Exclusion Constraints on Petri Nets." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 39, no. 6 (November 2009): 1237–46. http://dx.doi.org/10.1109/tsmca.2009.2027111.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Mutual exclusion constraints"

1

Bouazza, Syrine. "Contrôle des processus de désassemblage à l'aide des formalismes des systèmes à évènements discrets." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPAST215.

Full text
Abstract:
Le contrôle des processus de désassemblage fait référence aux méthodes et aux techniques utilisées pour démonter de manière sûre et efficace des composants mécaniques ou des ensembles complexes. Pour ce faire, des approches de commandes des contrôles sont développés pour satisfaire les contraintes imposées à ces systèmes. Plus précisément, dans cette thèse nous nous s'intéressons à trois types de spécifications : les contraintes marquages, les Contraintes de Marquage Généralisées (CMGs), et les Contraintes d'Exclusions Mutuelles (CEMs).Pour cela, nous avons proposé trois méthodes analytiques. La première contribution concerne une nouvelle technique de conception de lois de commande pour les systèmes de désassemblages afin d'assurer la satisfaction des contraintes de marquage dans des Graphes d'Evénements Temporisés (GETs) avec certaines transitions d'entrée incontrôlables. La deuxième technique met l'accent sur la synthèse des contrôleurs tout en assurant des CMGs spécifiées par des inégalités pondérées dans l'algèbre Min-Plus soumis à des GETs. La dernière approche vise à piloter les processus de désassemblages modélisés par des Réseaux de Graphes d'Evénements Temporisés (RGETs) imposés à des CEMs.En alternative, il convient de noter que ces approches se basent sur les structures conceptuelles des Systèmes à Evénements Discrets (SEDs) ainsi que sur l'algèbre Min-Plus. Ces outils offrent la capacité de représenter de façon exacte et méthodique les systèmes de manufacturier. Par conséquent, la problématique se trouve formulée en utilisant des modèles linéaires de contrôle basés sur l'algèbre Min-Plus. En fait, le comportement de ces graphes est décrite en utilisant des équations Min-Plus linéaires, et les contraintes sont exprimées par des inégalités ou des inégalités pondérées dans l'algèbre Min-Plus.Des conditions suffisantes pour l'existence des lois de commande causales sont établies. Ces contrôleurs développés sont des retours d'états qui peuvent être symbolisés par des places de surveillance empêchant le système de toute violation de contrainte. Le graphe est vivant et sans blocage
Disassembly process control involves the methods and techniques used to safely and efficiently disassemble mechanical components or complex assemblies. To do this, control approaches are developed to satisfy the constraints imposed on these systems. More specifically, in this thesis we are interested in three types of specifications: marking constraints, Generalized Marking Constraints (GMCs), and Mutual Exclusion Constraints (MECs).To this aim, we have proposed three analytical methods. The first contribution concerns a new technique for designing control laws for disassembly systems to ensure the satisfaction of marking constraints in Timed Event Graphs (TEGs) with some uncontrollable input transitions. The second technique focuses on controller synthesis while ensuring GMCs specified by weighted inequalities in the Min-Plus algebra subject to GETs. The final method aims to control disassembly processes modelled by Timed Event Graph Networks (NGETs) imposed on MECs.Alternatively, it is worth noting that these approaches are based on the conceptual structures of Discrete Event Systems (DES) and the Min-Plus algebra. These tools offer the ability to represent manufacturing systems accurately and methodically. Consequently, the problem is formulated using linear control models based on Min-Plus algebra. In fact, the behaviour of these graphs is described using linear Min-Plus equations, and constraints are expressed by inequalities or weighted inequalities in the Min-Plus algebra.Sufficient conditions for the existence of causal control laws are established. These developed controllers are state feedbacks that can be represented by monitoring places preventing the system from any constraint violation. The graph is alive and unblocked
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Mutual exclusion constraints"

1

Mameli, Matteo. Why Human Nature Matters. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350189782.

Full text
Abstract:
Does human nature constrain social and political change? Or do social and political changes transform human nature? Why Human Nature Matters argues that instead of being mutually exclusive, the answer to both questions is yes! This philosophical account of human nature explores the relation between biology and politic, explaining clearly what is at stake in issues from climate change to the social and political consequences of the technological revolution. Appeals to human nature are often used in support of a politics of exclusion. The biological study of human beings has been put to the service of racism, sexism, ableism, and other forms of oppression. By demolishing these existential biases and building on advancements in biological theory, this book explores the philosophical significance of those developments and offers new conceptual tools for linking a biological understanding of humanity to a politics of inclusion and freedom.
APA, Harvard, Vancouver, ISO, and other styles
2

Teoh, Karen M. Schooling Diaspora. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190495619.001.0001.

Full text
Abstract:
Schooling Diaspora relates the previously untold story of female education and the overseas Chinese in British Malaya and Singapore, traversing more than a century of British imperialism, Chinese migration, and Southeast Asian nationalism. This book explores the pioneering English- and Chinese-language girls’ schools in which these women studied and worked, drawing from school records, missionary annals, colonial reports, periodicals, and oral interviews. The history of educated overseas Chinese girls and women reveals the surprising reach of transnational female affiliations and activities in an age and a community that most accounts have cast as male dominated. These women created and joined networks in schools, workplaces, associations, and politics. They influenced notions of labor and social relations in Asian and European societies. They were at the center of political debates over language and ethnicity and were vital actors in struggles over twentieth-century national belonging. Their education empowered them to defy certain sociocultural conventions in ways that school founders and political authorities did not anticipate. At the same time, they contended with an elite male discourse that perpetuated patriarchal views of gender, culture, and nation. Even as their schooling propelled them into a cosmopolitan, multi-ethnic public space, Chinese girls and women in diaspora often had to take sides as Malayan and Singaporean society became polarized—sometimes falsely—into mutually exclusive groups of British loyalists, pro-China nationalists, and Southeast Asian citizens. They negotiated these constraints to build unique identities, ultimately contributing to the development of a new figure: the educated transnational Chinese woman.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mutual exclusion constraints"

1

Roy, Bernard, and Roman Slowinski. "Multicriteria Task Allocation to Heterogenous Processors with Capacity and Mutual Exclusion Constraints." In Applications of Combinatorial Optimization, 327–64. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600283.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roy, Bernard, and Roman Slowinski. "Multicriteria Task Allocation to Heterogenous Processors with Capacity and Mutual Exclusion Constraints." In Applications of Combinatorial Optimization, 327–64. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119005384.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schefer, Sigrid, Mark Strembeck, Jan Mendling, and Anne Baumgrass. "Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context." In On the Move to Meaningful Internet Systems: OTM 2011, 329–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25109-2_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Strembeck, Mark, and Jan Mendling. "Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context." In On the Move to Meaningful Internet Systems: OTM 2010, 204–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16934-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bouazza, Syrine, Said Amari, Hichem Hassine, Maher Barkallah, and Mohamed Haddar. "A New Approach to Solve the Mutual Exclusion Constraints Problem for Discrete Event Systems with Disturbances – Application to a Manufacturing Workshop." In Lecture Notes in Mechanical Engineering, 72–82. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57324-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Berry, Aidan, and Robin Jarvis. "Accounting for decision making: resource constraints and decisions which are mutually exclusive." In Accounting in a Business Context, 341–57. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-6942-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Berry, Aidan, and Robin Jarvis. "Accounting for decision making: resource constraints and decisions which are mutually exclusive." In Accounting in a Business Context, 288–304. Boston, MA: Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-6944-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Marwedel, Peter. "System Software." In Embedded Systems, 203–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_4.

Full text
Abstract:
AbstractIn order to cope with the complexity of applications of embedded systems, reuse of components is a key technique. As pointed out by Sangiovanni-Vincentelli (The context for platform-based design. IEEE Design and Test of Computers, 2002), software and hardware components must be reused in the platform-based design methosdology (see p. 296). These components comprise knowledge from earlier design efforts and constitute intellectual property (IP). Standard software components that can be reused include system software components such as embedded operating systems (OSs) and middleware. The last term denotes software that provides an intermediate layer between the OS and application software. This chapter starts with a description of general requirements for embedded operating systems. This includes real-time capabilities as well as adaptation techniques to provide just the required functionality. Mutually exclusive access to resources can result in priority inversion, which is a serious problem for real-time systems. Priority inversion can be circumvented with resource access protocols. We will present three such protocols: the priority inheritance, priority ceiling, and stack resource protocols. A separate section covers the ERIKA real-time system kernel. Furthermore, we will explain how Linux can be adapted to systems with tight resource constraints. Finally, we will provide pointers for additional reusable software components, like hardware abstraction layers (HALs), communication software, and real-time data bases. Our description of embedded operating systems and of middleware in this chapter is consistent with the overall design flow.
APA, Harvard, Vancouver, ISO, and other styles
9

Hsiung, Pao-Ann, Yen-Hung Lin, and Yean-Ru Chen. "Safecharts Model Checking for the Verfication of Safety-Critical Systems." In Verification, Validation and Testing in Software Engineering, 427–66. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59140-851-2.ch014.

Full text
Abstract:
Unintentional design faults in safety-critical systems might result in injury or even death to human beings. However, the safety verification of such systems is getting very difficult because designs are becoming very complex. To cope with high design complexity, model-driven architecture (MDA) design is becoming a well-accepted trend. However, conventional methods of code testing and hazard analysis do not fit very well with MDA. To bridge this gap, we propose a safecharts model-based formal verification technique for safety-critical systems. The safety constraints in safecharts are mapped to semantic equivalents in timed automata. The theory for safety verification is proved and implemented in the SGM model checker. Prioritized and urgent transitions are implemented in SGM to model the safe chart risk semantics. Finally, it is shown that priority-based approach to mutual exclusion of resource usage in safecharts is unsafe and solutions are proposed. Application examples show the benefits of the proposed model-driven verification method.
APA, Harvard, Vancouver, ISO, and other styles
10

Merilä, Juha, and Mats Björklund. "Phenotypic Integration as a Constraint and Adaptation." In Phenotypic Integration, 107–29. Oxford University PressNew York, NY, 2004. http://dx.doi.org/10.1093/oso/9780195160437.003.0005.

Full text
Abstract:
Abstract Despite the enormous diversity of living forms, it is quite clear that not all imaginable life forms-such as angels-have ever come into existence. There are two broad explanations for this. First, according to what can be called the genetic/epigenetic constraint view (e.g., Maynard Smith et al. 1985), organisms are to some degree victims of their own history: solutions available for a given organism or clade are constrained by its evolutionary history, as for instance dictated by its genetic architecture and/or ancestral developmental pathways. Second, according to what can be termed the functionalist/adaptationist view (Gould and Lewontin 1979), almost any solution to a problem posed by a selective environment is possible, insofar as it is not opposed by the laws of physics or by natural selection. Hence, organisms like angels might not exist either because of constraints of development, or because they are not fit for selective reasons. These two world views, although frequently polarized, are of course not mutually exclusive (Maynard Smith et al. 1985; Schlichting and Pigliucci 1998).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mutual exclusion constraints"

1

Achour, Z., and N. Rezg. "Time Floating General Mutual Exclusion Constraints (TFGMEC)." In Multiconference on "Computational Engineering in Systems Applications. IEEE, 2006. http://dx.doi.org/10.1109/cesa.2006.4281778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Easwaran, Arvind, and Björn Andersson. "Scheduling Sporadic Tasks on Multiprocessors with Mutual Exclusion Constraints." In 2009 International Conference on Parallel Processing Workshops (ICPPW). IEEE, 2009. http://dx.doi.org/10.1109/icppw.2009.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ma, Ziyue, Zhiwu Li, and Alessandro Giua. "Petri net controllers for disjunctive Generalized Mutual Exclusion Constraints." In 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA). IEEE, 2013. http://dx.doi.org/10.1109/etfa.2013.6648003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hou, Junyao, Hesuan Hu, Yuan Zhou, and Yang Liu. "Decentralized supervisory control of Generalized Mutual Exclusion Constraints in Petri Nets." In 2017 13th IEEE Conference on Automation Science and Engineering (CASE 2017). IEEE, 2017. http://dx.doi.org/10.1109/coase.2017.8256129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Achour, Zied, and Nidhal Rezg. "Time Floating General Mutual Exclusion Constraints in Partial Observable Discrete Event Systems." In 2006 IEEE International Conference on Information Reuse & Integration. IEEE, 2006. http://dx.doi.org/10.1109/iri.2006.252391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, ShouGuang, ChengYing Wang, and MengChu Zhou. "A transformation algorithm for optimal admissible generalized mutual exclusion constraints on Petri nets with uncontrollable transitions." In 2011 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2011. http://dx.doi.org/10.1109/icra.2011.5979727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Meng, Xuyun Zhang, Chi Yang, Shaoning Pang, Deepak Puthal, and Kaijun Ren. "Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control." In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. http://dx.doi.org/10.1109/trustcom/bigdatase/icess.2017.277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mitu, Cristinadana. "THE STRUCTURE OF AN E-LEARNING SITE IN TERMS OF CAPITALIZATION OF CULTURAL DIVERSITY FOR THE BENEFIT OF STUDENTS AND THE QUALITY OF EDUCATIONAL ACT." In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-200.

Full text
Abstract:
As a powerful engine of the knowledge-based society, e-Learning system has the ability to transform education, generating major initiatives needed in identifying new skills and behaviors. The release from the constraints of space and time and the ability to connect to Web resources made of the new online media ideal tools for distance learning. The sites of e-Learning join together numerous services which offer a rich experience of solutions and technologies for an educational system. They should form an immersive environment in which users can adjust gradually feeling its familiarity. This new type of education enables the formation of communities of students and teachers from all over the world so that they can harness the potential of using information technologies. It is also a planned teaching-learning experience organized by an institution that provides teaching materials in the online mode, in a sequential and logical order to be assimilated by students in their own way and at the desired place. The paper aims to present the structure of such a site, proposing a communication mechanism at the level of the site so that each student should be able to get a perspective on the information supplied in accordance with their own education, culture and areas of interest. An e-Learning site represents a meeting space of very broad categories of human types and provides support for holding an exclusive educational system via the Internet, with a structure and a very complex functionality. This should include public, generally accessible, informative sections, but also private sections for students and teachers. The paper also aims at defining the concept of quality of the educational act in e-Learning systems aiming to surprise a diversified approach to students in order to establish a genuine communication, providing differentiated access to the most diverse groups of trainees. The knowledge of authentic mutual awareness and the existence of common concepts and concerns is absolutely necessary in order to establish this genuine communication. An e-Learning site should be a necessary dosage of visual, content and accessibility providing a suitable communication environment of a very heterogeneous category of users.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography