Muutke küpsiste eelistusi

Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use 3rd edition, Vol 3 [Kõva köide]

(University of Aarhus, Denmark)
  • Kõva köide
  • Hind: 76,45 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 89,95 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
The contents of this volume are application oriented. The volume contains a de­ tailed presentation of 19 applications of CP-nets, covering a broad range of ap­ plication areas. Most of the projects have been carried out in an industrial set­ ting. The volume presents the most important ideas and experiences from the projects, in a way which is useful also for readers who do not yet have personal experience with the construction and analysis of large CPN models. The volume demonstrates the feasibility of using CP-nets and the CPN tools for industrial projects. The presentation of the projects is based upon material provided by the per­ sons who have accomplished the individual projects. At the beginning of each chapter, we list their names and we say where the original material has been published. The original material often contains more elaborate information, e.g., about details of the modelled system and related work. I have edited the material provided by the original authors. I have modified some of the CP-nets, e.g., to improve the layout and use more mnemonic names. In some cases, I have also changed a few net components, e.g., merged two tran­ sitions or introduced a Standard ML function for operations that are used in many arc expressions. These modifications make the CP-nets more appropriate as study material, but they do not change the essential behaviour of the CPN models.
1 Security System
1(20)
1.1 Introduction to Security System
2(1)
1.2 CPN Model of Security System
3(7)
1.3 Simulation of Security System
10(2)
1.4 Occurrence Graph Analysis of Security System
12(4)
1.5 Implementation of Security System
16(2)
1.6 Conclusions for Security System Project
18(3)
2 UPC Algorithms in ATM Networks
21(18)
2.1 Introduction to UPC Algorithms
22(1)
2.2 CPN Model of UPC Algorithms
22(7)
2.3 CPN Model of Traffic Sources
29(5)
2.4 Simulation of UPC Algorithms
34(2)
2.5 Conclusions for UPC Algorithms Project
36(3)
3 Audio/Video System
39(12)
3.1 Introduction to Audio/Video System
40(2)
3.2 CPN Model of Audio/Video System
42(3)
3.3 Simulation of Audio/Video System
45(2)
3.4 Occurrence Graph Analysis of Audio/Video System
47(3)
3.5 Conclusions for Audio/Video Project
50(1)
4 Transaction Processing and Interconnect Fabric
51(22)
4.1 Introduction to Transaction Processing
52(5)
4.2 CPN Model of Transaction Processing
57(7)
4.3 Introduction to Interconnect Fabric
64(2)
4.4 CPN Model of Interconnect Fabric
66(5)
4.5 Conclusions for Transactions and Interconnect Project
71(2)
5 Mutual Exclusion Algorithm
73(12)
5.1 Introduction to Mutual Exclusion Algorithm
74(1)
5.2 CPN Model of Mutual Exclusion Algorithm
75(3)
5.3 Occurrence Graph Analysis of Mutual Exclusion Algorithm
78(6)
5.4 Conclusions for Mutual Exclusion Algorithm Project
84(1)
6 ISDN Supplementary Services
85(14)
6.1 Introduction to ISDN Supplementary Services
86(4)
6.2 CPN Model of ISDN Supplementary Services
90(6)
6.3 Validation of ISDN Supplementary Services
96(1)
6.4 Conclusions for ISDN Supplementary Services Project
97(2)
7 Intelligent Network
99(18)
7.1 Introduction to Intelligent Network
100(3)
7.2 CPN Model of Intelligent Network
103(11)
7.3 Conclusions for Intelligent Network Project
114(3)
8 Communications Gateway
117(14)
8.1 Introduction to Communications Gateway
118(1)
8.2 CPN Model of Communications Gateway
119(8)
8.3 Conclusions for Communications Gateway Project
127(4)
9 BRI Protocol in ISDN Networks
131(18)
9.1 Introduction to BRI Protocol
132(4)
9.2 CPN Model of BRI Protocol
136(11)
9.3 Conclusions for BRI Protocol Project
147(2)
10 VLSI Chip
149(12)
10.1 Introduction to VLSI Chip
150(1)
10.2 CPN Model of VLSI Chip
151(8)
10.3 Conclusions for VLSI Chip Project
159(2)
11 Arbiter Cascade
161(10)
11.1 Introduction to Arbiter Cascade
162(1)
11.2 CPN Model of Arbiter Cascade
163(5)
11.3 Conclusions for Arbiter Cascade Project
168(3)
12 Document Storage System
171(8)
12.1 Introduction to Document Storage System
172(1)
12.2 CPN Model of Document Storage System
173(3)
12.3 Simulation of Document Storage System
176(2)
12.4 Conclusions for Document Storage Project
178(1)
13 Distributed Program Execution
179(10)
13.1 Introduction to Distributed Program Execution
180(1)
13.2 CPN Model of Distributed Program Execution
181(4)
13.3 Verification of Distributed Program Execution
185(3)
13.4 Conclusions for Distributed Program Execution Project
188(1)
14 Electronic Funds Transfer System
189(14)
14.1 Introduction to SADT
190(3)
14.2 Introduction to Electronic Funds Transfer System
193(3)
14.3 CPN Model of Electronic Funds Transfer System
196(5)
14.4 Conclusions for Electronic Funds Transfer Project
201(2)
15 Bank Courier Network
203(10)
15.1 Introduction to Bank Courier Network
204(1)
15.2 CPN Model of Bank Courier Network
205(7)
15.3 Conclusions for Bank Courier Network Project
212(1)
16 Network Management System
213(12)
16.1 Introduction to Network Management System
214(3)
16.2 CPN Model of Network Management System
217(4)
16.3 Validation of Network Management System
221(2)
16.4 Conclusions for Network Management Project
223(2)
17 Naval Vessel
225(12)
17.1 Introduction to Naval Vessel
226(1)
17.2 CPN Model of Naval Vessel
227(6)
17.3 Simulation of Naval Vessel
233(1)
17.4 Conclusions for Naval Vessel Project
234(3)
18 Chemical Production System
237(10)
18.1 Introduction to Chemical Production System
238(2)
18.2 CPN Model of Chemical Production System
240(3)
18.3 Validation of Chemical Production System
243(2)
18.4 Conclusions for Chemical Production Project
245(2)
19 Nuclear Waste Management Programme
247(14)
19.1 Introduction to Nuclear Waste Management Programme
248(5)
19.2 CPN Model of Nuclear Waste Management Programme
253(5)
19.3 Simulation of Nuclear Waste Management Programme
258(2)
19.4 Conclusions for Nuclear Waste Management Project
260(1)
References 261