Guoqiang Li

Learn More
The pi calculus has been applied to modelling biochemical networks. In these applications, the modelling is done without considerations to exceptions. The Ipi calculus, the Interference pi calculus, is introduced to describe the signal transduction with aberrance. The calculus is obtained by adding two aberrant actions into the pi calculus and a tag system(More)
We have developed a calculus, called Ipi, for describing the aberrance in biological models. Our approach extends the traditional pi calculus to handle aberrant process in the signal transduction. In this paper we propose a typing system that replaces the tag system of Ipi calculus. It is shown that the typing system is equal to the tag system in terms of(More)
Interrupts are important aspects of real-time embedded systems to handle events in time. When there exist nested interrupts in a real-time system, and an urgent interrupt is allowed to preempt the current interrupt handling, the design and analysis of the system become difficult due to the lack of appropriate behavioral models. This paper proposes a(More)
Resource allocation mechanism plays a critical role towards the success of cloud computing. Existing allocation mechanisms in public cloud is unsuitable to private IaaS cloud because they either cannot maximize the sum of users value, or provide no service guarantee. For overcome these shortcomings, we propose a novel online, model-free mechanism that makes(More)
Timed automata are popular for formally analyzing real-time systems. However, it is difficult to depict real-time systems with compositional components that interact with each other in a synchronization way or a mutex way. Synchronized components are modeled using parallel composition of timed automata by Larsen et al. [1]. This paper proposes controller(More)
Multi-processor execution platforms are being more and more commonly adopted in various real-time systems. In some systems, real-time tasks are generated at runtime to be executed under time constrains, e.g. interruptions triggered by events should be handled preemptively within their deadlines. Besides some other system verifications, checking whether all(More)
Trace analysis, one of the formal methods to verify security protocols, represents every possible runs of the protocols as traces and analyzes whether any unsafe state is reachable. However, the number of states is infinite because we assume the intruder can generate infinite messages. In this paper, a typed process calculus inspired by the spi calculus is(More)