## Perspectives of Systems Informatics: 6th International Andrei Ershov Memorial Conference, PSI 2006, Novosibirsk, Russia, June 27-30, 2006, Revised PapersThis volume contains the ?nal proceedings of the Sixth International Andrei Ershov Memorial Conference on Perspectives of System Informatics (PSI 2006), held in Akademgorodok (Novosibirsk, Russia), June 27-30, 2006. The conference was held to honour the 75th anniversary of a member of the Russian Academy of Sciences Andrei Ershov (1931–1988) and his outsta- ing contributions towards advancing informatics. The role of Andrei Ershov in the establishment and development of the theory of programming and systems programming in our country cannot be overestimated. Andrei was one of the founders of the Siberian Computer Science School. He guided and took active part in the development of the programming system ALPHA and the mul- language system BETA, and authored some of the most remarkable results in the theoryofprogramming. Andreiisjustly consideredoneofthefoundersofthe theory of mixed computation. In 1974 he was nominated as Distinguished F- low of the British Computer Society. In 1981 he received the Silver Core Award for services rendered to IFIP. Andrei Ershov’s brilliant speeches were always in the focus of public attention. Especially notablewerehis lectures “Aesthetic and HumanFactorinProgramming”and“Programming—TheSecondLiteracy. ”He was not only an extremely gifted scientist, teacher and ?ghter for his ideas, but also a bright and many-sided personality. He wrote poetry, translated the works of R. Kipling and other English poets, and enjoyed playing guitar and singing. Everyone who had the pleasure of knowing Andrei Ershov and working with him will always remember his great vision, eminent achievements and generous friendship. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

1 | |

Grand Challenges of System Programming | 19 |

Specifying and Verifying Programs in Spec | 20 |

Specification Language for Distributed Systems | 21 |

Why Automata Models Are Sexy for Testers? Invited Talk | 26 |

An Universal Resolving Algorithm for Inverse Computation of Lazy Languages | 27 |

Program Generation in the Equivalent Transformation Computation Model Using the Squeeze Method | 41 |

A Versioning and Evolution Framework for RDF Knowledge Bases | 55 |

Preconditions for Structural Synthesis of Programs | 284 |

How to Verify and Exploit a Refinement of ComponentBased Systems | 297 |

Refinements in Typed Abstract State Machines | 310 |

Report on an Implementation of a Semiinverter | 322 |

Loop Parallelization in Multidimensional Cartesian Space | 335 |

An ASM Semantics of Token Flow in UML 2 Activity Diagrams | 349 |

WellStructured Model Checking of Multiagent Systems | 363 |

Development of a Robust Data Mining Method Using CBFS and RSM | 377 |

A Graphical Approach to Prove the Semantic Preservation of UMLOCL Refactoring Rules | 70 |

On the Usage of Concrete Syntax in Model Transformation Rules | 84 |

TTCN3 for Distributed Testing Embedded Software | 98 |

Chase of Recursive Queries | 112 |

Improving Semistatic Compression Via PairBased Coding | 124 |

An AgentBased Architecture for Dialogue Systems | 135 |

Encoding Mobile Ambients into the πCalculus | 148 |

Characterizations of CD Grammar Systems Working in Competence Mode by Multicounter Machine Resources | 166 |

Deriving StateBased Implementations of Interactive Components with History Abstractions | 180 |

Introducing Debugging Capabilities to Natural Semantics | 195 |

Solution Strategies for Multidomain Constraint Logic Programs | 209 |

InformationFlow Attacks Based on Limited Observations | 223 |

Verifying Generalized Soundness of Workflow Nets | 235 |

Specifying Monogenetic Specializers by Means of a Relation Between Source and Residual Programs | 248 |

Satisfiability of Viability Constraints for Pfaffian Dynamics | 260 |

On the Importance of Parameter Tuning in Text Categorization | 270 |

A Mathematical Model of Architectural Merger | 389 |

A Formal Model of Data Privacy | 400 |

Linear Complementarity and PMatrices for Stochastic Games | 409 |

RapidOWL An Agile Knowledge Engineering Methodology | 424 |

BURSBased Instruction Set Selection | 431 |

Improved ResolutionBased Method for Satisfiability Checking Formulas of the Language L | 438 |

An Adjunction | 443 |

Streaming Networks for Coordinating DataParallel Programs | 451 |

Formal Methods in Industrial Software Standards Enforcement | 456 |

Visual Rules Modeling | 467 |

Security for Multithreaded Programs Under Cooperative Scheduling | 474 |

A Fully Dynamic Algorithm for Recognizing and Representing Chordal Graphs | 481 |

Towards an Architecture | 487 |

495 | |

### Common terms and phrases

abstract Abstract State Machines algorithm application approach architecture Berlin Heidelberg 2007 called chordal graphs clauses component Computer Science concrete syntax configuration constraint corresponding counters data privacy database defined Definition denote diagrams domain encoding evaluation example finite formal function GLCP graph idleness implementation input instance iteration knowledge label language LNCS Logic Programming loop marking metamodel method mobile ambients model checking nodes nonterminals object diagram ontology operation optimal output P-matrix pair paper parameters pattern Petri net Pfaffian portal problem proof query recursive refinement relation rewriting Rocchio Scott domains Section selected Semantic Web semantics semi-inversion sentential form sequence simulated solver specification step stochastic games strategy stream processing subset Theorem tile tokens transformation transition machine tree tuple variables Virbitskaite Voronkov Eds

### Popular passages

Page 480 - JA Goguen and J. Meseguer. Security Policies and Security Models.

Page v - Cerrada, and M. Cerrolaza. PREFACE This book comprises one of the two volumes of the edited Proceedings of the fourth International Conference on Computational Methods and Experimental Measurements held in 1989. The primary aim of the conference was to provide a forum for the presentation and exchange of innovative approaches in the fields of numerical methods and experimental studies, with emphasis on their interaction and application in engineering. The success of the meeting as well as the previous...

Page 480 - D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis.