Comparison between SSF’s and Åbo Akademi’s AOCS Modeling Approaches Clause Samples

Comparison between SSF’s and Åbo Akademi’s AOCS Modeling Approaches. SSF’s AOCS model development stems from the detailed description of the AOCS system provided as Ada code. Its goal is to produce Event-B models as close as possible to the provided Ada description, reflecting both its overall complexity and organizational structure. As a result, the developed models put the Rodin Platform to a serious test by sheer number of variables and events needed to represent the level of detail present in the Ada description, which is a still somewhat simplified version of the real AOCS subsystem. It also highlights the lack of Rodin Platform features that are sorely needed to improve its scalability such as decomposition and modularization support, modeling of procedure calls, control flow management etc. To faithfully reflect the control flow and organizational structure of the Ada description, many special variables (e.g., program counters or the variables to model formal parameters of called procedures) have to be introduced. This makes difficult to formulate more general properties of the system, for example, that some property which is true at certain point of execution is still true after a number of steps down the road of the modeled control flow. The formal development attempted by Åbo follows the standard techniques of top-down modeling by refinement. The provided Ada document is used more like a reference point or general requirements document. The goal of the development is to identify generic specification and refinement steps or patterns as well as general properties that are typical for this class of systems. The development starts with a much simplified architecture of the AOCS system, which is then unfolded layer by layer by refinement. At the same time, the selected general properties about mode management are formulated and proved. This is possible because the level of complexity represented in models is still manageable. The current development is still very incomplete. The refinement process will be continued, thus slowly approaching the level of detail that is already covered by SSF models. To avoid explosion of complexity, the use of newly developed decomposition and modularization techniques [RD7], [RD8] (e.g., the modularization plug-in) will be investigated.

Related to Comparison between SSF’s and Åbo Akademi’s AOCS Modeling Approaches

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Presentation of Potential Target Businesses The Company shall cause each of the Initial Shareholders to agree that, in order to minimize potential conflicts of interest which may arise from multiple affiliations, the Initial Shareholders will present to the Company for its consideration, prior to presentation to any other person or company, any suitable opportunity to acquire an operating business, until the earlier of the consummation by the Company of a Business Combination or the liquidation of the Company, subject to any pre-existing fiduciary obligations the Initial Shareholders might have.

  • COVID-19 Vaccine Passports Pursuant to Texas Health and Safety Code, Section 161.0085(c), Contractor certifies that it does not require its customers to provide any documentation certifying the customer’s COVID-19 vaccination or post-transmission recovery on entry to, to gain access to, or to receive service from the Contractor’s business. Contractor acknowledges that such a vaccine or recovery requirement would make Contractor ineligible for a state-funded contract.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (eff. Sept. 1, 2023, Section 2275.0102(a)(1), pursuant to House Bill 4595, Acts 2023, 88th Leg., R.S.) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102 (eff. Sept. 1, 2023, Section 2275.0102, pursuant to House Bill 4595, Acts 2023, 88th Leg., R.S.), Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103 (eff. Sept. 1, 2023, Section 2275.0103, pursuant to House Bill 4595, Acts 2023, 88th Leg., R.S.), or (2) headquartered in any of those countries.