2018
DOI: 10.1016/j.tcs.2017.12.010
|View full text |Cite
|
Sign up to set email alerts
|

Kernel P systems: From modelling to verification and testing

Abstract: A kernel P system integrates in a coherent and elegant manner some of the most successfully used features of the P systems employed in modelling various applications. It also provides a theoretical framework for analysing these applications and a software environment for simulating and verifying them. In this paper, we illustrate the modelling capabilities of kernel P systems by showing how other classes of P systems can be represented with this formalism and providing a number of kernel P system models for a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
18
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 25 publications
0
18
0
Order By: Relevance
“…TER, (4) In a similar way, it can be proved that TER, (7,8) In a similar way, it can be proved that (1) α e ∼e b Theorem 1 (2) α M ∼ si given condition In a similar way, it can be proved that In the Xd-C program, the memory state transfers from M to M 2 . Compared to M , M 2 allocates memory blocks to variables y 1 , ..., y m and variables in dcl, and assigns v k to y k for 1 ≤ k ≤ m. Whereas in the MSVL program, the state transfers from s i to s t .…”
mentioning
confidence: 81%
See 3 more Smart Citations
“…TER, (4) In a similar way, it can be proved that TER, (7,8) In a similar way, it can be proved that (1) α e ∼e b Theorem 1 (2) α M ∼ si given condition In a similar way, it can be proved that In the Xd-C program, the memory state transfers from M to M 2 . Compared to M , M 2 allocates memory blocks to variables y 1 , ..., y m and variables in dcl, and assigns v k to y k for 1 ≤ k ≤ m. Whereas in the MSVL program, the state transfers from s i to s t .…”
mentioning
confidence: 81%
“…(ra1 aop ra2, σ, s, |σ| + 1)⇓ptr(b , j ) assumption (6) =⇒ (ra1, σ, s, |σ| + 1)⇓ptr(b , j 1 ) ∧ (ra2, σ, s, |σ| + 1)⇓n2∧ j = j 1 + n2 * sizeof (τ ) R6, (5) (7) (G, E e1, M ⇒ptr(b, j1)) ∧ (G, E e2, M ⇒v2)∧ (ra1, σ, s, |σ| + 1)⇓ptr(b , j 1 ) ∧ (ra2, σ, s, |σ| + 1)⇓n2 (4, 6) (8)…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…This approximation is obtained by limiting the length of any computation to an upper bound k and considering only computations up to k transitions in length. This approximation is then used to construct a deterministic finite cover automaton (DFCA) of the model [6][7][8].…”
Section: Kernel P Systems Testingmentioning
confidence: 99%