In this paper, a modeling methodology called BN_CPN based on colored Petri nets for business negotiation activities is proposed. With BN_CPN, a Web-based collaborative e-business negotiation system is modeled. Based o...
详细信息
In this paper, a modeling methodology called BN_CPN based on colored Petri nets for business negotiation activities is proposed. With BN_CPN, a Web-based collaborative e-business negotiation system is modeled. Based on the analysis of the characteristics of business negotiation activities, through the expansion of the classical colored Petri net withthe connotation of collaborative e-business negotiation, formalized description for each sub module is implemented by using BN_CPN system. the modeling methodology for Web-based collaborative e-business negotiation systems can fully demonstrate the characteristics and demands of business negotiation activities and can serve as the theoretical guide for design and development of collaborative e-business negotiation systems
Using simulations of a complex system such as a Web application server provides us with a tool that allows the running of tests without using the resources needed in a real system; thus enabling a "what-if" ...
详细信息
Using simulations of a complex system such as a Web application server provides us with a tool that allows the running of tests without using the resources needed in a real system; thus enabling a "what-if" analysis platform that gives support in the decisions taking process. this paper goes through the methodology and the construction of this light and fast simulation, showing the points to take care of and that have made this approach successful. Our evaluation shows some of the results obtained with simulations, compares them withthe real system and provides new information to investigate hypotheses; as for instance the effect of modifying the backlog queue component on overloaded systems, to increase the number of sessions finished. We have used several results from research on the effect of admission control over SSL connections to verify our simulated approach
Hardware/software codesign involves various design problems including system specification, design space exploration, hardware/software co-verification, and system synthesis. A codesign environment is a software tool ...
详细信息
Hardware/software codesign involves various design problems including system specification, design space exploration, hardware/software co-verification, and system synthesis. A codesign environment is a software tool that facilitates capabilities to solve these design problems. this paper presents the peace codesign environment mainly targeting for multimedia applications with real-time constraints. Peace specifies the system behavior with a heterogeneous composition of three models of computation. the Peace environment provides seamless co-design flow from functional simulation to system synthesis, utilizing the features of the formal models maximally during the whole design process. Preliminary experiments with real examples prove the viability of the proposed technique
Performance evaluation and modeling is a crucial process to enable the optimization of parallel programs. Programs written using two programming models, such as MPI and OpenMP, require an analysis to determine both pe...
详细信息
Performance evaluation and modeling is a crucial process to enable the optimization of parallel programs. Programs written using two programming models, such as MPI and OpenMP, require an analysis to determine both performance efficiency and the most suitable numbers of processes and threads for their execution on a given platform. To study both of these problems, we propose the construction of a model that is based upon a small number of parameters, but is able to capture the complexity of the runtime system. We must incorporate measurements of overheads introduced by each of the programming models, and thus need to model boththe network and computational aspects of the system. We have combined two different techniques: static analysis, driven by the OpenUH compiler, to retrieve application signatures and a parallelization overhead measurement benchmark, realized by Sphinx and Perfsuite, to collect system profiles. Finally, we propose a performance evaluation measurement to identify communication and computation efficiency. In this paper we describe our underlying framework, the performance model, and show how our tool can be applied to a sample code
Virtual instrumentation is defined as the combination of measurement and control hardware and application software with industry-standard computer technology to create user-defined instrumentation systems. Computer-ai...
详细信息
Virtual instrumentation is defined as the combination of measurement and control hardware and application software with industry-standard computer technology to create user-defined instrumentation systems. Computer-aided laboratory exercises based on the LabVIEW system are efficiently used on the topic of power electronic systems. the paper presents the application mentioned virtual instrument system in the education of boost type DC/DC converter in the continuous and discontinuous conduction mode. Its main application is in regulated DC power supplies and the regenerative braking of DC motors. Time-resolved measurements provided by NI ELVIS suite enable the students to explore and explain a behavior of circuits in the many different stages. A presented education form provides using different pedagogical tools and approaches. It is suitable for self-study purposes and in the field of e-learning platform education
Person identification is very important in the domain of multimedia news as it is often the focus of events in news stories and interest of searchers. However, this detection is impeded by the imprecise audio/visual a...
详细信息
Person identification is very important in the domain of multimedia news as it is often the focus of events in news stories and interest of searchers. However, this detection is impeded by the imprecise audio/visual analysistools. In this paper, we describe a multimodal and multi-faceted approach to person-x detection in news video. We make use of multimodal features extracted from text, visual and audio inherent in news video. We also incorporate multiple external sources of news from Web and parallel news archives to extract location and temporal profile of the persons. We call this second source of information the multi-faceted context. the multimodal, multi-faceted information is then fused using a rank boosting approach. Experiments on TRECVID 2003 and 2004 search queries demonstrate that our approach is effective
the proceedings contain 43 papers. the special focus in this conference is on theorem Proving and Probabilistic Model Checking. the topics include: Revisiting positive equality;an interpolating theorem prover;minimal ...
ISBN:
(纸本)354021299X
the proceedings contain 43 papers. the special focus in this conference is on theorem Proving and Probabilistic Model Checking. the topics include: Revisiting positive equality;an interpolating theorem prover;minimal assignments for bounded model checking;numerical vs. statistical probabilistic model checking;efficient computation of time-bounded reachability probabilities in uniform continuous-time markov decision processes;model checking discounted temporal properties;automatic creation of environment models via training;error explanation with distance metrics;online efficient predictive safety analysis of multithreaded programs;verification of object-oriented designs using UPPAAL;checker of persistent security;tampere verification tool;an aspect-oriented framework for synchronization;an animation tool for model-checking games;a tool for checking ANSI-C programs;obtaining memory-efficient reachability graph representations using the sweep-line method;automated generation of a progress measure for the sweep-line method;resource-optimal scheduling using priced timed automata;decidable and undecidable problems in schedulability analysis using timed automata;the succinct solver suite;binding-time analysis for metaML via type inference and constraint solving;a class of polynomially solvable range constraints for interval analysis without widenings and narrowings;a partial order semantics approach to the clock explosion problem of timed automata;lower and upper bounds in zone based abstractions of timed automata;a scalable incomplete test for the boundedness of UML RT models;automatic verification of time sensitive cryptographic protocols and simulation-based verification of autonomous controllers via livingstone pathfinder.
the decision of a problem of increase of accuracy strapdown attitude and navigation systems is considered. the analysis of errors strapdown systems is executed by the example of three variants of attitude parameters a...
详细信息
ISBN:
(纸本)5900780597
the decision of a problem of increase of accuracy strapdown attitude and navigation systems is considered. the analysis of errors strapdown systems is executed by the example of three variants of attitude parameters and for two circuits of processing of the measuring information - on the basis of matrix and integral algorithms. Researches were carried out on an interval of angular rotation 1 hour and on trajectories of more difficult, than conic rotation. the opportunity of the reckoning accuracy increase of attitude parameters is shown by transition to a integral-matrix method of construction of the strap-down system algorithms which description is resulted on the basis of use z-transformation with reference to the circuit of processing of the measuring information. Results of modelling strapdown attitude system are resulted.
the modern queueing theory is one of the powerful tools for a quantitative and qualitative analysis of communication systems, computer networks, transportation systems, and many other technical systems. the paper is d...
详细信息
ISBN:
(纸本)1842331167
the modern queueing theory is one of the powerful tools for a quantitative and qualitative analysis of communication systems, computer networks, transportation systems, and many other technical systems. the paper is designated to the analysis of queueing systems, arising in the networks theory and communications theory (called open queueing network). the authors of this research in the sphere of queueing theory present the theorem about the law of the iterated logarithm (LIL) for the queue length of a customers in open queueing network and its application to the mathematical model of the open message switching system.
暂无评论