Product organizations often need to develop variants of the same basic product. All the product development life-cycle artifacts from requirements documents to testing artifacts have to be developed for each variant. ...
详细信息
ISBN:
(纸本)1891706268
Product organizations often need to develop variants of the same basic product. All the product development life-cycle artifacts from requirements documents to testing artifacts have to be developed for each variant. Storing these artifacts as core assets and structuring them as units that can be composed to get the final artifacts can greatly reduce the cost and improve the quality of the resultant product. This paper proposes a structural alignment of core assets corresponding to the various phases of software development to features of the product family and aspect weaving as a core assets composition operator. Aspect Oriented programming (AOP) is used for code and an aspect oriented extension to XML is used for other artifacts. These ideas are validated through a prototype toolset that captures the complete Software Development Life Cycle (SDLC) process and allows the user to model the commonalities and variations as features, associate them to core assets and build the product automatically. This paper presents our approach and the details of the toolset along with a case study of a Library System.
AI Planning typically deals with the causal relations between the actions while the role of explicit time and limited resources is suppressed. The recent trends show that integrating time and resource reasoning into p...
详细信息
AI Planning typically deals with the causal relations between the actions while the role of explicit time and limited resources is suppressed. The recent trends show that integrating time and resource reasoning into planning significantly improves direct applicability of planning technology in real-life problems. In this paper we propose a suboptimal domain-independent planning system Filuta that focuses on planning, where explicit time plays a major role and resources are constrained. We benchmark Filuta on the planning problems from the international Planning Competition (IPC) 2008 and compare our results with the competition participants.
We present simulations and measurements of the sensitivity of a master-slave emitter-coupled logic (ECL) latched comparator implemented in an InP/GaInAs DHBT technology. The circuit exhibited simulated and experimenta...
详细信息
We present simulations and measurements of the sensitivity of a master-slave emitter-coupled logic (ECL) latched comparator implemented in an InP/GaInAs DHBT technology. The circuit exhibited simulated and experimental sensitivities of 11.5 mV and 17 mV, respectively, at a clock rate of 20 GHz, with no preamplifier.
Novel three-terminal field-induced charge-separation lasers (FICSLs) in VCSEL form were designed and fabricated. The new gain modulation mechanism of hole-electron separation was demonstrated for the first time by app...
详细信息
Novel three-terminal field-induced charge-separation lasers (FICSLs) in VCSEL form were designed and fabricated. The new gain modulation mechanism of hole-electron separation was demonstrated for the first time by applying a variable gate voltage with a constant injection current to the active region.
This paper addresses a new uncertainty set - interval random uncertainty set for robust Value-at-Risk optimization. The form of interval random uncertainty set makes it suitable for capturing the downside and upside d...
详细信息
This paper addresses a new uncertainty set - interval random uncertainty set for robust Value-at-Risk optimization. The form of interval random uncertainty set makes it suitable for capturing the downside and upside deviations of real-world data. These deviation measures capture distributional asymmetry and lead to better optimization results. We also apply our interval random chance-constrained programming to robust Value-at-Risk optimization under interval random uncertainty sets in the elements of mean vector. Numerical experiments with real market data indicate that our approach results in better portfolio performance.
Some shortest path problems that can be solved using the A* algorithm have a large branching factor due to the combination of multiple choices at each move. Multiple sequence alignment and multi-agent pathfinding are ...
详细信息
Some shortest path problems that can be solved using the A* algorithm have a large branching factor due to the combination of multiple choices at each move. Multiple sequence alignment and multi-agent pathfinding are examples of such problems. If the search can be stopped after each choice instead of being stopped at each combination of choices, it takes much less memory and much less time. The goal of the paper is to show that Partial Move A* is much better than A* for these problems when the branching factor is large due to a large combination of choices at each move. When there is such a large combination of choices at each move, Partial Move A* can yield large memory gains and speedups over regular A*.
Reliability and/or availability are increasingly important aspects in the design of systems, especially networks and service offerings. Optimization here is a multi-criteria process finding the right compromise betwee...
详细信息
Reliability and/or availability are increasingly important aspects in the design of systems, especially networks and service offerings. Optimization here is a multi-criteria process finding the right compromise between cost and quality. At the same time, results should be explored online, either as part of interactive, user-centric design tools or for Web based service negotiation. In this paper we consider a generic method for multi-criteria optimization based on reliability/availability graphs, but also provide a more specialized solution for dealing with the widely used reliability/availability block diagrams. Initial experiments show that the techniques can be applied to realistic problem sizes from the literature.
We have experimentally investigated the trade-offs involved in thinning down the channel of III-V FETs with the ultimate goal of enhancing the electrostatic integrity and scalability of these devices. To do so, we hav...
详细信息
We have experimentally investigated the trade-offs involved in thinning down the channel of III-V FETs with the ultimate goal of enhancing the electrostatic integrity and scalability of these devices. To do so, we have fabricated InAs HEMTs with a channel thickness of t ch = 5 nm and we have compared them against, InAs HEMTs with t ch = 10 nm. The fabricated thin-channel devices exhibit outstanding logic performance and scalability down to 40 nm in gate length. L g = 40 nm devices exhibit S = 72 mV/dec, DIBL = 72 mV/V, and I ON /I OFF = 2.5 × 10 4 , all at V DS = 0.5 V. However, there are trade-offs of using a thin channel which manifest themselves in a higher source resistance, lower transconductance, and lower f T when compared with InAs HEMTs with t ch = 10 nm.
As an accepted part of life, inconsistency is ubiquitous in knowledge, information and data. Inconsistency is a very important phenomenon and can be utilized as an effective tool to help accomplish the objectives in o...
详细信息
As an accepted part of life, inconsistency is ubiquitous in knowledge, information and data. Inconsistency is a very important phenomenon and can be utilized as an effective tool to help accomplish the objectives in our endeavors. In this paper, we focus our attention on the logical forms in which antagonistic propositions (or inconsistent knowledge) manifest themselves in knowledge systems and how we quantify different antagonistic manifestations of knowledge. We describe algorithms that quantify twelve types of inconsistency that include: complementary, mutually exclusive, incompatible, anti-subsumption, anti-supertype, asymmetric, anti-inverse, mismatching, disagreeing, contradictory, precedence, and probabilistic value inconsistency. The take-home message is that there are circumstances in knowledge systems where inconsistencies arise in logical forms other than just a pair of complementary literals.
In cooperative intrusion detection, several intrusion detection systems (IDS), network analyzers, vulnerability analyzers and other analyzers are deployed in order to get an overview of the system under consideration....
详细信息
In cooperative intrusion detection, several intrusion detection systems (IDS), network analyzers, vulnerability analyzers and other analyzers are deployed in order to get an overview of the system under consideration. In this case, the definition of a shared vocabulary describing the different information is prominent. Since these pieces of information are structured, we first propose to use description logics which ensure the reasoning decidability. Besides, the analyzers used in cooperative intrusion detection are not totally reliable. The second contribution of this paper is to handle these inconsistencies induced by the use of several analyzers using the so-called partial lexicographic inference.
暂无评论