the Gridbus workflow management system (GWMS) is designed to execute scientific applications, expressed in the form of workflows, onto Grid and Cloud resources. Withthe help of this system, we demonstrate a computati...
详细信息
the Forensic Lucid programming language is being developed for inten- sional cyberforensic case specification and analysis, including the syntax and oper ational semantics. In significant part, the language is based o...
详细信息
Electric powered wheelchair (EPW) controllers have not seen substantial improvement since the introduction of the microprocessor. there are no features that warn the driver of danger or help keep the EPW under control...
详细信息
ISBN:
(纸本)9780889867406
Electric powered wheelchair (EPW) controllers have not seen substantial improvement since the introduction of the microprocessor. there are no features that warn the driver of danger or help keep the EPW under control in adverse conditions such as slipping or tipping. With an estimated 300,000 EPWs in use in the United States and the population of older adults increasing rapidly, the need for safer control systems for EPWs is a priority. this paper presents in detail the electronic, mechanical, and software design used in developing a smart controller for EPWs. A single board computer provides the computational power and storage space needed to execute normal operations, complex safety algorithms, and extensive data logging. An array of sensors connects to the computer, providing feedback on velocity, inertia, caster angle, and obstacle range. A rugged aluminum enclosure protects the electronics and provides connectors for all the sensors. A real-time operating system is used as the basis for programming. the software architecture uses a 3 level hierarchical structure that organizes tasks based on periodicity, priority, and computational load. the goal of this project is to demonstrate what can be done with an EPW to enhance the mobility, participation, and safety of its occupant.
this paper makes use of the characteristics of the Petri net, which describes the discrete event system effectively. Based on the principle of Petri net in arrangement and the characteristic of the earthwork allocatio...
详细信息
Peer-to-peer overlays provide a substrate well suited to building distributed storage systems. Applications that use the infrastructure need the ability to control access to their data. However, traditional authorizat...
详细信息
ISBN:
(纸本)9781605582412
Peer-to-peer overlays provide a substrate well suited to building distributed storage systems. Applications that use the infrastructure need the ability to control access to their data. However, traditional authorization services were not designed to operate in the face of network partitions, malicious nodes, and on an Internet-wide scale. We describe the implementation of the Decentralized Authentication and Authorization Layer (DAAL), a mechanism to leverage the storage functionality of the overlay and obviate the need for an online, centralized access control service. the system can efficiently identify malicious nodes and continue to operate correctly when an arbitrary, predefined fraction of the network is unreachable (as occurs during an attack against the routing infrastructure or during a distributed denial-of-service attack). DAAL melds the access request efficiency of capability-based systems withthe revocation power of reference monitor-based access control lists. It avoids the use of distributed leases as they create a vulnerability window during which there is a gap between the security policy and configuration. Actualizing the design can be challenging. Hence, we describe the protocol details and how they can be abstracted behind a minimal, intuitive application programming interface. As a proof of concept, we implemented DAAL as a Java prototype on a 200-node peer-to-peer overlay distributed across the world. Copyright 2008 ACM.
this paper presents the design and implementation of an open visual object-oriented programming environment (VOOPE). the environment supports a programming approach in which a program is created using extended visual ...
详细信息
this paper presents the design and implementation of an open visual object-oriented programming environment (VOOPE). the environment supports a programming approach in which a program is created using extended visual objects (EVOs) - the objects having visual forms and dynamic behaviors. the environment allows creation of EVOs and modification of their behavior to adapt the changing software requirements. thereby, VOOPE allows incremental software development using the learning capability of EVOs without rebuilding the software.
To quickly localize defects, we want our attention to be focussed on relevant failing tests. We propose to improve defect localization by exploiting dependencies between tests, using a JUNIT extension called JEXAMPLE....
详细信息
ISBN:
(纸本)9783540682547
To quickly localize defects, we want our attention to be focussed on relevant failing tests. We propose to improve defect localization by exploiting dependencies between tests, using a JUNIT extension called JEXAMPLE. In a case study, a monolithic white-box test suite for a complex algorithm is refactored into two traditional JUNIT style tests and to JEXAMPLE. Of the three refactorings, JEXAMPLE reports five times fewer defect locations and slightly better performance (-8-12%), while having similar maintenance characteristics. Compared to the original implementation, JEXAMPLE greatly improves maintainability due the improved factorization following the accepted test quality guidelines. As such, JEXAMPLE combines the benefits of test chains with test quality aspects of JUNIT style testing.
—In delay tolerant networks, custody transfer can provide certain degree of reliability as a custodian node cannot discard a message unless its life time expires or the custody is transferred to another node after a ...
详细信息
When the training subset of a support vector machine contains fuzzy information, the support vector machine won't work. A method for calculating fuzzy linear separable support vector classifier is discussed. With ...
详细信息
When the training subset of a support vector machine contains fuzzy information, the support vector machine won't work. A method for calculating fuzzy linear separable support vector classifier is discussed. Withthe given confidence level, convert the fuzzy classification problem into finding the fuzzy chance constrained programming, and establish a solution finding theory with fuzzy chance constrained programming crisp equivalence programming dual programming. A algorithm for fuzzy linear separable support vector classifier is derived: given the fuzzy training subset of a fuzzy linear separable problem and selecting appropriate confidential level, construct appropriate quadratic programming equation;find the optimal solution of the quadratic programming;construct optimal separating hyperplane, find the optimal classification function, and establish new training subset;construct support vector regression machine withthe new training subset, get the regression functions, and establish the membership function of the optimal classification function from these;lastly, find the optimal solution. the algorithm is also verified with given data.
this paper propose the use of the Fuzzy Analytical Hierarchy process (FAHP) and Goal programming (GP) as an aid in making location-allocation decision and suggest a systematic method for the site selection and product...
详细信息
this paper propose the use of the Fuzzy Analytical Hierarchy process (FAHP) and Goal programming (GP) as an aid in making location-allocation decision and suggest a systematic method for the site selection and product allocation problem. the method can be seen as a decision support framework, which links various objectives, subjective and critical factors in the location-allocation problem to make an optimal decision in which fits best for both operations managers and investors. Important advantages of applying the framework are (1) the ability to decompose the complex problem in smaller problems, (2) the possibility of an efficient and effective contribution of operations managers and investors in decision making process, (3) the detail assessment of the selected location alternative. A demonstration of the application of this methodology in tea industry in Iran is presented.
暂无评论