Real Time embedded system designers are facing extreme challenges in underlying architectural design selection. It involves the selection of a programmable, concurrent, heterogeneous multiprocessor architecture platfo...
详细信息
ISBN:
(纸本)9781424400379
Real Time embedded system designers are facing extreme challenges in underlying architectural design selection. It involves the selection of a programmable, concurrent, heterogeneous multiprocessor architecture platform. Such a multiprocessor system on chip (MPSoC) platform has set new innovative trends for the real-time systems and system on Chip (SoC) designers. the consequences of this trend imply the shift in concern from computation and sequential algorithms to modeling concurrency, synchronization and communication in every aspect of hardware and software co-design and development. With a billion transistors era, some of the main problems in deep sub-micron technologies characterized by gate lengths in the range of 60-90 nm arise from non scalable wire delays, errors in signal integrity and un-synchronized communication. these problems have been addressed by the use of packet switched Network on Chip (NOC) architecture for future SoCs and thus, real-time systems. Such a NOC based system should be able to support different levels of quality of service (QoS) to meet the real time systems requirements. thus, it becomes extremely critical to properly design a network interface (NI) and the communication backbone for NOC. In this paper we present a component based design of network interface and communication backbone which supports different levels of QoS. the design has been tested for an adaptive wormhole routing with proactive turn prohibition to guarantee deadlock free on chip communication for NOC architecture. In this work we propose to use the modified turn prohibition (MTP), which has been shown to perform better than up/down and the turn prohibition.
the emergence of Learning Objects in learning technology has had a big impact on the learning environment and its community. Teachers and students have more facilities for using the E-Learning system, which has made t...
详细信息
Internet and wireless technologies have flattened the world by revolutionizing the exchange of information among individuals and organizations at a global scale over the past decade. Similar technological forces have ...
详细信息
ISBN:
(纸本)3540372466
Internet and wireless technologies have flattened the world by revolutionizing the exchange of information among individuals and organizations at a global scale over the past decade. Similar technological forces have led to the emergence of embedded networked sensing systems, or sensor networks, that are bringing about the next revolution. this new local revolution is making the world "transparent" by enabling observation of physical, biological, chemical, enterprise, urban, social, and personal processes up close, and at spatial and temporal details that are simply impossible otherwise. Already this technology has led to new science resulting from observation of new phenomena in areas ranging from the investigation of critical microclimate on the scale of a mountain canyon, to distribution of contaminants and their introduction into ground water supplies, to the fine-scale properties of alpine plants. the considerable progress in the past few years have also led to the realization that the early view of sensor networks as "smart dust" - a large and ad hoc but flat and homogeneous single-purpose long-lived collection of static resource-constrained devices - needs to be considerably expanded to a view of these systems as multi-scale, multi-modal, multi-user rapidlydeployable actuated observing systems. the talk will describe how the early technical challenges such as autonomous self-configuration, energyaware protocols, and efficient embedded software are now giving way to new challenges involving system and data integrity, safety and robustness, software re-configuration, and active sensing. Moreover, as the embedded sensing technology moves from scientific, engineering, defense, and industrial contexts to the wider personal, social and urban contexts, a new class of applications are emerging which draw on sensed information about people, objects, and physical spaces, and integrate withthe global Internet and cellular infrastructure. the talk will discuss the priva
Service-oriented architecture can improve e-Business applications to be integrated and flexible. this paper proposes a multi-model driven collaborative development platform for service-oriented e-Business systems. the...
详细信息
ISBN:
(纸本)142440164X
Service-oriented architecture can improve e-Business applications to be integrated and flexible. this paper proposes a multi-model driven collaborative development platform for service-oriented e-Business systems. the platform provides three views, i.e., business view, process view, and service view to support service-oriented softwareengineering, top-down business planning and bottom-up service-oriented application development. Business and technical consultants can collaborate from distributed sites of e.g., clients and IT vendors to provide their clients' with rapid development and demonstration. the proposed platform is driven by three models, i.e., service meta model, process model and business model. All of the three models support semantic description and rational operations, and facilitate intelligent service discovery, process execution and business-business integration. Concepts and implementation issues about the proposed platform has been presented in this paper. the platform has been developed and deployed in an innovation centre to be evaluated by visiting customers.
Real-Time Process Algebra (RTPA) is a mathematics-based notation system for the specification and refinement of real-time and safety-critical systems. this paper presents the work on designing and developing a set of ...
详细信息
ISBN:
(纸本)9781424400379
Real-Time Process Algebra (RTPA) is a mathematics-based notation system for the specification and refinement of real-time and safety-critical systems. this paper presents the work on designing and developing a set of tools that facilitate automatic generation of C++ code from RTPA specifications of system architectures and behaviors. A two-phrase strategy has been employed in the design of the toolkit. In the first phrase, an RTPA specification is lexically and syntactically analyzed and type-checked, which results in a set of abstract syntax trees. In the second phrase, C++ code is generated using the RTPA-to-C++ mapping strategies and patterns when walking down the abstract syntax trees. the RTPA-to-C++ mapping strategies specify boththe traditional sequential part of RTPA mapping onto the standard C++ library and the real-time features of RTPA, such as interrupt, concurrency, duration, and event/time-driven dispatch, mapping onto the RTPA run-time library, which provides real-time support and is implemented using real-time kernel techniques. the toolkit implemented includes an RTPA lexer, an RTPA parser, an RTPA type-checker, and an RTPA code-generator. the experimental results show that RTPA specifications can be rigorously checked and corresponding C++ code can be automatically generated from RTPA specifications using the toolkit. the automatically generated code is executable and effective under the support of the standard C++ library and the specially developed RTPA run-time library.
Security involves technical as well as social challenges. In the development of security-critical applications, system developers must consider boththe technical and the social parts. To achieve this, security issues...
详细信息
ISBN:
(数字)9783540346531
ISBN:
(纸本)354034652X
Security involves technical as well as social challenges. In the development of security-critical applications, system developers must consider boththe technical and the social parts. To achieve this, security issues must be considered during the whole development life-cycle of an information system. this paper presents an approach that allows developers to consider boththe social and the technical dimensions of security through a structured and well defined process. In particular, the proposed approach takes the high-level concepts and modelling activities of the secure Tropos methodology and enriches them with a low level security-engineering ontology and models derived from the UMLsec approach. A real case study from the e-commerce sector is employed to demonstrate the applicability of the approach.
Web-based intelligent tutoring technologies present a great improvement from traditional computer aided learning in K-12 settings. We created a Web-based intelligent tutoring system to teach a reading comprehension ap...
详细信息
Web-based intelligent tutoring technologies present a great improvement from traditional computer aided learning in K-12 settings. We created a Web-based intelligent tutoring system to teach a reading comprehension approach to elementary and middle school students. this paper reports on each phase of the waterfall design process: analysis, design, development, and implementation of the system. the audience for this paper includes software designers working to develop learning technologies
there are a lot of support systemsthat help in the performance of SI (system integration), which provides all the services needed by enterprises, from the planning of information systems to development, construction ...
详细信息
there are a lot of support systemsthat help in the performance of SI (system integration), which provides all the services needed by enterprises, from the planning of information systems to development, construction and management. However, these support systems are still labor-intensive and involve repetitive work. One of the works is the deployment of unit applications developed by different developers to the test environment or the working environment after building and gathering the applications. In this paper, an automation plan for the build-and-deploy process is presented through an investigation of KT's NeOSS (New Operations Support System), a large-scale SI project
A stress test methodology aimed at increasing chances of discovering faults related to network traffic in distributed systems is presented. the technique uses the UML 2.0 model of the distributed system under test, au...
详细信息
ISBN:
(纸本)1595933751
A stress test methodology aimed at increasing chances of discovering faults related to network traffic in distributed systems is presented. the technique uses the UML 2.0 model of the distributed system under test, augmented with timing information, and is based on an analysis of the control flow in sequence diagrams. It yields stress test requirements that are made of specific control flow paths along with time values indicating when to trigger them. Different variants of our stress testing technique already exist (they stress different aspects of a distributed system) and we focus here on one variant that is designed to identify and to stress test the system at the instant when data traffic on a network is maximal. Using a real-world distributed system specification, we design and implement a prototype distributed system and describe, for that particular system, how the stress test cases are derived and executed using our methodology. the stress test results indicate that the technique is significantly more effective at detecting network traffic-related faults when compared to test cases based on an operational profile. Copyright 2006 ACM.
this paper explores the nature of software and software development, discusses the importance of specialization in software development, and infers that separation of design and implementation is beneficial to softwar...
详细信息
ISBN:
(纸本)9781424404759
this paper explores the nature of software and software development, discusses the importance of specialization in software development, and infers that separation of design and implementation is beneficial to software development. It proposes that roles can be taken as a new mechanism to separate design from implementation. It presents an exciting innovative perspective of software development, i.e., role-based software development. Finally, it shows the most difficult and important tasks of role-based software development
暂无评论