Parallel programming is returning to importance. functionalprogramming ideas offer a way to break through the barriers that restrict parallel programmers, dramatically simplifying how parallelism can be exploited. th...
详细信息
ISBN:
(纸本)9783642213380
Parallel programming is returning to importance. functionalprogramming ideas offer a way to break through the barriers that restrict parallel programmers, dramatically simplifying how parallelism can be exploited. this paper explores some ideas of abstraction from functionalprogramming, showing how functionalprogramming offers opportunities to deal with real problems of parallelism.
this paper presents a new approach meant to provide an automatic design of feed forward neural models by means of multiobjective graph genetic programming. the suggested algorithm can deal with partially interconnecte...
详细信息
One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have signif...
详细信息
ISBN:
(纸本)9781424495375
One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, we propose a new method to find joint policies for SUs which not only tries to guarantee QoS requirements but also maximize network throughput. We use Decentralized Partially Observable Markov Decision Process (Dec-POMDP) to formulate interactions between SUs. Meanwhile, a tractable approach for Dec-POMDP is utilized to extract suboptimum joint policies for large horizons. Among these policies, the QoS-aware joint policy is selected as the joint sensing strategy for SUs. To show the efficiency of the proposed method, we consider two SUs trying to access two-channel primary users (PUs) network modeled by discrete Markov chains. Simulations demonstrate two interesting findings: 1-Optimum joint policies for large horizons can be obtained using the proposed method. 2-Our method outperforms other related works in terms of network throughput.
Conformance of implementations to protocol specifications is essential to assure interoperability between peers in network communications. Monitoring or passive testing techniques are used when no access to the commun...
详细信息
ISBN:
(纸本)9781612081236
Conformance of implementations to protocol specifications is essential to assure interoperability between peers in network communications. Monitoring or passive testing techniques are used when no access to the communication interfaces is available or when the normal operation of the system cannot be interrupted. Most monitoring techniques only consider control portion of exchanged messages, usually ignoring the data part. However, as protocols become more complex and message exchange more data intensive, testing for data relations and constraints between exchanged messages becomes essential. In this paper we propose a novel approach for defining such relations as properties called invariants and show how they can be tested directly on traces using logic programming. Experimental results for SIP protocol traces are provided.
In the standard IEC 61508 miscellaneous architectures for safety related systems are introduced. Depending on the required safety, reliability and availability levels several architectures such as 1002-, 2002-, 1003-,...
详细信息
the common approach to include non-functional requirements in tool chains for hardware/software embedded systems requires developers to manually change the software code and/or the hardware, in an error-prone and tedi...
详细信息
ISBN:
(纸本)9781457704345
the common approach to include non-functional requirements in tool chains for hardware/software embedded systems requires developers to manually change the software code and/or the hardware, in an error-prone and tedious process. In the REFLECT research project we explore a novel approach where safety requirements are described using an aspect-and strategy-oriented programming language, named LARA, currently under development. the approach considers that the weavers in the tool chain use those safety requirements specified as aspects and strategies to produce final implementations according to specific design patterns. this paper presents our approach including LARA-based examples using an avionics application targeting the FPGA-based embedded systems consisting of a general purpose processor (GPP) coupled to custom computing units.
the paper relates to practical aspects of insertion modeling. Insertion modeling system is an environment for the development of insertion machines, used to represent insertion models of distributed systems. the archi...
详细信息
the paper relates to practical aspects of insertion modeling. Insertion modeling system is an environment for the development of insertion machines, used to represent insertion models of distributed systems. the architecture of insertion machines and insertion modeling system IMS is presented. Insertion machine for constraint programming is specified as an example, and as a starting point of 'verifiable programming' project.
Area exploration and mapping with teams of robots is a challenging application. As the complexity of this application increases so does the challenge of designing effective coordinated control. One potential solution ...
详细信息
暂无评论