An auction model is used to increase the individual profits for market players with products they do not use. A Financial Transmission Rights Auction has the goal of trade transmission rights between Bidders and helps...
详细信息
An auction model is used to increase the individual profits for market players with products they do not use. A Financial Transmission Rights Auction has the goal of trade transmission rights between Bidders and helps them raise their own profits. the ISO plays a major rule on keep the system in technical limits without interfere on the auctions offers. In some auction models the ISO decide want bids are implemented on the network, always withthe objective maximize the individual profits for all bidders in the auction. this paper proposes a methodology for a Financial Transmission Rights Auction and an informatics application. the application receives offers from the purchase and sale side and considers bilateral contracts as Base Case. this goal is maximize the individual profits within the system in their technical limits. the paper includes a case study for the 30 bus IEEE test case.
Various forms of pervasive computing environments are being deployed in an increasing number of areas including hospitals, homes and military settings. Entities in this environment provide rich functionalities (i.e. s...
详细信息
Various forms of pervasive computing environments are being deployed in an increasing number of areas including hospitals, homes and military settings. Entities in this environment provide rich functionalities (i.e. services). How to organize these heterogeneous and distributed entities to deliver user-defined services is challenging. Pantagruel is an approach to integrate a taxonomical description of a pervasive computing environment into a visual programming language. A taxonomy describes the relevant entities of a given pervasive computing area and serves as a parameter to a sensor-controller-actuator development paradigm. the orchestration of area-specific entities is supported by high-level constructs, customized with respect to taxonomical information. Pantagruel is also a language that describes and manages services. Further more, Pantagruel can be viewed as a high level service contract between the service designer and the program implementer. this paper presents a formalization of Pantagruel, both its syntax and semantics. Four kinds of static properties are stated based on the formalization. Predicate abstraction based algorithms are designed to verify the properties.
Mobile agents' paradigm and technology is emerging as a powerful tool for engineering highly dynamic, reconfigurable distributed systems and applications in heterogeneous environments. this paper proposes a statec...
详细信息
ISBN:
(纸本)9781424458288;9789774033964
Mobile agents' paradigm and technology is emerging as a powerful tool for engineering highly dynamic, reconfigurable distributed systems and applications in heterogeneous environments. this paper proposes a statecharts-based development process for implementing atomic read/write shared memory in mobile ad hoc networks(geoqurums approach), which allows for a seamless transition from the specification of mobile agent behavior to its implementation and adaptation to target mobile agent systems. In particular. modeling of the mobile agent behavior is visual and its coding is seamlessly supported by the Mobile Active Object Framework(MAOF). the coded agent behavior can be adapted to platform-specific mobile agents by means of the Mobile Agent Adaptation Framework(MAAF). thus, enabling re-use of existing mobile agent systems.
Open source software (OSS) has been widely accepted as one of reuse methods to develop software applications in industry. OSS is well known for free software which can be used with freedoms on costs and copyrights. No...
详细信息
Open source software (OSS) has been widely accepted as one of reuse methods to develop software applications in industry. OSS is well known for free software which can be used with freedoms on costs and copyrights. Nonetheless, when it comes to compliances of OSS licenses, different licenses have different duties to which users should conform. Furthermore, if the software using OSS is commercial, the conformance of OSS license compliances gets more critical. However, it is not easy for the commercial software developers to fully comply with compliances of OSSs due to the absence of a support system a management system allowing the developers to satisfy the compliances. In this paper, we present a practical management framework for commercial software development with OSS. In the framework, we define a development process including activities, instructions, and artifacts to use OSS. We also present practices on providing infrastructure and organizational support as well as defining education curriculum. And finally we discuss lessons, issues, and further directions.
this paper presents an approach to automatically distinguish the copied clone from the original in a pair of clones. It matches the line-by-line version information of a clone to the pair's other clone. A case stu...
详细信息
this paper presents an approach to automatically distinguish the copied clone from the original in a pair of clones. It matches the line-by-line version information of a clone to the pair's other clone. A case study on the GNOME Desktop Suite revealed a complex flow of reused code between the different subprojects. In particular, it showed that the majority of larger clones (with a minimal size of 28 lines or higher) exist between the subprojects and more than 60% of the clone pairs can be automatically separated into original and copy.
Deformation mechanisms of Mg89Zn4Y7 (at.%) extruded alloy, which is mostly composed of LPSO-phase, was investigated focusing on their temperature dependence. the yield stress of as-extruded alloy showed extremely high...
详细信息
ISBN:
(纸本)0878492550
Deformation mechanisms of Mg89Zn4Y7 (at.%) extruded alloy, which is mostly composed of LPSO-phase, was investigated focusing on their temperature dependence. the yield stress of as-extruded alloy showed extremely high value of similar to 480 MPa at RT, but it largely decreased to similar to 130 MPa at 300 degrees C. the decreasing rate of the yield stress could be significantly reduced, however, by the annealing of specimen at 400 degrees C, by suppressing the microyielding which is considered to occur related by the grain boundary sliding in restricted regions. the yield stress of the annealed specimens with random textures could be estimated by the liall-Petch relationship by regarding the length of long-axis of plate-like grains as a grain size between RT and 300 degrees C. the yield stress of the annealed specimens maintained high values even at 200 degrees C, but it also showed large decreases at 300 degrees C.
Wireless channels provide an extremely challenging scenario to support quality data and multi-media services. In this paper, we consider the scenario of supporting vector delay-limited wireless multimedia services suc...
详细信息
ISBN:
(纸本)9781424458288;9789774033964
Wireless channels provide an extremely challenging scenario to support quality data and multi-media services. In this paper, we consider the scenario of supporting vector delay-limited wireless multimedia services such as Constant Bit Rate (CBR) wireless video, where certain desired amount of data need to be transmitted through a vector channel within a given delay. We focus on the problem of energy minimization under target delay-limited rate and bit error rate constraints. We develop an adaptive modulation scheme for single user wireless systems for generic vector wireless communications systems model. In this paper we extend previous works on this problem to provide a recursive closed form solution that reduces memory requirements and make it suitable for real-time deployments. through simulations we find improvements in average bit energy as we increase the delay.
Software metrics provide essential means for software practitioners to assess its quality. However, to assess software quality, it is important to assess its UML models because of UML wide and recent usage as an objec...
详细信息
ISBN:
(纸本)9781424458288;9789774033964
Software metrics provide essential means for software practitioners to assess its quality. However, to assess software quality, it is important to assess its UML models because of UML wide and recent usage as an object-oriented modeling language. But the issue is which type of software metrics can be utilized on UML models. One of the most important software metrics suite is Chidamber and Kemerer metrics suite, known by CK suite. In the current work, an automated tool is developed to compute the six CK metrics by gathering the required information from class diagrams, activity diagrams, and sequence diagrams. In addition, extra information is collected from system designer, such as the relation between methods and their corresponding activity diagrams and which attributes they use. the proposed automated tool operates on XMI standard file format to provide independence from a specific UML tool. To evaluate the applicability and quality of this tool, it has been applied to two examples: an online registration system and one of the bioinformatics Microarray tools (MIDAS).
Design-level vulnerabilities are a main source of security risks in software. To improve the reliability of software design, this paper presents a modified threat-driven modeling framework, to determine which threats ...
详细信息
ISBN:
(纸本)9781424458288;9789774033964
Design-level vulnerabilities are a main source of security risks in software. To improve the reliability of software design, this paper presents a modified threat-driven modeling framework, to determine which threats require mitigation and how to mitigate the threats. To specify the functions and threat mitigations of a security design as a whole, aspect-oriented Stochastic Petri nets are used as a formal amplified model. Moreover, this paper proposes an adapted augmented approach to define software security metrics based on vulnerabilities included in the software systems and their impacts on software quality. the Common Vulnerability Scoring System (CVSS), a vulnerability scoring system designed to provide a standardized method for rating software vulnerabilities, is used as the basis in the metric definition and calculations. Furthermore, a case study is detailed, which shows the essence and feasibility of using aspect-oriented stochastic Petri net models for threat modeling and that the proposed security metrics are consistent with common practice.
暂无评论