the proceedings contain 50 papers. the topics discussed include: a compositional modelling framework for exploring MPSoC systems;a high-level virtual platform for early MPSoC software development;on compile-time evalu...
ISBN:
(纸本)9781605586281
the proceedings contain 50 papers. the topics discussed include: a compositional modelling framework for exploring MPSoC systems;a high-level virtual platform for early MPSoC software development;on compile-time evaluation of process partitioning transformations for kahn process networks;SARA: StreAm register allocation;dynamically utilizing computation accelerators for extensible processors in a software approach;scalable and retargetable simulation techniques for multiprocessor systems;an on-chip interconnect and protocol stack for multiple communication paradigms and programming models;a monitoring and adaptive routing mechanism for QoS traffic on mesh NoC architectures;a DP-network for optimal dynamic routing in network-on-chip;LOP: a novel SRAM-based architecture for low power and high throughput packet classification;memory-efficient distribution of regular expressions for fast deep packet inspection;and on-the-fly hardware acceleration for protocol stack processing in next generation mobile devices.
Secure interoperation is an increasingly important issue for large-scale enterprise applications. In this paper, we investigate, through constraint logic programming (CLP), secure interoperation in collaborating envir...
详细信息
In wide-enterprise information system, a Garbage Collector (GC) is a critical memory management process in programming languages such as C++. the programmers need to be aware about memory management and can't be r...
详细信息
A growing number of applications, with diverse requirements, are integrated on the same System on Chip (SoC) in the form of hardware and software Intellectual Property (IP). the diverse requirements, coupled withthe ...
详细信息
ISBN:
(纸本)9781605586281
A growing number of applications, with diverse requirements, are integrated on the same System on Chip (SoC) in the form of hardware and software Intellectual Property (IP). the diverse requirements, coupled withthe IPs being developed by unrelated design teams, lead to multiple communication paradigms, programming models, and interface protocols that the on-chip interconnect must accommodate. Traditionally, on-chip buses offer distributed shared memory communication with established memory-consistency models, but are tightly coupled to a specific interface protocol. On-chip networks, on the other hand, offer layering and interface abstraction, but are centred around point-to-point streaming communication, and do not address issues at the higher layers in the protocol stack, such as memory-consistency models and message-dependent deadlock. In this work we introduce an on-chip interconnect and protocol stack that combines streaming and distributed shared memory communication. the proposed interconnect offers an established memory-consistency model and does not restrict any higher-level protocol dependencies. We present the protocol stack and the architectural blocks and quantify the cost, both on the block level and for a complete SoC. For a multi-processor multi-application SoC with multiple communication paradigms and programming models, our proposed interconnect occupies only 4% of the chip area. Copyright 2009 ACM.
this paper investigates the problem of global robust stabilization by state feedback, for a family of high order feedforward (upper-triangular) nonlinear systems with delayed input. the uncertain nonlinearities are as...
详细信息
ISBN:
(纸本)9781424454402
this paper investigates the problem of global robust stabilization by state feedback, for a family of high order feedforward (upper-triangular) nonlinear systems with delayed input. the uncertain nonlinearities are assumed to satisfiy a polynomial growth assumption with a constant growth rate. the designed controllers, which are continuous but not smooth feedbacks, could achieve global asymptotical stability. Based on the appropriate state transformation of time-delay systems, the problem of controller design can be converted into the problem of finding a parameter, which can be gotten by appraising the nonlinear terms of the systems. An example is given to show the effectiveness of the proposed design procedure.
Nowadays the possibilities of evolutionary algorithms are widely used in many optimization and classification tasks. Evolutionary algorithms are stochastic search methods that try to emulate Darwin's principle of ...
详细信息
ISBN:
(纸本)9789984440286
Nowadays the possibilities of evolutionary algorithms are widely used in many optimization and classification tasks. Evolutionary algorithms are stochastic search methods that try to emulate Darwin's principle of natural evolution. there are (at least) four paradigms in the world of evolutionary algorithms: evolutionary programming, evolution strategies, genetic algorithms and genetic programming. this paper analyzes present-day approaches of genetic algorithms and genetic programming and examines the possibilities of genetic programmingthat will be used in further research. the paper presents implementation examples that show the working principles of evolutionary algorithms.
the separation of concerns (SOC), as a conceptual tool, enables us to manage the complexity of the software systems that we develop. When the idea is taken further to software packaging, greater reuse and maintainabil...
详细信息
ISBN:
(纸本)9781424438075
the separation of concerns (SOC), as a conceptual tool, enables us to manage the complexity of the software systems that we develop. When the idea is taken further to software packaging, greater reuse and maintainability are achieved. One of the methods of SOC is view-oriented programming (VOP) in which an object can change its behaviors and play different roles (views) in their lifecycle. In VOP, an object's response to a message depends on the views currently attached to its core instance. this view-programming suffers from security issues to protect the privileges of each client who needs to access different views of the same object. In a previous article, we introduced a view security model based on changing the signature of each method to authenticate a client privileges to access object views. In this paper, we present the main parts of our views security model without changing each method signature. Java security model is applied to views to support transparent authentication. these issues are discussed through an example.
During the last two decades, monads have become an indispensable tool for structuring functional programs with computational effects. In this setting, the mathematical notion of a monad is extended with operations tha...
详细信息
ISBN:
(纸本)9783642005893
During the last two decades, monads have become an indispensable tool for structuring functional programs with computational effects. In this setting, the mathematical notion of a monad is extended with operations that allow programmers to manipulate these effects. When several effects are involved, monad transformers can be used to build up the required monad one effect at a time. Although this seems to be modularity nirvana, there is a catch: in addition to the construction of a monad, the effect-manipulating operations need to be lifted to the resulting monad. the traditional approach for lifting operations is non-modular and ad-hoc. We solve this problem with a principled technique for lifting operations that makes monad transformers truly modular.
this paper presents the Total Optimisation using Answer Set Technology (TOAST) system, which can be used to generate optimal code sequences for machine architectures via if technique known as superoptimisation. Answer...
详细信息
ISBN:
(纸本)9783642042379
this paper presents the Total Optimisation using Answer Set Technology (TOAST) system, which can be used to generate optimal code sequences for machine architectures via if technique known as superoptimisation. Answer set programming (ASP) is utilised as the modelling and computational framework for searching over the large. complex search spaces and for proving the functional equivalence of two code sequences. Experimental results are given showing the progress made in solver performance over the previous few years, along with an Outline Of future developments to the system and applications within compiler toolchanis.
the proceedings contain 21 papers. the topics discussed include: usability issues in description logic knowledge base completion;the advent of formal diagrammatic reasoning systems;the logic of learning;time and logic...
ISBN:
(纸本)9783642018145
the proceedings contain 21 papers. the topics discussed include: usability issues in description logic knowledge base completion;the advent of formal diagrammatic reasoning systems;the logic of learning;time and logic: A.N. prior's formal analysis of temporal concepts;factor analysis of incidence data via novel decomposition of matrices;a unified hierarchy for functional dependencies, conditional functional dependencies and association rules;robust elements in rough set abstractions;some computational problems related to pseudo-intents;yet a faster algorithm for building the Hasse diagram of a concept lattice;context graphs-representing formal concepts by connected subgraphs;handling large formal context using BDD - perspectives and limitations;a novel approach to cell form;identifying ecological traits: a concrete FCA-based approach;and a concept lattice-based kernel for SVM text classification.
暂无评论