In parallel and distributed computing, development of an efficient static task scheduling algorithm for directed acyclic graph (DAG) applications is an important problem. The static task scheduling problem is NP-compl...
详细信息
Wireless sensor and actuator networks (WS&ANs) are a new technology based on networks of small radio-enabled embedded devices that are being deployed in areas such as environmental monitoring, vehicle tracking, bu...
详细信息
Multi-core processor technology has been applied to the processors in embedded systems as well as in ordinary PC systems. In multi-core embedded processors, however, a processor may consist of heterogeneous CPU cores ...
详细信息
For a practical environmental laboratory, many environmental test chambers are needed, and any central control system designed for them would face the problems listed as follow: 1. Different protocol types. 2. Differe...
详细信息
For a practical environmental laboratory, many environmental test chambers are needed, and any central control system designed for them would face the problems listed as follow: 1. Different protocol types. 2. Different connecting interfaces. 3. Different operating method. 4. Large distributed area. To address these problems, a laboratory central control system (LCCS) architecture is proposed in this paper, and the application software is then developed to monitor and control 15 chambers in one of the environmental laboratories in Chengdu City. This application demonstrates great value in increasing the efficiency of the environment test in that laboratory.
It has been identified that as complexity of computing and communication devices increases, fault-tolerance will gain more and more importance. Wireless sensor networks (WSNs) are exceptionally complex distributed sys...
详细信息
Run-time verification checks whether the active execution traces of an application fulfills its specified behavior and is especially applicable when one needs to consider the actual execution context in the verificati...
详细信息
Run-time verification checks whether the active execution traces of an application fulfills its specified behavior and is especially applicable when one needs to consider the actual execution context in the verification. In today's practices, software is more and more distributed over multiple processes, possibly running at different locations. This is supported by middleware that, to some extend, allows implementing applications in a distribution-transparent way. We define four requirements for the effective verification of such software: 1) abstraction of less-critical details of software behavior due to the complexity of software behavior, 2) distribution-transparent specification of software behavior, as software is also implemented in such a way, 3) end-to-end verification of behavior, and 4) automatic generation of verification modules for arbitrary process and distribution structures. The existing runtime verification systems fall in short to fulfill these requirements, therefore their applicability is limited. We develop the E-Chaser runtime verification system to facilitate the verification of distributedsoftware by addressing these requirements. This paper explains the approach and the prototype implementation of E-Chaser based on the Java-RMI technology.
Urban distributed lifelines constitute critical infrastructure elements with their continuous interaction guaranteeing the service and well-being of growing urban populations. However, their interdependence and exposu...
详细信息
The goal of radiation therapy is to give as much dose as possible to the exact target location and minimizing any dose to a normal tissue. Advances of Cyber-physical control systems allow planning and provide very acc...
详细信息
The goal of radiation therapy is to give as much dose as possible to the exact target location and minimizing any dose to a normal tissue. Advances of Cyber-physical control systems allow planning and provide very accurate treatments. However, the current technology does not sufficiently compensate a respiratory movement, that is especially important incase of lung (area) cancer. In this paper we present a model of radiation treatment system developed to analyze a system that compensates respiratory motion. We use Uppaal, an integrated tool environment for modeling, validation and verification of real-time systems modeled as networks of timed automata, extended with data types (bounded integers, arrays, etc.).
In network based applications, packet capture is the main area that attracts many researchers in developing traffic monitoring systems. Along with the packet capture, many other functions such as security are incorpor...
详细信息
Resisting spam in tagging system is very challenging. This paper presents Sitab, a novel spam-resistant tagging system which can significantly diminish spam in tag search results based on users' implicit tagging b...
详细信息
Resisting spam in tagging system is very challenging. This paper presents Sitab, a novel spam-resistant tagging system which can significantly diminish spam in tag search results based on users' implicit tagging behavior. Sitab is trained to obtain the weights of the client's each type of implicit tagging behavior. For each tag search, Sitab ranks each resource in the results list according to its relevance degree which is calculated by the client's implicit tagging behavior with respect to that resource. Experimental results show that Sitab can effectively resist tag spam and work better than existing tag search schemes, especially in systems with large amount of spam tags.
暂无评论