Implementation of the main building block (compression function) for five different SHA-3 candidates on reconfigurable hardware is presented. The five candidates, namely Blue Midnight Wish, Luffa, Skein, Shabal, and B...
详细信息
This paper is the ?rst extensive performance study of a recently proposed parallel programming model, called Concurrent Collections (CnC). In CnC, the programmer expresses her computation in terms of application-speci...
详细信息
The proceedings contain 41 papers. The topics discussed include: Bayesian network inference with qualitative expert knowledge for decision support systems;semantic query validation in guided-based systems: assuring th...
ISBN:
(纸本)9780769540887
The proceedings contain 41 papers. The topics discussed include: Bayesian network inference with qualitative expert knowledge for decision support systems;semantic query validation in guided-based systems: assuring the construction of queries that make sense;user and item pattern matching in multi-criteria recommender systems;modeling of device collaboration process based on Petri net;CP-nets based methodology for integrating functional verification and performance analysis of network protocol;a novel security approach for critical information systems: preventing flooding in the non-authenticated client area using a new service from local network service providers;achieving flow-level controllability in network intrusion detection system;explaining classification by finding response-related subgroups in data;real-time implementation of synthetic aperture sonar imaging on high performance clusters;and recovering depth from a single image using dark channel prior.
UML models are widely used in software product line engineering for activities such as modeling the software product line reference architecture, detailed design, and automation of software code generation and testing...
详细信息
ISBN:
(纸本)9781424455096
UML models are widely used in software product line engineering for activities such as modeling the software product line reference architecture, detailed design, and automation of software code generation and testing. But in high-tech companies, modeling activities are typically distributed across multiple sites and involve multiple partners in different conntries, thus complicating model management. Today's UML modeling tools support sophisticated version management for managing parallel and distributed modeling. However, the literature does not provide a comprehensive set of industrial-level criteria to evaluate the version management capabilities of UML tools. This article's contribution is a framework for evaluating the version management features of UML modeling tools for multi-site, multi-partner software product line organizations.
This research targets formal modeling of embedded systems capable of self-management. In our approach, we use the ASSL (Autonomic System Specification Language) framework as a development environment, where self-manag...
详细信息
Today's emerging architectures have higher levels of parallelism incorporated within a processor. They require efficient strategies to extract the performance they have to offer. In our work, we develop architectu...
详细信息
Actual distribution networks have not been designed to accept extensive distributed Generation (DG). The present framework may change in the near future impelled by a worldwide increasing of DG penetration in distribu...
详细信息
ISBN:
(纸本)9781424463916
Actual distribution networks have not been designed to accept extensive distributed Generation (DG). The present framework may change in the near future impelled by a worldwide increasing of DG penetration in distribution grids. The mutual dependency of energy distribution and communication on the same grid requires new means to effectively monitor and control both systems in parallel. Relaying and control IEDs can also serve as measurement units for power quality. Synchronized measurement technology (SMT) has the potential of becoming the backbone of this paradigm. By using wide area information systems, the data can be made available to all involved partners. This paper provides different outlooks about the possibilities of Embedded systems to integrate the protection, control and monitoring functions in Distribution Automation systems.
We present new methods to extend data reliability of disks in RAID systems for applications like long term data archival. The proposed solutions extend existing algorithms to detect and correct errors in RAID systems ...
详细信息
Palacios is a new open-source VMM under development at Northwestern University and the University of New Mexico that enables applications executing in a virtualized environment to achieve scalable high performance on ...
详细信息
Business requirements for modern enterprise systems usually comprise a variety of dynamic constraints, i.e., constraints that require a complex set of context information only available at runtime. Thus, the efficient...
详细信息
ISBN:
(纸本)9783642117466
Business requirements for modern enterprise systems usually comprise a variety of dynamic constraints, i.e., constraints that require a complex set of context information only available at runtime. Thus, the efficient evaluation of dynamic constraints, e. g., expressing separation of duties requirements, becomes an important factor for the overall performance of the access control enforcement. In distributedsystems, e. g., based on the service-oriented architecture (SOA), the time for evaluating access control constraints depends significantly on the protocol between the central Policy Decision Point (PDP) and the distributed Policy Enforcement Points (PEPs). In this paper, we present a policy-driven approach for generating customized protocol for the communication between the PDP and the PEPs. We provide a detailed comparison of several approaches for querying context information during the evaluation of access control constraints.
暂无评论