Cooperative tracking control for multiple heavy-haul trains can improve the safety and efficiency of heavy-haul railway transportation. However, the false data injection attack for the tracking control system is a ser...
详细信息
This volume constitutes the thoroughly refereed post-conference proceedings of the 7th international Doctoral Workshop on Mathematical and engineering Methods in Computer Science, MEMICS 2011, held in Lednice, Czech R...
详细信息
ISBN:
(数字)9783642259296
ISBN:
(纸本)9783642259289
This volume constitutes the thoroughly refereed post-conference proceedings of the 7th international Doctoral Workshop on Mathematical and engineering Methods in Computer Science, MEMICS 2011, held in Lednice, Czech Republic, on October 14-16, 2011.;The 13 revised full papers presented together with 6 invited talks were carefully reviewed and selected from 38 submissions. The papers address all current issues of mathematical and engineering methods in computer science, especially: software and hardware dependability, computer security, computer-aided analysis and verification, testing and diagnostics, simulation, parallel and distributed computing, grid computing, computer networks, modern hardware and its design, non-traditional computing architectures, softwareengineering, computational intelligence, quantum information processing, computer graphics and multimedia, signal, text, speech, and image processing, and theoretical computer science.
Automatic detection and tracking of human hands in video imagery has many applications. While some success has been achieved in human-computer interaction applications, hand tracking would also be extremely useful in ...
详细信息
ISBN:
(纸本)9780889866560
Automatic detection and tracking of human hands in video imagery has many applications. While some success has been achieved in human-computer interaction applications, hand tracking would also be extremely useful in security systems, where it could help the system to understand and predict human actions, intentions, and goals. We have designed and implemented a prototype hand tracking system, which is able to track the hands of moving humans in low resolution video sequences. Our system uses grayscale appearance and skin color information to classify image subwindows as either containing or not containing a human hand. The prototype's performance is quite promising, detecting nearly all visible hands in a test sequence with a relatively low error rate. In future work we plan to improve the prototype and explore methods for interpreting human gestures in surveillance video.
Case Based Reasoning (CBR) is the process of solving new problem based on the solutions of similar previous problems. XML is a markup language that allows document owners describe their data in their own formats. Ther...
详细信息
ISBN:
(纸本)9781424474226;9780769540887
Case Based Reasoning (CBR) is the process of solving new problem based on the solutions of similar previous problems. XML is a markup language that allows document owners describe their data in their own formats. There might be the same information has been described in various ways. This makes searching those information from different formats difficult. CXDR (CBR for XML Document Recommendation) is an idea to make searching XML documents easier. CXDR applies CBR framework to collect the mostly use XML document and recommend it to its user. CBR in CXDR consists of two parts, cases and knowledge. The case is XML documents and the knowledge is an XML document recommendation. The recommendation from CXDR is the most use XML element names and structure.
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages of software development. However, there...
详细信息
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages of software development. However, there is no formal way provided for software developers to find out what makes a communication protocol secure and what are secure designs. In this paper we propose a method that defines security requirements, bridges security requirement analysis with security design, and integrates the security techniques into a communication protocol to fulfill the security requirements.
A design flow for processor platforms with on-chip coarse-grain reconfigurable logic is presented. The reconfigurable logic is realized by a 2-dimensional array of processing elements. Performance is improved by accel...
详细信息
ISBN:
(纸本)9781424400546
A design flow for processor platforms with on-chip coarse-grain reconfigurable logic is presented. The reconfigurable logic is realized by a 2-dimensional array of processing elements. Performance is improved by accelerating critical software loops, called kernels, on the reconfigurable array. Basic steps of the design flow have been automated. A procedure for detecting critical loops in the input C code was developed, while a mapping technique for coarse grain reconfigurable arrays, based on software pipelining, was also devised. Analytical results derived from mapping five real-life DSP applications on eight different instances of a generic system architecture are presented. Large values of instructions per cycle were achieved on two reconfigurable arrays that resulted in high-performance kernel mapping. Additionally, by mapping critical code on the reconfigurable logic, speedups ranging from 1.27 to 3.18 relative to an all-processor execution were achieved
For concurrent softwaresystems state/event linear temporal logic SE-LTL is a specification language with high expressive power and the ability to reason about both states and events. Until now, SE-LTL model checking ...
详细信息
For concurrent softwaresystems state/event linear temporal logic SE-LTL is a specification language with high expressive power and the ability to reason about both states and events. Until now, SE-LTL model checking algorithm is still explicit. We introduce a bounded model checking procedure for SE-LTL which reduces model checking to propositional satisfiability. This new technique avoids the space blow up of BDDs, generates counterexamples much faster, and sometimes speeds up the verification. For SE-LTL- x we further show how to integrate the procedure and stuttering equivalent technique. The experiment result shows that the integration can reduce the verification time very much.
Conflict detection and resolution are among the most fundamental issues in transactional memory systems. Hardware transactional memory (HTM) systems such as AMD's Advanced Synchronization Facility (ASF) employ inh...
详细信息
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system calls invoked by an application and contro...
详细信息
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system calls invoked by an application and controlling their execution. However, a problem in existing sandboxing systems is the amount of overhead required for security checks performed after system call interceptions. In this paper, we propose a sandboxing system that executes speculative security checks. The proposed system predicts the behavior of a sandboxed application and executes speculative security checks in parallel with the application, thus reducing the overhead. Behavior is predicted based on system call profiles in past executions of the application. We implemented the system on Linux and made a preliminary evaluation.
The reliable and fault tolerant computers are key to the success to aerospace, and communication industries where failures of the system can cause a significant economic impact and loss of life. Designing a reliable d...
详细信息
The reliable and fault tolerant computers are key to the success to aerospace, and communication industries where failures of the system can cause a significant economic impact and loss of life. Designing a reliable digital system, and detecting and repairing the faults are challenging tasks in order for the digital system to operate without failures for a given period of time. The paper presents a new and systematic softwareengineering approach of performing fault diagnosis of digital systems, which have employed multiple processors. The fault diagnosis model is based on the classic PMC model to generate data obtained on the basis of test results performed by the processors. The PMC model poses a tremendous challenge to the user in doing fault analysis on the basis of test results performed by the processors. This paper will perform one fault model for developing software. The effort has been made to preserve the necessary and sufficient.
暂无评论