Bluetooth has provided many features that enable wireless ad-hoc networks, but it has also introduced many problems. the root cause of these problems lies in its communication mechanisms. We argue in this paper that t...
详细信息
ISBN:
(纸本)9781424451142
Bluetooth has provided many features that enable wireless ad-hoc networks, but it has also introduced many problems. the root cause of these problems lies in its communication mechanisms. We argue in this paper that the models that have been used to study distributed algorithms on Bluetooth networks do not adequately model these networks in most cases, and were often oversimplified. this is mainly due to how the many restrictions that the Bluetooth specifications impose on such networks are taken into account, and the lack of "shared knowledge" of these restrictions among the researchers of this field. We give some examples to back our argument. We give also some suggestions and proposals to overcome these issues.
Simulink is one of the most widely used industrial tools to design embedded systems. Applying formal methods sooner in the cycle of development is an important industrial challenge in order to reduce the cost of bug f...
详细信息
ISBN:
(纸本)9780769536781
Simulink is one of the most widely used industrial tools to design embedded systems. Applying formal methods sooner in the cycle of development is an important industrial challenge in order to reduce the cost of bug fixing. In this article, we introduce a new method, called Abstract Simulation and based on abstract interpretation of Simulink models. Abstract Simulation uses several numerical domains such as a domain for Taylor forms or floating-point numbers with errors. these domains allow us to estimate errors introduced by numerical algorithms and by computations during simulations. As a result, our method makes it possible to validate numerical behaviors of embedded systems modeled in Simulink. A prototype has been implemented and experimental results are commented.
the Markov Reward Model Checker (MRMC) is a software tool for verifying properties over probabilistic models. It supports PCTL and CSL model checking, and their reward extensions. Distinguishing features of MRMC are i...
详细信息
ISBN:
(纸本)9780769538082
the Markov Reward Model Checker (MRMC) is a software tool for verifying properties over probabilistic models. It supports PCTL and CSL model checking, and their reward extensions. Distinguishing features of MRMC are its support for computing time and reward-bounded reachability probabilities, (property-driven) bisimulation minimization, and precise on-the-fly steady-state detection. Recent tool features include time-bounded reachability analysis for uniform CTMDPs and CSL model checking by discrete-event simulation. this paper presents the tool's current status and its implementation details.
we study in this paper the impact of the modifications introduced in version 1.2 of the Bluetooth specifications on Bluetooth Scatternet Formation (BSF) algorithms. Up to now, the effect of these modifications on BSF ...
详细信息
ISBN:
(纸本)9781424444465
we study in this paper the impact of the modifications introduced in version 1.2 of the Bluetooth specifications on Bluetooth Scatternet Formation (BSF) algorithms. Up to now, the effect of these modifications on BSF algorithms had not been analyzed. We show that: 1) Bluetooth ver1.2 and upward have a major positive effect on static BSF algorithms (i.e. those which require an external device discovery phase). We conducted some experiments on a common device discovery technique for static BSF algorithms and compared its performance using Ver1.2 and Ver1.1 (the latter is used in most BSF studies). We found that this technique, using ver1.2, generates a connected topology about 3.5 times faster than it does using ver1.1. It also discovers about 20% more edges. 2) Dynamic algorithms, on the other hand, are not affected by these modifications. this will be proven using some experiments and some analytical arguments. these results give more applicability to static BSF algorithms and call for more research on dynamic BSF algorithms.
the proceedings contain 10 papers. the topics discussed include: ubiquitous autonomic management;value benefit analysis of technologies for ubiquitous computing to be implemented in the healthcare sector;challenges fo...
ISBN:
(纸本)9781605585796
the proceedings contain 10 papers. the topics discussed include: ubiquitous autonomic management;value benefit analysis of technologies for ubiquitous computing to be implemented in the healthcare sector;challenges for context management systems imposed by context inference;a distributed model for digital personal environments management;pervasive knowledge-based Networking for maintenance inspection in smart buildings;general method for testing context aware applications;designing ubiquitous applications: proposal of a specification environment;open framework middleware: an experimental middleware design concept for wireless sensor networks;managing the culloden battlefield invisible mobile guidance experience;and knowledge management for context-aware, policy-based ubiquitous computingsystems.
How can a bridge be built between autonomic computing approaches and parallel computingsystems? How can autonomic computing approaches be extended towards building reliable systems? How can existing technologies be m...
详细信息
ISBN:
(纸本)9781424450077
How can a bridge be built between autonomic computing approaches and parallel computingsystems? How can autonomic computing approaches be extended towards building reliable systems? How can existing technologies be merged to provide a solution for self-managing systems? the work reported in this paper aims to answer these questions by proposing Swarm-Array computing, a novel technique inspired from swarm robotics and built on the foundations of autonomic and parallel computing paradigms. Two approaches based on intelligent cores and intelligent agents are proposed to achieve autonomy in parallel computingsystems. the feasibility of the proposed approaches is validated on a multi-agent simulator.
this paper presents a brief survey of typical examples of systems in the field of position determination and identifies a need for a further research. this is followed by a description of a managed positioning environ...
详细信息
the proceedings contain 48 papers. the topics discussed include: neural computations that support long mixed sequences of knowledge acquisition tasks;constraints, graphs, algebra, logic, and complexity;distributed sys...
ISBN:
(纸本)9783642020162
the proceedings contain 48 papers. the topics discussed include: neural computations that support long mixed sequences of knowledge acquisition tasks;constraints, graphs, algebra, logic, and complexity;distributed systems and their environments;co-evolution and information signals in biological sequences;strong positive reducibilities;fixed-parameter algorithms for graph-modeled date clustering;approximability and fixed-parameter tractability for the exemplar genomic distance problems;quantitative aspects of speed-up and gap phenomena;computingthe exact distribution function of the stochastic longest path length in a DAG;on the connection between interval size functions and path counting;a computational proof of complexity of some restricted counting problems;discovering almost any hidden motif from multiple sequences in polynomial time with low sample complexity and high success probability;and on the tractability of maximal strip recovery.
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algor...
详细信息
ISBN:
(纸本)9780982148907
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. this paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm.
this paper develops a new control approach to position synchronization of multiple robot manipulators based on emergent consensus algorithms. the proposed strategy only requires local neighbor-to-neighbor information ...
详细信息
ISBN:
(纸本)9781424443451
this paper develops a new control approach to position synchronization of multiple robot manipulators based on emergent consensus algorithms. the proposed strategy only requires local neighbor-to-neighbor information exchange between manipulators and does not assume the existence of any explicit leaders in the team. the control strategy is to stabilise position tracking of each manipulator while synchronizing its motion with other manipulator's position motion so that differential position errors amongst robots converge to zero. Simulations conducted on a multi-robots manipulators motion control system demonstrate the effectiveness of the method.
暂无评论