Agent-oriented software engineering (AOSE) has become an active area of research in recent years. We look at the use of agent-oriented concepts for software analysis. Using agent-oriented analysis may offer benefits e...
详细信息
Agent-oriented software engineering (AOSE) has become an active area of research in recent years. We look at the use of agent-oriented concepts for software analysis. Using agent-oriented analysis may offer benefits even if the system is implemented without an agent-based language or framework (e.g. using an object-oriented detailed design and language). We examine the software analysis components of a number of existing agent-oriented methodologies. We discuss the benefits that can be gained by using agent-oriented concepts, and where the concepts require further development. Based on this analysis, we present the agent-oriented methodology that we are developing, and describe an example of how it may be applied for software analysis.
Nowadays, dynamically and partially reconfigurable architectures (DPRA) have been widely adopted by backbone equipment manufacturers to tackle the market pressure in terms of cost, performance, time to market, etc. Am...
详细信息
ISBN:
(纸本)078038511X
Nowadays, dynamically and partially reconfigurable architectures (DPRA) have been widely adopted by backbone equipment manufacturers to tackle the market pressure in terms of cost, performance, time to market, etc. Among all the advantages of DPRA, the run time rapid reconfiguration is still not fully utilized to deliver the greatest potential. In our work, a system level asynchronous virtual pipeline (SLAVP) is studied on a block partitioned DPRA for throughput critical telecommunication applications. Unlike previous approaches, SLAVP does not constrain the computation of pipeline stages to be strictly balanced, and it does not constrain the input specification to be a sequential dataflow graph. By swapping tasks in/out, more logic stages are implemented than the physically available resources, and this achieves greater efficiency on the DPRA. In addition, we proposed a method to transform the problem to a generic system level synthesis problem, and then developed a hierarchical genetic algorithm (GA) based tool for synthesis on a block partitioned DPRA.
This work deals with the problem of data cache for dynamic Web servers. A set of requests (which number could be large) is submitted to a server for computing. Every request is modelled by a series-parallel graph of e...
详细信息
This work deals with the problem of data cache for dynamic Web servers. A set of requests (which number could be large) is submitted to a server for computing. Every request is modelled by a series-parallel graph of elementary tasks. These tasks are computed and their results are submitted to be stored into a cache. Due to the limitation of the cache capacity, some strategies should be used to select the right ones. The aim of This work is to determine, in a static session, what tasks results have to be cached in order to reduce the computing time. The problem has been formalized using graphs representation whose complexity is briefly shown to be NP-hard. Then, heuristics are proposed to select the cached data. Finally some preliminary experimental results are discussed.
Machine vision system is one of the most important components of intelligent vehicles, and the software and hardware co-realization is critical for the vision navigation of intelligent vehicles. This work presents the...
详细信息
ISBN:
(纸本)0780382730
Machine vision system is one of the most important components of intelligent vehicles, and the software and hardware co-realization is critical for the vision navigation of intelligent vehicles. This work presents the multi-DSP realization for intelligent vehicle vision system, analyzes and illustrates the software and hardware co-realization. Based on the software framework and the dataflow of the machine vision system, we propose the software implementation for the host computer and DSP terminals. In particular, a road detection algorithm and its multi-DSP realization are presented. Simulated in real environments, the system is stable and its real-time performance is satisfactory.
In the field of embedded systems, reconfigurable processors, composed of a standard processor core coupled with a reconfigurable device, are gaining more and more importance. Algorithm developers are facing the issue ...
详细信息
In the field of embedded systems, reconfigurable processors, composed of a standard processor core coupled with a reconfigurable device, are gaining more and more importance. Algorithm developers are facing the issue of mapping applications on configurable hardware, without a specific knowledge of the underlying architecture. In this paper, we present a modular dataflow control unit for a reconfigurable datapath, which can be easily programmed starting from the C description of the required functionality.
In view of defects of tradition chips used for conference systems, such as poor performance and higher prices, this paper proposes the technical solution to use DSP technology to design and realize the multi-party con...
详细信息
In view of defects of tradition chips used for conference systems, such as poor performance and higher prices, this paper proposes the technical solution to use DSP technology to design and realize the multi-party conference system, and describes detailed designs and specified realization methods. With stable performance and requiring much lower costs, the product is now being extensively applied in Chinese railway and military systems and achieving favorable economic and social benefits.
Sharing the resources among various users and the lack of a centralized control are two key characteristics of many distributed heterogeneous computing systems. A critical challenge for designing applications in such ...
详细信息
Sharing the resources among various users and the lack of a centralized control are two key characteristics of many distributed heterogeneous computing systems. A critical challenge for designing applications in such systems is to coordinate the resources in a decentralized fashion while adapting to the changes in the system. In this paper, we consider the computation of a large set of equal-sized independent tasks. This represents the computation paradigm for a variety of large scale applications such as SETI@home and Monte Carlo simulations. We focus on the performance optimization for a decentralized adaptive task allocation protocol. We develop a bandwidth allocation strategy based on our decentralized task allocation algorithm, and a simple task buffer management policy. Simulation results show that our task allocation protocol achieves close to the optimal system throughput.
Heterogeneity issues in Web services composition are discussed and classified into heterogeneity between semantic equivalent Web services and heterogeneity between sequent Web services in a process flow, we induce the...
详细信息
Heterogeneity issues in Web services composition are discussed and classified into heterogeneity between semantic equivalent Web services and heterogeneity between sequent Web services in a process flow, we induce these heterogeneity issues into six types of conflicts, namely semantic conflict, data type conflict, Structure conflict, parameter number conflict, data unit conflict and data precision conflict. Then, an ontology based conflict resolution is designed, including the definition of domain ontology knowledge for business specification, the definition of domain and industry terms ontology knowledge for describing the profile information of Web services and the definition of meta-ontology knowledge for transformation. Furthermore, the implementation issues are presented
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive information as part of their correct functioni...
详细信息
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive information as part of their correct functioning and therefore violate noninterference. To control information flow while permitting intentional information release, some systems have a downgrading or declassification mechanism. A major danger of such a mechanism is that it may cause unintentional information release. This paper shows that a robustness property can be used to characterize programs in which declassification mechanisms cannot be exploited by attackers to release more information than intended. It describes a simple way to provably enforce this robustness property through a type-based compile-time program analysis. The paper also presents a generalization of robustness that supports upgrading (endorsing) data integrity.
We report on the computation of 3D volumetric optical flow on gated MRI datasets. We extend the 2D least squares and regularization approaches of Lucas and Kanade [4] and Horn and Schunck [3] and show flow fields (as ...
详细信息
We report on the computation of 3D volumetric optical flow on gated MRI datasets. We extend the 2D least squares and regularization approaches of Lucas and Kanade [4] and Horn and Schunck [3] and show flow fields (as XY and XZ 2D flows) for a beating heart. The flow not only can capture the expansion and contraction of various parts of the heart motion but also can capture the twisting motion of the heart.
暂无评论