An automatic method for computing the expected execution time of jobs based on Petri nets is proposed. With this method a job operation flow is modeled using the timed Petri net, all operation cases for every fault ar...
详细信息
An automatic method for computing the expected execution time of jobs based on Petri nets is proposed. With this method a job operation flow is modeled using the timed Petri net, all operation cases for every fault are considered using the reachability tree of the Petri net, and the expected execution time is computed automatically. A support system that actualizes the proposed method on a workstation is described. This approach allows job operation flows to be planned without misunderstandings.< >
Summary form only given. The authors report a case study of data-flow software pipelining, an efficient code-mapping strategy for array operations in loops on a highly pipelined static data-flow processor architecture...
详细信息
Summary form only given. The authors report a case study of data-flow software pipelining, an efficient code-mapping strategy for array operations in loops on a highly pipelined static data-flow processor architecture based on an argument-fetching data-driven principle. The new architecture has the potential of keeping the instruction-processing pipeline full busy as long as the structure of the program can keep enough enabled instructions for concurrent execution-one main objective of data-flow software pipelining proposed in this work.< >
We have studied tools and techniques to assist integrated modular avionics (IMA) platform design. We propose an approach that helps to decide whether a set of systems can be implemented on an IMA architecture while en...
详细信息
We have studied tools and techniques to assist integrated modular avionics (IMA) platform design. We propose an approach that helps to decide whether a set of systems can be implemented on an IMA architecture while enforcing safety requirements. To support the dialogue between teams in charge of defining system architectures and the avionics architecture designers the approach is based on the exchange of allocations constraints. The approach is made of three main steps: system designers describe formally how failures propagate in the system under study and derive segregation constraints, IMA designers collect the constraints and use a constraint solver to generate safe allocations, system designers use this allocation to combine the system failure propagation model with an avionics platform model in order to check quantitative safety requirements. The approach is supported by a set of tools including fault-tree analysers and constraint solvers.
The visualization of scalar functions of two variables is a classic and ubiquitous application. We present a new method to visualize such data. The method is based on a nonlinear mapping of the function to a height fi...
详细信息
ISBN:
(纸本)0780372018
The visualization of scalar functions of two variables is a classic and ubiquitous application. We present a new method to visualize such data. The method is based on a nonlinear mapping of the function to a height field, followed by visualization as a shaded mountain landscape. The method is easy to implement and efficient, and leads to intriguing and insightful images: The visualization is enriched by adding ridges. Three types of applications are discussed: visualization of iso-levels, clusters (multivariate data visualization), and dense contours (flow visualization).
This paper proposes a framework to support the development and use of tools that support the teaching of software and Web engineering. It describes the evolution of tools to support the teaching of software engineerin...
详细信息
This paper proposes a framework to support the development and use of tools that support the teaching of software and Web engineering. It describes the evolution of tools to support the teaching of software engineering from simple client-side tools that support drawing DFDs and UML diagrams to Web-based repositories that support process modelling. The paper specifically introduces the concept of "automated walkthroughs" and describes their use within the WWW. It also describes tools that automatically create automated walkthroughs for the World Wide Web (WWW) and their evaluation within a masters-level software engineering module. Conclusions are drawn about the general applicability of the framework and proposals are made for further work in this area.
Heterogeneity issues in Web services composition are discussed and classified into heterogeneity between semantic equivalent Web services and heterogeneity between sequent Web services in a process flow, we induce the...
详细信息
Heterogeneity issues in Web services composition are discussed and classified into heterogeneity between semantic equivalent Web services and heterogeneity between sequent Web services in a process flow, we induce these heterogeneity issues into six types of conflicts, namely semantic conflict, data type conflict, Structure conflict, parameter number conflict, data unit conflict and data precision conflict. Then, an ontology based conflict resolution is designed, including the definition of domain ontology knowledge for business specification, the definition of domain and industry terms ontology knowledge for describing the profile information of Web services and the definition of meta-ontology knowledge for transformation. Furthermore, the implementation issues are presented
An integrated analysis framework is presented which consists of a hierarchy of models and analysis techniques that can be applied at different levels of the design of distributed computations. The goal is to determine...
详细信息
An integrated analysis framework is presented which consists of a hierarchy of models and analysis techniques that can be applied at different levels of the design of distributed computations. The goal is to determine a computation response time as viewed by a user and show how a software's response time can be affected by properties of the underlying communication subnetwork. The result of the computation structure analysis is applied to a buffer processing system and it is shown that transient variations in communication network parameters can shift the execution of a computation from a stable operating region, where execution time cost remains acceptable, to an unstable state.< >
Progress in VLSI and WSI technologies has resulted in the manufacture of special purpose VLSI chips with multiple copies of low-cost processors. These processors can be used to design high performance systems such as ...
详细信息
Progress in VLSI and WSI technologies has resulted in the manufacture of special purpose VLSI chips with multiple copies of low-cost processors. These processors can be used to design high performance systems such as systolic arrays. This paper proposes a new systematic approach which can be used to detect and correct errors in systolic array architectures. The approach relies on space-time mapping of algorithms into systolic arrays. Fault-tolerant algorithms are designed by introducing redundant computations at the algorithmic level. This is done by deriving several versions of a given algorithm, each of which can be mapped into respective systolic architecture. Fault-tolerant systolic array is constructed by merging the corresponding systolic array of several versions of the algorithm.< >
We introduce the notions of required precision and information content of datapath signals and use them to define functionally safe transformations on dataflow graphs. These transformations reduce widths of datapath ...
详细信息
ISBN:
(纸本)1581132972
We introduce the notions of required precision and information content of datapath signals and use them to define functionally safe transformations on dataflow graphs. These transformations reduce widths of datapath operators and enhance their mergeability. Using efficient algorithms to compute required precision and information content of signals, we define a new algorithm for partitioning a dataflow graph consisting of datapath operators into mergeable clusters. Experimental results indicate that use of our clustering algorithm for operator merging based synthesis of datapath intensive designs, can lead to significant improvement in the delay and area of the implementation.
Extraction of complex data structures like vector field topologies in large-scale, unsteady flow field datasets for the interactive exploration in virtual environments cannot be carried out without parallelization str...
详细信息
Extraction of complex data structures like vector field topologies in large-scale, unsteady flow field datasets for the interactive exploration in virtual environments cannot be carried out without parallelization strategies. We present an approach based on Nested OpenMP to find critical points, which are the essential parts of velocity field topologies. We evaluate our parallelization scheme on several multi-block datasets, and present the results for various thread counts and loop schedules on all parallelization levels. Our experience suggests that upcoming massively multi-threaded processor architectures can be very advantageously for large-scale feature extractions
暂无评论