In this paper, a routing model for minimizing hot spots in the network on chip (NOC) is presented. The model makes use of AntNet routing algorithm which is based on Ant colony. Using this algorithm, which we call AntN...
详细信息
ISBN:
(纸本)1595934790
In this paper, a routing model for minimizing hot spots in the network on chip (NOC) is presented. The model makes use of AntNet routing algorithm which is based on Ant colony. Using this algorithm, which we call AntNet routing algorithm, heavy packet traffics are distributed on the chip minimizing the occurrence of hot spots. To evaluate the efficiency of the scheme, the proposed algorithm was compared to the XY, Odd-Even, and DyAD routing models. The simulation results show that in realistic (Transpose) traffic as well as in heavy packet traffic, the proposed model has less average delay and peak power compared to the other routing models. In addition, the maximum temperature in the proposed algorithm is less than those of the other routing algorithms. Copyright 2006 ACM.
Several path-planning algorithms for mobile robots have been introduced. Proper architectures for mobile robots to implement the path-planning algorithms are also of interest. If the mobile robots are to perform compl...
详细信息
Applications in mobile multi-agent systems require a high degree of confidence that code that runs inside the system will not be malicious and that any agents which are malicious can be identified and contained. Since...
详细信息
ISBN:
(纸本)1595933956
Applications in mobile multi-agent systems require a high degree of confidence that code that runs inside the system will not be malicious and that any agents which are malicious can be identified and contained. Since the inception of mobile agents, this threat has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agent, and very few approaches have undertaken the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists that facilitates provision of the required security qualities of mobile agent software while extensively focusing on easing the software development burden. In this paper, we introduce a mobile agent system that enhances security functionality by integrating core software and hardware assurance qualities, as well as addressing security concerns from the perspectives of both the platform and the agent. Copyright 2006 ACM.
This paper presents a very fast and low-power address bus encoder which is less dependent on address bus width. Its encoding scheme is the same as TO-XOR encoding method but its encoder and decoder architectures are m...
详细信息
This paper provides an overview of the research in railway scheduling and dispatching. A distinction is made between tactical scheduling, operational scheduling and re-scheduling. Tactical scheduling refers to master ...
详细信息
ISBN:
(纸本)9783939897002
This paper provides an overview of the research in railway scheduling and dispatching. A distinction is made between tactical scheduling, operational scheduling and re-scheduling. Tactical scheduling refers to master scheduling, whereas operational scheduling concerns scheduling at a later stage. Re-scheduling focuses on the re-planning of an existing timetable when deviations from it have occurred. 48 approaches published between 1973 and 2005 have been reviewed according to a framework that classifies them with respect to problem type, solution mechanism, and type of evaluation. 26 of the approaches support the representation of a railway network rather than a railway line, but the majority has been experimentally evaluated for traffic on a line. 94 % of the approaches have been subject to some kind of experimental evaluation, while approximately 4 % have been implemented. The solutions proposed vary from myopic, priority-based algorithms, to traditional operations research techniques and the application of agent technology.
Most segmentation algorithms are based on the assumption of intensity homogeneity within an object. However, in many applications, the object of interest contains more than one homogenous region. Even when the object&...
详细信息
This talk provides a personal perspective on the evolution of empirical softwareengineering. The evolution has included the focus of the studies, e.g., from attempting to demonstrate the effectiveness of various proc...
详细信息
ISBN:
(纸本)1595932186
This talk provides a personal perspective on the evolution of empirical softwareengineering. The evolution has included the focus of the studies, e.g., from attempting to demonstrate the effectiveness of various processes to the building of knowledge around a domain or a set of processes. The study designs have changed from strictly quantitative studies to all forms of controlled experiments, quasi-experiments, preexperimental designs, case studies, field studies, and focus group activities. There has been recognition of the importance and influence of context variables and the domain in interpreting the results of studies. The issue of meta-analysis has become more important and is still an elusive goal. A community of empiricists has evolved that allows for the replication of studies leading to the identification of context variables. But there still does not exist a community consensus on the right ways to build bodies of knowledge or a "blessed" set of approaches. We argue over what is appropriate evidence when we review papers. We struggle with the concept of experimental replication. We do not know how to break an empirical study into significant small enough chunks for publication in the various standard forums. We have not convinced the softwareengineering community that empirical study is a necessary or even valuable research paradigm for the field. What other problems that remain? How can they be solved? What will the future hold for empirical study? This talk will address these issues and propose a possible path towards a mature empirical softwareengineering discipline.
Identifying misbehaviors is an important challenge for monitoring, fault diagnosis and intrusion detection in wireless sensor networks. A key problem is how to minimise the communication overhead and energy consumptio...
详细信息
暂无评论