In Bollue et al. (2009), a methodology was introduced for the synthesis of behavioral controllers for discrete-event systems. The approach is based on NCES-like Petri net models of the uncontrolled plant and additiona...
详细信息
In Bollue et al. (2009), a methodology was introduced for the synthesis of behavioral controllers for discrete-event systems. The approach is based on NCES-like Petri net models of the uncontrolled plant and additional goal and safety specifications given by linear marking constraints. This paper presents different approaches to improve the synthesis process with respect to efficiency and applicability. One focus is the use of satisfiability checking of systems of integer linear inequations in the preprocessing of the model for the elimination of unnecessary complexity during the process. Further, several improvements of the synthesis algorithm itself are discussed, which increase the efficiency by applying an advanced guided search and by reusing already found partial solutions.
According to the Internet of Services vision, composite services are created by composing services to complex business processes. The relationships between services in a composition are defined by Service Level Agreem...
详细信息
Critical path selection is very important in delay testing. Critical paths found by conventional static timing analysis (STA) tools are inadequate to represent the real timing of the circuit, since neither the testabi...
详细信息
In this paper, we propose a deterministic greedy heuristic providing a construction layout for a cost-efficient multi-layer network that is able to carry a given set of traffic demands with and without protection on d...
详细信息
ISBN:
(纸本)9781424481675
In this paper, we propose a deterministic greedy heuristic providing a construction layout for a cost-efficient multi-layer network that is able to carry a given set of traffic demands with and without protection on different layers. We apply the heuristic to different reference network topologies and protection requirements. Evaluations are conducted regarding equipment cost on different layers, blocking probability, path lengths, and number of demands affected by specific failures.
Quality measurements are required to support VoIP traffic in the Internet. The widely used average Mean Opinion Score is, however, not sufficient for this task. In this paper, we provide a detailed analysis of the Sky...
详细信息
Quality measurements are required to support VoIP traffic in the Internet. The widely used average Mean Opinion Score is, however, not sufficient for this task. In this paper, we provide a detailed analysis of the Skype SILK codec and compare it with the iLBC and GSM codec. The results show that the SILK codec is superior to the other codecs in scenarios with random and bulk packet loss. This increased tolerance of packet loss enables the option of QoE Monitoring under reasonable network conditions. From analysis, we derive an estimation, which can be used to monitor the MOS value of the users in the worst case. Furthermore, we show how sampling can effectively decrease the required measurement effort.
Programmable Logic Controllers (PLCs) have been established as standard devices for automation and process control since the 1990s. Although a lot of research work has been done on the field of controller modeling and...
详细信息
Programmable Logic Controllers (PLCs) have been established as standard devices for automation and process control since the 1990s. Although a lot of research work has been done on the field of controller modeling and verification, it is still daily practice that control software is manually developed without applying formal validation methods. On the other hand, controller modeling is often seen detached from the plant or its model, i.e. as an open loop. The results of analysis of open-loop controller behavior give very little or almost no indications of the correct behavior of the closed-loop system. The contribution therefore proposes an approach to generate formal models out of PLC code. These controller models enable formal verification of the closed loop in combination with a specification. Due to the year of publication, all solution approaches are based on the syntax definition of the IEC 61131-3, which is not fulfilled by every industrial PLC vendor. Therefore, this contribution will show a way to use the defined xml formats of the Technical Committee 6 of the PLCopen as input for the formal model generation.
In service-oriented systems, clients can access services via a network. Service level agreements (SLA) can exist, which specify - among other things - performance-related Quality of Service (QoS) properties between th...
详细信息
ISBN:
(纸本)9781450301077
In service-oriented systems, clients can access services via a network. Service level agreements (SLA) can exist, which specify - among other things - performance-related Quality of Service (QoS) properties between the client and the server, such as round-trip time, processing time, or availability. For a service provider serious financial consequences or other penalties can follow in case of not fulfilling the SLAs. The service consumer wants to evaluate that the provider complies with the guaranteed SLAs. Designing and developing a QoS-aware service-oriented system means facing many design challenges, such as where and how to measure the performance-related QoS properties. This paper presents design practices and patterns for measuring such QoS properties by extending and utilizing existing patterns. The focus of the patterns lies on the QoS measuring impact on the client's or service's performance, the extend of separation of concerns, the property of reusability, and the preciseness of the measured QoS properties. The patterns help to build efficient solutions to measure performance-related QoS properties in a service-oriented system.
For the sake of building the theoretical system of the designing course teaching, developing multimedia teaching resources to correspond with the teaching rules of higher education. Based on theoretical analysis, this...
详细信息
ISBN:
(纸本)9781424455140;9781424455157
For the sake of building the theoretical system of the designing course teaching, developing multimedia teaching resources to correspond with the teaching rules of higher education. Based on theoretical analysis, this paper investigates the technologies including teaching design and multimedia teaching resources development and provides the principles and requirements, process of design and development, evaluation on effectiveness of design and development, that promotes the reform of highereducation teaching methods.
The challenges with deploying a cellular wireless communication network with static frequency reuse in an interference limited environment is that for highly loaded cells, significant regions of coverage will experien...
详细信息
ISBN:
(纸本)9781424425181;9781424425198
The challenges with deploying a cellular wireless communication network with static frequency reuse in an interference limited environment is that for highly loaded cells, significant regions of coverage will experience high interference levels, resulting in unserviceable low signal-to-interference values. Therefore, interference mitigation approaches as adaptive fractional frequency reuse are considered to tackle the problem. In this paper, different strategies for user and resource allocation are evaluated along with fractional frequency reuse schemes. In contrast to downlink scenarios, we investigate the performance of the OFDMA uplink. It is shown that soft frequency reuse is well-performing in the uplink although it is easy to deploy since it does not rely on resource coordination.
This paper proposes an audio zero-watermarking algorithm based on Fast Fourier Transform (FFT). This algorithm does not change any contents about the audio signals. It proposes a solution about the contradictions abou...
详细信息
ISBN:
(纸本)9781424451623;9781424451616
This paper proposes an audio zero-watermarking algorithm based on Fast Fourier Transform (FFT). This algorithm does not change any contents about the audio signals. It proposes a solution about the contradictions about imperceptible and robustness. The experimental results show this algorithm can effectively resist low-pass filtering, Gaussian noise and re-sampling attacks. This new audio zero-watermarking algorithm based on FFT can meet the requirements of watermarking security.
暂无评论