In July 2007 Carnegie Mellon University (Carnegie Mellon®) hosted its sixth annual offering of the Information Assurance Capacity Building Program (IACBP). The goal of the intensive in-residence summer program is...
详细信息
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the gen...
详细信息
ISBN:
(纸本)9783540730934
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the generation of the reachability graph and the theory of regions was proposed. In this paper, we propose a new synthesis method based on the composition of Petri net modules, avoiding the exploration of the reachability graph. The behavior of ACMs is formally defined and correctness properties are specified in CTL. Model checking is used to verify the correctness of the Petri net models. The algorithms to generate the Petri net models are presented. Finally, a method to automatically generate C++ source code from the Petri net model is described.
Agents' pro attitudes such as goals, intentions, desires, wishes, and judgements of satisfactoriness play an important role in how agents act rationally. To provide a natural and satisfying formalization of these ...
详细信息
Class responsibility assignment is not an easy skill to acquire. Though there are many methodologies for assigning responsibilities to classes, they all rely on human judgment and decision making. Our objective is to ...
详细信息
Class responsibility assignment is not an easy skill to acquire. Though there are many methodologies for assigning responsibilities to classes, they all rely on human judgment and decision making. Our objective is to provide decision-making help to re-assign methods and attributes to classes in a class diagram. Our solution is based on a multi-objective genetic algorithm (MOGA) and uses class coupling and cohesion measurement. Our MOGA takes as input a class diagram to be optimized and suggests possible improvements to it. The choice of a MOGA stems from the fact that there are typically many evaluation criteria that cannot be easily combined into one objective, and several alternative solutions are acceptable for a given OO domain model. This article presents our approach in detail, our decisions regarding the multi-objective genetic algorithm, and reports on a case study. Our results suggest that the MOGA can help correct suboptimal class responsibility assignment decisions.
Mobile games are one of the primary entertainment applications at present. Limited by scarce resources, such as memory, CPU, input and output, etc, mobile game development is more difficult than desktop application de...
详细信息
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infra...
详细信息
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infrastructure-based networks to be compatible with the characteristics of MANET. Moreover, we add some new features and their associated measurements that we believe important for testing new proposed IDS. The modified measurements with the new added ones form a set of measurements that will be used throughout the testing process. To the best of our knowledge, there has not been any work done for testing IDS in MANET. Simulators are the most common tools used for testing the IDS. Therefore, we add some precautions for choosing a simulator and a list of available simulators. The precautions will help researchers to test the measurements efficiently and the list of simulators will guide them to select one according to their needs. Finally, we present some input parameter precautions that help on having more trustworthy testing results.
This paper examines software designs produced by students nearing completion of their computer Science degrees. The results of this multi-national, multi institutional experiment present some interesting implications ...
详细信息
ISBN:
(纸本)9781595932594
This paper examines software designs produced by students nearing completion of their computer Science degrees. The results of this multi-national, multi institutional experiment present some interesting implications for educators. Copyright 2006 ACM.
This paper presents the implementation of a JPEG encoder that exploits minimal usage of FPGA resources. The encoder compresses an image as a stream of 8times8 blocks with each element of the block applied and processe...
详细信息
ISBN:
(纸本)1424413656;9781424413652
This paper presents the implementation of a JPEG encoder that exploits minimal usage of FPGA resources. The encoder compresses an image as a stream of 8times8 blocks with each element of the block applied and processed individually. The zigzag unit typically found in implementations of JPEG encoders is eliminated. The division operation of the quantization step is replaced by a combination of multiplication and shift operations. The encoder is implemented on Xilinx Spartan-3 FPGA and is benchmarked against two software implementations on four test images. It is demonstrated that it yields performance of similar quality while requiring very limited FPGA resources. A co-emulation technique is applied to reduce development time and to test and verify the encoder design.
Increasingly, software must adapt its behavior in response to changes in the supporting computing, communication infrastructure, and in the surrounding physical environment. Since most existing software was not design...
详细信息
Increasingly, software must adapt its behavior in response to changes in the supporting computing, communication infrastructure, and in the surrounding physical environment. Since most existing software was not designed to adapt, research on technique to make legacy software dynamically adaptive has gained increasing interest. Assurance is crucial for adaptive software to fulfill its intended purpose. Correctness is even more critical if it is to be applied in high assurance systems. This paper proposes a model-driven approach to introduce dynamic adaptation to non-adaptive legacy systems while maintaining assurance properties. An aspect-oriented technique is applied to achieve separation of concerns in the implementation.
Fault detection and isolation is a key component of any safety-critical system. Although diagnosis methods based on discrete event systems have been recognized as a promising framework, they cannot be easily applied t...
详细信息
Fault detection and isolation is a key component of any safety-critical system. Although diagnosis methods based on discrete event systems have been recognized as a promising framework, they cannot be easily applied to systems with complex continuous dynamics. This paper presents a novel approach for discrete event system diagnosis of continuous systems based on a qualitative abstraction of the measurement deviations from the nominal behavior. We systematically derive a diagnosis model, provide diagnosability analysis, and design a diagnoser. Our results show that the proposed approach is easily applicable and can be used for online diagnosis of abrupt faults in continuous systems.
暂无评论