This paper describes the implementation of transmission-line matrix (TLM) method algorithms on a massively parallel computer (DECmpp 12000), the technique of distributed computing in the UNIX environment, and the comb...
详细信息
This paper describes the implementation of transmission-line matrix (TLM) method algorithms on a massively parallel computer (DECmpp 12000), the technique of distributed computing in the UNIX environment, and the combination of TLM analysis with Prony's method as well as with autoregressive moving average (ARMA) digital signal processing for electromagnetic field modelling. By combining these advanced computation techniques, typical electromagnetic field modelling of microwave structures by TLM analysis can be accelerated by a few orders of magnitude.
Computational e-mail systems, which allow mail messages to contain command scripts that automatically execute upon receipt, can be used as a basis for building a variety of collaborative applications. However, their u...
详细信息
ISBN:
(纸本)9780897917322
Computational e-mail systems, which allow mail messages to contain command scripts that automatically execute upon receipt, can be used as a basis for building a variety of collaborative applications. However, their use also presents a serious security problem because a command script from a sender may access/modify receiver's private files or execute applications on receiver's behalf. Existing solutions to the problem either severely restrict I/O capability of scripts, limiting the range of applications that can be supported over computational e-mail, or permit all I/O to scripts, potentially compromising the security of the receiver's files. Our model, called the intersection model of security, permits I/O for e-mail from trusted senders but without compromising the security of private files. We describe two implementations of our security model: an interpreter-level implementation and an operating systems-level implementation. We discuss the tradeoffs between the two implementations and suggest directions for future work.
The ability to share synchronized views of interactions with an application is critical to supporting synchronous collaboration. This paper suggests a simple synchronous collaboration paradigm in which the sharing of ...
详细信息
A corner is modelled as the intersection of two lines. A corner point is that point on an input digital arc whose a posteriori probability of being a corner is the maximum among all the points on the arc. The performa...
详细信息
作者:
Karam, GeraldTRIO
Telecommunications Software Methods Project Real-time and Distributed Systems Group Department of Systems and Computer Engineering Carleton University 1125 Colonel By Drive Ottawa Ontario CANADA K1S 5B6
A timeline is a linear, graphical visualization of events over time. For example, in concurrent application, events would represent state changes for some system object (such as a task or variable). A timeline display...
详细信息
ISBN:
(纸本)9780897916837
A timeline is a linear, graphical visualization of events over time. For example, in concurrent application, events would represent state changes for some system object (such as a task or variable). A timeline display generator creates the graphical visualization from some record of events. This paper reports on a model for timeline display generators based on a formal model of event history and the objectives of timeline visualization. In this model, any timeline display generator is completely described through the definition of a set of mathematical functions. The exact characteristics and flexibility of a particular implementation of a timeline display generator, depends on the way in which these functions have been implemented. The current prototype, xtg, (Timeline Display Generator for X-windows) serves as an example implementation of these ideas. Characteristics of xtg are presented, and its use in the analysis of a real-world client-server application is discussed. Xtg has been applied to several other applications to-date and is being applied by several telecommunications companies to areas ranging from software process analysis to call trace data analysis.
A corner is modelled as the intersection of two lines. A corner point is that point on an input digital arc whose a posteriori probability of being a corner is the maximum among all the points on the arc. The performa...
详细信息
A corner is modelled as the intersection of two lines. A corner point is that point on an input digital arc whose a posteriori probability of being a corner is the maximum among all the points on the arc. The performance of the corner detector is characterized by its false alarm rate, misdetection rate, and the corner location error all as a function of the noise variance, the included corner angle, and the arc length. Theoretical expressions for the quantities compare well with experimental results.< >
Domain based testing (DBT) is a test generation method based on two concepts from software reuse, domain analysis and domain modeling. We applied DBT to command-based systems where the domain model represents the synt...
详细信息
Domain based testing (DBT) is a test generation method based on two concepts from software reuse, domain analysis and domain modeling. We applied DBT to command-based systems where the domain model represents the syntax and semantics of the command language. The domain model drives the generation of test cases. The test generation process consists of three stages: scripting; command template generation; and parameter value selection. Because it is based on ideas from software reuse, DBT also provides a good structure for test case reuse. Production use of the DBT tool Sleuth to generate system tests for an automated robot tape library confirms that DBT provides a wide variety of test case reuse scenarios.< >
This paper describes the software Technology Risk Advisor (STRA), a knowledge-based softwareengineering tool that provides assistance in identifying and managing software technology risks. The STRA contains a knowled...
详细信息
This paper describes the software Technology Risk Advisor (STRA), a knowledge-based softwareengineering tool that provides assistance in identifying and managing software technology risks. The STRA contains a knowledge base of software product and process needs, satisfying capabilities and capability maturity factors. After a user ranks the importance of relevant needs to his or her project, the STRA automatically infers risk areas by evaluating disparities between project needs and technology maturities. Identified risks are quantitatively prioritized and the user is given risk reduction advice and rationale for each conclusion. This paper presents methods used in the STRA, along with discussions of knowledge acquisition experimental results, current status, and related work.< >
Size and code coverage are two important attributes that characterize a set of tests. When a program P is executed on elements of a test set T, we can observe the fault-detecting capacity of T for P. We can also obser...
详细信息
Size and code coverage are two important attributes that characterize a set of tests. When a program P is executed on elements of a test set T, we can observe the fault-detecting capacity of T for P. We can also observe the degree to which T induces code coverage on P according to some coverage criterion. We would like to know whether it is the size of T or the coverage of T on P which determines the fault detection effectiveness (FDE) of T for P. We found that there is little or no reduction in the FDE of a test set when its size is reduced while the all-uses coverage is kept constant. These data suggest, indirectly, that coverage is more correlated than the size with the FDE. To further investigate this suggestion, we report an empirical study to compare the statistical correlation between (1) FDE and coverage, and (2) FDE and the size. Results from our experiments indicate that the correlation between FDE and block coverage is higher than that between FDE and size.< >
The concept of a simulation environment combines different aspects of the simulation process into one complete powerful tool. The environment should provide the necessary state-of-the-art advances and concepts that a ...
详细信息
ISBN:
(纸本)9780780321090
The concept of a simulation environment combines different aspects of the simulation process into one complete powerful tool. The environment should provide the necessary state-of-the-art advances and concepts that a modeler may require during the simulation development and execution process. The "environment" requirements must address the end user needs while minimizing the necessity of learning a new language. The requirements must specify the useful features, independent of different platforms and implementation languages. Hence the opportunity exists for standardization of environments. The paper opens a discussion on challenges and rewards awaiting the simulation community with the advent of a standard environment.
暂无评论