Cache coherent Non-Uniform Memory Access (cc-NUMA) architectures have been widely used for chip multiprocessors (CMPs). However, they require complicated hardware to properly handle the cache coherence problem. Moreov...
详细信息
Recently, Intel has introduced a research prototype manycore processor called the Single-chip Cloud computer (SCC). The SCC is an experimental processor created by Intel Labs. It contains 48 cores in a single chip and...
详细信息
The paper is concerned with data transmission via channels composed of a memoryless binary symmetric channel and the erasure channel of Peter Elias. Channels of this type play an important role in modelling different ...
The paper is concerned with data transmission via channels composed of a memoryless binary symmetric channel and the erasure channel of Peter Elias. Channels of this type play an important role in modelling different types of networks especially wireless networks, and have been investigated using, amongst others, the theory of Markov chains. Channel Capacities and network flows have been determined. The authors focus their interest on some aspects of coding theory. They assume the data transmission to be protected by a linear code, a CRC for example, and determine the probability of undetected error of the code. They then consider redundant transmission via two or more channels with bit inversion, and calculate the probability of undetected error. They prove some inequalities that are useful instruments to estimate the rate of transmission errors and to determine safety integrity levels according to the standards. Finally the authors apply their results to Bluetooth channels suffering from different types of noise.
With the publication and enforcement of the standard IEC 61508 of safety related systems, recent system architectures have been presented and evaluated. Among a number of techniques and measures to the evaluation of s...
With the publication and enforcement of the standard IEC 61508 of safety related systems, recent system architectures have been presented and evaluated. Among a number of techniques and measures to the evaluation of safety integrity level (SIL) for safety-related systems, several measures such as reliability block diagrams and Markov models are used to analyze the probability of failure on demand (PFD) and mean time to failure (MTTF) which conform to IEC 61508. The current paper deals with the quantitative analysis of the novel 1oo4-architecture (one out of four) presented in recent work. Therefore sophisticated calculations for the required parameters are introduced. The provided 1oo4-architecture represents an advanced safety architecture based on on-chip redundancy, which is 3-failure safe. This means that at least one of the four channels have to work correctly in order to trigger the safety function.
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the syste...
详细信息
ISBN:
(纸本)9781618040282
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the system is supposed to do and what can go wrong. This article presents the service-oriented approach - security services that can be developed and tested and applied against many types of applications or scenarios. The proposed concept has the contribution to allow for SSAS (Software Security as a Service) providers to provide access to software services without requiring the customer to host this service within their local environment. In this model, the access control decision and (ideally) enforcement functionality is not embedded within an application. The split of enforcement and decision point has its advantages.
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to prop...
详细信息
ISBN:
(纸本)9789604742974
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to propose an ontology dependent approach to transform XML based scientific data description into RDF instances in order to using them as a complete resource on the Semantic Web. The transforming process includes: establishing an ontology describing the data semantic and links between the elements of the output RDF file;establishing a mapping document defining the relationship between the input XML Schema file and the OWL ontology. The proposed approach has been verified successfully as web service implementation utilizing specific scientific experimental data.
Access control is a vital security mechanism in today's operating systems and the security policies dictating the security relevant behaviors is lengthy and complex for example in Security-Enhanced Linux (SELinux)...
详细信息
We introduce a new nameless representation of lambda terms inspired by ordered logic. At a lambda abstraction, number and relative position of all occurrences of the bound variable are stored, and application carries ...
详细信息
Maximum Distance Separable (MDS) codes are used as diffusion layers in the design of the well known block ciphers like the Advanced Encryption Standard (AES) and Khazad. The reason for the use of MDS codes in the desi...
详细信息
暂无评论