The authors of the presented paper are propose to relief the calculus, modelling and construction of the translation module of an industrial robot which possess in his cinematic chain five degrees of freedom, type TTR...
It my great pleasure and honor to welcome you to FoSER 2010: The FSE/SDP Workshop on the Future of Software Engineering Research. This workshop was organized in collaboration with and made possible by generous support...
详细信息
ISBN:
(纸本)9781450304276
It my great pleasure and honor to welcome you to FoSER 2010: The FSE/SDP Workshop on the Future of Software Engineering Research. This workshop was organized in collaboration with and made possible by generous support from the Software Design and Productivity Coordinating Group (SDP) of the U.S. National Coordination Office (NCO) for Networking and Information Technology Research and Development (NITRD), and the National Science Foundation (NSF). This one-time, international working conference has brought together top academic and industrial researchers and government research funding agency personnel from around the world to engage in an extended discussion of consequential new ideas about the future of our field. The ideas produced by this workshop will be disseminated in two forms. First, the position papers accepted by the program committee will be published in a companion to the Proceedings of FSE-18. Second, the workshop findings will be published subsequently in a special report by NITRD/SDP. The call for papers for FoSER 2010 solicited 4-page position papers with new ideas about the future of software and software-reliant systems, and the research that will be needed to meet future needs. Papers were expected to be creative and thought-provoking, and to articulate compelling new perspectives, positions, problem formulations, assumptions and approaches. The workshop did not seek, and did not accept, technical research papers or abstracts. The workshop received a total of 139 position papers. Of these, 90 papers (65%) were accepted. Each paper was reviewed by at least two members of the workshop program committee. The committee was asked to accept all papers presenting significant new ideas about how our field should move forward. Copyright 2010 ACM.
IEEEXtreme is an IEEE Student Activities Committee initiative to create a worldwide programming contest for IEEE Student Branches. The success of the past editions and the way IEEEXtreme is evolving, suggests that it ...
详细信息
We present the results of a community detection analysis of the Wikipedia graph. Distinct communities in Wikipedia contain semantically closely related articles. The central topic of a community can be identified usin...
详细信息
ISBN:
(纸本)9781605584874
We present the results of a community detection analysis of the Wikipedia graph. Distinct communities in Wikipedia contain semantically closely related articles. The central topic of a community can be identified using PageRank. Extracted communities can be organized hierarchically similar to manually created Wikipedia category structure. Copyright is held by the author/owner(s).
The calculation of "Probability of Failure on Demand" (PFH) according to IEC 61508 shows for a 1oo1 and a 1oo2 system using the same initial values that - as expected - a 1oo2 system is a better safety integ...
详细信息
The calculation of "Probability of Failure on Demand" (PFH) according to IEC 61508 shows for a 1oo1 and a 1oo2 system using the same initial values that - as expected - a 1oo2 system is a better safety integrity system than a 1oo1 system. This means, that a 1oo2 system has a lower probability of failure than a 1oo1 system. Comparing the same systems operating in a high demand or continuous mode of operation, there will be some cases, especially for systems with high diagnostics, where a 1oo1 system has a lower ¿Probability of Failure per Hour¿ (PFH) value than a 1oo2 system, using the PFH formulas according to IEC 61508. Using the equation according to IEC 61508, it is also possible that the PFH value is apparently better the longer the system runs either in the high mode or continuous mode of operation. Both results are irreproducible in industrial reality. Therefore, this paper will analyze first what conditions are necessary to get a hazard event when using a PFH system. Only those cases are considered in the modified PFH calculation, in which indeed a hazard event occurs. In a second step, it presents a new approach with the help of plausible arguments in order to calculate the PFH value of a PFH system considering a high diagnostic and a very low failure rate. The presented approach can also be correctly verified with mathematics using the advanced Markov model also described in this paper.
Multithreaded Object-Oriented programming in concurrency environment using object-oriented technology is a complex activity. Programmers need to be aware of issues unrelated to their domain of problem, and are often u...
详细信息
Multithreaded Object-Oriented programming in concurrency environment using object-oriented technology is a complex activity. Programmers need to be aware of issues unrelated to their domain of problem, and are often unprepared for the challenges of the concurrent object-oriented programming brings. The interaction of their components becomes more complex, and makes it difficult to validate the design and correctness of the implemented program. Supporting separation of concerns in the design and implementation of the multithreaded object-oriented programming can provide a number of benefits such as comprehension, reusability, extensibility and adaptability in both design and implementation. We have tackled this problem by adopting the technique of separation of concerns in multithreaded object-oriented programming. In this paper we demonstrate an aspect-oriented approach that can be used for multithreaded object-oriented programming. We also show how better the separation of concerns in components. Readers/Writers problem is demonstrated using an aspect-oriented approach. Our methodology, which is based on aspect-oriented techniques as well as language and architecture independence, is an aspect-oriented framework.
This paper presents a novel method on coloring the grayscale images. For this purpose, a combination of artificial neural networks and some image processing algorithms was developed to transfer colors from a user-sele...
详细信息
This paper presents a novel method on coloring the grayscale images. For this purpose, a combination of artificial neural networks and some image processing algorithms was developed to transfer colors from a user-selected source image to a target grayscale image. According to the results of this combining method, a survey where volunteers were asked to rate the plausibility of the colorings generated automatically was performed for individual images. In most cases automatically-colored images were rated either as totally or mostly acceptable.
Maintainability, extendibility and reusability of components in the design of robot control architectures is a major challenge. Parallel kinematic robots feature a wide variety of structures and applications. They are...
详细信息
The SecureMDD approach aims to generate both, a formal specification for verification and executable code, from UML diagrams. The UML models define the static as well as dynamic components of the system under developm...
详细信息
ISBN:
(纸本)9781424437252
The SecureMDD approach aims to generate both, a formal specification for verification and executable code, from UML diagrams. The UML models define the static as well as dynamic components of the system under development. This model-driven approach is focused on security-critical applications that are based on cryptographic protocols, especially Java Card applications. In this paper we describe the generation of the formal specification from the UML model which is then used as input for our interactive verification system KIV. The formal specification is based on abstract state machines and algebraic specifications. It allows to formulate and to prove application-specific security properties.
Efficiently using the computational power made available through desktop grids based distributed systems is a complicated and many-sided problem, caused by the intermittent resource availability. In this paper a novel...
详细信息
ISBN:
(纸本)9781424435692
Efficiently using the computational power made available through desktop grids based distributed systems is a complicated and many-sided problem, caused by the intermittent resource availability. In this paper a novel solution is presented for predicting the runtimes of parameter sweep jobs. These jobs are characterized by their lack of inter-dependence and suitability for runtime prediction by modeling. This makes them ideal candidates for deployment on volatile grid configurations using prediction based techniques. The parameter sweep prediction framework used to make the predictions is referred to as GIPSy (grid information prediction system). Previous research involving GIPSy has focused on results obtained during simulation were it is necessary to make some basic assumptions. By combining GIPSy with PGS (prediction based grid scheduling), an actual grid implementation, real results can be obtained. A detailed comparison between the expected results, based on simulation analysis, and the final results is given. Discrepancies are highlighted and possible causes are identified, solutions are proposed and implemented. By comparing the results for different model building configurations an optimal configuration is found that produces reliable result independent of the chosen job type. Results are presented for a quantum physics problem and two simulated workloads represented by sleep jobs.
暂无评论