作者:
Fuchs, GerhardGerman, ReinhardComputer Science
Department of Computer Networks and Communication Systems Friedrich-Alexander-Universität Erlangen-Nürnberg Martensstr. 3 91058 Erlangen Germany
Wireless Sensor networks (WSNs) consist of sensor nodes (spots). In the frame of our ongoing ACOOWEE project we assay how spots can be programmed so that they collaborate and fulfil a common task. The novelty of our w...
详细信息
In the automotive industry active safety functions are deployed to better protect the passengers and vulnerable road users in case of an accident. To do so, advanced system architectures which enable an OEM to integra...
详细信息
KAD is one of the largest scale DHT based on real applications. Measurements on KAD is a good approach for researching DHT. Many different active and passive measurements have been made on those systems, and crawlers ...
详细信息
KAD is one of the largest scale DHT based on real applications. Measurements on KAD is a good approach for researching DHT. Many different active and passive measurements have been made on those systems, and crawlers are novel approach in active measurement. A crawler begins crawling into the DHT with a basic set of given nodes, sending node searching requests to the nodes in the given set for contact information from more unknown nodes. There are three goals in mind while we design the crawler: finishing crawling the given nodes set as soon as possible; retrieving more nodes information after the crawling; getting result while sending as few network packets as possible. The above goals are correlated with each other. Optimizing one may impact others. This paper proposes a basic DHT crawler framework and discusses possible extension to the framework. After that we exploit the fact that the connectivity in the overlay network is universality, thus we do not need to crawl the whole overlay network space while maintaining the crawling affect.
In this paper, we study the constellation design of quadrature amplitude modulations (QAMs) with odd number of bits per symbol. A square constellation, which adopts symmetrical Gray labeling, is proposed. Simplified m...
详细信息
Hypervisor-based fault tolerance (HBFT), a checkpoint-recovery mechanism, is an emerging approach to sustaining mission-critical applications. Based on virtualization technology, HBFT provides an economic and transpar...
详细信息
作者:
Zhao, SinanLuo, BinDang, AnhongGuo, HongCREAM Group
State Key Laboratory of Advanced Optical Communication Systems and Networks Institute of Quantum Electronics School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
Based on weak fluctuation theory and gamma-gamma irradiance distribution model, the combined effect of scintillation and beam wander on ground-to-satellite laser uplink communicationsystems is analyzed and optimum tr...
详细信息
作者:
Xie, GuodongDang, AnhongGuo, HongCREAM Group
State Key Laboratory of Advanced Optical Communication Systems and Networks Institute of Quantum Electronics School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
Coherent differential phase-shift keying (DPSK) transmission system is very suitable for atmosphere channels. Based on Gamma-Gamma channel model, the error probability expressions of three different detection schemes ...
详细信息
作者:
Han, YaoqiangDang, AnhongTang, JunxiongGuo, HongCREAM Group
State Key Laboratory of Advanced Optical Communication Systems and Networks Institute of Quantum Electronics School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
In this paper, we propose a correlation beacon detection scheme for optical wireless link establishment under strong interference conditions. An outdoor experiment is demonstrated and validates that the beacon can be ...
详细信息
A novel semiconductor saturable absorber based on high contrast grating is investigated for the first time. The extremely broad reflection band, low saturation fluence, and large design flexibility make it useful in m...
详细信息
The formal verification of task schedulability is getting more important in the automotive domain as more and more applications are integrated into domain specific controllers. Especially for safety critical applicati...
详细信息
The formal verification of task schedulability is getting more important in the automotive domain as more and more applications are integrated into domain specific controllers. Especially for safety critical applications an indepth knowledge about the worstcase response time of tasks is of utmost importance. Such systems often consist of subsystems that comprise of a collection of tasks, called transactions, which are triggered by external events. We adapt a well known response time analysis to analyze asynchronous task sets where subsets may be triggered from different clock references. Therefore we refine the original computational model from the literature to capture the information about transaction clock references. To determine the schedulability of the system we first analyze all task subsets which are triggered by the same clock reference. Then we combine the results to derive the response times for the complete task set. The approach incorporates no overestimation of the response times and therefore represets a necessary and sufficient schedulability test for such systems. The computational complexity of the presented approach is O(nm) with n being the number of tasks and m the number of clock references in the system. We apply the analysis to a real-world scenario from the automotive safety domain to confirm the computational feasibility and validity of the analysis in real-world systems.
暂无评论