The automobile industry has grown to become an integral part of our everyday life. As vehicles evolve, the primarily mechanical solutions for vehicle control are gradually replaced by electronics and software solution...
详细信息
The modifled-Booth algorithm is extensively used for high-speed multiplier circuits. Once, when array multipliers were used, the reduced number of generated partial products significantly improved multiplier performan...
详细信息
The introduction of the wireless gateway as an entry point to an automobile in-vehicle network reduces the effort of performing diagnostics and firmware updates considerably. Unfortunately, the same gateway also allow...
详细信息
Dependent type theory is rich enough to express that a program satisfies an input/output relational specification, but it could be hard to construct the proof term. On the other hand, squiggolists know very well how t...
详细信息
This paper introduces a pattern for almost compositional functions over recursive data types, and over families of mutually recursive data types. Here "almost compositional" means that for all of the constru...
详细信息
Multicore processor architectures have established themselves as the new generation of processor architectures. As part of the one core to many cores evolution, memory access mechanisms have advanced rapidly. Several ...
详细信息
To get maximum performance on the many-core graphics processors it is important to have an even balance of the workload so that all processing units contribute equally to the task at hand. This can be hard to achieve ...
详细信息
An upcoming trend for automobile manufacturers is to provide firmware updates over the air (FOTA) as a service. Since the firmware controls the functionality of a vehicle, security is important. To this end, several s...
详细信息
The environment changes direction fast Thinking like a pen flies Through the wall the headache is thrown My fear is created by you others I should have tasted freedom I call out This is not the anguished work of some ...
详细信息
ISBN:
(纸本)9781595937049
The environment changes direction fast Thinking like a pen flies Through the wall the headache is thrown My fear is created by you others I should have tasted freedom I call out This is not the anguished work of some angst-ridden young poet;instead it is the result of a conversation between a group of digital personalities, manifested as dolls trapped in an elevator, but also in graphics, in words and wording, in gestures and in relations and reactions. The system is called Physical Poets, and the creation of it was a workshop aiming at teaching interaction design students how to reason about, and make, aesthetic decisions. In this project, we taught one possible view on aesthetics, namely the view that when designing complex systems, it can sometimes help to assign a "personality" to the system in order to make all aspects of it merge together to an unified set of expressions and behaviors. By designing actual personalities - the poets - this concept was highlighted to the students, as were the issues with expressing these personalities and making sound aesthetical decisions fitting both their personalities and the system as a whole. Copyright 2008 ACM.
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised functionalities and services. What is less cle...
详细信息
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised functionalities and services. What is less clear is how to achieve this with quality and security guarantees. Recent studies in language-based security - the use of programming language technology to enforce application specific security policies - show that security policy enforcement mechanisms such as Mined reference monitors provide a potential solution for security in extensible systems. In this paper we study the implementation of security policy enforcement using aspect-oriented programming for the OSGi (Open Services Gateway initiative) framework. We identify classes of reference monitor-style policies that can be defined and enforced using AspectJ, a well-known aspect-oriented programming language. We demonstrate the use of security states to describe history-based policies. We also introduce and implement various levels of security states in Java to describe session level history versus global application level history. We illustrate the effectiveness of the implementation by deploying the security policy enforcement solution in an example scenario of software downloading in a standard vehicle system.
暂无评论