Hardware/software (HW-SW) partitioning is a key problem in codesign of embedded systems, studied extensively in the past. This paper describes a new approach to hardware/software partitioning for synchronous model. We...
详细信息
Hardware/software (HW-SW) partitioning is a key problem in codesign of embedded systems, studied extensively in the past. This paper describes a new approach to hardware/software partitioning for synchronous model. We formalize the partitioning problem using timed automata, which captures the key elements of the partitioning. Then the tabu algorithm is applied to timed automata model to search for the solution efficiently. An industrial experiment is conducted to show our approach can handle large applications with hundreds of nodes in task graph effectively
In real-life distributed systems, dynamic changes are unavoidable properties because of the degeneration or improvement in system performance. Hence to understand the dynamic changes and to "catch the trend"...
详细信息
In real-life distributed systems, dynamic changes are unavoidable properties because of the degeneration or improvement in system performance. Hence to understand the dynamic changes and to "catch the trend" of the changes in distributed systems will be very important for distributed systems management. In order to model the dynamic changes in distributed systems, temporal extensions of Bayesian networks are employed to address the temporal factors and to model the dynamic changes of managed entities and the dependencies between them. Furthermore, the prediction capabilities are investigated by means of the relevant inference techniques when the imprecise and dynamic management information occurs in the distributed system
In this article, we describe a grid of sensors to collect patients' vital data and to allow real time monitoring of patients in heath-care centres. We analyse the problem scenario and identify the components invol...
详细信息
In this article, we describe a grid of sensors to collect patients' vital data and to allow real time monitoring of patients in heath-care centres. We analyse the problem scenario and identify the components involved towards the construction of an integrated and homogeneous management system. Finally, we present a case study to demonstrate the applicability of our approach
Digital watermarking medical images provides security to the images. The purpose of this study was to see whether digitally watermarked images changed clinical diagnoses when assessed by radiologists. We embedded 256 ...
详细信息
Digital watermarking medical images provides security to the images. The purpose of this study was to see whether digitally watermarked images changed clinical diagnoses when assessed by radiologists. We embedded 256 bits watermark to various medical images in the region of non-interest (RONI) and 480K bits in both region of interest (ROI) and RONI. Our results showed that watermarking medical images did not alter clinical diagnoses. In addition, there was no difference in image quality when visually assessed by the medical radiologists. We therefore concluded that digital watermarking medical images were safe in terms of preserving image quality for clinical purposes
The increasing heterogeneity, dynamism and uncertainty of emerging DCE (Distributed Computing Environment) systems imply that an application must be able to detect and adapt to changes in its state, its requirements a...
详细信息
The increasing heterogeneity, dynamism and uncertainty of emerging DCE (Distributed Computing Environment) systems imply that an application must be able to detect and adapt to changes in its state, its requirements and the state of the system to meet its desired QoS constraints. As system and application scales increase, ad hoc heuristic-based approaches to application adaptation and self-management quickly become insufficient. This paper builds on the Accord programming system for rule-based self-management and extends it with model-based control and optimization strategies. This paper also presents the development of a self-managing data streaming service based on online control using Accord. This service is part of a Grid-based fusion simulation workflow consisting of long-running simulations, executing on remote supercomputing sites and generating several terabytes of data, which must then be streamed over a wide-area network for live analysis and visualization. The self-managing data streaming service minimize data streaming overheads on the simulations, adapt to dynamic network bandwidth and prevent data loss. An evaluation of the service demonstrating its feasibility is presented.
This paper addresses the need of semantic component in the grid environment to discover and describe the grid resources semantically. We propose semantic grid architecture by introducing a knowledge layer at the top o...
详细信息
This paper addresses the need of semantic component in the grid environment to discover and describe the grid resources semantically. We propose semantic grid architecture by introducing a knowledge layer at the top of Gridbus broker architecture and thereby enabling broker to discover resources semantically. The semantic component in the knowledge layer enables semantic description of grid resources with the help of ontology template. The ontology template has been created using Protege-OWL editor for different types of computing resources in the grid environment. The Globus Toolkit's MDS is used to gather grid resource information and Protege-OWL libraries are used to dynamically create knowledge base of grid resources. Algernon inference engine is used for interacting with the knowledge base to discover suitable resources.
computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. In today's environment, there is heightened awareness of the threat of well-funded professional ...
computer trustworthiness continues to increase in importance as a pressing scientific, economic, and social problem. In today's environment, there is heightened awareness of the threat of well-funded professional cyber hackers and the potential for nation-state sponsored cyber warfare. An accelerating trend of the last decade has been the growing integration role of computing and communication in critical infrastructure systems that now have complex interdependencies rooted in information technologies. These overlapping and interacting trends force us to recognize that trustworthiness of our computersystems is not an IT issue any more; it has a direct and immediate impact on our critical infrastructure. Security is often a collective enterprise, with complicated interdependencies and composition issues among a variety of participants. This poses a challenge for traditional engineering education models and curricula. The panel will discuss experiences and strategies to establish curricular foundation elements providing CSET graduates with an understanding of the interaction between cyber security, critical infrastructure systems and public policy
暂无评论