We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are ex...
详细信息
We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are explained in detail. Experimental results of tunable optical filters, which play a major role in WDM systems, are reported. New concepts for novel optical interconnectors and novel miniaturized lasers for direct generation of green light are proposed as examples for possible next generation components to improve the performance of optical communication based computer architecture.
Emerging multi-core processors promise to provide an exponentially increasing number of hardware threads with every generation. Applications will need to be highly concurrent to fully use the power of these processors...
详细信息
Applications need to become more concurrent to take advantage of the increased computational power provided by chip level multiprocessing. Programmers have traditionally managed this concurrency using locks (mutex bas...
详细信息
OPC which stands for Open Process Control is the world's fastest growing industrial standard that has emerged to provide a greater interoperability between various process control hardware devices from different m...
详细信息
OPC which stands for Open Process Control is the world's fastest growing industrial standard that has emerged to provide a greater interoperability between various process control hardware devices from different manufacturers and windows based automation applications. For this purpose OPC defines a set of interfaces, based on Microsoft's OLE/ COM and DCOM technology. OPC standard also provides benefits for both end users and vendors in the Process Control community. This paper disc usses an introduction to OPC, OPC specifications, OPC architectures, OPC strategies for redundancy and OPC benefits.
This paper is the second part of concepts of safety networks in industries. In the first part the requirements and specifications were detailed to be considered and fulfilled to design safety bus systems. The second p...
详细信息
This paper is the second part of concepts of safety networks in industries. In the first part the requirements and specifications were detailed to be considered and fulfilled to design safety bus systems. The second part introduces data integrity in more detail and compares mathematically different architectures of safety-bus-systems.
This paper details the needs, demands and specifications to be incorporated and satisfied to design safety bus systems for modern industries. Distributed control systems in industries are connected via bus systems, an...
详细信息
This paper details the needs, demands and specifications to be incorporated and satisfied to design safety bus systems for modern industries. Distributed control systems in industries are connected via bus systems, and need efficient and uninterrupted communication between all bus stations. Therefore, it is compulsory that these communications are fault tolerant and safe. For safety related systems, further safety layers are mandatory to perform these requirements. In a safety related application it is important that the safe protocol alone is not able to achieve this task without a safety source node at one end and a safe destination node at the other. Only the combination between safety related protocol and safety related hardware nodes can accomplish the requirements for safety related networks systems.
Explorative research is a vital part of biological sciences. Biologists frequently have to examine and compare multiple (large) sets of biological data in an interactive and explorative manner. Exploring alternative w...
详细信息
This paper presents an advanced control structure exploiting a GPC master-slave solution to regulate the oxygen and nitrification process of a simulated water treatment plant. The slave controller regulates the proces...
This paper presents an advanced control structure exploiting a GPC master-slave solution to regulate the oxygen and nitrification process of a simulated water treatment plant. The slave controller regulates the process variable, whilst the master controller changes the set-point for the slave controller depending on the output behaviour of the system. The presented structure outperforms significantly the standard control structure. Different weather conditions are simulated and analysed for comparison
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information can be encrypted when stored in non-vol...
详细信息
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information can be encrypted when stored in non-volatile memory such as hard disks, for many e-commerce and network applications, sensitive information is often stored as plaintext in main memory. Documented and reported exploits facilitate an adversary stealing sensitive information from an application's memory. These exploits include illegitimate memory scan, information theft oriented buffer overflow, invalid pointer manipulation, integer overflow, password stealing Trojans and so forth. Today's computing system and its hardware cannot address these exploits effectively in a coherent way. This paper presents a unified and lightweight solution, called InfoShield that can strengthen application protection against theft of sensitive information such as passwords, encryption keys, and other private data with a minimal performance impact. Unlike prior whole memory encryption and information flow based efforts, InfoShield protects the usage of information. InfoShield ensures that sensitive data are used only as defined by application semantics, preventing misuse of information. Comparing with prior art, InfoShield handles a broader range of information theft scenarios in a unified framework with less overhead. Evaluation using popular network client-server applications shows that InfoShield is sound for practical use and incurs little performance loss because InfoShield only protects absolute, critical sensitive information. Based on the profiling results, only 0.3% of memory accesses and 0.2% of executed codes are affected by InfoShield.
Domain Specific Languages (DSLs) are high level languages designed for solving problems in a particular domain, and have been suggested as means for developing reliable software systems. However, designing of a domain...
详细信息
Domain Specific Languages (DSLs) are high level languages designed for solving problems in a particular domain, and have been suggested as means for developing reliable software systems. However, designing of a domain specific language is a difficult task. The design of a domain specific language will evolve as it is used more and more and experienced is gained by its designers. Being able to rapidly develop the implementation infrastructure (interpreter, compiler, debugger, profiler, etc.) of a domain specific language is thus of utmost importance so that as the language evolves, the implementation infrastructure can keep pace. In this paper we present a framework for automatically generating interpreters, compilers, debuggers, and profilers from semantic specification of a domain specific language. We illustrate our approach via the SCR language, a language used by the US defense department for developing control systems. Copyright 2005 ACM.
暂无评论