A 1 GeV/u 56 Fe ion beam allows for true 90° tilt irradiations of various microelectronic components and reveals relevant upset trends for an abundant element at the GCR flux energy peak.
A 1 GeV/u 56 Fe ion beam allows for true 90° tilt irradiations of various microelectronic components and reveals relevant upset trends for an abundant element at the GCR flux energy peak.
This paper introduces DynamicView, a novel Semantic Web application, for users to query, browse and visualize distribution and evolution of research interests in temporal, spatial and ontological dimensions. We presen...
详细信息
There are many distributed, autonomous, heterogeneous and dynamic data sources in data sharing environment. In order to achieve the goal of global data sharing without compromising the security of local domain respect...
详细信息
ISBN:
(纸本)9781424432004;9780769531854
There are many distributed, autonomous, heterogeneous and dynamic data sources in data sharing environment. In order to achieve the goal of global data sharing without compromising the security of local domain respectively, it is necessary to establish an access control mechanism to satisfy the security need of data sharing across multi-domain. In this paper, a criterion based algorithm for role mapping across multi-domain is proposed. The algorithm not only resolves the conflicts of cyclic inheritance and separation of duties, but also makes the establishment of role mapping more efficiently by preserving the historical information of role mapping paths established successfully before. Evaluation by access instances shows that the algorithm meets the demands of access control in multi-domains and scales very well.
Multicast plays an important role in supporting a new generation of applications. At present and for different reasons, technical and non-technical, multicast IP hasnpsilat yet been totally adopted for Internet. Durin...
详细信息
Multicast plays an important role in supporting a new generation of applications. At present and for different reasons, technical and non-technical, multicast IP hasnpsilat yet been totally adopted for Internet. During recent years, an active area of research is that of implementing this kind of traffic in the application layer where the multicast functionality isnt a responsibility of the routers but that of the hosts, which we know as Multicast Overlay Networks (MON). In this article, routing in an MON is put forward as a multiobjective optimization problem (MOP) where two functions are optimized: 1) the total end to end delay of the multicast tree and 2) the maximum link utilization. The simultaneous optimization of these two functions is an NP-Complete problem and to solve this we suggest using Multiobjective Evolutionary Algorithms (MOEA), specifically NSGA-II.
The current software development environment has been changing into new development paradigms such as concurrent distributed development environment and the so-called open source project by using network computing tec...
详细信息
A low energy sensor node processor is proposed for continuous healthcare monitoring application. The bio signal processing block is integrated into the processor to support the compression and the encryption. A quadra...
详细信息
A low energy sensor node processor is proposed for continuous healthcare monitoring application. The bio signal processing block is integrated into the processor to support the compression and the encryption. A quadratic level bio signal compression algorithm is proposed to reduce the transmission power consumption and the memory capacity. And the AES-128 data encryption datapath is integrated for user privacy and authentication. The CR is 8.4:1, the PRD is 0.897% and the compression rate is 6.4 Mbps. The encryption rate is 1.6 Mbps and the normalized performance is 0.4b/cycle/k-gates which is the highest value compared to the related works. The proposed processor consumes 0.56 nJ/bit at 1V supply voltage with 1MHz operating frequency in 0.25-mum CMOS process.
Java is widely used because its security and platform independence. Although Java's security model is designed for protecting users from untrusted sources, Java's security is not under fully control at the app...
详细信息
ISBN:
(纸本)9781424432004;9780769531854
Java is widely used because its security and platform independence. Although Java's security model is designed for protecting users from untrusted sources, Java's security is not under fully control at the application level. A large number of Java classes or Java class libraries have been used in network iquest application development, whose source is unknown and trust unassured. Analyzing the vulnerability of Java bytecode is helpful for assessing the security of untrusted Java components. The data-flow based methods suit to vulnerability analysis because their data propagation character. The paper is about using data-flow based methods to analyze the vulnerability of Java program in bytecode.
Producing software that is adaptable to the rapid environmental changes and the dynamic nature of the business life-cycle is extensively becoming a topical issue in the software evolution. In this context, change prop...
详细信息
Producing software that is adaptable to the rapid environmental changes and the dynamic nature of the business life-cycle is extensively becoming a topical issue in the software evolution. In this context, change propagation (CP) process is one of the critical parts in the software change management. Traditional strategies have projected more complex ways, resulting to substantial failures and risks. This paper presents an investigation and highlights on the desired criteria to provide better means to simplify the complicated CP tasks. The evaluation results may be used as a foundation in improving CP approaches that provide significant challenges in software evolution.
Much as software is very useful as a driving force of physical machine in assisting many aspects of human endeavor, it is also often accomplished with delicate aspect especially when correct specification and quality ...
详细信息
Much as software is very useful as a driving force of physical machine in assisting many aspects of human endeavor, it is also often accomplished with delicate aspect especially when correct specification and quality are not met. Ranging from less critical applications (such as payroll), to highly sophisticated application (such as health care system) as well as mission critical applications (such as space mission), failures in the functionality of these systems are often accompanied by disproportionate heavy losses to the respective users. In addition, industrial application is performance-intensive and cannot afford to fail. In this paper, our novel open onions ontology was presented which approaches software development from a layered point of view, the open source approach as an alternative methodology for industrial application development was proposed. Various issues involved in industrial applications were reviewed, the current industrial development methodologies were discussed and possibilities of adopting open source were explored.
In both industrial and research areas of electronic engineering,Sound Source Localization for robot control has always been an interesting subject to be further *** some dangerous situation,especially when a special d...
详细信息
In both industrial and research areas of electronic engineering,Sound Source Localization for robot control has always been an interesting subject to be further *** some dangerous situation,especially when a special driver is required to implement a particular task,the device should be able to combine robotics control technology with Sound Source Localization,and take actions according to the different response *** this research project,a multifunc-tional model driver,named "Mobile Island",has been designed and built up by integrating the Emulator 8051 micro-controller,Intel 8255 interfaces,some components and other necessary *** intelligent Mobile Island imple-mented by C language programs can operate under three control *** the sound control Mode 1,the model driver can detect and track a target by Sound Source Localization and then turn and move toward the *** the keypad control Mode 2,it can be controlled by a manual *** the free run Mode 3,Mobile Island can move and turn by *** finding an object in front,it will turn away before moving forward again,so that it can avoid crashing on the obstacle.
暂无评论