In an Ethernet Passive Optical Network (EPON), all optical network units (ONUs) share one uplink channel to transmit multiple traffic. To avoid data collision, a contention-free MAC protocol is needed to schedule the ...
详细信息
Summary form only given. We propose architecture and a general optimization framework for dynamic, distributed real-time systems. Interesting features of this model include the consideration of adaptive applications a...
详细信息
Summary form only given. We propose architecture and a general optimization framework for dynamic, distributed real-time systems. Interesting features of this model include the consideration of adaptive applications and utility functions. We extend by formalizing the corresponding multicriterial optimization problem. As the most difficult part of this problem, we identified the evaluation and comparison of the quality of single allocations and sets of allocations, respectively. To this end, we propose and examine metrics for measuring the goodness of solutions within our general resource management framework. These metrics lay the basis for further work on developing both online and offline algorithms to tackle the general optimization problem and provide an efficient adaptive resource manager for dynamic, distributed real-time systems.
Although network intrusion detection systems (nIDS) are widely used, there is limited understanding of how these systems perform in different settings and how they should be evaluated. This paper examines how nIDS per...
详细信息
Although network intrusion detection systems (nIDS) are widely used, there is limited understanding of how these systems perform in different settings and how they should be evaluated. This paper examines how nIDS performance is affected by traffic characteristics, rulesets, string matching algorithms and processor architecture. The analysis presented in this paper shows that nIDS performance is very sensitive to these factors. Evaluating a nIDS therefore requires careful consideration of a fairly extensive set of scenarios. Our results also highlight potential dangers with the use of workloads based on combining widely-available packet header traces with synthetic packet content as well as with the use of synthetic rulesets.
Regression testing is an important part of software quality assurance. We work to extend regression testing to include regression benchmarking, which applies benchmarking to detect regressions in performance. Given th...
详细信息
We propose a family of finite approximations for the departure process of a MAP/MAP/1 queue. The departure process approximations are derived via an exact aggregate solution technique (called ETAQA) applied to quasi-b...
详细信息
We propose a family of finite approximations for the departure process of a MAP/MAP/1 queue. The departure process approximations are derived via an exact aggregate solution technique (called ETAQA) applied to quasi-birth-death processes (QBDs) and require only the computation of the frequently sparse fundamental-period matrix G. The approximations are indexed by a parameter n, which determines the size of the output model as n-1 QBD levels. The marginal distribution of the true departure process and the lag correlations of the interdeparture times up to lag n+1 are preserved exactly. Via experimentation we show the applicability of the proposed approximation in traffic-based decomposition of queueing networks and investigate how correlation propagates through tandem queues.
Software inspection is an effective method to detect faults in software artefacts. Several empirical studies have been performed on reading techniques, which are used in the individual preparation phase of software in...
详细信息
Software inspection is an effective method to detect faults in software artefacts. Several empirical studies have been performed on reading techniques, which are used in the individual preparation phase of software inspections. Besides new experiments, replications are needed to increase the body of knowledge in software inspections. We present a replication of an experiment, which compares usage-based and checklist-based reading. The results of the original experiment show that reviewers applying usage-based reading are more efficient and effective in detecting the most critical faults from a user's point of view than reviewers using checklist-based reading. We present the data of the replication together with the original experiment and compares the experiments. The main result of the replication is that it confirms the result of the original experiment. This replication strengthens the evidence that usage-based reading is an efficient reading technique.
A knowledge based system may be considered as knowledge, distributed between one or several experts and the system users. Explanations in such a system provide for a more intensive interaction between the system and t...
详细信息
A knowledge based system may be considered as knowledge, distributed between one or several experts and the system users. Explanations in such a system provide for a more intensive interaction between the system and the user. We construct an explanation network by defining relationships between various knowledge fragments. Knowledge fragments on varying levels are formulated using the Qualitative Process Theory. The relationships are defined by links, compatible with Rhetorical Structure Theory. Different knowledge elements are combined into an explanation path by using Toulmin's argumentation theory. The feasibility of this approach is investigated. We show the following: By representing relations in a concept hierarchy as well as representing the relationships between elements in a rule of a knowledge base, both problem solving inferences and explanations can be generated. At the moment, the derivation of explanations cannot be performed automatically, but ready-made explanations may be stored and presented in a useful way. The explanation network idea has great knowledge acquisition power. An empirical study with users showed that different paths within the explanation net are useful for users with different prior knowledge. To conclude, the idea of distributing knowledge by support from an explanation network is fruitful and feasible.
作者:
Bohn, JürgenGärtner, FelixVogt, Harald
Department for Computer Science Distributed Systems Group CH-8092 Zürich Switzerland
Departement de Systèmes de Communications Laboratoire de Programmation Distribuée CH-1015 Lausanne Switzerland
This paper proposes that the healthcare domain can serve as an archetypical field of research in pervasive computing. We present this area from a technological perspective, arguing that it provides a wide range of pos...
详细信息
This document demonstrates how a face recognition system can be designed with artificial neural network. Note that the training process did not consist of a single call to a training function. Instead, the network was...
详细信息
This document demonstrates how a face recognition system can be designed with artificial neural network. Note that the training process did not consist of a single call to a training function. Instead, the network was trained several times on various input ideal and noisy images, the images that contents faces. In this case training a network on different sets of noisy images forced the network to learn how to deal with noise, a common problem in the real world.
This work analyzes the impact of having more than one frequency channel on outage probability and node throughput in TDMA-based broadband fixed cellular multihop networks. The scenario considered is a low node density...
详细信息
This work analyzes the impact of having more than one frequency channel on outage probability and node throughput in TDMA-based broadband fixed cellular multihop networks. The scenario considered is a low node density, start-up network with inadequate single-hop coverage. In this scenario the user terminals themselves act as relays, therefore, there are no additional relays deployed by the service provider: besides, no separate relaying channels are used (this scenario ensures a fair comparison between the multihop cellular network considered here and the traditional single-hop cellular network). In a situation where there is outage with a single-hop due to poor coverage, a suitable multihop route with minimum number of hops is sought. It is observed that as the number of available channels increases the coverage is enhanced remarkably; in addition, the average node throughput is increased as well although no explicit attempt for throughput maximization is made during the search for the multihop routes.
暂无评论