Context: Cyber-physical systems (CPS) are increasingly self-adaptive, i.e. they have the ability to introspect and change their behavior. This self-adaptation process must be considered when modeling the safety and se...
详细信息
This paper describes a new approach on optimization of constraint satisfaction problems (CSPs) by means of substituting sub-CSPs with locally consistent regular membership constraints. The purpose of this approach is ...
详细信息
These are the proceedings of the first teacher training of the Erasmus+ project No. 2020-1-PT01-KA203-078646 -- Sustrainable. The full title of this project is Promoting Sustainability as a Fundamental Driver in Softw...
详细信息
The use of glide symmetry in radiofrequency devices to introduce dispersive effects has been recently proposed and demonstrated. One of these effects is to control the propagation constant of the structure. Here, we p...
详细信息
The use of glide symmetry in radiofrequency devices to introduce dispersive effects has been recently proposed and demonstrated. One of these effects is to control the propagation constant of the structure. Here, we propose a mm-wave phase shifter whose elements have a glide-symmetric configuration to achieve a greater phase shift in the same waveguide space than the non-glide-symmetric case. The glide-symmetric phase shifter is implemented in waveguide technology and is formed by rows of metallic pins that produce the desired phase shift. To assess the better performance of the glide-symmetric phase shifter, it is compared to its non-glide-symmetric version whose metallic pins are located only in one of the broad sides of the waveguide. The operating frequency range of the phase shifter is 67 to 75 GHz. Results show a 180 degree phase shift in regard to the reference waveguide without pins, and 50 degrees more than the non-glide-symmetric version.
The paradigm shift that has to take place in the new 5G networks in order to meet the expected data rates is a huge technological challenge. The use of super dense heterogeneous networks is one of the most promising a...
详细信息
This paper describes a new approach on optimization of constraint satisfaction problems (CSPs) by means of substituting sub-CSPs with locally consistent regular membership constraints. The purpose of this approach is ...
详细信息
Formal methods (in a broad sense) have been around almost since the beginning of computerscience. Nonetheless, there is a perception in the formal methods community that take-up by industry is low considering the pot...
详细信息
We develop normalisation by evaluation (NBE) for dependent types based on presheaf categories. Our construction is formulated using internal type theory using quotient inductive types. We use a typed presentation henc...
详细信息
Procedural content generation (PCG) is a research field on the rise, with numerous papers devoted to this topic. This paper presents a PCG method based on a self-adaptive evolution strategy for the automatic generatio...
详细信息
Procedural content generation (PCG) is a research field on the rise, with numerous papers devoted to this topic. This paper presents a PCG method based on a self-adaptive evolution strategy for the automatic generation of maps for the real-time strategy (RTS) game Planet Wars. These maps are generated in order to fulfill the aesthetic preferences of the user, as implied by her assessment of a collection of maps used as training set A topological approach is used for the characterization of the maps and their subsequent evaluation: the sphere-of-influence graph (SIG) of each map is built, several graph-theoretic measures are computed on it, and a feature selection method is utilized to determine adequate subsets of measures to capture the class of the map. A multiobjective evolutionary algorithm is subsequently employed to evolve maps, using these feature sets in order to measure distance to good (aesthetic) and bad (non-aesthetic) maps in the training set. The so-obtained results are visually analyzed and compared to the target maps using a Kohonen network.
Access control is a vital security mechanism in today's operating systems and the security policies dictating the security relevant behaviors is lengthy and complex for example in Security-Enhanced Linux (SELinux)...
详细信息
暂无评论