Recent years have seen a proliferation of the use of simulation models in computational science. Most of these models have never been independently replicated by anyone but the original developer. Furthermore, there i...
详细信息
ISBN:
(纸本)9781632662156
Recent years have seen a proliferation of the use of simulation models in computational science. Most of these models have never been independently replicated by anyone but the original developer. Furthermore, there is a growing credibility gap due to widespread, relaxed attitudes in communication of experiments, models, and validation of simulations used in computational research. We examine various issues and challenges involved in model replication and simulation experiment reproducibility. Model-driven simulation engineering principles and model transformation concepts are adopted as solution strategies to improve replicability of models and reproducibility of experiments. A process model, an architectural framework, and an implementation strategy is introduced to address identified issues in simulation experiment management and model replication.
Scalable simulation in a cluster computing environment depends on effective mechanisms for load balancing. This paper presents an object-oriented software architecture and specifies communication protocols which suppo...
详细信息
Impaired people require additional attention by the people around them and also by the people who design artifacts and tools for them. We investigate the interaction design aspects of a wheelchair controller, develope...
详细信息
This paper addresses the need to enhance the integrity and transparency of aircraft maintenance records in the aviation industry by using blockchain technologies. A physical aircraft maintenance logbook is susceptible...
详细信息
x UAS application areas increase by the day. x UAS relatively easy to be built. x News outlets UAS applications: + Expected use on a massive scale. + Equipped with high-res cameras and storage. + Record visual and aud...
详细信息
ISBN:
(纸本)9781479989522
x UAS application areas increase by the day. x UAS relatively easy to be built. x News outlets UAS applications: + Expected use on a massive scale. + Equipped with high-res cameras and storage. + Record visual and audio information. + Also can record people's faces or license plates. x Need privacy protection measures.
Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for r...
详细信息
ISBN:
(纸本)9781450333764
Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for resource-bounded systems, such as cyber-physical systems. For example, many control systems are built on legacy components which are computationally limited but have strict timing constraints. If integrity protection is a binary decision, it may simply be infeasible to introduce into such systems;without it, however, an adversary can forge malicious messages, which can cause significant physical or financial harm. We propose a formal game-theoretic framework for optimal stochastic message authentication, providing provable integrity guarantees for resource-bounded systems based on an existing MAC scheme. We use our framework to investigate attacker deterrence, as well as optimal design of stochastic message authentication schemes when deterrence is impossible. Finally, we provide experimental results on the computational performance of our framework in practice. Copyright is held by the owner/author(s).
This research presents a novel approach to stream-line the configuration of AUTOSAR (Automotive Open System Architecture) modules using Artificial Intelligence (AI)-based tools. Traditional methods of generating AUTOS...
Embedded systems are proliferating in vast application areas of life with ever increasing multifarious functionalities. Due to the focus of research and development on growing software issues, the naturalness of physi...
详细信息
softwareengineering (SE) and human-computer interaction (HCI) are often regarded as two separate entities while the fact is the two share many similarities and should affect each other to produce a better product or ...
详细信息
Ternary Content Addressable Memory (TCAM) is a kind of extraordinary memory which is used to search operations in routers, firewalls, network address translators, and entire content in a single clock cycle. It is a sp...
详细信息
暂无评论