In this article, we describe a grid of sensors to collect patients' vital data and to allow real time monitoring of patients in heath-care centres. We analyse the problem scenario and identify the components invol...
详细信息
In this article, we describe a grid of sensors to collect patients' vital data and to allow real time monitoring of patients in heath-care centres. We analyse the problem scenario and identify the components involved towards the construction of an integrated and homogeneous management system. Finally, we present a case study to demonstrate the applicability of our approach
Voting technology has seen various changes over the time, starting from traditional ballot voting system to the latest e-voting system. But technology couldn't affect the popularity of ballot voting system though ...
详细信息
ISBN:
(纸本)9780387287539
Voting technology has seen various changes over the time, starting from traditional ballot voting system to the latest e-voting system. But technology couldn't affect the popularity of ballot voting system though it doesn't provide desirable blend of accessibility and efficiency. We believe that an architecture that combines the efficiency of current day technology and the ease of ballot voting system will revolutionize voting. We propose a novel architecture for voting system that uses multiple channels (ATM, Internet, cellular phone, telephone and ballot) and multiple databases to show that it is ideal in achieving accessibility, efficiency, feasibility and flexibility. We show through simulations that the proposed multi channel voting system is suitable for several countries. We compare the cost of this voting system with the traditional one in different scenarios with the help of a new metric.
Mobile 1Pv6 allows mobile devices always addressable by its home address wherever it is located. In this paper the focus is given on a micromobility based test-bed development with improved scheme. The test-bed consis...
详细信息
An algorithm for time division multiple access (TDMA) is found to be applicable in converting existing distributed algorithms into a model that is consistent with sensor networks. Such a TDMA service needs to be self-...
详细信息
Progressive ubiquitous networks have impressed us with alternative features, diversity or security. When the diversity from small devices to large machines is in normal states, ubiquitous networks are functional and u...
详细信息
Recomposable software enables a system to change its structure and behavior during execution, in response to a dynamic execution environment. This paper proposes an approach to ensure that such adaptations are safe wi...
详细信息
This paper describes TRAP/C++, a software tool that enables new adaptable behavior to be added to existing C++ programs in a transparent fashion. In previous investigations, we used an aspectoriented approach to manua...
详细信息
ISBN:
(纸本)1595930396
This paper describes TRAP/C++, a software tool that enables new adaptable behavior to be added to existing C++ programs in a transparent fashion. In previous investigations, we used an aspectoriented approach to manually define aspects for adaptation infrastructure, which were woven into the original application code at compile time. In follow-on work, we developed TRAP, a transparent shaping technique for automatically generating adaptation aspects, where TRAP/J is a specific instantiation of TRAP. This paper presents our work into building TRAP/C++, which was intended to be a port of TRAP/J into C++. Designing TRAP/C++ required us to overcome two major hurdles: lack of reflection in C++ and the incompatibility between the management of objects in C++ and the aspect weaving technique used in TRAP/J. We used generative programming methods to produce two tools, TrapGen and TrapCC, that work together to produce the desired TRAP/C++ functionality. Details of the TRAP/C++ architecture and operation are presented, which we illustrate with a description of a case study that adds dynamic auditing capabilities to an existing distributed C++ application. Copyright 2005 ACM.
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facilitate the specification of critical pro...
详细信息
ISBN:
(纸本)9781581139631
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facilitate the specification of critical properties, such as those that must be satisfied by embedded systems. Thus far, no analogous repository has been compiled for real-time specification patterns. This paper makes two main contributions: First, based on an analysis of timing-based requirements of several industrial embedded system applications, we created real-time specification patterns in terms of three commonly used real-time temporal logics. Second, as a means to further facilitate the understanding of the meaning of a specification, we offer a structured English grammar that includes support for real-time properties. We illustrate the use of the real-time specification patterns in the context of property specifications of a real-world automotive embedded system. Copyright 2005 ACM.
To understand a role of feedback signals in the visual cortex, we have developed a computational model which performs image interpretation in degraded environments;given a degraded picture, we seek the image that maxi...
详细信息
Internet owes its outstanding expansion in recent years to the development of handheld multimedia devices. The performable features and security of these devices have mainly relied on software supports. However, this ...
详细信息
ISBN:
(纸本)9806560612
Internet owes its outstanding expansion in recent years to the development of handheld multimedia devices. The performable features and security of these devices have mainly relied on software supports. However, this obviously contradicts power conscious design. The hardware system of a single VLSI processor is indispensable to fulfill demands for the power conscious high speed cryptography of large quantity of multimedia data. Setting up the drastic throughput of 1GIPS (109 instructions/sec) and 1-W power dissipation, we have exploited the architecture of a hardware security-embedded multimedia mobile processor named HSgorilla by sophisticatedly unifying up-to-date processor techniques. This paper focuses on HSgorilla's aspects, application, and design approach for one of processor cores, HSgorilla035, by using 0.35-μm CMOS standard cell technology. Current specifications so far achieved fill our expectations to some extent, yet they are not always sufficient for the target specifications. Actually, further enhancement of throughput is required. We will be able to afford to do this, considering the power consumption is still less than 1W.
暂无评论