In order to support the development of complex products, modeling tools and processes need to support co-design of software and hardware in an integrated way. Modelica is the major object-oriented mathematical modelin...
详细信息
In order to support the development of complex products, modeling tools and processes need to support co-design of software and hardware in an integrated way. Modelica is the major object-oriented mathematical modeling language for component-oriented modeling of complex physical systems and UML is the dominant graphical modeling notation for software. In this paper we propose ModelicaML UML profile as an integration of Modelica and UML. The profile combines the major UML diagrams with Modelica graphic connection diagrams and is based on the System Modeling Language (SysML) profile.
computer science and engineering communities have been exploring a variety of activities and techniques to attract and retain more students, especially women and minorities, to computer science and computer engineerin...
详细信息
computer science and engineering communities have been exploring a variety of activities and techniques to attract and retain more students, especially women and minorities, to computer science and computer engineering degree programs1. This paper briefly describes the efforts and results of a plan for actively recruiting young women into undergraduate computer engineering and computer science programs hosted by the University of North Texas (UNT). It also describes a series of activities aimed at improving the retention rate of students already in our programs, particularly during the freshman year. Such recruitment and retention efforts are critical to the country's efforts to increase the number of engineering professionals, and are a priority for the computer Science and Engineering (CSE) department at UNT. We initially designed a three-part plan to achieve our recruitment and retention goals: Sponsorship of portable and mobile summer computer engineering robotics camps for middle and high-school women students, coordinating with the regional Girl Scouts councils and other organizations to help with the recruitment;Creation of an Ambassador program using young women currently enrolled in the upper division of current computer science and computer engineering programs as a form of outreach to area high schools and junior colleges;and Expansion of our successful undergraduate mentoring program by using the Ambassador cohort mentioned above as mentors for incoming freshman and first-year transfer women entering our programs. This paper will focus primarily on the summer camp program and present an analysis of the results we have seen to date after 2 years of camp activities. Results from student surveys and parent surveys will be presented. The paper concludes with recommended changes and improvements in the program, as well as a discussion of adaptations that would create programs suitable for implementation at other institutions as well as programs aimed at a dif
With single thread performance starting to plateau, HW architects have turned to chip level multiprocessing (CMP) to increase processing power. All major microprocessor companies are aggressively shipping multi-core p...
详细信息
ISBN:
(纸本)1595936025
With single thread performance starting to plateau, HW architects have turned to chip level multiprocessing (CMP) to increase processing power. All major microprocessor companies are aggressively shipping multi-core products in the mainstream computing market. Moore's law will largely be used to increase HW thread-level parallelism through higher core counts in a CMP environment. CMPs bring new challenges into the design of the software system stack. In this tutorial, we talk about the shift to multi-core processors and the programming implications. In particular, we focus on transactional programming. Transactions have emerged as a promising alternative to lock-based synchronization that eliminates many of the problems associated with lock-based synchronization. We discuss the design of both hardware and software transactional memory and quantify the tradeoffs between the different design points. We show how to extend the Java and C languages with transactional constructs, and how to integrate transactions with compiler optimizations and the language runtime (e.g., memory manager and garbage collection).
We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are ex...
详细信息
Safety-related systems mostly comprise hardware and software solutions. Due to the increasing application of complex hardware and software systems, the software systems have to be considered regarding safety as well a...
详细信息
Safety-related systems mostly comprise hardware and software solutions. Due to the increasing application of complex hardware and software systems, the software systems have to be considered regarding safety as well as hardware systems. The development of a safety-related software system is similar to the development of a safety-related hardware systems. But there are still no generally accepted methods for developing safety-critical software. One has to use the methods, which fit best to the actual requirements. However, the calculation of reliability and availability for safety-related software systems is far more complex.
Robotic systems have been developed in every field where a further progress was constricted due to the human limitations in terms of speed, precision, fatigue, repeatability, strength, safety etc. One of the pioneer f...
The international standard IEC/61508 provides the developer with guidelines for the design and implementation of safety related systems according to this standard. This standard states qualitative and quantitative cri...
详细信息
ISBN:
(纸本)9781424435890
The international standard IEC/61508 provides the developer with guidelines for the design and implementation of safety related systems according to this standard. This standard states qualitative and quantitative criteria in order to judge a safety related system in such a way that safety critical applications can be implemented. This paper details a quantitative criterion which is the probability of failure on low demand, known as PFD. After an introduction into this topic, the principle steps to calculate the probability of failure with the help of reliability block diagrams for different hardware architecture will be detailed and presented. The PFD-equations will be derived for a 1oo1 architecture with the help of MacLaurin series.
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes. We show that their notion of quiescence as a necessary and sufficient con...
详细信息
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology fo...
详细信息
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology for developing security-critical e-commerce applications. We present an approach to model these applications with the Unified Modeling Language (UML) [1] extended by a UML profile to tailor our models to security applications. Our intent is to (semi-) automatically generate a formal specification suitable for verification as well as an implementation from the model. Therefore we offer a development method seamlessly integrating semi-formal and formal methods as well as the implementation. This is a significant advantage compared to other approaches not dealing with all aspects from abstract models down to code. Based on this approach we can prove security properties on the abstract protocol level as well as the correctness of the protocol implementation in Java with respect to the formal model using the refinement approach. In this paper we concentrate on the modeling with UML and some details regarding the transformation of this model into the formal specification. We illustrate our approach on an electronic payment system called Mondex [10]. Mondex has become famous for being the target of the first ITSEC evaluation of the highest level E6 which requires formal specification and verification.
暂无评论