We report world record high data transmission over standard optical fiber from a single optical source. We achieve a line rate of 44.2 Terabits per second (Tb/s) employing only the C-band at 1550nm, resulting in a spe...
详细信息
Performance non-determinism in computersystems complicates evaluation, use, and even development of these systems. In performance evaluation via benchmarking and simulation, non-determinism requires long executions a...
详细信息
In tandem with the growing important roles of software in modern society is the increasing number of threats to software. Building softwaresystems that are resistant to these threats is one of the greatest challenges...
详细信息
ISBN:
(纸本)9789898425188
In tandem with the growing important roles of software in modern society is the increasing number of threats to software. Building softwaresystems that are resistant to these threats is one of the greatest challenges in information technology. Threat identification methods for secure software development can be found in the literature. However, none of these methods has involved automatic threat identification based on analyzing UML models. Such an automated approach should offer benefits in terms of speed and accuracy when compared to manual methods, and at the same time be widely applicable due to the ubiquity of UML. This paper addresses this shortcoming by proposing an automated threat identification method based on parsing UML diagrams.
The Workshop on Emerging Trends in software Metrics aims at bringing together researchers and practitioners to discuss the progress of software metrics. The motivation for this workshop is the low impact that software...
详细信息
Real-time access to complex knowledge is a business driver in the contact centre environment. In this paper we outline for the domain of telecom technical product support a knowledge sharing paradigm in which a deskto...
详细信息
Real-time access to complex knowledge is a business driver in the contact centre environment. In this paper we outline for the domain of telecom technical product support a knowledge sharing paradigm in which a desktop client annotates named entities in technical documents with canonical names, class names or relevant class axioms, derived from an ontology by means of a web services framework. We described the system and its core components;OWL-DL telecom hardware ontology, ontological-natural language processing pipeline, an ontology axiom-extractor;and the semantic assistant framework.
Power spectra for AOAs in microcells are typified by a clustering of AOAs in multiple overlapping groups, which, when analysed as a single conglomeration, have large spreads. Centroids of such conglomerations are in t...
详细信息
In this paper CMOS compatible Gate Diffusion Input (GDI) design technique is proposed. The GDI method enables the implementation of a wide range of complex logic functions using only two transistors. This method is su...
详细信息
In this paper we describe the application of the agile software development approach in system engineering projects. We describe the main characteristics of system projects, highlighting the challenges that the applic...
详细信息
Recently, more and more services need high quality bandwidth. In order to satisfy those services, high-speed networks are needed. The Task Force team of IEEE 802.3ah set a standard as Ethernet Passive Optical Network ...
详细信息
暂无评论