To achieve Quality of Service (QoS) in Next Generation Networks (NGNs), the Differentiated Services architecture implements appropriate Per Hop Behavior (PHB) for service differentiation. Common recommendations to enf...
详细信息
We propose a method for early fire detection based on the Lucas-Kanade optical flow algorithm that is able to detect fire in real time in a video stream from a monocular camera. The method works both indoors and in op...
详细信息
In the past decades, embedded system designers moved from simple, predictable system designs towards complex systems equipped with caches. This step was necessary in order to bridge the increasingly growing gap betwee...
详细信息
A number of approaches for endowing systems with self-Adaptive behavior have been proposed over the past years. Among such efforts, architecture-centric solutions with explicit representation of feedback loops have cu...
详细信息
This paper presents a unified approach for repre-senting multiple domains alongside production in cyber-physical production systems (CPPSs) through domain-specific languages (DSLs). The approach is illustrated using m...
详细信息
This book constitutes the refereed proceedings of the 7th German Conference on Multiagent systems Technologies, MATES 2009, held in Hamburg, Germany in September 2009 - colocated with the 10th International Workshop o...
详细信息
ISBN:
(数字)9783642041433
ISBN:
(纸本)9783642041426
This book constitutes the refereed proceedings of the 7th German Conference on Multiagent systems Technologies, MATES 2009, held in Hamburg, Germany in September 2009 - colocated with the 10th International Workshop on Computational Logic in Multi-Agent systems (CLIMA X) and the 5th International Workshop on Modelling of Objects, Components, and Agents (MOCA 2009). The 14 revised full papers, 10 short papers, and 5 exhibition papers presented together with one invited talk were carefully reviewed and selected from 44 submissions. The papers present and discuss the latest advances of research and development in the area of autonomous agents and multiagent systems ranging from theoretical and methodological issues to applications in various fields.
The problem of optimal compile-time multiprocessor scheduling of iterative data-flow programs with feedback (delay elements) is addressed in this paper, unlike the earlier studies assumed the availability of a large n...
详细信息
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to determine how to generate realistic workloa...
详细信息
ISBN:
(纸本)1581136730
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to determine how to generate realistic workloads for nIDS performance evaluation. We develop a workload model that appears to provide reasonably accurate estimates compared to real workloads. The model attempts to emulate a traffic mix of different applications, reflecting characteristics of each application and the way these interact with the system. We have implemented this model as part of a traffic generator that can be extended and tuned to reflect the needs of different scenarios. We also present an approach to measuring the capacity of a nIDS that does not require the setup of a full network testbed. security, intrusion detection, workload characterization and generation.
In this paper, we present an OpenCL implementation of a biologically sound spiking neural network with two goals in mind: First, applied neural dynamics should be accurate enough for bio-inspired training methods, thu...
详细信息
RTnet is a distributed real-time network protocol for fully-connected local area networks with a broadcast capability. It supports streaming real-time and non-realtime traffic and on-the-fly addition and removal of ne...
详细信息
RTnet is a distributed real-time network protocol for fully-connected local area networks with a broadcast capability. It supports streaming real-time and non-realtime traffic and on-the-fly addition and removal of network nodes. This paper presents a formal analysis of RTnet using the model checker Uppaal. Besides normal protocol behaviour, the analysis focuses on the fault-handling properties of RTnet, in particular recovery after packet loss. Both qualitative and quantitative properties are presented, together with the verification results and conclusions about the robustness of RTnet.
暂无评论