Embedded systems of today need to manage more data than ever before. The main reasons for the increase in number of data items are increased functional requirements on the software. With a larger amount of data to man...
详细信息
The research field of Intelligent Service Robots, which has become more and more popular over the last years, covers a wide range of applications from climbing machines for cleaning large storefronts to robotic assist...
详细信息
ISBN:
(纸本)1595933751
The research field of Intelligent Service Robots, which has become more and more popular over the last years, covers a wide range of applications from climbing machines for cleaning large storefronts to robotic assistance for disabled or elderly people. When developing service robot software, it is a challenging problem to design the robot architecture by carefully considering user needs and requirements, implement robot application components based on the architecture, and integrate these components in a systematic and comprehensive way for maintainability and reusability. Furthermore, it becomes more difficult to communicate among development teams and with others when many engineers from different teams participate in developing the service robot. To solve these problems, we applied the COMET design method, which uses the industry-standard UML notation, to developing the software of an intelligent service robot for the elderly, called T-Rot, under development at Center for Intelligent Robotics (CIR). In this paper, we discuss our experiences with the project in which we successfully addressed these problems and developed the autonomous navigation system of the robot with the COMET/UML method. Copyright 2006 ACM.
This paper presents interfacing techniques to integrate a virtual environment (VE), computer graphics, image-based modeling, and other technologies in a networked system for robot control. Technologies such as network...
详细信息
A design of fuzzy model-based predictive control for industrial furnaces has been derived and applied to the model of three-zone 25 MW RZS pusher furnace at Skopje Steelworks. The fuzzy-neural variant of Takagi-Sugeno...
详细信息
Service oriented architectures consist of loosely coupled services that can be quickly composed to support flexibility in business processes. The flexibility requires alternative service compositions to fulfill a cust...
详细信息
Service oriented architectures consist of loosely coupled services that can be quickly composed to support flexibility in business processes. The flexibility requires alternative service compositions to fulfill a customer's business process. However, customers are often not aware of their options and thus cannot make good decisions on how to compose their services. Therefore, we propose to support the decision making of the customer by modeling the different alternatives explicitly in a variability model and communicating the alternatives to the customer.
A control scheme for highway tunnels is designed based on a static model of a highway tunnel. The controller is designed to keep the exhaust levels inside the tunnel below given limits. During operation, the model is ...
详细信息
Updating real-time system software is often needed in response to errors and added requirements to the software. Stopping a running application, updating the software, and then restarting the application is not suitab...
详细信息
Updating real-time system software is often needed in response to errors and added requirements to the software. Stopping a running application, updating the software, and then restarting the application is not suitable for systems with high availability requirements. On the other hand, dynamically updating a system may increase the execution time of the tasks, thus, degrading the performance of the system. Degradation is not acceptable for performance-critical real-time systems as there are strict requirements on the performance. In this paper we present an approach that enables dynamic reconfiguration of a real-time system, where the performance of the system during a reconfiguration satisfies a given worst-case performance specification. Evaluation shows that the presented method is efficient in guaranteeing the worst-case performance of dynamically reconfigurable firm real-time systems
This article introduces a special issue of software Process - Improvement and Practice focusing on processes found in free or open source software development (F/OSSD) projects. It seeks to provide a background overvi...
详细信息
In this paper we consider data freshness and overload handling in embedded systems. The requirements on data management and overload handling are derived from an engine control software. Data items need to be up-to-da...
详细信息
In this paper we consider data freshness and overload handling in embedded systems. The requirements on data management and overload handling are derived from an engine control software. Data items need to be up-to-date, and to achieve this data dependencies must be considered, i.e., updating a data item requires other data items are up-to-date. We also note that a correct result of a calculation can in some cases be calculated using a subset of the inputs. Hence, data dependencies can be divided into required and not required data items, e.g., only a subset of data items affecting the fuel calculation in an engine control needs to be calculated during a transient overload in order to reduce the number of calculations. Required data items must always be up-to-date, whereas not required data items can be stale. We describe an algorithm that dynamically determines which data items need to be updated taking workload, data freshness, and data relationships into consideration. Performance results show that the algorithm suppresses transient overloads better than (m, k)- and skip-over scheduling combined with established algorithms to update data items. The performance results are collected from an implementation of a real-time database on the realtime operating system muC/OS-II. To investigate whether the system is occasionally overloaded an offline analysis algorithm estimating period times of updates is presented
Today's cyber attacks come from many Internet and legal domains, requiring a coordinated swift and legitimate response. Consequently, determining the legality of a response requires a coordinated consensual legal ...
详细信息
ISBN:
(纸本)972886552X
Today's cyber attacks come from many Internet and legal domains, requiring a coordinated swift and legitimate response. Consequently, determining the legality of a response requires a coordinated consensual legal argument that weaves legal sub-arguments from all participating domains. Doing so as a precursor for forensic analysis is to provide legitimacy to the process. We describe a tool that can be used to weave such a legal argument using the WWW securely. Our tool is a legal whiteboard that allows participating group of attorneys to meet in Cyberspace in real time and construct a legal argument graphically by using a decision tree. A tree constructed this way and verified to hold anticipated legal challenges can then be used to guide forensic experts and law enforcement personnel during their active responses and off-line examinations. In our tool the group of attorneys that construct the legal argument elects a leader (say the super builder) that permits (through access control) the group to construct a decision tree that, when populated by actual parameters of a cyber incident will output a decision. During the course of the construction, all participating attorneys can construct sub-parts of the arguments that can be substantiated with relevant legal documents from their own legal domains. Because diverse legal domains use different nomenclatures, we provide the capability to index and search legal documents using a complex International legal Ontology that goes beyond the traditional NeuxsLexus like legal databases. This Ontology itself can be created using the tool from remote locations. Once the sub arguments are made, they are submitted to the master builder through a ticketing mechanism that has the final authority to approve and synchronize the sub-trees to become the final decision tree with all its attached legal documents. Our tool has been fine tuned with numerous interviews with practicing attorneys in the subject area of cyber crime.
暂无评论