The objective of this research is to model and analyze candidate hull configurations for a low-cost, modular, autonomous underwater robot. As the computational power and speed of microprocessors continue to progress, ...
详细信息
By understanding a building as a dynamic entity capable of adapting itself not only to changing environmental conditions but also to occupant’s living habits, high standards of comfort and user satisfaction can be ac...
详细信息
This paper provides analysis of the possible impacts of social engineering in ubiquitous environment and the ways of preventing it. The main goal of this paper is to emphasize the possible danger of impact of social e...
详细信息
ISBN:
(纸本)0769530486
This paper provides analysis of the possible impacts of social engineering in ubiquitous environment and the ways of preventing it. The main goal of this paper is to emphasize the possible danger of impact of social engineering in ubiquitous computing, and importance of establishing not only technical, hut also non-technical mechanisms for preventing it. The paper describes how to ensure security and privacy protection in terms of user own responsibility and the use of proper policy and legislation mechanisms.
Requirements Elicitation, one of the most critical tasks in Requirements engineering activities, is basically the process that involves communication with the stakeholders, understanding their necessities and formulat...
详细信息
ISBN:
(纸本)0769530486
Requirements Elicitation, one of the most critical tasks in Requirements engineering activities, is basically the process that involves communication with the stakeholders, understanding their necessities and formulating the problems to be solved. Conventional devices and tools used in different requirements gathering activities are mostly desktop computer or laptop based. Because of their size and less mobility feature, they are usually not brought to the workplace of the stakeholders. The advancing capabilities of mobile devices and mobile tools can significantly contribute to the automation of RE activities. The aim of this proposed research is to enhance requirements elicitation activities by using mobile devices and designing and implementing a web-based mobile RE tool to automate and supplement the traditional requirements elicitation process. This paper describes the ongoing research and presents the progress so far.
The aim of reverse engineering is to draw out many kinds of information from existing software and using this information for system renovation and program understanding. Based on traditional practice, reverse enginee...
详细信息
This paper provides analysis of the possible impacts of social engineering in ubiquitous environment and the ways of preventing it. The main goal of this paper is to emphasize the possible danger of impact of social e...
详细信息
This paper provides analysis of the possible impacts of social engineering in ubiquitous environment and the ways of preventing it. The main goal of this paper is to emphasize the possible danger of impact of social engineering in ubiquitous computing, and importance of establishing not only technical, but also non-technical mechanisms for preventing it. The paper describes how to ensure security and privacy protection in terms of user own responsibility and the use of proper policy and legislation mechanisms.
The aim of reverse engineering is to draw out many kinds of information from existing software and using this information for system renovation and program understanding. Based on traditional practice, reverse enginee...
详细信息
ISBN:
(纸本)9781424431779
The aim of reverse engineering is to draw out many kinds of information from existing software and using this information for system renovation and program understanding. Based on traditional practice, reverse engineering and requirements engineering are two separate processes in software round trip engineering. In this paper, we argue that it is necessary to recover requirements from the reverse engineered outcome of legacy system and by integrating this outcome in the requirements phase of software life cycle, it is possible to have a better requirements elicitation, and clear understanding of what is redundant, what must be retained and what can be re-used. So we have presented a revised model of traditional re-engineering process and also described the rationality of the proposed model. In the paper we have also discussed briefly about software reverse engineering, requirement engineering and their basic practices and activities.
The method of using in-network aggregation for energy efficient data collection often results in processing delay and additional time for gathering related data at an intermediate node. This unfortunately may make the...
详细信息
ISBN:
(纸本)1595936955
The method of using in-network aggregation for energy efficient data collection often results in processing delay and additional time for gathering related data at an intermediate node. This unfortunately may make the scheme undesirable for networks deployed for emergent event monitoring. In this paper, we propose ReCoDa - Reliable forwarding of Correlated Data with low latency, an energy-efficient and reliable delivery scheme benefiting from data correlation among sensor nodes but without performing in-network aggregation. Our idea is to allow each node to determine the data transmission reliability it shall obtain based on the preceding transmissions from other nodes, subjecting to the overall information reliability requirement. This in turn is achieved through controllab.e multi-path forwarding. Simulation shows that ReCoDa can successfully reduce redundancy up to 2.9 times compared with schemes not exploiting data redundancy and achieves energy efficiency up to 4.79 times higher. Copyright 2007 ACM.
In component-based software development, it is important to use formal models to describe component composition. However, the existing component composition models generally ignore real-time issues. We present a forma...
详细信息
A thruster controlled AUV is being developed for the Indian AUV project. All motions and control is carried out by a set of five thrusters for controlling positions in two attitudes and three linear directions. As a p...
详细信息
暂无评论