Discussions of softwareengineering education tend to focus on the needs of industry and the preparation of graduates for professional careers. This is understandable, and may even be appropriate, but what about those...
详细信息
Discussions of softwareengineering education tend to focus on the needs of industry and the preparation of graduates for professional careers. This is understandable, and may even be appropriate, but what about those who hope to go on to do research in softwareengineering - how well are we catering for them?
Fault diagnosis is crucial for ensuring the safe operation of complex engineeringsystems. Although discrete-event diagnosis methods are used extensively, they do not easily apply to parametric fault isolation in syst...
详细信息
ISBN:
(纸本)9781424414970;1424414970
Fault diagnosis is crucial for ensuring the safe operation of complex engineeringsystems. Although discrete-event diagnosis methods are used extensively, they do not easily apply to parametric fault isolation in systems with complex continuous dynamics. This paper presents a novel discrete-event system diagnosis approach for abrupt parametric faults in continuous systems that is based on a qualitative abstraction of measurement deviations from the nominal behavior. Our approach systematically generates a diagnosis model from bond graphs that is used to analyze system diagnosability and derive the discrete-event diagnoser. The proposed approach is applied to an electrical power system diagnostic testbed.
Increasingly, software must adapt its behavior in response to changes in the supporting computing, communication infrastructure, and in the surrounding physical environment. Since most existing software was not design...
详细信息
Increasingly, software must adapt its behavior in response to changes in the supporting computing, communication infrastructure, and in the surrounding physical environment. Since most existing software was not designed to adapt, research on technique to make legacy software dynamically adaptive has gained increasing interest. Assurance is crucial for adaptive software to fulfill its intended purpose. Correctness is even more critical if it is to be applied in high assurance systems. This paper proposes a model-driven approach to introduce dynamic adaptation to non-adaptive legacy systems while maintaining assurance properties. An aspect-oriented technique is applied to achieve separation of concerns in the implementation.
Effective scheduling is a key concern for the execution of performance driven grid applications. In this paper, we propose a dynamic critical path (DCP) based workflow scheduling algorithm that determines efficient ma...
详细信息
Effective scheduling is a key concern for the execution of performance driven grid applications. In this paper, we propose a dynamic critical path (DCP) based workflow scheduling algorithm that determines efficient mapping of tasks by calculating the critical path in the workflow task graph at every step. It assigns priority to a task in the critical path which is estimated to complete earlier. Using simulation, we have compared the performance of our proposed approach with other existing heuristic and meta-heuristic based scheduling strategies for different type and size of workflows. Our results demonstrate that DCP based approach can generate better schedule for most of the type of workflows irrespective of their size particularly when resource availability changes frequently.
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to...
详细信息
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to achieve authentication: public key based and symmetric key based. Although previous work has shown that public key authentication is feasible on sensor nodes if used sparingly, it is still quite expensive compared to symmetric key based approach. In this paper, we propose a symmetric key based protocol for authenticating reprogramming process. Our protocol is based on the secret instantiation algorithm from, which requires only O(log n) keys to be maintained at each sensor. We integrate this algorithm with the existing reprogramming protocol. Through simulation, we show that it is able to authenticate reprogramming process at very low communication cost, and has very short delay.
Economics-driven software mining (EDSM) sifts through the repository data to extract information that could be useful for reasoning about not only the technical aspects but also the economics properties related to the...
详细信息
Economics-driven software mining (EDSM) sifts through the repository data to extract information that could be useful for reasoning about not only the technical aspects but also the economics properties related to the development and/or evolution of softwaresystems, and in relation to the environments in which they are procured, developed, evolved and used. The objective is to provide the analyst with insights into investment decisions related to the development, maintenance, and evolution of softwaresystems, EDSM can also assist the analyst in resource planning and utilization. In this position paper, we define EDSM, describe possible scenarios for realizing EDSM and highlight some challenges.
Current mobile middleware is designed according to a 'one-size-fits-all' paradigm, which lacks the flexibility for customization and adaptation to different situations, and does not support user-centered appli...
详细信息
Current mobile middleware is designed according to a 'one-size-fits-all' paradigm, which lacks the flexibility for customization and adaptation to different situations, and does not support user-centered application scenarios well. In this paper we describe an ongoing intelligent mobile middleware research project called PLIMM that focuses on user-centered application scenarios. PLIMM is designed based on software product line ideas which make it possible for specialized customization and optimization for different purposes and hardware/software platforms. To enable intelligence, the middleware needs access to a range of context models. We model these contexts with OWL, focusing on user-centered concepts. The basic building block of PLIMM is the enhanced BDI agent where OWL context ontology logic reasoning will add indirect beliefs to the belief sets. Our approach also addresses the handling of ontology evolutions resulting from the timely adaptation of ontology to changes and the consistent propagation of these changes to all related artifacts, using Frame based product line configuration techniques.
A significant open problem of case based reasoning system is a construction of better knowledge base. We propose a new framework for constructing alternative knowledge base in case based reasoning system based on roug...
详细信息
A significant open problem of case based reasoning system is a construction of better knowledge base. We propose a new framework for constructing alternative knowledge base in case based reasoning system based on rough sets and formal concept analysis. Our framework first applies rough set theory for discovering reduced cases required in a case based reasoning system. We then achieve further hierarchical structure of knowledge base using formal concept analysis. The result is the concept lattice knowledge base embedded to our proposed case based reasoning system. A part of case based reasoning system is developed with an example throughout. We also discuss how our proposed framework can be beneficial for a case based reasoning system.
Web service composition provision which requires efficient coordination of the execution of component services is a critical issue in service-oriented computing. Nowadays, BPEL4WS, the de facto industry standard for s...
详细信息
ISBN:
(纸本)9781595937575
Web service composition provision which requires efficient coordination of the execution of component services is a critical issue in service-oriented computing. Nowadays, BPEL4WS, the de facto industry standard for service compositions, is predominantly deployed in a way in which all interactions and intermediate data must go through one server. This centralised management results in problems such as poor performance, impaired reliability, limited scalability, and restricted flexibility. To address these problems, this research proposes an agent-based decentralised process management framework for Web service composition. This framework allows distributed BPEL engines, each of which is represented by a software agent, to manage the execution of relevant sub-processes, and to interact with one another directly to coordinate the execution of the whole process. Such a framework naturally reflects the distributed and dynamic features of the Web services environment and subsequently offers improved coordination support for service composition provision.
Mobile games are one of the primary entertainment applications at present. Limited by scarce resources, such as memory, CPU, input and output, etc, mobile game development is more difficult than desktop application de...
详细信息
Mobile games are one of the primary entertainment applications at present. Limited by scarce resources, such as memory, CPU, input and output, etc, mobile game development is more difficult than desktop application development, with performance as one of the top critical requirements. As object-oriented technology is the prevalent programming paradigm, most of the current mobile games are developed with object-orientation (OO) technologies. Intuitively OO is not a perfect paradigm for embedded software. Questions remain such as how OO and to what degree OO will affect the performance, executable file size, and how optimization strategies can improve the qualities of mobile game software. These questions are investigated in this paper within the mobile Role-Playing-Game (RPG) domain using five industrial mobile games developed with OO. We analyzed them and found excessive usage of OO features used for the development of mobile device applications (but normal for usual desktop applications). We then apply some optimization strategies along the way of structural programming. The experiment shows that the total jar file size of these five optimized games decreases 71 % the lines of codes decreases 59%, and the loading time of each optimized game decreases 22.73%, 34.62% 25.79% 24.65% and 16.70% respectively. Therefore, we conclude from our experiments that 00 should be used with great care in the development of mobile games, and that structural programming can be a very competitive alternative.
暂无评论