An algorithm for time division multiple access (TDMA) is found to be applicable in converting existing distributed algorithms into a model that is consistent with sensor networks. Such a TDMA service needs to be self-...
详细信息
It is often the case that in the development of a system-on-a-chip(SoC)design,a family of SystemC transaction level models(TLM)is *** in the same family often share common functionalities but differ in their timing,im...
详细信息
It is often the case that in the development of a system-on-a-chip(SoC)design,a family of SystemC transaction level models(TLM)is *** in the same family often share common functionalities but differ in their timing,implementation,configuration and performance in various SoC developing *** most cases,all the TLMs in a family must be verified for the follow-up design *** our previous work,we proposed to call such family TLM product line(TPL),and proposed feature-oriented(FO)design methodology for efficient TPL ***,developers can only verify TLM in a family one by one,which causes large portion of duplicated verification ***,in our proposed methodology,functional verification of TPL has become a *** this paper,we proposed a novel TPL verification method for FO *** our method,for the given property,we can exponentially reduce the number of TLMs to be verified by identifying mutefeature-modules(MFM),which will avoid duplicated *** proposed method is presented in informal and formal way,and the correctness of it is *** theoretical analysis and experimental results on a real design show the correctness and efficiency of the proposed method.
System testing is concerned with testing an entire system based on its specifications. In the context of object-oriented, UML development, this means that system test requirements are derived from UML analysis artifac...
详细信息
The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication pr...
详细信息
The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication protocol [Chin. Phys. Lett. 32 (2015) 050301]. Specifically, the first bit of every four-bit message block is leaked out without awareness. A way to improve the information leakage problem is given.
softwareengineering is not only a technical discipline of its own. It is also a problem domain where technologies coming from other disciplines are relevant and can play an important role. One important example is kn...
详细信息
ISBN:
(纸本)1581135564
softwareengineering is not only a technical discipline of its own. It is also a problem domain where technologies coming from other disciplines are relevant and can play an important role. One important example is knowledge engineering, a term that I use in the broad sense to encompass artificial intelligence, computational intelligence, knowledge bases, data mining, and machine learning. I see a number of typical software development issues that can benefit from these disciplines and, for the sake of clarifying the discussion, I have divided them into four categories: (1) Planning, monitoring, and quality control of projects, (2) The quality and process improvement of software organizations, (3) Decision making support, (4) Automation. First, the planning, monitoring, and quality control of software development is typically based, unless it is entirely ad-hoc, on past project data and/or expert opinion. As discussed below, several techniques coming from machine learning, computational intelligence, and knowledge-based systems have shown to be useful in this context. Second, software organizations are inherently learning organizations, that need to improve, based on experience and project feedback, the way they develop software in changing and volatile environments. Large amounts of data, numerous documents, and other forms of information are typically gathered on projects. The question then becomes how to enable the intelligent storage and use of such information in future projects. Third, during the course of a project, software engineers and managers have to face important, complex decisions. They need decision models to support them, especially when project pressure is intense. Techniques originally developed for building risk models based on expert elicitation or optimization heuristics can play a key role in such a context. The last category of applications concerns automation. Many automation problems, such as test data generation, can be formulated as const
Service innovation has assumed considerable significance with the growth of the services sectors of economies globally, yet progress has been slow in devising carefully formulated, systematic techniques to under pin s...
详细信息
We present here an improved strategy to devise optimal integration test orders in object-oriented systems. Our goal is to minimize the complexity of stubbing during integration testing as this has been shown to be a m...
详细信息
ISBN:
(纸本)1581135564
We present here an improved strategy to devise optimal integration test orders in object-oriented systems. Our goal is to minimize the complexity of stubbing during integration testing as this has been shown to be a major source of expenditure. Our strategy to do so is based on the combined use of inter-class coupling measurement and genetic algorithms. The former is used to assess the complexity of stubs and the latter is used to minimize complex cost functions based on coupling measurement. Using a precisely defined procedure, we investigate this approach in a case study involving a real system. Results are very encouraging as the approach clearly helps obtaining systematic and optimal results. Copyright 2002 ACM.
Complex diseases are generally caused by the dysregulation of biological functions rather than individual molecules. Hence, a major challenge of the systematical study on complex diseases is how to capture the differe...
详细信息
Complex diseases are generally caused by the dysregulation of biological functions rather than individual molecules. Hence, a major challenge of the systematical study on complex diseases is how to capture the differentially regulated biological functions, e.g., pathways. The traditional differential expression analysis(DEA) usually considers the changed expression values of genes rather than functions. Meanwhile, the conventional function-based analysis(e.g., PEA: pathway enrichment analysis) mainly considers the varying activation of functions but disregards the structure change of genetic elements of functions. To achieve precision medicine against complex diseases, it is necessary to distinguish both the changes of functions and their elements from heterogeneous dysregulated pathways during the disease development and progression. In this work, in contrast to the traditional DEA, we developed a new computational framework, namely differential function analysis(DFA), to identify the changes of element-structure and expression-activation of biological functions, based on comparative non-negative matrix factorization(cN MF). To validate the effectiveness of our method, we tested DFA on various datasets, which shows that DFA is able to effectively recover the differential element-structure and differential activation-score of pre-set functional groups. In particular, the analysis of DFA on human gastric cancer dataset, not only capture the changed network-structure of pathways associated with gastric cancer, but also detect the differential activations of these pathways(i.e., significantly discriminating normal samples and disease samples), which is more effective than the state-of-the-art methods, such as GSVA and Pathifier. Totally,DFA is a general framework to capture the systematical changes of genes, networks and functions of complex diseases, which not only provides the new insight on the simultaneous alterations of pathway genes and pathway activations, but a
A case study of the application of a distributed control scheme to a power system control is presented. In addition, an investigation has been conducted into voltage control. Combined injection of VAr-compensating dev...
详细信息
A case study of the application of a distributed control scheme to a power system control is presented. In addition, an investigation has been conducted into voltage control. Combined injection of VAr-compensating devices controlled by distributed expert systems has been proposed as a measure to maintain voltage stability in a power system under heavy loading conditions. A simulation study has been carried out by using five workstations that represent a power system and four VAr-compensating devices. The results demonstrate the effectiveness of the proposed system for voltage recovery.< >
Reactive real-time systems have to react to external events within time constraints: Triggered tasks must execute within deadlines. It is therefore important for the designers of such systems to analyze the schedulabi...
详细信息
Reactive real-time systems have to react to external events within time constraints: Triggered tasks must execute within deadlines. It is therefore important for the designers of such systems to analyze the schedulability of tasks during the design process, as well as to test the system's response time to events in an effective manner once it is implemented. This article explores the use of genetic algorithms to provide automated support for both tasks. Our main objective is then to automate, based on the system task architecture, the derivation of test cases that maximize the chances of critical deadline misses within the system;we refer to this testing activity as stress testing. A second objective is to enable an early but realistic analysis of tasks' schedulability at design time. We have developed a specific solution based on genetic algorithms and implemented it in a tool. Case studies were run and results show that the tool (1) is effective at identifying test cases that will likely stress the system to such an extent that some tasks may miss deadlines, (2) can identify situations that were deemed to be schedulable based on standard schedulability analysis but that, nevertheless, exhibit deadline misses.
暂无评论