967 Result(s)
-
Chapter and Conference Paper
Efficient Data Structure for Fully Symbolic Verification of Real-Time Software Systems
A new data-structure called RED (Region-Encoding Diagram) for the fully symbolic model-checking of real-time software systems is proposed. RED is a BDD-like data-structure for the encoding of regions [2]. Unlike ...
-
Chapter and Conference Paper
A Framework for Exploiting Object Parallelism in Distributed Systems
To support parallel computing in a distributed object-based computing platform, a uniform high performance distributed object architecture layer is necessary. In this paper, we propose a distributed object-bas...
-
Chapter and Conference Paper
On Memory-Block Traversal Problems in Model-Checking Timed Systems
A major problem in model-checking timed systems is the huge memory requirement. In this paper, we study the memory-block traversal problems of using standard operating systems in exploring the state-space of t...
-
Chapter and Conference Paper
TIMES b— A Tool for Modelling and Implementation of Embedded Systems
Times is a modelling and schedulability analysis tool for embedded real-time systems, developed at Uppsala University in 2001. It is appropriate for systems that can be described as a set of preemptive or non-pre...
-
Chapter and Conference Paper
Timed Automata with Asynchronous Processes: Schedulability and Decidability
In this paper, we exend timed automata with asynchronous processes i.e. tasks triggered by events as a model for real-time systems. The model is expressive enough to describe concurrency and synchronization, a...
-
Chapter and Conference Paper
Schedulability Analysis Using Two Clocks
In classic scheduling theory, real-time tasks are usually assumed to be periodic, i.e. tasks arrive and compute with fixed rates periodically. To relax the stringent constraints on task arrival times, we propo...
-
Chapter and Conference Paper
Sensors Network Optimization by a Novel Genetic Algorithm
This paper describes the optimization of a sensor network by a novel Genetic Algorithm (GA) that we call King Mutation C2. For a given distribution of sensors, the goal of the system is to determine the optima...
-
Chapter and Conference Paper
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System
Network attached storage system is proposed to solve the bottleneck problem of the multimedia server. It adds a network channel to the RAID and data can be transferred between the Net-RAID and clients directly...
-
Chapter and Conference Paper
The Strategy of Batch Using Dynamic Cache for Streaming Media
The batch is an important technique for delivering video over Internet or VoD. It is a key method to improve effect for video multicast. In this paper, we research the batch strategy of proxy cache for streami...
-
Chapter and Conference Paper
A Real-Time Transaction Approach for Grid Services: A Model and Algorithms
Because transactions in Grid applications often have deadlines, effectively processing real-time transactions in Grid services presents a challenging task. Although real-time transaction techniques have been w...
-
Chapter and Conference Paper
Extended DBP for (m,k)-Firm Based QoS
In this paper, an extended DBP (E_DBP) scheme is studied for (m,k)-firm constraint. The basic idea of the proposed algorithm takes into account the distance to exit a failure state, which is a symmetrical noti...
-
Chapter and Conference Paper
A Novel Intrusion Detection Method
It is an important issue for the security of network that how to detect new intrusions attack. This paper investigates unsupervised intrusion detection method. A distance definition for mixed attributes, a sim...
-
Chapter and Conference Paper
The Transmitted Strategy of Proxy Cache Based on Segmented Video
Using proxy cache is a key technique that may help to reduce the loads of the server, network bandwidth and startup delays. Basing on the popularity of clients’ request to segment video,we extend the length fo...
-
Chapter and Conference Paper
New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications
Regions Of Interest (ROI) image coding is one of the most significant features in JPEG2000 for network applications. In this paper, a new approach for ROI coding so-call Up-Down Bitplanes Shift (UDBShift) is p...
-
Chapter and Conference Paper
A Pervasive Sensor Node Architecture
A set of sensor nodes is the basic component of a sensor network. Many researchers are currently engaged in develo** pervasive sensor nodes due to the great promise and potential with applications shown by v...
-
Chapter and Conference Paper
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing
This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...
-
Chapter and Conference Paper
Collaborative Process Execution for Service Composition with StarWebService
This paper gives a brief introduction to a collaborative process execution mechanism for service composition implemented in StarWebService system. The main idea is to partition the global process model of comp...
-
Chapter and Conference Paper
Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture
A low-cost parallel QoS Sensitive domain, which supports load balancing network architecture, is developed in the paper. To deal with the scaling problem, a large network, thus, is structured by grou** nodes...
-
Chapter and Conference Paper
Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata
We study schedulability problems of timed systems with non-uniformly recurring computation tasks. Assume a set of real time tasks whose best and worst execution times, and deadlines are known. We use timed aut...
-
Chapter and Conference Paper
UML Based Statistical Testing Acceleration of Distributed Safety-Critical Software
It is necessary to assess the reliability of distributed safety-critical systems to a high degree of confidence before they are deployed in the field. However, distributed safety-critical software systems ofte...