Skip to main content

previous disabled Page of 49
and
  1. Chapter and Conference Paper

    Efficient Data Structure for Fully Symbolic Verification of Real-Time Software Systems

    A new data-structure called RED (Region-Encoding Diagram) for the fully symbolic model-checking of real-time software systems is proposed. RED is a BDD-like data-structure for the encoding of regions [2]. Unlike ...

    Farn Wang in Tools and Algorithms for the Construction and Analysis of Systems (2000)

  2. No Access

    Chapter and Conference Paper

    A Framework for Exploiting Object Parallelism in Distributed Systems

    To support parallel computing in a distributed object-based computing platform, a uniform high performance distributed object architecture layer is necessary. In this paper, we propose a distributed object-bas...

    Chen Wang, Yong Meng Teo in High Performance Computing and Networking (2000)

  3. Chapter and Conference Paper

    On Memory-Block Traversal Problems in Model-Checking Timed Systems

    A major problem in model-checking timed systems is the huge memory requirement. In this paper, we study the memory-block traversal problems of using standard operating systems in exploring the state-space of t...

    Fredrik Larsson, Paul Pettersson, Wang Yi in Tools and Algorithms for the Construction … (2000)

  4. Chapter and Conference Paper

    TIMES b— A Tool for Modelling and Implementation of Embedded Systems

    Times is a modelling and schedulability analysis tool for embedded real-time systems, developed at Uppsala University in 2001. It is appropriate for systems that can be described as a set of preemptive or non-pre...

    Tobias Amnell, Elena Fersman in Tools and Algorithms for the Construction … (2002)

  5. Chapter and Conference Paper

    Timed Automata with Asynchronous Processes: Schedulability and Decidability

    In this paper, we exend timed automata with asynchronous processes i.e. tasks triggered by events as a model for real-time systems. The model is expressive enough to describe concurrency and synchronization, a...

    Elena Fersman, Paul Pettersson, Wang Yi in Tools and Algorithms for the Construction … (2002)

  6. Chapter and Conference Paper

    Schedulability Analysis Using Two Clocks

    In classic scheduling theory, real-time tasks are usually assumed to be periodic, i.e. tasks arrive and compute with fixed rates periodically. To relax the stringent constraints on task arrival times, we propo...

    Elena Fersman, Leonid Mokrushin in Tools and Algorithms for the Construction … (2003)

  7. Chapter and Conference Paper

    Sensors Network Optimization by a Novel Genetic Algorithm

    This paper describes the optimization of a sensor network by a novel Genetic Algorithm (GA) that we call King Mutation C2. For a given distribution of sensors, the goal of the system is to determine the optima...

    Hui Wang, Anna L. Buczak, Hong **, Hongan Wang in Network and Parallel Computing (2004)

  8. Chapter and Conference Paper

    Enlarge Bandwidth of Multimedia Server with Network Attached Storage System

    Network attached storage system is proposed to solve the bottleneck problem of the multimedia server. It adds a network channel to the RAID and data can be transferred between the Net-RAID and clients directly...

    Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang in Network and Parallel Computing (2004)

  9. Chapter and Conference Paper

    The Strategy of Batch Using Dynamic Cache for Streaming Media

    The batch is an important technique for delivering video over Internet or VoD. It is a key method to improve effect for video multicast. In this paper, we research the batch strategy of proxy cache for streami...

    Zhiwen Xu, **aoxin Guo, Yunjie Pang, Zhengxuan Wang in Network and Parallel Computing (2004)

  10. Chapter and Conference Paper

    A Real-Time Transaction Approach for Grid Services: A Model and Algorithms

    Because transactions in Grid applications often have deadlines, effectively processing real-time transactions in Grid services presents a challenging task. Although real-time transaction techniques have been w...

    Feilong Tang, Minglu Li, Joshua Zhexue Huang, Lei Cao in Network and Parallel Computing (2004)

  11. Chapter and Conference Paper

    Extended DBP for (m,k)-Firm Based QoS

    In this paper, an extended DBP (E_DBP) scheme is studied for (m,k)-firm constraint. The basic idea of the proposed algorithm takes into account the distance to exit a failure state, which is a symmetrical noti...

    Jiming Chen, Zhi Wang, Yeqiong Song, Youxian Sun in Network and Parallel Computing (2004)

  12. Chapter and Conference Paper

    A Novel Intrusion Detection Method

    It is an important issue for the security of network that how to detect new intrusions attack. This paper investigates unsupervised intrusion detection method. A distance definition for mixed attributes, a sim...

    ShengYi Jiang, QingHua Li, Hui Wang in Network and Parallel Computing (2004)

  13. Chapter and Conference Paper

    The Transmitted Strategy of Proxy Cache Based on Segmented Video

    Using proxy cache is a key technique that may help to reduce the loads of the server, network bandwidth and startup delays. Basing on the popularity of clients’ request to segment video,we extend the length fo...

    Zhiwen Xu, **aoxin Guo, Yunjie Pang, Zhengxuan Wang in Network and Parallel Computing (2004)

  14. Chapter and Conference Paper

    New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications

    Regions Of Interest (ROI) image coding is one of the most significant features in JPEG2000 for network applications. In this paper, a new approach for ROI coding so-call Up-Down Bitplanes Shift (UDBShift) is p...

    Li-bao Zhang, Ke Wang in Network and Parallel Computing (2004)

  15. Chapter and Conference Paper

    A Pervasive Sensor Node Architecture

    A set of sensor nodes is the basic component of a sensor network. Many researchers are currently engaged in develo** pervasive sensor nodes due to the great promise and potential with applications shown by v...

    Li Cui, Fei Wang, Haiyong Luo, Hailing Ju, and Tianpu Li in Network and Parallel Computing (2004)

  16. Chapter and Conference Paper

    ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing

    This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...

    Yong-Meng Teo, **anbing Wang in Network and Parallel Computing (2004)

  17. Chapter and Conference Paper

    Collaborative Process Execution for Service Composition with StarWebService

    This paper gives a brief introduction to a collaborative process execution mechanism for service composition implemented in StarWebService system. The main idea is to partition the global process model of comp...

    Bixin Liu, YuFeng Wang, Bin Zhou, Yan Jia in Network and Parallel Computing (2004)

  18. Chapter and Conference Paper

    Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture

    A low-cost parallel QoS Sensitive domain, which supports load balancing network architecture, is developed in the paper. To deal with the scaling problem, a large network, thus, is structured by grou** nodes...

    Furong Wang, Ye Wu in Network and Parallel Computing (2004)

  19. Chapter and Conference Paper

    Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata

    We study schedulability problems of timed systems with non-uniformly recurring computation tasks. Assume a set of real time tasks whose best and worst execution times, and deadlines are known. We use timed aut...

    Pavel Krčál, Wang Yi in Tools and Algorithms for the Construction and Analysis of Systems (2004)

  20. No Access

    Chapter and Conference Paper

    UML Based Statistical Testing Acceleration of Distributed Safety-Critical Software

    It is necessary to assess the reliability of distributed safety-critical systems to a high degree of confidence before they are deployed in the field. However, distributed safety-critical software systems ofte...

    Jiong Yan, Ji Wang, Huo-wang Chen in Parallel and Distributed Processing and Applications (2005)

previous disabled Page of 49