首页 > 最新文献

2009 International Symposium on Autonomous Decentralized Systems最新文献

英文 中文
Comparison of documents of an Automatic Train Protection system project with RAMS standard 列车自动保护系统项目文件与RAMS标准的比较
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207320
K. Tashiro, M. Matsumoto
Development documents of a railway signaling system based on ADS (Autonomous Decentralized System) [1] architecture has conformity with RAMS (Reliability, Availability, Maintainability and Safety) standard IEC 62278. A project to replace existing ATP (Automatic Train Protection) system in Tokyo metropolitan commuter lines with new one had been successfully carried out from 1996 to 2004 keeping continuity of service through the construction including extension of renewal sections. An examination on the documents of the project showed that ADS design concept realized suitable documentation architecture as well as reasonable procedure of allocation of safety-related functions and hardware devices both to meet with the requirements of documentation manners from the RAMS standard.
基于ADS (Autonomous Decentralized system)[1]架构的铁路信号系统开发文件符合RAMS (Reliability, Availability,维修性和安全性)标准IEC 62278。从1996年到2004年,在东京大都市通勤线路上成功地实施了用新系统替换现有ATP(列车自动保护系统)的项目,通过扩建更新路段等建设保持了服务的连续性。通过对项目文件的审查,ADS的设计理念实现了合适的文件体系结构,以及安全相关功能和硬件设备的合理配置程序,满足RAMS标准对文件方式的要求。
{"title":"Comparison of documents of an Automatic Train Protection system project with RAMS standard","authors":"K. Tashiro, M. Matsumoto","doi":"10.1109/ISADS.2009.5207320","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207320","url":null,"abstract":"Development documents of a railway signaling system based on ADS (Autonomous Decentralized System) [1] architecture has conformity with RAMS (Reliability, Availability, Maintainability and Safety) standard IEC 62278. A project to replace existing ATP (Automatic Train Protection) system in Tokyo metropolitan commuter lines with new one had been successfully carried out from 1996 to 2004 keeping continuity of service through the construction including extension of renewal sections. An examination on the documents of the project showed that ADS design concept realized suitable documentation architecture as well as reasonable procedure of allocation of safety-related functions and hardware devices both to meet with the requirements of documentation manners from the RAMS standard.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126440851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive DRM framework in user-converged multimedia ecosystems, utilizing MPEG-21 semantics 基于MPEG-21语义的用户融合多媒体生态系统中的自适应DRM框架
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207324
T. Fragopoulos, J. Gialelis, D. Serpanos
As dynamicity in networks and interoperability in DRM systems become the critical aspects in networked ecosystems, new emerging frameworks for secure, user-converged digital content delivery are required. In this work, we argue that the IPMP and REL components of MPEG-21 framework should be utilized in order to achieve a user-adaptive and interoperable DRM architecture.
随着网络的动态性和DRM系统的互操作性成为网络生态系统的关键方面,需要新的安全、用户融合的数字内容交付框架。在这项工作中,我们认为应该利用MPEG-21框架的IPMP和REL组件来实现用户自适应和可互操作的DRM架构。
{"title":"Adaptive DRM framework in user-converged multimedia ecosystems, utilizing MPEG-21 semantics","authors":"T. Fragopoulos, J. Gialelis, D. Serpanos","doi":"10.1109/ISADS.2009.5207324","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207324","url":null,"abstract":"As dynamicity in networks and interoperability in DRM systems become the critical aspects in networked ecosystems, new emerging frameworks for secure, user-converged digital content delivery are required. In this work, we argue that the IPMP and REL components of MPEG-21 framework should be utilized in order to achieve a user-adaptive and interoperable DRM architecture.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131473213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of System Dynamics theory in the evaluation of an integrated Business Excellence system 系统动力学理论在综合业务卓越系统评价中的应用
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207318
Vassilios Mavroeidis, S. Koubias, S. Goutsos
Aim of this research is to propose an accurate model of measuring business excellence by applying the theory of System Dynamics. This theory defines the interaction of system variables giving the opportunity of a reliable and fair score as well as objective decision-making with regard to the areas that are susceptible of continuous improvement. This paper utilises the principles of the System Dynamics in order to propose a new method for measuring business excellence and thus contributing to a thorough evaluation of an enterprise which implements a Business Excellence Model. The proposed business excellence system is adopted and applied as the Hellenic National Quality Award scheme. The study only adopts empirical data from the application of the proposed business excellence system due to the early stages of implementation in the market. Future research may use more data to better tune the proposed method. Based on the more accurate analytical results achieved by the proposed model, the Hellenic national authority of managing the Hellenic scheme of business excellence might use the proposed model for measuring business excellence and to drive continuous improvement and competitiveness according to its strategy.
本研究的目的是运用系统动力学理论,提出一个准确的衡量企业卓越性的模型。该理论定义了系统变量的相互作用,给出了可靠和公平得分的机会,以及关于容易持续改进的领域的客观决策。本文利用系统动力学的原理,提出了一种衡量卓越业务的新方法,从而有助于对实施卓越业务模型的企业进行全面评估。提出的卓越业务体系被采纳并作为希腊国家质量奖计划实施。由于在市场上实施的阶段较早,本研究仅采用了所提出的卓越经营系统应用的实证数据。未来的研究可能会使用更多的数据来更好地调整所提出的方法。基于所提出的模型所获得的更准确的分析结果,管理希腊企业卓越计划的希腊国家当局可能会使用所提出的模型来衡量企业卓越性,并根据其战略推动持续改进和竞争力。
{"title":"Application of System Dynamics theory in the evaluation of an integrated Business Excellence system","authors":"Vassilios Mavroeidis, S. Koubias, S. Goutsos","doi":"10.1109/ISADS.2009.5207318","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207318","url":null,"abstract":"Aim of this research is to propose an accurate model of measuring business excellence by applying the theory of System Dynamics. This theory defines the interaction of system variables giving the opportunity of a reliable and fair score as well as objective decision-making with regard to the areas that are susceptible of continuous improvement. This paper utilises the principles of the System Dynamics in order to propose a new method for measuring business excellence and thus contributing to a thorough evaluation of an enterprise which implements a Business Excellence Model. The proposed business excellence system is adopted and applied as the Hellenic National Quality Award scheme. The study only adopts empirical data from the application of the proposed business excellence system due to the early stages of implementation in the market. Future research may use more data to better tune the proposed method. Based on the more accurate analytical results achieved by the proposed model, the Hellenic national authority of managing the Hellenic scheme of business excellence might use the proposed model for measuring business excellence and to drive continuous improvement and competitiveness according to its strategy.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134471699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A uniqueness verifying Public Key Infrastructure based on Autonomous Decentralized System architecture 一种基于自治分散系统架构的唯一性验证公钥基础设施
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207327
Luis Carlos Coronado García, Carlos Hernández-López, C. P. Leguízamo
A Public Key Infrastructure (PKI) must provide the mechanisms for assuring secure transactions and high reliability of its services. The use of public key cryptography satisfies the first requirement[1], while the second has been traditionally satisfied by the use of distributed architectures, among these the Autonomous Decentralized Systems (ADS) [2] are specially interesting since can provide on line expandability, maintenance and fault tolerance; however, the implementation of a PKI based on ADS rise new challenges, among the most important are: how to assure the uniqueness of public keys in such system and, since ADS architectures usually rely on specialized hardware for their implementation, how to implement such architecture without that specialized hardware.This paper explores the use of an ADS architecture based on software in order to provide high reliability to a PKI, assuring the uniqueness of its public keys.
PKI (Public Key Infrastructure,公钥基础设施)必须提供确保安全交易和高可靠性的机制。公钥加密的使用满足了第一个要求[1],而第二个要求传统上是通过使用分布式体系结构来满足的,其中自治分散系统(ADS)[2]特别有趣,因为它可以提供在线可扩展性、维护和容错性;然而,基于ADS的PKI的实现提出了新的挑战,其中最重要的是:如何保证在这样的系统中公钥的唯一性,以及由于ADS体系结构通常依赖于专门的硬件来实现,如何在没有专门硬件的情况下实现这样的体系结构。本文探讨了一种基于软件的ADS体系结构,为PKI提供高可靠性,保证其公钥的唯一性。
{"title":"A uniqueness verifying Public Key Infrastructure based on Autonomous Decentralized System architecture","authors":"Luis Carlos Coronado García, Carlos Hernández-López, C. P. Leguízamo","doi":"10.1109/ISADS.2009.5207327","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207327","url":null,"abstract":"A Public Key Infrastructure (PKI) must provide the mechanisms for assuring secure transactions and high reliability of its services. The use of public key cryptography satisfies the first requirement[1], while the second has been traditionally satisfied by the use of distributed architectures, among these the Autonomous Decentralized Systems (ADS) [2] are specially interesting since can provide on line expandability, maintenance and fault tolerance; however, the implementation of a PKI based on ADS rise new challenges, among the most important are: how to assure the uniqueness of public keys in such system and, since ADS architectures usually rely on specialized hardware for their implementation, how to implement such architecture without that specialized hardware.This paper explores the use of an ADS architecture based on software in order to provide high reliability to a PKI, assuring the uniqueness of its public keys.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122129386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A three-step dynamic threshold method to cluster BGP updates into routing events 采用三步动态门限方法将BGP更新聚到路由事件中
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207350
Xin Wu, Xia Yin, Zhiliang Wang, Min Tang
In order to better understand BGP dynamics, a time-based approach has been developed to cluster BGP updates into routing events. Its basic idea is to cluster consecutive BGP updates of the same prefix into one routing events if the updates are separated by a time interval less than a threshold. Most of static threshold methods might incorrectly group multiple events into one if the threshold is too high, or divide a single event into multiple ones if the threshold is too low. On the other hand, previous dynamic threshold approach did not present a persuasive way to calculate one of its key parameters. In this paper we present a three-step dynamic threshold method to cluster BGP updates into routing events. We evaluate our approach using updates of BGP beacon prefixes downloaded from Route Views. The experiment result shows that our dynamic threshold approach could cluster updates into routing events more precisely than previous methods, and thus improve the accuracy of the BGP measurement studies.
为了更好地理解BGP动态,开发了一种基于时间的方法将BGP更新聚类到路由事件中。它的基本思想是,如果更新之间的时间间隔小于阈值,则将相同前缀的连续BGP更新聚集到一个路由事件中。如果阈值过高,大多数静态阈值方法可能会错误地将多个事件分组为一个事件,或者如果阈值过低,则将单个事件划分为多个事件。另一方面,以往的动态阈值方法没有给出一种有说服力的方法来计算其关键参数之一。本文提出了一种三步动态阈值方法,将BGP更新聚类到路由事件中。我们使用从路由视图下载的BGP信标前缀更新来评估我们的方法。实验结果表明,动态阈值方法比以往的方法更精确地将更新聚类到路由事件中,从而提高了BGP度量研究的准确性。
{"title":"A three-step dynamic threshold method to cluster BGP updates into routing events","authors":"Xin Wu, Xia Yin, Zhiliang Wang, Min Tang","doi":"10.1109/ISADS.2009.5207350","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207350","url":null,"abstract":"In order to better understand BGP dynamics, a time-based approach has been developed to cluster BGP updates into routing events. Its basic idea is to cluster consecutive BGP updates of the same prefix into one routing events if the updates are separated by a time interval less than a threshold. Most of static threshold methods might incorrectly group multiple events into one if the threshold is too high, or divide a single event into multiple ones if the threshold is too low. On the other hand, previous dynamic threshold approach did not present a persuasive way to calculate one of its key parameters. In this paper we present a three-step dynamic threshold method to cluster BGP updates into routing events. We evaluate our approach using updates of BGP beacon prefixes downloaded from Route Views. The experiment result shows that our dynamic threshold approach could cluster updates into routing events more precisely than previous methods, and thus improve the accuracy of the BGP measurement studies.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115973410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fragment and replicate algorithms for non-equi-join evaluation on Smart Disks 智能硬盘非等联接评估的分片和复制算法
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207358
Vassilis Stoumpos, A. Delis
The predicates in a non-equi-join can be anything but equality relations. Non-equi-join predicates can be as simple as an inequality expression between two join relation fields, or as complex as a user-defined function that carries out arbitrary complex comparisons. The nature of non-equi-join calls for predicate evaluation over all possible combinations of tuples in a two-way join. In this paper, we consider the family of fragment and replicate join algorithms that facilitates non-equijoin evaluation and adapt it in a Smart Disk environment. We use Smart Disk as an umbrella term for a variety of different storage devices featuring an embedded processor that may offload data processing from the main CPU. Our approach partially replicates one of the join relations in order to harness all processing capacity in the system. However, partial replication introduces problems with synchronizing concurrent algorithmic steps, load balancing, and selection among different join evaluation alternatives.We use a processing model to avoid performance pitfalls and autonomously select algorithm parameters. Through experimentation we find our proposed algorithms to utilize all system resources and, thus, yield better performance.
非相等连接中的谓词可以是任何关系,但不能是相等关系。非等连接谓词可以像两个连接关系字段之间的不等式表达式一样简单,也可以像执行任意复杂比较的用户定义函数一样复杂。非等联接的性质要求对双向联接中元组的所有可能组合进行谓词计算。在本文中,我们考虑了一系列片段和复制连接算法,这些算法促进了非等连接评估,并将其应用于智能磁盘环境。我们使用智能磁盘作为各种不同存储设备的总称,这些设备具有嵌入式处理器,可以从主CPU卸载数据处理。我们的方法部分地复制了其中一个连接关系,以便利用系统中的所有处理能力。但是,部分复制引入了同步并发算法步骤、负载平衡以及在不同连接求值备选方案之间进行选择等问题。我们使用处理模型来避免性能缺陷并自主选择算法参数。通过实验,我们发现我们提出的算法能够充分利用系统资源,从而产生更好的性能。
{"title":"Fragment and replicate algorithms for non-equi-join evaluation on Smart Disks","authors":"Vassilis Stoumpos, A. Delis","doi":"10.1109/ISADS.2009.5207358","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207358","url":null,"abstract":"The predicates in a non-equi-join can be anything but equality relations. Non-equi-join predicates can be as simple as an inequality expression between two join relation fields, or as complex as a user-defined function that carries out arbitrary complex comparisons. The nature of non-equi-join calls for predicate evaluation over all possible combinations of tuples in a two-way join. In this paper, we consider the family of fragment and replicate join algorithms that facilitates non-equijoin evaluation and adapt it in a Smart Disk environment. We use Smart Disk as an umbrella term for a variety of different storage devices featuring an embedded processor that may offload data processing from the main CPU. Our approach partially replicates one of the join relations in order to harness all processing capacity in the system. However, partial replication introduces problems with synchronizing concurrent algorithmic steps, load balancing, and selection among different join evaluation alternatives.We use a processing model to avoid performance pitfalls and autonomously select algorithm parameters. Through experimentation we find our proposed algorithms to utilize all system resources and, thus, yield better performance.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128817084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security system for children on school route 学校路线上的儿童安全系统
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207331
Atsushi Ito, T. Ohta, S. Inoue
To keep safety is one of the most important duties of government. In 2007, Ministry of Internal Affairs and Communications of Japan tested 16 different models of security system for children on school route. One of the models was constructed and tested at an area of a school in Hiroshima City from September to December of 2007. A consortium was established by Hiroshima City, Hiroshima City University, Chugoku Electric Power Co., Inc, KDDI Corporation, etc. to conduct this project. For this model project, we developed new security system for children on school route by using mobile ad hoc network that is constructed based on mobile phone with Bluetooth function. About 700 students used this system for four months. In this paper, we present the outline of this system and the result of the trial. We also describe that this system has good performance and accuracy to keep safety of students on the way to school.
维护安全是政府最重要的职责之一。2007年,日本总务省对16种不同的儿童上学路线安全系统进行了测试。其中一个模型于2007年9月至12月在广岛市一所学校的一个区域进行了建造和测试。该项目由广岛市、广岛市市立大学、中国电力株式会社、KDDI株式会社等组成联合体进行。在这个模型项目中,我们利用基于具有蓝牙功能的手机构建的移动自组网,为学校路线上的儿童开发了新的安全系统。大约700名学生在四个月的时间里使用了这个系统。在本文中,我们介绍了该系统的概要和试验结果。该系统具有良好的性能和准确性,保证了学生在上学途中的安全。
{"title":"Security system for children on school route","authors":"Atsushi Ito, T. Ohta, S. Inoue","doi":"10.1109/ISADS.2009.5207331","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207331","url":null,"abstract":"To keep safety is one of the most important duties of government. In 2007, Ministry of Internal Affairs and Communications of Japan tested 16 different models of security system for children on school route. One of the models was constructed and tested at an area of a school in Hiroshima City from September to December of 2007. A consortium was established by Hiroshima City, Hiroshima City University, Chugoku Electric Power Co., Inc, KDDI Corporation, etc. to conduct this project. For this model project, we developed new security system for children on school route by using mobile ad hoc network that is constructed based on mobile phone with Bluetooth function. About 700 students used this system for four months. In this paper, we present the outline of this system and the result of the trial. We also describe that this system has good performance and accuracy to keep safety of students on the way to school.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128439499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A model for concurrent states and its coverage criteria 并发状态模型及其覆盖标准
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207390
Hideharu Kojima, Y. Kakuda, Juichi Takahashi, T. Ohta
Recently, the embedded software, which is implemented in high definition TVs, recorders and cellar phones and so on, are complicated. There are several reasons. One of the reasons is that embedded software will be implemented with libraries for concurrent processing such as pthread in C language. Developers have to be aware that concurrent programming by using multithread, multi-process and so on. However, concurrent programming is harder than sequential programming. It is possible to cause defects such as race conditions, dead lock and so on. In this paper, we employ ACP (all concurrent paths) and CMFG (concurrent module flow graph) to execute white box testing for the source code of the concurrent software. The number of test cases of ACP becomes huge when the number of blocks increases. In this paper, we propose to suppress the number of test cases of ACP and measure the coverage of ACP by a tool.
目前,用于高清电视、录像机、手机等的嵌入式软件较为复杂。有几个原因。其中一个原因是嵌入式软件将使用用于并发处理的库来实现,例如C语言中的pthread。开发人员必须意识到并发编程通过使用多线程、多进程等。然而,并发编程比顺序编程更难。有可能造成竞争条件、死锁等缺陷。本文采用ACP (all concurrent paths)和CMFG (concurrent module flow graph)对并行软件的源代码进行白盒测试。随着区块数量的增加,ACP的测试用例数量也会越来越多。在本文中,我们提出抑制ACP的测试用例的数量,并通过一个工具来度量ACP的覆盖率。
{"title":"A model for concurrent states and its coverage criteria","authors":"Hideharu Kojima, Y. Kakuda, Juichi Takahashi, T. Ohta","doi":"10.1109/ISADS.2009.5207390","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207390","url":null,"abstract":"Recently, the embedded software, which is implemented in high definition TVs, recorders and cellar phones and so on, are complicated. There are several reasons. One of the reasons is that embedded software will be implemented with libraries for concurrent processing such as pthread in C language. Developers have to be aware that concurrent programming by using multithread, multi-process and so on. However, concurrent programming is harder than sequential programming. It is possible to cause defects such as race conditions, dead lock and so on. In this paper, we employ ACP (all concurrent paths) and CMFG (concurrent module flow graph) to execute white box testing for the source code of the concurrent software. The number of test cases of ACP becomes huge when the number of blocks increases. In this paper, we propose to suppress the number of test cases of ACP and measure the coverage of ACP by a tool.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133216213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
End-to-end delay analysis of the IEEE 802.11e with MMPP input-traffic 基于MMPP的IEEE 802.11e端到端时延分析
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207380
J. Vardakas, M. Logothetis
We investigate the performance of the IEEE 802.11e in respect of end-to-end delay, which is estimated by the sum of queuing delay and MAC delay. The MAC delay analysis is performed based on elementary probability theory (conditional probabilities) while avoiding the complex Markov Chain method. A comprehensive study of the MAC delay is presented by providing higher moments of the MAC delay distribution. To this end, we use the Z-transform of the backoff duration. The first moment corresponds to the mean MAC delay, while the second moment corresponds to the Standard Deviation of the MAC delay; the latter depicts the jitter. We also estimate the probability mass function (pmf) of the MAC delay through the Lattice Poisson Algorithm. As far as the queuing delay is concerned, we provide the mean queuing delay by considering a queuing system with one queue per Access Category (AC) per mobile station, with a single server (the wireless medium), common to all mobile stations, and a Markov Modulated Poisson Process as input, that expresses the bursty nature of Internet traffic. The presented analytical model provides results of the mean end-to-end delay for both saturated and non-saturated channel conditions.
我们研究了IEEE 802.11e在端到端延迟方面的性能,这是通过队列延迟和MAC延迟的总和来估计的。MAC延迟分析基于初等概率论(条件概率)进行,避免了复杂的马尔可夫链方法。通过提供MAC延迟分布的较高矩,对MAC延迟进行了全面的研究。为此,我们使用后退持续时间的z变换。第一个矩对应于平均MAC延迟,第二个矩对应于MAC延迟的标准差;后者描述了抖动。我们还通过点阵泊松算法估计了MAC延迟的概率质量函数(pmf)。就排队延迟而言,我们通过考虑一个排队系统来提供平均排队延迟,该系统每个移动站每个访问类别(AC)有一个队列,具有所有移动站共用的单个服务器(无线介质),并将马尔可夫调制泊松过程作为输入,表示互联网流量的突发性质。所提出的分析模型提供了饱和和非饱和信道条件下的平均端到端延迟的结果。
{"title":"End-to-end delay analysis of the IEEE 802.11e with MMPP input-traffic","authors":"J. Vardakas, M. Logothetis","doi":"10.1109/ISADS.2009.5207380","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207380","url":null,"abstract":"We investigate the performance of the IEEE 802.11e in respect of end-to-end delay, which is estimated by the sum of queuing delay and MAC delay. The MAC delay analysis is performed based on elementary probability theory (conditional probabilities) while avoiding the complex Markov Chain method. A comprehensive study of the MAC delay is presented by providing higher moments of the MAC delay distribution. To this end, we use the Z-transform of the backoff duration. The first moment corresponds to the mean MAC delay, while the second moment corresponds to the Standard Deviation of the MAC delay; the latter depicts the jitter. We also estimate the probability mass function (pmf) of the MAC delay through the Lattice Poisson Algorithm. As far as the queuing delay is concerned, we provide the mean queuing delay by considering a queuing system with one queue per Access Category (AC) per mobile station, with a single server (the wireless medium), common to all mobile stations, and a Markov Modulated Poisson Process as input, that expresses the bursty nature of Internet traffic. The presented analytical model provides results of the mean end-to-end delay for both saturated and non-saturated channel conditions.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132295015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An assurance method for functional system expansion of Tokyo metropolitan railway system 东京都市铁路系统功能系统扩展的保障方法
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207329
Keiji Kamijyo, H. Kawasaki, T. Arisawa, K. Bekki, H. Osumi, Daisuke Yagyu
Autonomous decentralized system (ADS) architecture has been used mainly to realize high assurance control system. However, ADS architecture proposed previously is too simple to apply large-scale complicated system. In this paper, we clarify that large-scale ADS is represented by hierarchical three layers structure and many ADS sub-systems are connected by gateways and agents using railway transport operation control system (ATOS) as an example. ATOS is a system which has been growing and changing continuously. We show that both gateway and agent are effective for system assurance in functional system expansion for large-scale ADS. ATOS: Autonomous Decentralized Transport Operation Control System
自治分散系统(ADS)体系结构主要用于实现高保证控制系统。然而,以往提出的ADS架构过于简单,无法应用于大规模复杂系统。本文以铁路运输运营控制系统(ATOS)为例,阐明了大规模ADS采用分层三层结构表示,多个ADS子系统通过网关和代理进行连接。ATOS是一个不断成长和变化的系统。我们证明了网关和代理都是有效的系统保证,用于大规模ADS:自治分散运输运行控制系统的功能系统扩展
{"title":"An assurance method for functional system expansion of Tokyo metropolitan railway system","authors":"Keiji Kamijyo, H. Kawasaki, T. Arisawa, K. Bekki, H. Osumi, Daisuke Yagyu","doi":"10.1109/ISADS.2009.5207329","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207329","url":null,"abstract":"Autonomous decentralized system (ADS) architecture has been used mainly to realize high assurance control system. However, ADS architecture proposed previously is too simple to apply large-scale complicated system. In this paper, we clarify that large-scale ADS is represented by hierarchical three layers structure and many ADS sub-systems are connected by gateways and agents using railway transport operation control system (ATOS) as an example. ATOS is a system which has been growing and changing continuously. We show that both gateway and agent are effective for system assurance in functional system expansion for large-scale ADS. ATOS: Autonomous Decentralized Transport Operation Control System","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 International Symposium on Autonomous Decentralized Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1