We present our developed embedded system based coherent population trapping (CPT) atomic clock circuit designed for the Miniature Atomic Clock. The size of the circuit is 30mm × 30mm, and the power consumption is 130mW. We connect this circuit to a physics package to form a CPT atomic clock with short-term frequency stability of 4 × 10-11τ-1/2.
{"title":"Embedded System Design for Miniature CPT Atomic Clock Circuit","authors":"Yuan Tian, Yi Zhang, S. Gu","doi":"10.1109/ECBS.2013.9","DOIUrl":"https://doi.org/10.1109/ECBS.2013.9","url":null,"abstract":"We present our developed embedded system based coherent population trapping (CPT) atomic clock circuit designed for the Miniature Atomic Clock. The size of the circuit is 30mm × 30mm, and the power consumption is 130mW. We connect this circuit to a physics package to form a CPT atomic clock with short-term frequency stability of 4 × 10-11τ-1/2.","PeriodicalId":403664,"journal":{"name":"European Conference on the Engineering of Computer-Based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115551466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Breitman, Simone Diniz Junqueira Barbosa, P. Salas, R. Berardi, J. V. Filho, Tássia Freitas, T. Batista
Understanding IT organizations is essential for ensuring a successful transformation phase in IT outsourcing deals. However, this process of understanding is regard as a hard task, since usually there are important differences between its current (AS-IS) state and the desired (TO-BE) state. It becomes a greater problem when there are different models of both AS-IS and TO-BE states in an organization. We present a methodology based on viewpoint concepts from requirement engineering. This methodology allows us to represent and visualize distinct viewpoints models of an IT organization from several perspectives and to compare these models in order to help design changes to bring the organization from an AS-IS state to a TO-BE state.
{"title":"Understanding IT Organizations Using Viewpoints","authors":"K. Breitman, Simone Diniz Junqueira Barbosa, P. Salas, R. Berardi, J. V. Filho, Tássia Freitas, T. Batista","doi":"10.1109/ECBS.2011.36","DOIUrl":"https://doi.org/10.1109/ECBS.2011.36","url":null,"abstract":"Understanding IT organizations is essential for ensuring a successful transformation phase in IT outsourcing deals. However, this process of understanding is regard as a hard task, since usually there are important differences between its current (AS-IS) state and the desired (TO-BE) state. It becomes a greater problem when there are different models of both AS-IS and TO-BE states in an organization. We present a methodology based on viewpoint concepts from requirement engineering. This methodology allows us to represent and visualize distinct viewpoints models of an IT organization from several perspectives and to compare these models in order to help design changes to bring the organization from an AS-IS state to a TO-BE state.","PeriodicalId":403664,"journal":{"name":"European Conference on the Engineering of Computer-Based Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127920984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aspect oriented programming and subsequently aspect oriented software development have received great attention recently and constitutes an interesting field of research in computer science. The goal of this paper is to propose a more precise understanding of aspects based on the idea of crosscutting concerns in view of model transformation. This proposal considers security aspects as an example of a behavior applied over a desired software product. This implies improving the actual definition of aspects. The work introduces the main current concepts of aspect, defines aspects as behavioral entities, presents examples, and outlines a method for model transformation based on the proposed definition.
{"title":"Introducing Security Aspects with Model Transformations","authors":"J. Fox, J. Jürjens","doi":"10.1109/ECBS.2005.48","DOIUrl":"https://doi.org/10.1109/ECBS.2005.48","url":null,"abstract":"Aspect oriented programming and subsequently aspect oriented software development have received great attention recently and constitutes an interesting field of research in computer science. The goal of this paper is to propose a more precise understanding of aspects based on the idea of crosscutting concerns in view of model transformation. This proposal considers security aspects as an example of a behavior applied over a desired software product. This implies improving the actual definition of aspects. The work introduces the main current concepts of aspect, defines aspects as behavioral entities, presents examples, and outlines a method for model transformation based on the proposed definition.","PeriodicalId":403664,"journal":{"name":"European Conference on the Engineering of Computer-Based Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present how to develop graphical user interfaces from two UML models: use case and activity diagrams. Our method obtains from them a UML class diagram for representing GUI components, and it is suitable for generating code fragments, which can be considered as GUI prototypes.
{"title":"Designing GUI Components for UML Use Cases","authors":"J. Almendros-Jiménez, Luis Iribarne","doi":"10.1109/ECBS.2005.31","DOIUrl":"https://doi.org/10.1109/ECBS.2005.31","url":null,"abstract":"In this paper we present how to develop graphical user interfaces from two UML models: use case and activity diagrams. Our method obtains from them a UML class diagram for representing GUI components, and it is suitable for generating code fragments, which can be considered as GUI prototypes.","PeriodicalId":403664,"journal":{"name":"European Conference on the Engineering of Computer-Based Systems","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132293041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-05-24DOI: 10.1109/ECBS.2004.1316714
M. Kubát
Automated acquisition of knowledge and skills by way of machine-learning techniques is a new promising technology for embedded systems. The paper briefly summarizes the ambitions of this technology, and then discusses in some detail the work that has been done in one of its subfields: induction in time-varying domains.
{"title":"Induction in Time-Varying Domains: Motivation, Origins, and Encouragements","authors":"M. Kubát","doi":"10.1109/ECBS.2004.1316714","DOIUrl":"https://doi.org/10.1109/ECBS.2004.1316714","url":null,"abstract":"Automated acquisition of knowledge and skills by way of machine-learning techniques is a new promising technology for embedded systems. The paper briefly summarizes the ambitions of this technology, and then discusses in some detail the work that has been done in one of its subfields: induction in time-varying domains.","PeriodicalId":403664,"journal":{"name":"European Conference on the Engineering of Computer-Based Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132564199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EASe Introduction","authors":"","doi":"10.1109/ECBS.2005.33","DOIUrl":"https://doi.org/10.1109/ECBS.2005.33","url":null,"abstract":"","PeriodicalId":403664,"journal":{"name":"European Conference on the Engineering of Computer-Based Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115724767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ECBS.2001.922438
Jiang Guo
The key to integration is determining the relationship between what components are potentially reusable and how they can be properly adapted. This paper addresses how the results of specifcation matching can be used to guide the selection and application of adaptation tactics and airtonlate component adaptation and system integration based on type, interfnce, and behavior adaptation.
{"title":"Software Components Adaptive Integration","authors":"Jiang Guo","doi":"10.1109/ECBS.2001.922438","DOIUrl":"https://doi.org/10.1109/ECBS.2001.922438","url":null,"abstract":"The key to integration is determining the relationship between what components are potentially reusable and how they can be properly adapted. This paper addresses how the results of specifcation matching can be used to guide the selection and application of adaptation tactics and airtonlate component adaptation and system integration based on type, interfnce, and behavior adaptation.","PeriodicalId":403664,"journal":{"name":"European Conference on the Engineering of Computer-Based Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128412918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}