The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To protect user privacy, many smartphone systems adopt the permission-based mechanism in which a user can evaluate the risk of requests for private information from a mobile app before installing it. However, recent studies show that the permission based mechanism is vulnerable to application collusion attacks because two apps, which appear to be harmless individually, can establish a covert channel...
To protect user privacy, many smartphone systems, such as Android and Windows Phone, adopt the permission-based mechanism in which a user can evaluate the request of private information by a mobile app before installing it. However, recent studies show that the permission-based mechanism is vulnerable to application colluding attacks because two apps, which appear to be harmless individually, can...
Service providers today rely on service-chaining policy enforced by omnipresent middleboxes (MBoxes) to achieve crucial performance and security guarantees in their networks. On the other hand, they are currently struggling to satisfy growing traffic demands on their traditional services. Given the promise of emerging technologies, such as SDN and NFV, we argue that the enforcement of service-chaining...
Over the past few years, many architectures have been proposed for the future Internet. Nevertheless, such new schemes usually require existing systems to migrate to their proposed namespaces, which may compromise the adoption of new technologies. In addition, we note that most existing networked systems have their own namespaces, but inter-operation among them is rather static and lacks of flexibility...
As the control systems' dynamic property and the high requirement for real-time, the traditional real-time scheduling algorithms cannot adapt to the control system. Fortunately the adaptive closed-loop real-time scheduling algorithms behave robustly for disturbances. This paper discusses a new feedback real-time scheduling algorithm which can adapt to the special requirements of control system. The...
Feed rate has always been one of the most important indicators for CNC performance, while transfer velocity between two adjacent segments pays a key role in improving feed rate. Since the contour of a special part commonly consists of line and arc segments (non-micro segments), as well as continuous micro line segments (micro segments) so there should be different methods to deal with their transfer...
Primary/alternate version technique is a cost-effective means which trades the quality of computation results for promptness to tolerate the software faults. Generally speaking, this method requires that each real-time periodic task has two versions: primary and alternate. The primary version provides a result that is in some sense more desirable, but it may be subject to timing failure due to its...
This paper presents a fast calculation algorithm for the generation of envelope surface in multi-axis NC machining. According to the cutter location file, the motion coordinate system is constructed. Then the typical ball-end mill is analysised and the calculation formulas are obtained. The proposed formulas are independent of the types of the NC machines. This algorithm has been applied to a prototype...
Dependability is the representative property that predominantly distinguishes a hard real-time system from other computer systems besides timeliness. Primary/alternate version technique is a cost-effective means which trades the quality of computation results for promptness to tolerate the software faults. The kernel algorithm proposed in this paper employs the off-line backwards-RM scheme to pre-allocate...
This paper researches on the machining simulation of the multi-axis numerical control (NC) system, and proposes a new algorithm of intersection calculation and collision detection based on Three Dimensions Grid Representation (TDGR). The suggested algorithm is applied for the simulation system of the LT-NC310 system, whose data communications between simulation and task controller are completed by...
The real-time scheduling algorithms play an important role in real-time systems. Whether or not the real-time tasks could be completed within the specified deadline mainly relies on scheduling algorithms. This article proposes a sectional real-time scheduling algorithm called SS (sectional scheduling), and this algorithm divides the system load into three cases according to the intension of system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.