The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The bidirectional model transformation (BX) comprises a forward transformation get and a backward transformation put. Given that get may be an information-loss transformation, the behavior of put may be uncertain. An uncertain put produces many valid outputs that fit different application scenarios. This paper proposes an approach to variability management in BX to enable put to generate an output...
Service-based access models coupled with recent advances in application deployment technologies can support emerging dynamic and data-driven applications. However, due to evolving application requirements and the dynamicity of the underlying resources, it is necessary to support flexible and opportunistic composition of services in order to satisfy application needs. The goal of this work is to provide...
Simulation is a valuable tool for robotics research and development, and various simulation packages have been proposed. However, we are aware of no freely-available packages which implement the required fidelity to accurately model earth-moving robots that manipulate the terrain itself. The software which does exist for this is difficult if not impossible to run in real-time while achieving the desired...
In this extended abstract, we briefly survey the vision and goals of On-The-Fly (OTF) computing. Then we turn to heterogeneous multi-cores which, as platforms for OTF computing scenarios, have to support a high dynamics in both the workload and the system state. We argue that concepts and models of self-awareness studied in, for example, psychology, have been successfully transferred to the computing...
The demands placed on hydrologic analyses have increased considerably in recent years. Hydrologic analyses involve numerous methods and are useful in many fields, such as agriculture, forestry and grassland farming. In order to catch information and knowledge from Digital Elevation Models (DEM), processing data step by step in software is available, which needs many manual workloads and is not convenient...
Technology enhanced education has been recently established as a new approach for all stages of education in developing countries, especially in Macedonia. Although computer games are often given little attention we believe that within the vast amount of technologies and instruments used to achieve the needed improvements it is computer games that are playing the central role in delivering the desired...
This paper presents an approach for securing software application chains in cloud environments. We use the concept of workflow management systems to explain the model. Our prototype is based on the Kepler scientific workflow system enhanced with security analytics package.
This paper describes the co-simulation methodology adopted for hardware verification of a next generation network packet processing engine (Advanced I/O Processor or AIOP) utilizing virtual prototype models developed originally for software verification. Though co-simulation strategies are common in verification of stand-alone processors, they have seldom been used for mega-modules and SoC, which...
The cooperative edition of (meta)models may be enacted by the exchange of change operation journals between the participants. But these are often composed of atomic operations (create, delete, set, …) that have no useful meaning for the users. Hence, detecting and recovering composite operations is a crucial step to help users understand the history of their (meta)models in terms of higher level operations...
An application for evacuation simulation using computational resources may help previewing situations, flows, conflicts, and behaviours that may only happen in a real danger situation. This kind of application enables the execution of several pre-defined scenarios at any time, without the expensive and complex allocation of real people. This paper proposes an emergency simulation system on oil platforms...
Automotive companies commonly adopt Hardware-In-the-Loop simulators to develop new control strategies in order to reduce the effort and the cost of the testing phase. The engine management system is an important component of actual road vehicles, it has a vital impact on fuel economy and reduced emissions. Engine developer want to run the ECU while monitoring its internal state through special programs,...
In the era of big data, Hive has quickly gained popularity for its superior capability to manage and analyze very large datasets, both structured and unstructured, residing in distributed storage systems. However, great opportunity comes with great challenges: Hive query performance is impacted by many factors which makes capacity planning and tuning for Hive cluster extremely difficult. These factors...
Discussion of an Engineering Master's Thesis of a novel rotating engine along with a case study on the benefits of relationship of Engineering Industry with academia.
Control software is commonly used in various branches of industry. Its still increasing size and complexity indicates that it is crucial to propose various development processes that could make the work easier and faster. In this paper, the Model-Driven Development approach is presented, together with the mechanism of automatic generation of implementation, dedicated to projects created according...
At present, security-related engineering usually requires a big up-front design (BUFD) regarding security requirements and security design. In addition to the BUFD, at the end of the development, a security evaluation process can take up to several months. In today's volatile markets customers want to influence the software design during the development process. Agile processes have proven to support...
In this paper we illustrate a cost-effective software-in-the-loop simulation methodology, which is particularly suitable for testing large-scale pervasive systems and applications. The main advantage of such an approach is that real code has to be deployed once, and a general-purpose simulation engine replicates it over virtual devices and environments as often as we wish. Our implementation of the...
Quantifying and measuring Quality of Experience (QoE) are important and difficult concerns in Human Computer Interaction (HCI). Quality of Service (QoS) and the actual User Interface (UI) of the application are both important contributors to the QoE of a user. This paper describes a framework that measures accurately the way a user uses the UI in order to model users' behaviors and profiles. It monitors...
Integrating the computing process and the physical process, cyber-physical systems (CPS) pose many challenges to the system analysis and modeling. While most of the existing work focuses on developing the precise and formal model of CPS, little attentions have been given to the early requirements analysis and modeling which focuses on what the users' requirements are and what the software and physical...
Traffics produced by P2P system such as BitTorrent, Skype, etc, has been the primary networking traffic. Peer-to-peer systems can be very large and highly dynamic. Therefore, testing a new algorithm for P2P computing in real Internet is impractical and expensive. Simulation is another feasible approach to test new algorithms or investigate P2P system behaviors. Many P2P-oriented simulators have been...
This paper reviews the requirements and methods associated with executing a test program application in simulation mode. The simulation requires running the application with a subset of instrumentation or without any instrumentation and with or without the Unit Under Test (UUT). In simulation mode some of the instruments or the UUT may not exist, which requires that the simulation environment filter...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.