The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the new result in the Trajectory approach when considering more than one packet of a sporadic flow is overstocked on an output port for an AFDX network, using the FIFO assumption. The principal contribution is to compute upper bounds of end-to-end delays for the processing flows by the recursive calculation of interference time windows. The paper proposes a memo recursive computation...
Due to the separation of the radar transmitter and receiver, the channel mismatch, the time and phase synchronization error between synthetic aperture radar (SAR) central electronic equipments (CEE) is the key problems of spaceborne distributed SAR system compared with the traditional single-satellite double pass interferometric SAR (InSAR) system, which has to be considered in the SAR system design,...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
Failure is the typical phenomena of the execution of long-running transactions. To accommodate the random features of Internet-based computing we extend the Guarded Command Language by addition of probabilistic choice and coordination combinators. This paper deals with rollback and compensation mechanisms of the language by providing a probabilistic model. We also discuss algebraic properties of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.