The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development and acquisition of complex systems that are driven, in part, by system-of-systems requirements remains a challenge in the defense sector due to complexities in both program management and engineering design. The interdependencies between component systems often result in complex networks that, while enabling capabilities that are beyond those of individual systems, also increase risk...
The Controller Area Network (CAN) protocol is widely employed in the development of distributed embedded systems. Building on the CAN protocol, previous studies have illustrated how “Shared-Clock” (S-C) algorithms can be used in conjunction with off-the-shelf microcontrollers to create high-reliability distributed systems at low cost. In such studies, it has generally been assumed that S-C designs...
The focus of this paper is on interaction protocols and topologies of multi-agent systems for task allocation in manufacturing applications. Resource agents in manufacturing are members of a network whose possible logical topologies and governing interaction protocol influence the scheduling and control in the multi-agent system. Four models are identified in the paper, each having specific rules...
In any system-of-systems the potential exists for interactions between systems to occur that may affect the security of the overall system. We present a scenario that aims to highlight such problems, in particular that of security at a network boundary. This scenario considers cooperation and interactions between organisations and systems in the context of a major public event, such as a sporting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.