The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber-Physical Systems (CPSs) as advanced embedded systems integrating computation with physical process are increasingly penetrating into our life. Modeling and analysis for such systems closely involved with us are actively researched. A current challenging problem is how to take advantages of existing technologies like SysML/MARTE, Modelica and Statistical Model Checking (SMC) through effective...
In recent years, with the development of technology, the potential and application value of GIS (Geography Information System) has been shown in various fields. GIS performs well in data processing and graphic display but still has some shortcomings in some high-abstract-level areas like model library. In this paper we presented a model library by XML (Extensible Markup Language), and described its...
The research on next generation network has been carried out around the world in allusion to the problem that the Internet fails to satisfy some of high level requirements. As an important branch of the research, the study of network architecture modeling makes many achievements. However, as a major experiment platform of network architecture, the research findings of network simulation are quite...
The design and the requirements of modern computer-based systems have reached a complexity level that calls for the use of models for the verification of non functional requirements since the beginning of their design cycle. Such systems are however too complex to be modeled directly in a simple unstructured formal language like Queueing Networks or Petri Nets. SIMTHESys (Structured Infrastructure...
Technological advancements in communication and embedded computing lead to the increasing application of decentralized structures in automation and control. The decentralization adds new behavior in the form of - often non-deterministic - delays to the resulting networked control systems (NCS). To analyze a closed loop control system including network communication, simulation is a viable approach...
The construction industry has been facing a paradigm shift to (i) increase; productivity, efficiency, infrastructure value, quality and sustainability, (ii) reduce; lifecycle costs, lead times and duplications, via effective collaboration and communication of stakeholders in construction projects. Digital construction is a political initiative to address low productivity in the sector. This seeks...
In order to realization electronic parts product appearance quality detection control, one kind of processor based on the intelligent knowledge automatic extraction and system intelligence modeling was presented. In the processor, wavelet-fuzzy technique and neural network technique are combined. Uses the fuzzy wavelet extraction image feature, and wavelet function is used as fuzzy membership function...
We describe a benchmark of publicly-available multi-threaded programs with documented bugs in them. This project was initiated a few years ago with the goal of helping research groups in the fields of concurrent testing and debugging to develop tools and algorithms that improve the quality of concurrent programs. We present a survey of usage of the benchmark, concluding that the benchmark had an impact...
We present a new approach for mutation analysis of security policies test cases. We propose a metamodel that provides a generic representation of security policies access control models and define a set of mutation operators at this generic level. We use Kermeta to build the metamodel and implement the mutation operators. We also illustrate our approach with two successful instantiation of this metamodel:...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.