The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
OpenFlow has been applied to a variety of demands of the transmission quality of the Internet business and it is still growing on its way. To test this protocol with its evolution consideration, we analyzed the working process of OpenFlow protocol and constructed the CPN model through phasing firstly and then role division for version 1.0. In addition, the selection of tokens and their given values...
As software functions can be separated from the device hardware, new techniques as SDN and NFV can be enabled in the management and operation of communication networks. However, the automatic configuration and SDN tools give only moderate information to the control or orchestration systems, and this can affect the performance and reliability of the managed network. The control and orchestration functions...
Component-Based Development (CBD) reduces development time and effort by allowing systems to be built from pre-developed reusable components. Partitioning the behavior into a set of major operational modes is a classical approach to reduce complexity of embedded systems design and execution. In supporting system modes in CBD, a key issue is seamless composition of pre-developed multi-mode components...
The paper addresses the problem of creating a comprehensive fault injection environment, which integrates and improves various simulation and supplementary functions. This is illustrated with experimental results.
This paper describes a methodology for building a reliable internet core router that considers the vulnerability of its electronic components to single event upset (SEU). It begins with a set of meaningful system level metrics that can be related to product reliability requirements. A specification is then defined that can be effectively used during the system architecture, silicon and software design...
Datasets of tens of gigabytes are becoming common in computational and experimental science. Providing remote visualization of these large datasets with adequate levels of quality and interactivity is an extremely challenging task, particularly for scientists who collaborate in widely distributed locations and their primary access to visualization resources is a desktop computer. This paper describes...
Automated test case generation from behavioral models like finite state machines (FSMs) and statecharts has long been studied. Environments that enable a test designer to model a real complex software and to obtain test cases to validate such a software are mandatory in an automated test approach. This paper presents an environment, GTSC, which enables test sequences to be obtained from both Statechart-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.