The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In modern networks, faults in the network state, e.g., loops, black holes and access control violations that make services unavailable, arise commonly. To ensure networks' correctness, existing approaches verify network-wide invariants. However, these approaches cannot detect or prevent faults immediately as they arise, so that network performance is not affected. In this paper, we present a data...
As the Smart Grid becomes highly interconnected, the power protection, control, and monitoring functions of the grid are increasingly relying on the communications infrastructure, which has seen rapid growth. At the same time concerns regarding cyber threats have attracted significant attention towards the security of power systems. A properly designed security attack against the power grid can cause...
In the first part of this paper the operation mechanism of exchanging the data used in vehicles and equipment as well as the applied security measures have been presented. In the further part of the work, the identification method for the data in the network, for which the encoding system is not known, has been discussed. Subsequently, a suggestion of the decoding method for the network-derived data...
When software engineers fix bugs, they m ay h ave several options as to how to fix those bugs. Which fix they choose has many implications, both for practitioners and researchers: What is the risk of introducing other bugs during the fix? Is the bug fix in the same code that caused the bug? Is the change fixing the cause or just covering a symptom? In this paper, we investigate alternative fixes to...
This paper reports on an empirical study that explores the model development process followed by six expert modelers in discrete-event simulation (DES). So far the model development practice in DES has not been explored and there is little understanding of the processes followed. This study observes the modeling process of practitioners, experts in simulation modeling undertaking a laboratory modeling...
The implementation of communication protocols is an important development task that appears frequently in software projects. This article is a vision paper that describes the components of the current available implementation strategies and problems that arise. The article introduces the main existing protocol engineering techniques and puts them into the context of model driven software development...
Conventional RFID readers combine transmission (to the tag) and reception (from the tag) functions in a single physical device. In this paper we discuss the design and potential applications of a receive-only device, called “RFID listener”, that decodes the signals from both the tag and the reader. This enables augmented RFID systems where one transmitter coexists with multiple listeners offering...
Most multicast flows such as IPTV are streamed at a constant rate using UDP. To fairly share the bandwidth with TCP streams, several multicast congestion controls have been proposed. Highly scalable and most efficient ones are receiver-driven and use dynamic multicast groups, which means that each group begins to send at a high rate and slows down progressively. Each receiver joins groups to obtain...
This paper introduces data format of MSN text and voice communication. A monitoring system of MSN text and voice communication was designed. This monitoring system can not only monitor text communication, but also monitor voice communication. Monitoring system can restore a normal voice files. In four different environments, the software is tested. It works well.
This paper analyzes the causes leading to call drop for 3G video phones. A solution for reducing the call drop is proposed. The solution proposed in this work mainly consists of software components, according to which hardware needs to be selected. It also gives the video phone terminal structure, block diagram for H.324M video phone terminal, the main software functional blocks and the algorithm...
The embedded wireless application for vehicle diagnosis is presented. The design uses an ATmega16 microcontroller as a master which controls the wireless RF transceiver module nRF905 to realize the wireless vehicle diagnosis function. The nRF905 module is used for signal transmission between diagnostic-tester and vehicle ECU. Diagnosis application software is also developed on the PC Windows platform...
In this paper we will describe an open architecture for detecting earthquakes using the built in accelerometers available in some mobile phones. Although the idea of building a network of accelerometers for this application is not new, we will take an iterative approach starting with a prototype which exhibits some core functionality. Key questions include: what level of sophistication is required...
During interoperation process among components at signature level and behavioral level, many kinds of message mismatches happened. The classical way to solve the mismatch problems is to generate adaptor protocols (semi-) automatically in according to sets of component interface specifications and adaptation contracts, to authors knowledge, it can not perfectly solve the mismatch problem when messages...
Abstract Syntax Notation One (ASN.1) is a very popular specification language with many applications in networking. We work towards the correct translation from ASN.1, into the powerful algebraic specification language CafeOBJ. Our aim is to create a software environment that can translate correctly a protocol's specification written in ASN.1 into the powerful algebraic specification language CafeOBJ...
Controller area network (CAN) is widely used in real-time automobile control and is gaining wider acceptance as a standard for automotive networking. The applicability of earliest deadline (EDF) techniques to the scheduling of CAN messages has been shown in previous researches. Earliest deadline can guarantee higher network utilization than fixed-priority schemes like deadline or rate monotonic (DM,...
At current date the problem of how to build distributed and replicated software transactional memory (STM) to enhance both dependability and performance is still largely unexplored. This paper fills this gap by presenting D2STM, a replicated STM whose consistency is ensured in a transparent manner, even in the presence of failures. Strong consistency is enforced at transaction commit time by a non-blocking...
The following study investigated cognitive factors involved in applying the Perspective-Based Reading (PBR) technique for defect detection in software inspections. Using the protocol analysis technique from cognitive science, the authors coded concurrent verbal reports from novice reviewers and used frequency-based analysis to consider existing research on cognition in software inspections from within...
This paper looks into the features of SMS (short message service) relevant to building a remote monitoring system. Based on the analysis of SMS, a set of guidelines for customizing the user data protocol of short messages are presented. The paper brings forward a method for encapsulating a Modbus message into a short message. It also discusses user data protocol of ASCII-coded immediate alarm messages...
Voice restoration techniques for voice communication software are among the most popular for voice communication applications. Previous researches are mainly based on network package analysis, due to the diversity of voice communication software, these methods are just effective for certain kinds of voice communication software and have difficulty in dealing with encrypted voice communication especially...
We show that it is crucial for the support of business processes and intelligence as well as for the technical advantages that the peers (services) in service-oriented systems have user-oriented interfaces. Such a requirement is at present difficult to implement if we require that the interfaces must be completely implemented according to world-wide standards - i.e. no proprietary (ad hoc) solutions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.