The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hierarchical State Transition Matrix (HSTM) is a table-based modeling language that has been broadly used for developing software designs of embedded systems. In this paper, we describe a model checker Garakabu2, which we have been implementing for verifying HSTM designs against LTL properties. The HSTM designs that Garakabu2 takes as input are those developed using an industrial-strength model-based...
The Network Functions Virtualization (NFV) paradigm is the most promising technique to help network providers in the reduction of capital and energy costs. The deployment of virtual network functions (VNFs) running on generic x86 hardware allows higher flexibility than the classical middleboxes approach. NFV also reduces the complexity in the deployment of network services through the concept of service...
In this paper, standby mode control for set-top boxes based on network assistance is proposed. A set-top box with the standby mode control uses network-assisted passive standby mode that allows a set-top box to access network access during standby state where a set-top box does not receive broadcast services. The standby mode control helps a set-top box to update its software and firmware in standby...
Visualization of logic computations (i.e., by sharing a fixed function across distinct data streams) provides a means to effectively utilize hardware resources by context switching the logic to support multiple data streams of computation and to improve the total throughput of all streams. Context switching allows the pipeline stages of the logic to be fully utilized when feedback is present and to...
Stable task assignment among processors is a shrewd effort because such approaches require priori information about current processor load and then perform allocation. Initial policy structure includes no information about processor load but as the task groups arrive and get scheduled, this information acts as a prerequisite for next allocation. The task of load stability is tricky when static scheduling...
Device-to-Device (D2D) communication is a proximity-based technique used by Long Term Evolution-Advanced (LTE-A) systems. When a ProSe-enabled UE in D2D communication moves across a cell boundary, seamless handover is expected. However, LTE-A does not specify D2D handover procedures, and the current LTE-A handover procedures cannot support the ProSe service continuity requirements [1]. Therefore,...
This paper deals with switched linear systems with persistent disturbances and under arbitrary switching. For these systems, a systematic componentwise ultimate bound computation method has been previously developed. This method does not employ a Lyapunov function, yet yields a mixture of ellipsoidal and polyhedral sets, which are the type of level sets obtained via complex polytopic Lyapunov functions...
In order for robots to work alongside humans in a range of domains, they will need to operate with a variety of social dynamics that each context will require. This paper builds on previous work with a parameterized turn-taking model, CADENCE, in which different parameter settings resulted in different social dynamics. In contrast to the static parameter settings of previous work, we now investigate...
The AFDX (Avionics Full DupleX Switched Ethernet) is the backbone network of most modern civilian aircraft. For certification reasons, a guaranteed upper bound has to be determined on the end-to-end delay for all transmitted flows.
Contemporary embedded system development is focusing more and more on software modularity and reuse, to reduce development costs and improve reliability. In this scenario, a Real Time Operating System (RTOS) often plays a central role to schedule task execution and provide inter-task communication and synchronization. For this reason, its performance and overhead become critical points of system design...
Small cell network strategies are applied for providing enhanced coverage and maximizing system capacity in the network. In such an environment, substantial growth of signalling load on the Core Network (CN) can be caused by reduced cell size, increased user density and increased user velocity. In this paper, in order to reduce the signalling load incurred by path switching operations in the small...
Use-cases are a well-known technique for capturing functional requirements. Their advantage is the understand ability for a wide range of stakeholders. With a growing number of use-cases and their continuous refactoring, inconsistencies inevitably sneak in. This problem has been targeted in the Formal Verification of Annotated Textual Use-Cases (FOAM) tool that runs lightweight formal verification...
For the development of complex systems - composed of hardware, software, or both - more and more high-level descriptions have been introduced over the past years. Starting from an informal specification, models of the system are created with the help of languages such as UML, SysML, or MARTE. Based on this model, an implementation is generated in a programming language such as C++, Java, etc. for...
This paper summarizes a process of operating system adaptation to an Intel Atom processor. The main objectives of this project was to adapt a simple micro kernel embedded operating system to a more complicated processor family, without destroying the original modules of system or changing their functionality. Our motivation was the lack of information or techniques regarding operating system migration...
As the core density of future processors keeps increasing, MPI+Threads is becoming a promising programming model for large scale SMP clusters. Generally speaking, hybrid MPI+Threads runtime can largely improve intra-node parallelism and data sharing on shared-memory architectures. However, it does not help much on inter-node communication due to the inefficient integration of existing communication...
Context: This study is directed towards understanding the problems related to the transition phase carried out during the switching of outsourcing vendors in a near-shore context. Objective: Given the scarcity of such studies, an understanding of how the transition of distributed projects is enacted needs to be constructed. This study will contribute such an understanding of the complexity and nature...
A collection of double integrator agents is considered, where each agent has bounded input and a limited range for receiving information from other agents. One autonomous node (the Root) generates an unknown reference trajectory to which other agents are required to converge in minimum possible time, using only locally available information. A distributed algorithm is proposed to identify a directed...
The paper analyses some continuous-time dynamic models that describe the evolution of social systems characterized by the possibility of changing the alliances among the parties involved or damaging one's competitors. At any time each participant, either an individual or a coalition, can decide to form or terminate a bond, or to start or stop damaging an opponent (i.e., to switch from a network configuration...
We explore the idea of objects that, under some contextual conditions, become less “agreeable” to the user. Such an object may lower its performance level, become less usable, or start producing discouraging stimuli. Yet, it always remains fully functional and usable. We call such objects resistive. We describe three ways, in which making an object resistive may add value to the user. The resistive...
We study service and pricing competition in a duopoly market where consumers are variety seeking, which is modeled as a decrease in the willingness to pay for the product purchased on the previous purchase occasion. Under a two-stage Hotelling-type model, we show that the presence of variety seeking consumers induces higher service levels in Period 2, if prices are committed at the beginning. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.