The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Use-case scenarios, with notations such as UML sequence diagrams, are widely used to specify software system behavior. Although intuitive, these notations allow engineers to specify behaviors with unintended semantic side-effects. To address these inconsistencies, one class of languages targets triggered scenario specifications for expressing a system's reactive behaviors. However, these languages...
Collaboration and interaction between users and virtual humans in virtual environments is a crucial challenge, notably for Collaborative Virtual Environments for Training (CVET). A training procedure, indeed, often involves several actors: trainees, teammates and many times a trainer. Yet, a major benefit of CVET is to propose to users to be trained even if the required number of person needed by...
Within a cost-constrained economic environment, the DoD, government agencies, and commercial businesses seek to maximize mission capacity by sharing services across mission segments over an integrated infrastructure using a common mission control system. To accomplish this goal, a new technique is required to orchestrate the execution of existing and emerging mission services. The Dynamic Mission...
The problem of device independent data access has been answered by the cloud computing technology. The flexibility of device independence has driven many users, and the no maintenance strategy has driven many organizations towards this technology and the number is increasing by the day. Therefore energy efficient computing on the cloud processors has become inevitable. In this paper, we present a...
Contexts such as time, location and companion play an important role to determine topics of documents. We focus on companion context (friends, wife, husband etc.) as one of the most important contexts to determine topics. We propose companion context dependent topic model by the extension of basic graphical model: LDA (Latent Dirichlet allocation). We propose three kinds of LDA extensions. Firstly,...
Understanding skill acquisition in the context of information systems (IS) use is increasingly important as digital technologies continue to pervade all aspects of personal and business life. To address this important construct, in this study we explore potential antecedents of skill acquisition, including: playfulness, ease of use, comprehensiveness of use, and atypical use. We also explore the mediating...
With the growing popularity of online social network sites (SNSs) and increasing competition among the leading players, users' switching behavior between different SNSs becomes an issue of great interest to information systems researchers and practitioners, as user retention is the key to the success of SNSs. In this paper, we draw from the push-pull-mooring model and the uses and gratification theory...
Electronic networks of practice (ENPs) have become an important mechanism for knowledge exchange among loosely connected individuals who share common knowledge interests. While prior research has explored factors that influence knowledge contribution in such networks, less is understood about knowledge evaluation. This study examines the process of knowledge filtering in online ENP forums. Drawing...
Modern industrial systems are often large and distributed. Consequently, building the test harness for them can be technically challenging. A compositional approach attempts to overcome this problem by partitioning the system into smaller parts easier to test separately. And in particular, compositionality helps to avoid as much as possible testing the whole monolithic system thanks to mathematical...
We propose a hybrid approach to improving the verification performance of SMT-based bounded model checking for LTL properties. In this approach, stateless explicit-state exploration is utilized to traverse, under the constraints of bounded context switches, the state space of a system design and memorize legal execution paths. These paths are classified according to certain predicates into path clusters,...
Reconfigurable processors have widely attracted attention as an approach to realize high-performance and highly energy-efficient processors that map a target program's hot path to a reconfigurable datapath. In this paper, we propose a Control-Flow Driven Data-Flow Switching (CDDS) variable datapath architecture for embedded applications that demand extremely low power consumption in a wide range of...
Today's smartphones are not only tools for entertainment and communication, but also very effective tools for increasing the productivity of business users. End user can connect to company's IT infrastructure for uploading and downloading business data. However, smartphone security mechanisms have been discovered to offer very limited protection against malicious applications that pose a real threat...
As discovered in our previous benchmark works, a small number of workloads in PARSEC benchmark suite suffer from heavy performance loss in a virtual execution environment, of which the major loss exhibits fairly a strong connection with the thread synchronization operations. This paper examines one workload of this kind that makes heavy use of thread synchronization operations, and shows the performance...
A major challenge of Dynamic Binary Translation (DBT) is to efficiently handle the indirect branch. Conventionally, to translate indirect branches (IBs), DBT systems need to conduct address mapping between Source Binary Blocks (SBB) and Translated Binary Blocks (TBB). However, even a dedicated address mapping process still results in non-trivial performance overheads to DBT. This paper first provides...
Overheads due to context switching and external interrupt management are core characteristics for Real-Time Operating Systems (RTOS) since they play a central role in their performance and timeliness. In this paper we evaluate two core characteristics for the Real-Time Executive for Multiprocessor Systems (RTEMS), an operating system used for supporting space applications. Our assessment makes use...
Software Defined Networking (SDN) has been proposed as a drastic shift in the networking paradigm, by decoupling network control from the data plane and making the switching infrastructure truly programmable. The key enabler of SDN, OpenFlow, has seen widespread deployment on production networks and its adoption is constantly increasing. Although openness and programmability are primary features of...
The vision of autonomic computing involves distributed nodes capable of managing and preserving themselves. In practice, autonomic computing is also strongly connected to the concepts of mobility and platform heterogeneity since next generation networks assume different types of mobile nodes that operate inside ad hoc environments. In such cases where the context changes can be frequent, the capability...
This paper proposes a new space vector modulation (SVM) strategy for asymmetrical cascaded multilevel converters (ACMCs) operating under fault conditions. When the converter loses one power cell, the remaining ones can overmodulate, if the modulation strategy is not properly adapted to the fault condition. As in ACMCs the series-connected power cells operate with distinct voltages and frequencies,...
A small link bandwidth can lead to insufficient capacity and delay problems. Header compression can reduce the amount of packet header to make link utilization more efficient, but this compression technique introduces a longer processing time and may increase end-to-end delay. In time-sensitive applications such as VoIP, this additional delay is unacceptable since high network latency can lead to...
In this paper we discuss the need for a new command and control (C2) approach for the practical deployment of Moving Target Defenses (MTDs) enterprise networks. We describe some of the requirements and constraints associated with the combined use of multiple moving target defenses, and introduce a human-agent teamwork approach for the command and control of MTDs. We introduce and discuss some of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.