Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 14 papers published in subject: > since this site started. |
Results per page: | 14 Total, 2 Pages | << First < Previous 1 2 |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Schedulability Analysis for Mode Changes in AFDX Network | |||
Lu Xiaoyuan,Li Jian,Hu Fei | |||
Computer Science and Technology 18 December 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Avionics Full Duplex Switched Ethernet (AFDX) is a new communication standard for an Aircraft Data Network. AFDX networks are used in safety-critical applications that require dedicated bandwidth and provides deterministic Quality of Service (QoS). An aircraft system based on an AFDX network must have the ability to change its functionality over time by means of a mode change. Therefore, it is very important to guarantee the timing requirements in every steady mode, and also during the transition between two different modes. In this paper, a mode change request (MCR) is defined as a sporadic event which triggers a change from one mode to another mode. A Basic Mode Change Model is first described for an AFDX network in order to analyze schedulability of mutual data flows. Then schedulability analysis is done using the proposed model by computing worst case response time for the data flow. | |||
TO cite this article:Lu Xiaoyuan,Li Jian,Hu Fei. Schedulability Analysis for Mode Changes in AFDX Network[OL].[18 December 2012] http://en.paper.edu.cn/en_releasepaper/content/4500982 |
2. A Systematic Software Aging Parameter Identification Method\ for Xen | |||
Wu Di ,Wang Yuhao ,Song Qinbao | |||
Computer Science and Technology 23 May 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:software rejuvenation has been used to avoidsoftware (running image) aging, which is thephenomena of the gradual performance degradationof running software images due to unreleasedresources, accumulation of numerical errors, andfile system degradation. At the same time,software rejuvenation also can incur an overheadwhich should be balanced against the lossincurred due to unexpected outage caused by afailure. Thus, effective rejuvenation depends onthe right time. The time to rejuvenate is usuallyestimated based on the collection and statisticalanalysis of the values of aging related systemparameters. However, to our knowledge, there isno work on systematically identifying the agingrelated parameters. Thus, in this paper, wepropose a systematic method for identifying theseparameters, which is verified in the context ofXen. We firstly identify 2101 potential agingrelated system parameters that cover all the aspects of system, includingCPU scheduling, networking, memory/diskaccessing, virtual machine monitor communication and system kernel information. Then, we collect the values of theseparameters in both aging and healthy runningprocesses. After that, statistical test andmanual identification technique are used toobtain aging related parameters. We also verifiedthese parameters by a machine learning method,the results show that the parameters caneffectively represent the system performance andfurther system aging state. | |||
TO cite this article:Wu Di ,Wang Yuhao ,Song Qinbao . A Systematic Software Aging Parameter Identification Method\ for Xen[OL].[23 May 2012] http://en.paper.edu.cn/en_releasepaper/content/4479012 |
3. Component Security Testing Approach Based on Extended Chemical Abstract Machine | |||
Chen Jinfu ,Yansheng Lu,Huanhuan Wang | |||
Computer Science and Technology 09 October 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Unreliable component security hinders the development of component technology. Component security testing is rarely researched with comprehensive focus; several approaches or technologies for detecting vulnerabilities in component security have been proposed, but most are infeasible. A testing approach for component security, which is based on the chemical abstract machine, is proposed for detecting explicit and implicit component security vulnerabilities. We develop an extended chemical abstract machine model, called eCHAM, and generate a state transfer tree and testing sequence for components based on the proposed model. The model can help test the explicit security exceptions of components according to the testing approach of interface fault injection. Condition and state mutation algorithms for identifying implicit security exceptions are also proposed. Vulnerability testing reports are obtained according to the test results. Experiments were conducted in an integration testing platform to verify the applicability of the proposed approach. Results show that the approach is effective and practicable. The proposed approach can detect explicit and implicit security exceptions of components. | |||
TO cite this article:Chen Jinfu ,Yansheng Lu,Huanhuan Wang. Component Security Testing Approach Based on Extended Chemical Abstract Machine[J]. |
4. The Formal Model of Real-time Service Components Composition Based on Duration Calculus | |||
Jin Xianli ,Ma Huadong | |||
Computer Science and Technology 26 April 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper proposes a new method for modeling the real-time service components composition using Duration Calculus (DC), an interval temporal logic. We first introduce the definition of service component formalism. Then we analyze how to use DC to describe the component composition in detail. Moreover, the temporal constraint checking of component composition is discussed. Compared with the previous methods, the main advantage of our method is that it can formally depict the temporal constraints with different granularities of the service-oriented system. | |||
TO cite this article:Jin Xianli ,Ma Huadong . The Formal Model of Real-time Service Components Composition Based on Duration Calculus[OL].[26 April 2007] http://en.paper.edu.cn/en_releasepaper/content/12502 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: | 14 Total, 2 Pages | << First < Previous 1 2 |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated