Filters








6,908 Hits in 6.6 sec

Taming subsystems

Adam Lackorzynski, Alexander Warg
2009 Proceedings of the Second Workshop on Isolation and Integration in Embedded Systems - IIES '09  
Open systems, such as Linux, provide access to a huge software base.  ...  The embedded and mobile computing market with its wide range of innovations is expected to remain growing in the foreseeable future.  ...  In a client-server scenario, a server implements an object whereas the client uses the associated interface to access the object.  ... 
doi:10.1145/1519130.1519135 fatcat:pof34phsmrba3hmadpkhj3n2by

The Design of the NetBSD I/O Subsystems [article]

SungWon Chung
2016 arXiv   pre-print
The goal of this book is to provide necessary information to understand the operation and the implementation of I/O subsystems in the kernel as well as to design and implement a new filesystem on the NetBSD  ...  This book describes the source code of the NetBSD Operating System Release 1.6 in SUN UltraSPARC 64-bit platform by annotating related excerpts from references and user manuals on the NetBSD Operating  ...  This approach requires at least one memory-to-memory copy operation to satisfy a user request.  ... 
arXiv:1605.05810v1 fatcat:h74x3uds7vavhld43yjitxbfh4

D1.1 Design of infrastructure architecture and subsystems

Dan Warren, Ahmed Elmokashfi, Andrea F. Cattoni, Andres J. Gonzalez, Artur Hecker, Carlos Parada, Christos Politis, Christos Tranoris, Costas Kalogiros, Diego R. Lopez, Dimitrios Kritharidis, Duncan Silvey (+28 others)
2018 Zenodo  
To allow 5G-VINNI Facility Sites to implement their networks with some degree of consistency, and with the potential for inter-operability and interconnection between Facility Sites, a common architecture  ...  This document is produced ahead of implementation, and so is to some extent a description of the expectations for implementing a standards compliant facility.  ...  Inter-AS VPN, and option a, b or c).  In addition, RFC 4364 also includes a hierarchical approach allowing a VPN to be used as a Carrier for other Carriers (NSPs) traffic, either when such a customer  ... 
doi:10.5281/zenodo.2668754 fatcat:w55axi3vejf6bgrmwbqs2vshd4

Improved one-pass IP Multimedia Subsystem authentication for UMTS

Lili Gu, Mark A Gregory
2011 The International Conference on Information Networking 2011 (ICOIN2011)  
Authentication is very important for a terminal to gain access to a network and therefore considerable previous research into this topic has occurred.  ...  As a part of the evolved core network, Internet Protocol (IP) Multimedia Subsystem (IMS) provides multimedia services (data, voice, video and variations) over packet switched networks.  ...  Objectives The objective of this research is to develop improved IP multimedia subsystem authentication for the 4G LTE network with increased performance, security and less energy consumption.  ... 
doi:10.1109/icoin.2011.5723109 dblp:conf/icoin/GuG11 fatcat:wqafbuianza6bfwlo7ts2zc4cm

Focus Issue on Legacy Information Systems and Business Process Change: Migrating Large-Scale Legacy Systems to Component-Based and Object Technology: The Evolution of a Pattern Language

A.J. O'Callaghan
1999 Communications of the Association for Information Systems  
This paper presents a successful new approach that focuses primarily on the architecture of the software system to migrate an existing system to a new form.  ...  It resulted in a still-evolving pattern language called ADAPTOR (Architecture-Driven and Pattern-based Techniques for Object Reengineering). This article outlines the approach that underlies ADAPTOR.  ...  , hierarchical form of a structure chart [Constantine and Yourdon 1976] .  ... 
doi:10.17705/1cais.00203 fatcat:sxfpssqarrbnxegdrrnu35l7tu

System, Subsystem, Hive: Boundary Problems in Computational Theories of Consciousness

Tomer Fekete, Cees van Leeuwen, Shimon Edelman
2016 Frontiers in Psychology  
We argue that if a putative MoC can be shown to be systemic, this ipso facto resolves any associated boundary issues.  ...  However, unless its design is properly constrained, such an MoC gives rise to what we call the boundary problem: an MoC that labels a system as conscious will do so for some-perhaps most-of its subsystems  ...  We propose to do so by stating what it means for a subsystem to operate "on its own."  ... 
doi:10.3389/fpsyg.2016.01041 pmid:27512377 pmcid:PMC4961712 fatcat:awpck2ghv5d7lfnr6yqpyb4dgy

Improved E-ELT subsystem and component specifications, thanks to M1 test facility

M. Dimmler, J. Marrero, S. Leveque, Pablo Barriga, B. Sedghi, N. Kornweibel, Larry M. Stepp, Roberto Gilmozzi, Helen J. Hall
2014 Ground-based and Airborne Telescopes V  
Secondly, and of major benefit to the project, it offered the possibility to evaluate component and subsystem performance and interface issues in a system context in such detail, that issues could be identified  ...  early enough to feed back into the subsystem and component specifications.  ...  ACKNOWLEDGEMENTS The author would like to acknowledge the valuable support of Bernard Buzzoni for the optical setup and alignment of the metrology tests and Robert Frahm for the Labview implementation  ... 
doi:10.1117/12.2055142 fatcat:hhvvoiryojg6vonox3dq27zi6a

Design of a Flow Visualisation Framework

Matthew Edmunds, Chao Tong, Robert Laramee
2015 Computers  
We present a description of our system in detail, whereas previously published work focuses on the research contribution. The effectiveness and scalability of the approach is also discussed.  ...  The researcher is more able to compare and contrast existing or previous work with new research.  ...  Acknowledgments The Authors would like to thank the Department of Computer Science at Swansea University, UK.  ... 
doi:10.3390/computers4010024 fatcat:qj7b55oeo5bybgks3o7jtsjjea

Object acquaintance selection and binding

Jan Bosch
1998 Theory and Practice of Object Systems  
Traditional object communication is based on sending a message to a receiver object known to the sender of the message.  ...  to be reallocated at run-time and objects can be replaced by other objects in order to adapt to the dynamic changes in the system.  ...  Acknowledgements The discussions with Fredrik Ygge and the detailed comments from Peter Molin helped develop the ideas presented in this paper.  ... 
doi:10.1002/(sici)1096-9942(1998)4:3<151::aid-tapo2>3.0.co;2-v fatcat:3zxxxkqxzvgcxpexhurkfdjemy

Object acquaintance selection and binding

Jan Bosch
1998 Theory and Practice of Object Systems  
Traditional object communication is based on sending a message to a receiver object known to the sender of the message.  ...  to be reallocated at run-time and objects can be replaced by other objects in order to adapt to the dynamic changes in the system.  ...  Acknowledgements The discussions with Fredrik Ygge and the detailed comments from Peter Molin helped develop the ideas presented in this paper.  ... 
doi:10.1002/(sici)1096-9942(1998)4:3<151::aid-tapo2>3.3.co;2-n fatcat:nivaajwu3rffxftht5fvoz7eum

Technology harmonization - developing a reference architecture for the ground segment software

N. Duro, F. Moreira, J. Rogado, J. Reis, N. Peccia
2005 2005 IEEE Aerospace Conference  
Initially, the scope of the Ground Systems Harmonization roadmap was restricted to Mission Control and EGSE systems, but it was later broadened to include all Ground Systems Software.  ...  12 Over the past few years, efforts have been made in Europe to harmonize the space technology.  ...  That is, their inner functionalities are encapsulated using a Service Oriented approach, and their main interfaces are exported to external world.  ... 
doi:10.1109/aero.2005.1559702 fatcat:lcnd6vevjzcivpxbwqrkgee5q4

Safety-Critical Java: level 2 in practice

Matt Luckcuck, Andy Wellings, Ana Cavalcanti
2016 Concurrency and Computation  
We also propose simplifications to the termination protocol of missions and their mission sequencers.  ...  To illustrate the benefit of our changes, we present excerpts from a formal model of SCJ Level~2 written in Circus, a state-rich process algebra for refinement.  ...  We would like to thank the other members of the Expert Group for their contributions and feedback on some of the ideas expressed in this paper. No new primary data were created during this study.  ... 
doi:10.1002/cpe.3951 fatcat:5xh6rc4denagtjo4cowssqbvze

Reengineering legacy systems for distributed environments

Miguel A. Serrano, Doris L. Carver, Carlos Montes de Oca
2002 Journal of Systems and Software  
We then perform wrapping and object-based adaptations to the subsystems to address encapsulation and information hiding if the underlying paradigm of the legacy system is not object-based.  ...  Use hierarchical clustering algorithms over the association coefficients (support and confidence from the data mining) to produce a hierarchical decomposition of the system.  ...  shown in the figure corresponds to the CBO_d object-oriented metric that we defined and not the most common CBO metric.  ... 
doi:10.1016/s0164-1212(02)00020-1 fatcat:husaa4kzqbg5zddzh2pebvaxrm

An Approach to Building Object Models with UML in Embedded Systems

Kimour Mohamed Tahar
2004 Journal of Computing and Information Technology  
In this article, we propose a systematic approach to building object models in embedded systems.  ...  After hierarchically decomposing the system into its parts, the approach consists of firstly converting the use case into a statechart that models states of the concerned system parts and, secondly, identifying  ...  A control object: encapsulates appropriate computations that involve a group of entity objects or that cannot be naturally associated to other objects.  ... 
doi:10.2498/cit.2004.03.04 fatcat:3ckmwoq22jhl3f2z6zoy2zznyq

An agent-based approach for building complex software systems

Nicholas R. Jennings
2001 Communications of the ACM  
Secondly, although objects encapsulate state and behavior realization, they do not encapsulate behavior activation (action choice).  ...  The system's hierarchical nature is expressed through the "related to" links, components within a subsystem are connected through "frequent interaction" links, and interactions between components are expressed  ... 
doi:10.1145/367211.367250 fatcat:tv4feq3a7rct7bhcl5n76pjr5i
« Previous Showing results 1 — 15 out of 6,908 results