Third International Conference on Systems (icons 2008)

13-18 April 2008

Filter Results

Displaying Results 1 - 25 of 77
  • [Front cover]

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (122 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2008, Page(s):xii - xvi
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Tunable Current-Mode Multifunction Filter Using Universal Current Conveyors

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    In the paper a novel current-mode multifunction filter is presented, where changing the characteristic frequency f0 and the quality factor Q0 independently of each other and of other parameters is allowed. The whole design procedure is shown, with the Generalized Current Conveyor (GCC) being used in the initial design and the resultant multifunction filter containing the univ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating Almost Synchronous Communication Streams

    Publication Year: 2008, Page(s):7 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    An almost synchronous stream consists of a sequence of proper messages and pauses transmitted over a directed channel. The paper presents the transformational design of a communicating component which coordinates two almost synchronous streams. A proper message on one input channel is forwarded to the corresponding output channel as soon as there arrives a proper message on the other input channel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FINE: A Fully Informed aNd Efficient Communication-Induced Checkpointing Protocol

    Publication Year: 2008, Page(s):16 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    In this paper, first we discuss two critical data structures used in the communication-induced checkpointing (CIC) protocols and their distinct roles in guaranteeing z- cycle free (ZCF) property by tracking the checkpoint and communication pattern (CCPAT) in a distributed computation that can lead to Z-cycles and preventing them. Then, we provide our Transitive Dependency Enabled TimeStamp (TDE_TS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three

    Publication Year: 2008, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    DL systems with bilinear structure recently became an important base for cryptographic protocols such as identity-based encryption (IBE). Since the main computational task is the evaluation of the bilinear pairings over elliptic curves, known to be prohibitively expensive, efficient implementations are required to render them applicable in real life scenarios. We present an efficient accelerator f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A State Feedback Strategy for Decoupling a Class of Multivariable Systems

    Publication Year: 2008, Page(s):29 - 34
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Here a special state variable feedback or state feedback for short is introduced with the main objective of providing a convenient method for decoupling a MIMO transfer matrix. Decoupling in general and decoupling via state feedback in particular offer obvious advantages in the design and synthesis of controllers for MIMO systems. The early parts of this paper deal with the eigenvalues, poles, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Modeling and Control of Nonholonomic Mobile Robot with Lateral Slip

    Publication Year: 2008, Page(s):35 - 40
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2473 KB) | HTML iconHTML

    Nonholonomic mobile robots are characterized by no-slip constraints. However, in many practical situations, slips are inevitable. In this work, we develop a theoretical and systematic framework to include slip dynamics into the overall dynamics of the wheeled mobile robot (WMR). Such a dynamic model is useful to understand the slip characteristics during navigation of the WMR. We further design a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evaluation of QoS Management Approaches in Real-Time Databases

    Publication Year: 2008, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    In this paper we propose an evaluation model of QoS (Quality of Service) management approaches in real time database management systems (RTDBMS). In our model we define three evaluation levels: Models, Parameters and Policies. Each level is composed by a set of evaluation criteria. Our model is illustrated by an evaluation study of principale existing approaches of QoS management in RTDBMS. We aim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Synchronization Utilizing Harmonic Signal Generator for Capacitive Pressure Sensor Measurement

    Publication Year: 2008, Page(s):47 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    The harmonic signal generator utilizing sigma-delta modulation for capacitive pressure sensor measurement was designed in AMIS CMOS 0.7 mum technology. Harmonic signal generator is one of the important parts of complex measurement system for capacitive pressure sensor measurement. Whole capacitive measurement system is based on bandpass (BP) Sigma-Delta modulation. Phasing of harmonic signal and d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Load Control Techniques in SIP Signaling Servers

    Publication Year: 2008, Page(s):51 - 56
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    This paper is aimed at studying and evaluating the performance of two algorithms suitable for load control enhancement in "session initiation protocol" servers. A shrewd management of SIP call-control messages is key for the performance of telecom infrastructures, since SIP is rapidly gaining momentum to be the #1 protocol for session signaling in next-generation multimedia converged networks. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Second-Order State-Variable Filter with Current Operational Amplifiers

    Publication Year: 2008, Page(s):57 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    A design of the second-order filter based on the state-variable canonic structure is described. The filter operates in current mode and offers low-pass and band-pass transfer functions simultaneously. Current operational amplifiers are used as main active building blocks. An analysis of the influence of amplifier real properties on the filter characteristics is presented. The shifts of filter pole... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Secure Collaboration Transactions for Modern Information Systems

    Publication Year: 2008, Page(s):62 - 68
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB) | HTML iconHTML

    The issue of securing a collaboration within an information system is often addressed from the viewpoint of establishing a security policy that grants access to data by what role an individual has or the permissions that are attached to the underlying data. These methods are well suited for transactions where the concern is to secure the data during and after a collaboration. In the situation wher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meta-Design Support for Safe and Secure Networked Embedded Systems

    Publication Year: 2008, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    This paper presents principles of meta-design support for end-user development of safe and secure embedded system networking. The presented approach offers a reusable framework for Internet-based embedded system applications. The framework provides a development environment kernel that can be adapted for various safety/security critical embedded system application domains. It stems from the IEEE 1... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Derivation of Classes from Use Cases Automatically Generated by a Three-Level Sentence Processing Algorithm

    Publication Year: 2008, Page(s):75 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Identification of classes from a requirements specification is one of the most important and difficult tasks during analysis and design of new object- oriented systems. Recent developments in CASE tool research have begun incorporating quite sophisticated natural language processing techniques to help generate class diagrams; however, considerable problems remain in the form of overlooked and/or e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Microconductometer Utilizing Bipolar Pulse Method for Electro-Chemical Sensors

    Publication Year: 2008, Page(s):81 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    The microelectronic measuring system for conductivity electro-chemical sensor measurement of liquid materials properties was designed in AMIS CMOS 0.7 mum technology. The main parts of the system are current source with switchable subranges, the sensor switches allowing change of the current polarity in compliance with the bipolar pulse method, which was developed specially for this measurement pu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OCTOPODA: Building Financial Gateways Family System Using Domain Specific Kits

    Publication Year: 2008, Page(s):85 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    Financial institutions have been progressively challenged by being linked to a network of various internal and external systems through different and complex protocols. The way to manage this challenge is exploiting application-specific gateways known as financial gateways. However, the complexities of switch protocols as well as the variety of internal and external systems make the design of fina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Carbon Nanostructures in MEMS Applications

    Publication Year: 2008, Page(s):93 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1617 KB) | HTML iconHTML

    A new field emission pressure sensor based on carbon nanotubes (CNTs) emitting array is described in this paper. The pressure sensor is based on the principle that the field emission current is correlated with the electrical field intensity, i.e. the variable anode-emitter distance caused by pressure changes when the applied voltage is fixed. The sensor consists of two main parts, silicon etched m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Derivation of Tests from Timed Specifications According to Different Coverage Criteria

    Publication Year: 2008, Page(s):97 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    The main goal of this paper is to provide an algorithm to derive finite test suites, from timed specifications, according to a given coverage criterium. First, we introduce a timed extension of the finite state machines model. We consider that (output) actions take time to be performed. In addition to present our formalism, we develop a testing theory. Thus, we introduce a notion of timed test and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power-Aware Test Framework for Network-on-Chip

    Publication Year: 2008, Page(s):103 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    In this paper, we propose the power-aware test framework for network-on-chip (NoC). First, the possibility of using embedded processor and on-chip network are introduced and evaluated with benchmark system to test the other embedded cores. Second, a new generation method of test pattern, which is called 'don't care mapping', is presented to reduce the power consumption of on-chip network. The expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.