By Topic

Date 7-9 April 2006

Filter Results

Displaying Results 1 - 25 of 69
  • Welcome message from the chair

    Publication Year: 2006, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Menu page

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (289 KB)
    Freely Available from IEEE
  • Conference sessions

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (431 KB)
    Freely Available from IEEE
  • Engineering and technology management session

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (316 KB)
    Freely Available from IEEE
  • Poster session

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (10744 KB)
    Freely Available from IEEE
  • Poster session continued

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (508 KB)
    Freely Available from IEEE
  • [Hub page]

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (574 KB)
    Freely Available from IEEE
  • Raytheon Enterprise Management System Reference Architecture

    Publication Year: 2006, Page(s):3 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107807 KB) | HTML iconHTML

    Raytheon Information Systems is actively involved in numerous Network Centric development programs. A common element for these programs is an Enterprise Management System (EMS) responsible for all facets of network operations. The Raytheon EMS Reference Architecture (REMSRA) provides technical descriptions, COTS implementation options, and cost estimation information that can be directly inserted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture for interoperability and reuse in data mining systems

    Publication Year: 2006, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Data mining systems are mainly built to assist users to automatically abstract useful information from large data sets. Thus, they often lack supports for other important practical considerations commonly used in software development (e.g., ease of software modification and maintenance, and portability of resulting models). This paper studies principles for the development of data mining systems f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic transitions

    Publication Year: 2006, Page(s):22 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    A cryptographic transition is defined as managing the passage from one security architecture to another in a methodical approach that is consistent with prudent business practices and security guidelines. This paper addresses the three technology issues that drive the business and security justifications for initiating a transition; the principles guiding policy and practices when conducting a tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Open Source solutions for secure government systems

    Publication Year: 2006, Page(s):31 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (666 KB) | HTML iconHTML

    Recent updates to federal government and Department of Defense (DoD) security policies have opened the door to the official use of Open Source Software (OSS) as a solution set for the development of secure enterprise systems. New policies published by the National Institute of Standards and Technology (NIST) and the DoD have significantly changed the guidelines associated with deployment of indust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reinforcement Learning agents applied to a class of control system problems

    Publication Year: 2006, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    Some control system problems are sufficiently complex that it is difficult to define all of the decision weighting up-front. Reinforcement Learning (RL) can be applied to “tune” system performance. The Centipede Game from Economic Game Theory is used to simulate a control system problem with competing subsystem goals. RL agents are applied to the Centipede Game, which pits agents aga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A one gigaFLIPS fuzzy logic control chip using only combinational logic and Field Programmable Gate Arrays

    Publication Year: 2006, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2215 KB) | HTML iconHTML

    A real-time fully parallelized fuzzy logic control chip has been designed and implemented in a Xillinx Spartan IIe Field Programmable Gate Array. The current design handles two inputs and one output. Five membership functions are used to fuzzify each input signal, and five membership functions are used to defuzzify the output. Mamdani fuzzy inference is used to evaluate the 25 rules in the rule ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • View-based approach to constructing reliable Home Appliance Control System

    Publication Year: 2006, Page(s):47 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2097 KB) | HTML iconHTML

    Often times we may find ourselves in a situation where we are miles away and recall that we haven't closed our garage door or haven't switched off the stove, and using our internet-enabled wireless mobile device we send a command to our Home Appliance Control System (HACS) to either close the garage door or switch the stove off. However, how can we be sure that the command was executed and that th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Development of a high performance UAV for flight control research

    Publication Year: 2006, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    This paper summarizes the Phase I Airframe Development of an undergraduate research project for the Raptor 90 remote-controlled helicopter. The purpose of the project is to introduce the fundamentals of dynamics and control for rotorcraft to undergraduate engineers interested in control system theory. Follow on research for the Raptor 90 will include instrumentation and flight-testing for data col... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A pseudo random I/O scrambling and transformation approach in prevention of software piracy

    Publication Year: 2006, Page(s):62 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    This paper discusses a technique where input-output (I/O) is scrambled by mathematical manipulation. The process is effective in diverting the attention of adversary in terms of actual purpose of the application software. The technique is particularly useful when the software application performs certain number of mathematical equations, and produces a numerical result. The paper also demonstrates... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On effective use of reliability models and defect data in software development

    Publication Year: 2006, Page(s):67 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    In software technology today, several development methodologies such as extreme programming and open source development increasingly use feedback from customer testing. This makes the customer defect data become more readily available. This paper proposes an effective use of reliability models and defect data to help managers make software release decisions by applying a strategy for selecting a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Natural language order - a streamlined approach to modeling

    Publication Year: 2006, Page(s):72 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (942 KB) | HTML iconHTML

    Computer models of biological systems need to manage both form and function. The transformation of scientific observation to computer code requires a means of describing form and function that fits both systems approaches. We propose the use of formal natural language order. Our hypothesis is that by designing such a process we can provide a tool that both “feels” natural to the rese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software hazard generation with model checking

    Publication Year: 2006, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    The problem of finding hazards associated with software becomes more necessary if not critical as modern systems increasingly rely on software to provide their main functionalities. While verification and validation can help determine whether software behaves correctly according to its specifications and user needs, they cannot guarantee that software will not lead to system hazards particularly w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High performance RF SOI MOSFET varactor modeling and design

    Publication Year: 2006, Page(s):83 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1208 KB) | HTML iconHTML

    This paper presents an RF model of an accumulation-mode MOS varactor with a high capacitance tuning range in a multi-finger layout. This model is based on the physical parameters of the device, and it can describe the voltage dependent capacitance, as well as the parasitic circuit elements. It employs a single topology with lumped elements derived from the device, so that it can be easily integrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of a 45nm CMOS voltage controlled oscillator using design of experiments

    Publication Year: 2006, Page(s):87 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1228 KB) | HTML iconHTML

    We present a design of experiments (DOE) approach to nanometer design of an analog voltage controlled oscillator (VCO) using CMOS technology. The functional specifications of the VCO optimized in this design are the center frequency and minimization of overall power consumption as well as minimization of power due to gate tunneling current leakage, a component that was not important in previous ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant FPGAs by online ECC verification and restoration

    Publication Year: 2006, Page(s):91 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    In this paper, an new approach is introduced for FPGAs to perform online verification and restoration. The whole FPGA is considered as a static memory whose content is the configuration data. Hamming codes - an error correcting code, are used to detect and correct the configuration data written to FPGA. The extra Hamming parity data are stored in the Block Memory of the FPGA when configuring the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of cooperative control system tasks using hedonistic multi-agents

    Publication Year: 2006, Page(s):94 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    As control system complexity increases, scalability often becomes a limiting constraint. Distributed systems and multi-agent systems are useful approaches in designing complex systems, but communications for coordination are often a limiting factor as systems scale up. Colonies of social insects achieve synergistic results beneficial to the entire colony even though their individual behaviors can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of animal behavior using neural networks

    Publication Year: 2006, Page(s):99 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    In this paper, we simulated some basic animal behavior by letting it “evolve” through generations. The animals, which are able to survive, will be given the privilege to breed the new generation and pass the good genes to the next generation. Our simulation environment consisted of a Prey-Predator-Food model. The prey and predators created in our simulation are objects that have sens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.