Refining VHDL Specifications Through Conformance Testing: Case Study of an Adaptive Computing Architecture

1999 ◽  
Author(s):  
Ali Y. Duale ◽  
Bruce D. McClure ◽  
M. Umit Uyar
1990 ◽  
Vol 69 (1) ◽  
pp. 60-83 ◽  
Author(s):  
Mostafa Hashem Sherif ◽  
M. Üimit Uyar

2017 ◽  
Vol 42 (4) ◽  
pp. 372-382
Author(s):  
Akalanka Karunarathne Mudiyanselage ◽  
Lei Pan

2016 ◽  
Author(s):  
Kaoshan Dai ◽  
Ying Wang ◽  
Andrew Hedric ◽  
Zhenhua Huang

Psychometrika ◽  
2019 ◽  
Vol 84 (1) ◽  
pp. 285-309 ◽  
Author(s):  
Steven Andrew Culpepper ◽  
Herman Aguinis ◽  
Justin L. Kern ◽  
Roger Millsap

Information ◽  
2019 ◽  
Vol 10 (12) ◽  
pp. 383
Author(s):  
Guanggang Song ◽  
Bin Li ◽  
Yuqing He

Container terminals are the typical representatives of complex supply chain logistics hubs with multiple compound attributes and multiple coupling constraints, and their operations are provided with the strong characteristics of dynamicity, nonlinearity, coupling, and complexity (DNCC). From the perspective of computational logistics, we propose the container terminal logistics generalized computing architecture (CTL-GCA) by the migration, integration, and fusion of the abstract hierarchy, design philosophy, execution mechanism, and automatic principles of computer organization, computing architecture, and operating system. The CTL-GCA is supposed to provide the problem-oriented exploration and exploitation elementary frameworks for the abstraction, automation, and analysis of green production at container terminals. The CTL-GCA is intended to construct, evaluate, and improve the solution to planning, scheduling, and decision at container terminals, which all are nondeterministic polynomial hard problems. Subsequently, the logistics generalized computational pattern recognition and performance evaluation of a practical container terminal service case study is launched by the qualitative and quantitative approach from the sustainable perspective of green production. The case study demonstrates the application, utilization, exploitation, and exploration of CTL-GCA preliminarily, and finds the unsustainable patterns of production at the container terminal. From the above, we can draw the following conclusions. For one thing, the CTL-GCA makes a definition of the abstract and automatic running architecture of logistics generalized computation for container terminals (LGC-CT), which provides an original framework for the design and implementation of control and decision mechanism and algorithm. For another, the CTL-GCA can help us to investigate the roots of DNCC thoroughly, and then the CTL-GCA makes for conducting the efficient and sustainable running pattern recognition of LGC-CT. It is supposed to provide a favorable guidance and supplement to define, design, and implement the agile, efficient, sustainable, and robust task scheduling and resource allocation for container terminals by computational logistics whether in the strategy level or the tactical one.


Kybernetes ◽  
2017 ◽  
Vol 46 (3) ◽  
pp. 479-500 ◽  
Author(s):  
Kushal Anjaria ◽  
Arun Mishra

Purpose Any computing architecture cannot be designed with complete confidentiality. As a result, at any point, it may leak the information. So, it is important to decide leakage threshold in any computing architecture. To prevent leakage more than the predefined threshold, quantitative analysis is helpful. This paper aims to provide a method to quantify information leakage in service-oriented architecture (SOA)-based Web services. Design/methodology/approach To visualize the dynamic binding of SOA components, first, the orchestration of components is modeled. The modeling helps to information-theoretically quantify information leakage in SOA-based Web services. Then, the paper considers the non-interference policy in a global way to quantify information leakage. It considers not only variables which interfere with security sensitive content but also other architectural parameters to quantify leakage in Web services. To illustrate the attacker’s ability, a strong threat model has been proposed in the paper. Findings The paper finds that information leakage can be quantified in SOA-based Web services by considering parameters that interfere with security sensitive content and information theory. A hypothetical case study scenario of flight ticket booking Web services has been considered in the present paper in which leakage of 18.89 per cent information is calculated. Originality/value The paper shows that it is practically possible to quantify information leakage in SOA-based Web services. While modeling the SOA-based Web services, it will be of help to architects to identify parameters which may cause the leakage of secret contents.


Sign in / Sign up

Export Citation Format

Share Document