Giandini, Roxana Silvia
In the MDE (Model Driven Engineering) paradigm, models are thought to be the primary conductors in all software development aspects. A PIM (Platform Independent Model) is transformed into one or more PSMs (Platform Specific Model); hence, a specific PSM is generated for each specific technological platform. In turn these output models may be transformed into another set of models until finally the output consists of program code that can be executed. Model transformation is the MDE engine; models are no longer mere contemplative entities and become productive entities. The MDE initiative covers a broad spectrum of research areas: modeling languages,...
Ramón, Hugo Dionisio
C# for Programmers (Second Edition) focuses on explaining the characteristics of this language through the development of desktop applications –and in some cases, web forms– with the step-by-step technique, developing study cases such as: • Basic application for an automatic teller machine (ATM) • Payroll application • Guestbook application Concepts are developed in 26 chapters supported by 9 appendixes included in one CD.
Cheung, K. S.
Augmented marked graphs possess a special structure for modelling common resources as well as some desirable properties pertaining to liveness, boundedness, reversibility and conservativeness. This paper investigates the property-preserving composition of augmented marked graphs for the synthesis of distributed systems. It is proposed that distributed system components are specified as augmented marked graphs. An integrated system is obtained by composing these augmented marked graphs via their common resource places. Based on preservation of properties, liveness, boundedness, reversibility and conservativeness of the system can be readily derived. This contributes to resolve the problem of ensuring design correctness in the composition of...
Pérez, Celso Roberto; Lima, Derci de Oliveira
An ubiquitous computation environment has as presupposed that the computation is in all equipment and devices, and these are interacting between itself and with the people. The connection between objects and human beings is instantaneous, when these enter in the ubiquitous environment. A communication protocol to make the linking between many devices, of many manufacturers, in this environment, will be the key so that this connectivity happens. In the industrial automation, the protocol RS 485, is very used. Although some similarities in the intentions, the residential automation has different concepts from the industrial. The protocol I2C, of the wire technology,...
Anacleto, Valerio Adrián
In this paper, we present a UML profile and a group of UML patterns for documenting the component-andconnector
views of software architectures . They facilitate the creation of the component and connector viewtype in any UML 2.0 tool with a compliance level 3 . This work's contributions are: (1) Facilitating the documentation of all the software application's views using only one tool. (2) Curtailing investment in personnel training. (3) Allowing the establishment of an adequate traceability between the architectural artifacts and the rest of the model.
Del Colle, Franco A.; Gómez, Juan Carlos
An Image Adaptive Watermarking method based on the Discrete Wavelet Transform is presented in this paper.
The robustness and fidelity of the proposed method are evaluated and the method is compared to state-of-the-art watermarking techniques available in the literature. For the evaluation of watermark transparency, an image fidelity factor based on a perceptual distortion metric is introduced.
On the other hand, a degradation factor is introduced for the evaluation of watermark robustness against JPEG compression and resizing. The new fidelity metric allows a perceptually aware objective quantification of image fidelity.
The suitability of the proposed metric for the fidelity evaluation of still image...
Hernandez, Orlando J.; Sodon, Thomas; Adel, Michael; Kupp, Nathan
The need for privacy has become a major priority for both governments and civilians desiring protection from signal interception. Widespread use of personal communications devices has only increased demand for a level of security on previously insecure communications. This paper presents a novel low-cost architecture for the Advanced Encryption Standard (AES) algorithm utilizing a field programmable gate array (FPGA). In as much as possible, this architecture uses a bit-serial approach, and it is also suitable for VLSI implementations. In this implementation, the primary objective was not to increase throughput or decrease latency, but to balance these factors in order to...
De Giusti, Laura Cristina; Chichizola, Franco; Naiouf, Marcelo; De Giusti, Armando Eduardo
The TTIGHa model has been developed to model and predict the performance of parallel applications run over heterogeneous architectures. In addition, the task assignment algorithm was implemented to MATEHa processors based on the TTIGHa model.
This paper analyzes the assignment algorithm robustness before different variations which the model parameters may undergo (basically, communication and processing times).
De Giusti, Marisa Raquel; Lira, Ariel Jorge; Villarreal, Gonzalo Luján
Simulation is the process of executing a model, that is a representation of a system with enough detail to describe it but not too excessive. This model has a set of entities an internal state, a set of input variable that can be controlled and others that cannot, a list of process that bind these input variables with the entities and one or more output values, which result from the execution of the processes. Running a model is totally useless if it can not be analyzed, which means to study all interactions among input variables, model entities and their weight...